Sample records for remote code execution

  1. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  2. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  3. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  4. V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

  5. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

  6. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

  7. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

  8. U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...

    Broader source: Energy.gov (indexed) [DOE]

    4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

  9. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  10. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  11. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  12. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  13. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  15. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

  16. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  17. V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

  18. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  19. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  20. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  4. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  5. U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

  6. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  7. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  8. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  9. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

  10. Experience with Remote Job Execution

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

    2008-01-01T23:59:59.000Z

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  11. T-529: Apple Mac OS PackageKit Distribution Script Remote Code...

    Broader source: Energy.gov (indexed) [DOE]

    29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

  12. V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    remote user can cause the Firefox installer to load a DLL from the default downloads directory and execute arbitrary code. Only Windows-based systems are affected. A remote user...

  13. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

  14. U-071:HP Database Archiving Software Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

  15. T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

  16. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

  17. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  18. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  19. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  20. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

  1. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code| Department

  2. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  3. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  4. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  5. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Broader source: Energy.gov (indexed) [DOE]

    Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  6. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  7. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary...

  8. Federated Clusters Using the Transparent Remote Execution (TREx) Environment

    E-Print Network [OSTI]

    Scherson, Isaac D.

    Federated Clusters Using the Transparent Remote Execution (TREx) Environment Richert Wang1 University of California, Irvine 442 Computer Science Building Irvine, CA 92697-3435 rkwang@ics.uci.edu Enrique Cauich University of California, Irvine 442 Computer Science Building Irvine, CA 92697

  9. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

  10. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Broader source: Energy.gov (indexed) [DOE]

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

  11. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code.

  12. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2001-08-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document representsthe development of a uniform content code system for RH-TRU waste to be transported in the 72-Bcask. It will be used to convert existing waste form numbers, content codes, and site-specificidentification codes into a system that is uniform across the U.S. Department of Energy (DOE) sites.The existing waste codes at the sites can be grouped under uniform content codes without any lossof waste characterization information. The RH-TRUCON document provides an all-encompassing|description for each content code and compiles this information for all DOE sites. Compliance withwaste generation, processing, and certification procedures at the sites (outlined in this document foreach content code) ensures that prohibited waste forms are not present in the waste. The contentcode gives an overall description of the RH-TRU waste material in terms of processes and|packaging, as well as the generation location. This helps to provide cradle-to-grave traceability ofthe waste material so that the various actions required to assess its qualification as payload for the72-B cask can be performed. The content codes also impose restrictions and requirements on themanner in which a payload can be assembled.The RH-TRU Waste Authorized Methods for Payload Control (RH-TRAMPAC), Appendix 1.3.7of the 72-B Cask Safety Analysis Report (SAR), describes the current governing procedures|applicable for the qualification of waste as payload for the 72-B cask. The logic for this|classification is presented in the 72-B Cask SAR. Together, these documents (RH-TRUCON,|RH-TRAMPAC, and relevant sections of the 72-B Cask SAR) present the foundation and|justification for classifying RH-TRU waste into content codes. Only content codes described in thisdocument can be considered for transport in the 72-B cask. Revisions to this document will be madeas additional waste qualifies for transport. |Each content code uniquely identifies the generated waste and provides a system for tracking theprocess and packaging history. Each content code begins with a two-letter site abbreviation thatindicates the shipper of the RH-TRU waste. The site-specific letter designations for each of the|DOE sites are provided in Table 1. Not all of the sites listed in Table 1 have generated/stored RH-|TRU waste.

  13. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  14. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

  15. MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real

    E-Print Network [OSTI]

    Turletti, Thierry

    : information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

  16. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    issue does not affect Mac OS X systems. Viewing an image in a maliciously prepared directory may lead to arbitrary code execution. A path searching issue exists in QuickTime...

  17. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload...

  18. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  19. U-051: Skype Discloses IP Addresses to Remote Users | Department...

    Broader source: Energy.gov (indexed) [DOE]

    available at the time of this entry. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

  20. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  1. Classification of Code Annotations and Discussion of Compiler-Support for Worst-Case Execution Time Analysis

    E-Print Network [OSTI]

    of energy consumption, resource-aware code generation, or re- targetable code generators. Program execution providing explicit sup- port for WCET analysis would have on usage of these code annotations is discussed

  2. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  3. Preliminary Project Execution Plan for the Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    David Duncan

    2011-05-01T23:59:59.000Z

    This preliminary project execution plan (PEP) defines U.S. Department of Energy (DOE) project objectives, roles and responsibilities of project participants, project organization, and controls to effectively manage acquisition of capital funds for construction of a proposed remote-handled low-level waste (LLW) disposal facility at the Idaho National Laboratory (INL). The plan addresses the policies, requirements, and critical decision (CD) responsibilities identified in DOE Order 413.3B, 'Program and Project Management for the Acquisition of Capital Assets.' This plan is intended to be a 'living document' that will be periodically updated as the project progresses through the CD process to construction and turnover for operation.

  4. The role of the PIRT process in identifying code improvements and executing code development

    SciTech Connect (OSTI)

    Wilson, G.E. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Boyack, B.E. [Los Alamos National Lab., NM (United States)

    1997-07-01T23:59:59.000Z

    In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

  5. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  6. SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification

    E-Print Network [OSTI]

    Simha, Rahul

    SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software ­ for software integrity protection and authentication and presents performance results. Our system architecture

  7. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    Lets Remote Users Execute Arbitrary Code January 17, 2012 - 1:00pm Addthis PROBLEM: PHP Null Pointer Dereference in zendstrndup() Lets Local Users Deny Service PLATFORM: PHP...

  8. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  9. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Environmental Management (EM)

    URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSLTLS Sessions U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

  10. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2014-06-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  11. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-04-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  12. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-01-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  13. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-04-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  14. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-06-01T23:59:59.000Z

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  15. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Oracle Java. REFERENCE LINKS: SecurityTracker Alert ID: 1028466 Oracle IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create a specially crafted Java application that,...

  16. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to...

  17. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Danny Anderson

    2014-07-01T23:59:59.000Z

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE and commercial disposal options exist for contact-handled LLW; however, offsite disposal options are either not currently available (i.e., commercial disposal facilities), practical, or cost-effective for all remote-handled LLW streams generated at INL. Offsite disposal of all INL and tenant-generated remote-handled waste is further complicated by issues associated with transporting highly radioactive waste in commerce; and infrastructure and processing changes at the generating facilities, specifically NRF, that would be required to support offsite disposal. The INL Remote-Handled LLW Disposal Project will develop a new remote handled LLW disposal facility to meet mission-critical, remote-handled LLW disposal needs. A formal DOE decision to proceed with the project has been made in accordance with the requirements of National Environmental Policy Act (42 USC§ 4321 et seq.). Remote-handled LLW is generated from nuclear programs conducted at INL, including spent nuclear fuel handling and operations at NRF and operations at the Advanced Test Reactor. Remote-handled LLW also will be generated by new INL programs and from segregation and treatment (as necessary) of remote handled scrap and waste currently stored in the Radioactive Scrap and Waste Facility at the Materials and Fuels Complex.

  18. U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...

    Broader source: Energy.gov (indexed) [DOE]

    information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

  19. T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially...

    Broader source: Energy.gov (indexed) [DOE]

    of service. Solution: Pidgin has issued a fix (2.10.0). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

  20. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

  1. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  2. V-002: EMC NetWorker Module for Microsoft Applications Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    2: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code and Local Users Obtain Passwords V-002: EMC NetWorker Module for Microsoft Applications...

  3. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

  4. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

  5. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

  6. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

  7. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|Conduct

  8. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

  9. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters andCross-Site

  10. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar, Conduct

  11. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address| DepartmentObtain

  12. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

  13. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & SolarDepartmentArbitrary Code

  14. T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery AttacksCode |

  15. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO *Arbitrary Code

  16. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks |Department of EnergyCode |

  17. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code |

  18. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting Attacks |Service |Code |

  19. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities |

  20. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  1. U-082: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department of

  2. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08T23:59:59.000Z

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  3. T-660: OpenSSH on FreeBSD Has Buffer Overflow in pam_thread() That Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    The module does not adequately validate user input leading to an cross-site scripting (XSS) possibility in certain circumstances.

  4. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  5. U-219: Symantec Web Gateway Input Validation Flaws Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    9: Symantec Web Gateway Input Validation Flaws Lets Remote Users Inject SQL Commands, Execute Arbitrary Commands, and Change User Passwords U-219: Symantec Web Gateway Input...

  6. Executive Officer

    Broader source: Energy.gov [DOE]

    THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

  7. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive4

  8. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive45

  9. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    Eirinaki, Magdalini

    Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  10. FEI Program Session: Date: CHRIS Code: Session Number:

    Broader source: Energy.gov (indexed) [DOE]

    OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

  11. Virtual Private Environments for Multiphysics Code Validation on Computing Grids

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

  12. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich Marquez,

  13. Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

  14. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Environmental Management (EM)

    Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 ABSTRACT: A remote authenticated user can execute arbitrary...

  15. Real-time Remote Sensing of Snowmobiles Emissions at

    E-Print Network [OSTI]

    Denver, University of

    Real-time Remote Sensing of Snowmobiles Emissions at Yellowstone National Park: An Oxygenated Fuel 68509 #12;Real-time Remote Sensing of Snowmobile Emissions at Yellowstone National Park 2 Executive emissions from snowmobiles. Ratios of CO, HC and toluene to CO2 were measured and used to calculate %CO, %HC

  16. Chip Laingen Executive Director

    E-Print Network [OSTI]

    Levinson, David M.

    Link 3) MilTech · Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

  17. executive.mcgill.ca Understand how to enter and develop global business opportunities as they arise

    E-Print Network [OSTI]

    Fabry, Frederic

    of constant change. ALAIN LAFOREST - BMW GROUP OF CANADA #12;Designed for senior managers and executives · Developing global synergy and collaboration · Principles of leading in remote (virtual) work environments

  18. U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

  19. ISO 14001: An Executive Report

    E-Print Network [OSTI]

    Simon, Richard

    1998-01-01T23:59:59.000Z

    Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

  20. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16T23:59:59.000Z

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  1. Remote administration and user experience evaluation of the iLab Heat Transfer Project site

    E-Print Network [OSTI]

    Graham, Rodney K

    2006-01-01T23:59:59.000Z

    The iLab Heat Transfer Project provides a means for students to remotely execute, via a web interface, experiments related to the topic of heat transfer. The website associated with this project provides instructors with ...

  2. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07T23:59:59.000Z

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  3. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromising ScienceRecentRegionalReliabilityScientificNationalRemote

  4. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    commands with the privileges of the target web service. This can be exploited to gain shell access on the target device. IMPACT: Execution of arbitrary code via network, User...

  5. Code Description Code Description

    E-Print Network [OSTI]

    Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

  6. Carrie Takeyasu Executive Director

    E-Print Network [OSTI]

    Burg, Theresa

    Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

  7. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  8. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14T23:59:59.000Z

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  9. On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4,

    E-Print Network [OSTI]

    Denver, University of

    On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4, November 2002 Gary A Sensing of Automobile Emissions in the Phoenix Area: Year 4 1 EXECUTIVE SUMMARY The University of Denver #12;On-Road Remote Sensing of Automobile Emissions in the Phoenix Area: Year 4 2 by 5 years

  10. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  11. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Users Execute Arbitrary Code Remote execution of arbitrary code February 2, 2012 U-094: EMC Documentum Content Server Lets Local Administrative Users Gain Elevated Privileges EMC...

  12. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    reported in Microsoft Internet Explorer. reference LINKS: Bugtraq ID: 55562 Security Database KB2757760 Microsoft Security Advisory (2757760) SecurityTracker Alert ID: 1027538...

  13. V-035: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    read may occur in Skia CVE-2012-5130. A memory corruption error may occur in the Apple OSX driver for Intel GPUs CVE-2012-5131. A browser crash may occur when processing...

  14. E-Print Network 3.0 - alpha coding sequence Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    will generate conservative Alpha code sequences for unaligned memory access. If the profile does not indicate... Pentium or a 200-MHz Pentium Pro when executing translated...

  15. Conservation Focus and Executive

    E-Print Network [OSTI]

    Northwest Power and Conservation Council Focus and Executive Summary Background Power Committee Walla Walla May 12, 2009 #12;Northwest Power and Conservation Council Conditions Facing the Region and Conservation Council Resource Alternatives · Increased cost-effective efficiency potential ­ Technological

  16. Sustainability Initiative Executive Summary

    E-Print Network [OSTI]

    Sheridan, Jennifer

    UW­Madison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UW­Madison's leadership and campus community. There are many reasons why

  17. U-236: Microsoft JScript and VBScript Engine Integer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    Code U-131: Adobe Photoshop TIFF Image Heap Overflow Lets Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code...

  18. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  19. Spinal codes

    E-Print Network [OSTI]

    Perry, Jonathan, S.M. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

  20. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01T23:59:59.000Z

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  1. Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 · K. Crary and S. Sarkar the executable code is accompanied

  2. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive Committee

  3. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive

  4. Executives & Structure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

  5. CEES Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium: Celebrating the Past -Executive Committee photo

  6. NCAI Executive Council Winter Session

    Broader source: Energy.gov [DOE]

    National Congress of American Indians (NCAI) is hosting the 2015 Executive Council Winter Session in Washington, DC, Feb. 23-25, 2015.

  7. Fuzzy Partitioning Using Real Coded Variable Length Genetic Algorithm for Pixel Classification

    E-Print Network [OSTI]

    Bandyopadhyay, Sanghamitra

    , fuzzy clustering, pattern recognition, remote sensing imagery, Department of Computer Science, KalyaniFuzzy Partitioning Using Real Coded Variable Length Genetic Algorithm for Pixel Classification space. Real-coded variable string length genetic fuzzy clustering with automatic evolution of clusters

  8. Building Relationships with Executive Search Firms Building Relationships with Executive Search Firms

    E-Print Network [OSTI]

    Ferrari, Silvia

    Relationships Similar Searches Alumni Organizations Education Company Team - Sports Job Hunting / NetworkingBuilding Relationships with Executive Search Firms for Building Relationships with Executive Search Firms for Weiner & Associates, Inc. Executive Search Partners Weiner & Associates, Inc. Executive Search

  9. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17T23:59:59.000Z

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  10. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28T23:59:59.000Z

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  11. U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...

    Broader source: Energy.gov (indexed) [DOE]

    Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-126: Cisco Adaptive...

  12. U-120: RSA SecurID Software Token Converter Unspecified Buffer...

    Broader source: Energy.gov (indexed) [DOE]

    Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

  13. Introduction to Algebraic Codes

    E-Print Network [OSTI]

    codes. Since the elementary coding theory is assumed to be of interest only to ... the algebraic codes, mainly BCH codes, Reed-Solomon codes and classical ...

  14. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Broader source: Energy.gov (indexed) [DOE]

    text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

  15. SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...

    Office of Environmental Management (EM)

    SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

  16. JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP

    E-Print Network [OSTI]

    Peak, Derek

    JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

  17. Remote actuated valve implant

    SciTech Connect (OSTI)

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25T23:59:59.000Z

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  18. Remotely Deployed Virtual Sensors

    E-Print Network [OSTI]

    Julien, Christine

    Remotely Deployed Virtual Sensors TR-UTEDGE-2007-010 Sanem Kabadayi Christine Julien © Copyright 2007 The University of Texas at Austin #12;Remotely Deployed Virtual Sensors Sanem Kabadayi that run on mobile client devices connect to the sensors of a multihop sensor network. For emerging

  19. Holographic codes

    E-Print Network [OSTI]

    Latorre, Jose I

    2015-01-01T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  20. Holographic codes

    E-Print Network [OSTI]

    Jose I. Latorre; German Sierra

    2015-02-23T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  1. U-013: HP Data Protector Multiple Unspecified Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

  2. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01T23:59:59.000Z

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  3. Regulatory constraints on executive compensation

    E-Print Network [OSTI]

    Joskow, Paul L.

    1993-01-01T23:59:59.000Z

    This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

  4. Executive Summary By Blake Johnson

    E-Print Network [OSTI]

    Straight, Aaron

    Executive Summary By Blake Johnson Creating Business Value with Analytics and Big Data A one and Teradata Corporation, and was led by Blake Johnson, consulting professor in the Department of Management

  5. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01T23:59:59.000Z

    ~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

  6. Procedure-level Authorization for Java Remote Method Invocation Using SSL Credentials

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Procedure-level Authorization for Java Remote Method Invocation Using SSL Credentials Alexander of any thread assumptions. KEYWORDS Java, RMI, RPC, mobile code, SSL, Authorization #12;i TABLE............................................................ 2 Figure 2: The creation and registration of an SSL socket

  7. GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries

    SciTech Connect (OSTI)

    Shalf, John; Goodale, Tom

    2004-02-01T23:59:59.000Z

    GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

  8. Caltech campus executive LDRD.

    SciTech Connect (OSTI)

    Shepodd, Timothy J.; Knudsen, Tamara

    2013-01-01T23:59:59.000Z

    The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

  9. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  10. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    to Remote Users Two vulnerabilities were reported in Bugzilla. July 27, 2012 U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar,...

  11. U-017: HP MFP Digital Sending Software Lets Local Users Obtain...

    Broader source: Energy.gov (indexed) [DOE]

    TRACETRACK Support Lets Remote Users Obtain Potentially Sensitive Information V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  12. Identification coding schemes for modulated reflectance systems

    DOE Patents [OSTI]

    Coates, Don M. (Santa Fe, NM); Briles, Scott D. (Los Alamos, NM); Neagley, Daniel L. (Albuquerque, NM); Platts, David (Santa Fe, NM); Clark, David D. (Santa Fe, NM)

    2006-08-22T23:59:59.000Z

    An identifying coding apparatus employing modulated reflectance technology involving a base station emitting a RF signal, with a tag, located remotely from the base station, and containing at least one antenna and predetermined other passive circuit components, receiving the RF signal and reflecting back to the base station a modulated signal indicative of characteristics related to the tag.

  13. Thermal Infrared Remote Sensing

    E-Print Network [OSTI]

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing #12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 and x-ray Ultraviolet Infrared Microwave and radio waves Wavelength in meters (m) Electromagnetic.77 700 red limit 30k0.041 2.48 green500 near-infrared far infrared ultraviolet Thermal Infrare refers

  14. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph (Las Cruces, NM); Olsen, Khris (Richland, WA); Larson, David (Las Cruces, NM)

    1997-01-01T23:59:59.000Z

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  15. High Performance “Reach” Codes

    E-Print Network [OSTI]

    Edelson, J.

    2011-01-01T23:59:59.000Z

    Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

  16. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08T23:59:59.000Z

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

  17. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12T23:59:59.000Z

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  18. Remote connector development study

    SciTech Connect (OSTI)

    Parazin, R.J.

    1995-05-01T23:59:59.000Z

    Plutonium-uranium extraction (PUREX) connectors, the most common connectors used at the Hanford site, offer a certain level of flexibility in pipe routing, process system configuration, and remote equipment/instrument replacement. However, these desirable features have inherent shortcomings like leakage, high pressure drop through the right angle bends, and a limited range of available pipe diameters that can be connect by them. Costs for construction, maintenance, and operation of PUREX connectors seem to be very high. The PUREX connector designs include a 90{degree} bend in each connector. This increases the pressure drop and erosion effects. Thus, each jumper requires at least two 90{degree} bends. PUREX connectors have not been practically used beyond 100 (4 in.) inner diameter. This study represents the results of a survey on the use of remote pipe-connection systems in US and foreign plants. This study also describes the interdependence between connectors, remote handling equipment, and the necessary skills of the operators.

  19. Faculty of Engineering Executive Committee

    E-Print Network [OSTI]

    Petriu, Emil M.

    is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

  20. Project Description Executive Summary Report

    E-Print Network [OSTI]

    O'Toole, Alice J.

    $Total Project Cost: 1,000,000Auxillary Enterprises Balances $ 9,400,000Revenue Financing System Bonds $ 1Project Description Executive Summary Report Project Information Project Budget Project Funding 302-680 Parking Structure Phase I This project consists of a 750 space parking garage of approximately 251

  1. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    de Lijser, Peter

    Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  2. DISCOVER YOURS MBA FOR EXECUTIVES

    E-Print Network [OSTI]

    Richards-Kortum, Rebecca

    you to earn an MBA? Where is the starting point? What is the return on investment for you and your-suite view on building a robust corporate culture, protecting ethical business foundations, and managing the organization in change ÂĄ Executive Forum IV--an international management off-site intensive caps the global

  3. Executive Summary By Blake Johnson

    E-Print Network [OSTI]

    Straight, Aaron

    Executive Summary By Blake Johnson Creating Business Value with Enterprise Data and Analytics A one Corporation and was led by Blake Johnson, a consulting professor in the Department of Management Science the discussion of each of these topics are summarized below Framing the Day's Discussion Blake Johnson began

  4. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14T23:59:59.000Z

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  5. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemoteSpectrum andRemote

  6. Northwest Energy Efficiency Taskforce Executive Committee

    E-Print Network [OSTI]

    #12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

  7. UCSF Sustainability Action Plan: Executive Summary

    E-Print Network [OSTI]

    Yamamoto, Keith

    UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

  8. ByteCode 2011 LCT: An Open Source Concolic Testing Tool

    E-Print Network [OSTI]

    Heljanko, Keijo

    recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K¨ahk¨onen, Tuomas

  9. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  10. Executive Director Carleton Sustainable Energy Research Centre

    E-Print Network [OSTI]

    Dawson, Jeff W.

    Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

  11. Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA

    E-Print Network [OSTI]

    Pasareanu, Corina

    Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

  12. Vacuum Vessel Remote Handling

    E-Print Network [OSTI]

    and Remote Handling 4 Vacuum vessel functions · Plasma vacuum environment · Primary tritium confinement, incl ports 65 tonnes - Weight of torus shielding 100 tonnes · Coolant - Normal Operation Water, Handling 12 Vessel octant subassembly fab. (3) · Octant-to-octant splice joint requires double wall weld

  13. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  14. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    upgrade the printer's firmware with arbitrary code November 29, 2011 U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code Several...

  15. Collection Management Policy Executive Summary

    E-Print Network [OSTI]

    Levi, Ran

    Collection Development Budget Allocation 1.4 Responsibility for Collection Development within the Library 2 Management 3.1 Locations and Availability of Material 3.1.1 Heavy Demand 3.1.2 Closed access and remote - Collection Maintenance and Evaluation 4.1 De-Selection of Materials #12;4.1.1 Criteria for Retention

  16. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23T23:59:59.000Z

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  17. Implementation of Executive Order 13514, Federal Leadership in...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance Implementation of Executive Order 13514, Federal Leadership in...

  18. Executive Secretariat | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles »Exchange Visitors Program Exchange Visitors Program TheExecutive

  19. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    None

    2014-11-06T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  20. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09T23:59:59.000Z

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  1. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29T23:59:59.000Z

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  2. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16T23:59:59.000Z

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  3. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect (OSTI)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19T23:59:59.000Z

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  4. SUPPRESSED AMBIGUITY IN RANGE BY PHASE-CODED WAVEFORMS Sune R.J. Axelsson

    E-Print Network [OSTI]

    Ha, Dong S.

    SUPPRESSED AMBIGUITY IN RANGE BY PHASE-CODED WAVEFORMS Sune R.J. Axelsson Swedish Defence Research Email: Sune.Axelsson@dynamics. saab.se Abstract- In Doppler radar for surveillance and Remote Sensing

  5. Generalized concatenated quantum codes

    E-Print Network [OSTI]

    Grassl, Markus

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

  6. Concatenated Conjugate Codes

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-31T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  7. RH-TRU Waste Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2007-07-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

  8. Executive Committee | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive Committee

  9. STEP Participant Survey Executive Summary

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energy fromCommentsRevolving STATEMENT OF MELANIE KENDERDINE7 (07/03)Executive

  10. ExecutiveBios2012.indd

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director www.sandia.gov

  11. REMOTE AND RURAL ENTERPRISE (RARE)

    E-Print Network [OSTI]

    Viglas, Anastasios

    in remote central Australia is establishing a commercial aquaponics enterprise, a social entrepreneur, hospitality and horticulture. The current focus is on a commercial aquaponics enterprise and a cultural

  12. 2009 Wind Technologies Market Report: Executive Summary

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.

    2010-08-01T23:59:59.000Z

    This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

  13. Federal Executive Institute (FEI) | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    together managers and executives from 25 to 30 Federal agencies for a unique, residential learning experience. The objective is to help agencies in the development of their career...

  14. Budget Execution Funds Distribution and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09T23:59:59.000Z

    The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

  15. Senior Executive Service Candidate Development Program | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Program Senior Executive Service Candidate Development Program The Office of Learning and Workforce Development coordinates applications for all DOE Federal Employees. Overview The...

  16. Software Design 2 (Arduino Nano) BodyBody--RemotesRemotes

    E-Print Network [OSTI]

    Spletzer, John R.

    Software Design 2 (Arduino Nano) BodyBody--RemotesRemotes Gesture Based Appliance Control System the room Large wireless range, e.g. 100 m range with 1mW XBees Safely separate the Arduino from input ways to lower cost further Switch to Arduino Mini Light Develop our own wireless modules Jacob

  17. A multiple sphere T-matrix Fortran code for use on parallel computer clusters

    E-Print Network [OSTI]

    calculate maps of the electric field both interior and exterior to the spheres. The code is written- based algorithm ­ is not in a form readily adaptable to high-performance, parallel-based computational execution of the code for large-scale ensembles on both parallel and serial machines. To meet this end we

  18. Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *

    E-Print Network [OSTI]

    Pereira, Fernando

    , and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

  19. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

  20. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

  1. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J. (Scotia, NY); Cramer, Charles E. (Guilderford, NY)

    1988-01-01T23:59:59.000Z

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  2. Homological stabilizer codes

    SciTech Connect (OSTI)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15T23:59:59.000Z

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  3. Hans M. Amman Executive Board Utrecht University

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Hans M. Amman Executive Board Utrecht University Current Positions 2006­present Executive Board Member (lid College van Bestuur), Utrecht University, Utrecht, the Netherlands. 2006­present Professor of Economics and Management, Utrecht School of Economics, Utrecht University, Utrecht, the Netherlands

  4. IBM Global Business Services Executive Report

    E-Print Network [OSTI]

    -based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

  5. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2011-09-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  6. Space and Remote Sensing (ISR-2)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Space and Remote Sensing Developing and applying remote sensing capabilities to problems of global security and related sciences Contacts Group Leader Robert Shirey Email Deputy...

  7. Insertion of operation-and-indicate instructions for optimized SIMD code

    SciTech Connect (OSTI)

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04T23:59:59.000Z

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  8. NSTX Upgrade Project Execution Plan NSTX Upgrade Project

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 1 October 6, 2011 Submitted by: R. Strykowsky NSTX Upgrade Project Manager _____________________________ M. Williams Associate Director, PPPL

  9. NSTX Upgrade Project Execution Plan NSTX Upgrade Project

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 3 October 12, 2012 Administrative Change Submitted by: ______________________________ R. Strykowsky NSTX Upgrade Project Manager Anthony Indelicato

  10. The Minimum Assumed Incentive Effect of Executive Share Options 

    E-Print Network [OSTI]

    Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

    2003-01-01T23:59:59.000Z

    In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

  11. PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure

    SciTech Connect (OSTI)

    Ryan, M.T.; Fields, D.E.

    1981-05-01T23:59:59.000Z

    PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

  12. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Grassl, Markus

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

  13. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

  14. Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

    2007-09-27T23:59:59.000Z

    We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

  15. Generalized Concatenated Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

    2009-01-09T23:59:59.000Z

    We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

  16. Encoding Subsystem Codes

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli; Andreas Klappenecker

    2008-06-30T23:59:59.000Z

    In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

  17. Renewable Energy Requirement Guidance for EPAct 2005 and Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

  18. Richard Lazarus Named as Executive Director of National Commission...

    Office of Environmental Management (EM)

    Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National Commission on the BP...

  19. New Executive Order Establishes a Federal Flood Risk Management...

    Energy Savers [EERE]

    New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

  20. PIA - Savannah River Operations Office Executive Commitment Action...

    Energy Savers [EERE]

    Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations...

  1. American Indian Policy and Relevant DOE and Executive Orders...

    Energy Savers [EERE]

    Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

  2. President Issues Executive Order Aimed at Preparing for the Impacts...

    Broader source: Energy.gov (indexed) [DOE]

    President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

  3. Eastern Wind Integration and Transmission Study: Executive Summary...

    Office of Environmental Management (EM)

    Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This...

  4. OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...

    Office of Environmental Management (EM)

    OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy...

  5. SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES

    E-Print Network [OSTI]

    Delene, David J.

    SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb utilities. · Lackofnaturallight

  6. FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...

    Broader source: Energy.gov (indexed) [DOE]

    6 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

  7. On optimal constacyclic codes

    E-Print Network [OSTI]

    Giuliano G. La Guardia

    2013-11-11T23:59:59.000Z

    In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

  8. Project Execution Plan, Rev. 3

    SciTech Connect (OSTI)

    IT Corporation, Las Vegas

    2002-08-01T23:59:59.000Z

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  9. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  10. Stateless and stateful implementations of faithful execution

    DOE Patents [OSTI]

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16T23:59:59.000Z

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  11. Account Executive Account Manager of Sales

    E-Print Network [OSTI]

    Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

  12. Microsoft Word - CTF Executive Summary 001.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Loop Pre-Conceptual Design Executive Summary December 2008 BEA Contract No. 000 75310 Disclaimer This report was prepared as an account of work sponsored by an agency of the...

  13. NSTX Upgrade Project Execution Plan NSTX Upgrade Project

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    #12;#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii Table of Contents 1 ..............................................................................................................................1 1.2.1 DOE-approved project documents

  14. NSTX Upgrade Project Execution Plan NSTX Upgrade Project

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    #12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record/schedule baseline updates #12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii ..............................................................................................................................1 1.2.1 DOE-approved project documents

  15. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter W. Shor; Bei Zeng

    2009-05-04T23:59:59.000Z

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

  16. Remote drill bit loader

    SciTech Connect (OSTI)

    Dokos, J.A.

    1996-12-31T23:59:59.000Z

    A drill bit loader is described for loading a tapered shank of a drill bit into a similarly tapered recess in the end of a drill spindle. The spindle has a transverse slot at the inner end of the recess. The end of the tapered shank of the drill bit has a transverse tang adapted to engage in the slot so that the drill bit will be rotated by the spindle. The loader is in the form of a cylinder adapted to receive the drill bit with the shank projecting out of the outer end of the cylinder. Retainer pins prevent rotation of the drill bit in the cylinder. The spindle is lowered to extend the shank of the drill bit into the recess in the spindle and the spindle is rotated to align the slot in the spindle with the tang on the shank. A spring unit in the cylinder is compressed by the drill bit during its entry into the recess of the spindle and resiliently drives the tang into the slot in the spindle when the tang and slot are aligned. In typical remote drilling operations, whether in hot cells or water pits, drill bits have been held using a collet or end mill type holder with set screws. In either case, to load or change a drill bit required the use master-slave manipulators to position the bits and tighten the collet or set screws. This requirement eliminated many otherwise useful work areas because they were not equipped with slaves, particularly in water pits.

  17. Graph concatenation for quantum codes

    E-Print Network [OSTI]

    Beigi, Salman

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

  18. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    "qtactivex" parameters within an HTML object. 4) A boundary error when handling the transform attribute of "text3GTrack" elements can be exploited to cause a buffer overflow via...

  19. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    An SVG text handling font processing flaw exists CVE-2011-2877. A cross-origin access control flaw exists CVE-2011-2878. Lifetime and threading issues exist in...

  20. T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    be confirmed via a browser dialog CVE-2011-2783. A file path may be disclosed in the GL program log CVE-2011-2784. The homepage URL is not sanitized in extensions...

  1. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    ID 1028504 IBM Security Bulletin 1633819 CVE-2013-0127 CVE-2013-0538 IMPACT ASSESSMENT: Medium DISCUSSION: The mail client does not filter 'applet' and 'javascript' tags in...

  2. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar Power in the|

  3. V-109: Google Chrome WebKit Type Confusion Error Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment of

  4. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS XCode |

  5. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartmentApple Mac OS

  6. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023:Addresses | Department

  7. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a commandDepartment

  8. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters and

  9. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of Energy

  10. CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

  11. Joint Source-Channel Coding via Turbo Codes

    E-Print Network [OSTI]

    Alajaji, Fady

    Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

  12. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect (OSTI)

    Not Available

    2006-09-01T23:59:59.000Z

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  13. Unfolding the color code

    E-Print Network [OSTI]

    Aleksander Kubica; Beni Yoshida; Fernando Pastawski

    2015-03-06T23:59:59.000Z

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

  14. U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...

    Broader source: Energy.gov (indexed) [DOE]

    Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

  15. U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

  16. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

  17. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. November 9, 2012 V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple...

  18. T-625: Opera Frameset Handling Memory Corruption Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    security and stability enhancements. Opera Download Addthis Related Articles V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-105: Google Chrome...

  19. T-589: Citrix XenApp and Citrix Presentation Server Bug

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system.

  20. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  1. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    An update that fixes 25 vulnerabilities is now available. October 15, 2012 V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  2. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  3. U-002:Adobe Photoshop Elements Multiple Memory Corruption Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  4. List decoding of subspace codes and rank-metric codes

    E-Print Network [OSTI]

    Mahdavifar, Hessam

    2012-01-01T23:59:59.000Z

    2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

  5. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

  7. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  8. Compiling Codes on Euclid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  10. Homological Product Codes

    E-Print Network [OSTI]

    Sergey Bravyi; Matthew B. Hastings

    2013-11-04T23:59:59.000Z

    Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

  11. Electromagnetic Radiation REFERENCE: Remote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    1 CHAPTER 2: Electromagnetic Radiation Principles REFERENCE: Remote Sensing of the Environment John;2 Electromagnetic Energy Interactions Energy recorded by remote sensing systems undergoes fundamental interactions, creating convectional currents in the atmosphere. c) Electromagnetic energy in the form of electromagnetic

  12. Sustainable Acquisition Coding System | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

  13. Understanding Perception Through Neural 'Codes'

    E-Print Network [OSTI]

    Freeman, Walter J III

    2011-01-01T23:59:59.000Z

    Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “Perception Through Neural ‘Codes’. In: Special Issue on “

  14. 10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Sensing

    E-Print Network [OSTI]

    Plaza, Antonio J.

    10 January 2009 PHOTOGRAMMETRIC ENGINEERING & REMOTE SENSING High Performance Computing in Remote Book ReviewBook Review High Performance Computing in Remote Sensing introduces the most recent advances in the incorporation of the high-performance computing (HPC) paradigm in remote sensing missions. Eighteen well

  15. Connecting Remote Clusters with ATM

    SciTech Connect (OSTI)

    Hu, T.C.; Wyckoff, P.S.

    1998-10-01T23:59:59.000Z

    Sandia's entry into utilizing clusters of networked workstations is called Computational Plant or CPlant for short. The design of CPlant uses Ethernet to boot the individual nodes, Myrinet to communicate within a node cluster, and ATM to connect between remote clusters. This SAND document covers the work done to enable the use of ATM on the CPlant nodes in the Fall of 1997.

  16. The Remote Media Immersion (RMI)

    E-Print Network [OSTI]

    Shahabi, Cyrus

    the ultimate digital media delivery platform. Its streaming media server delivers multiple high- bandwidth aspects). The hope is that our advances in digital media delivery will enable new applicationsThe Remote Media Immersion (RMI) system blends multiple cutting- edge media technologies to create

  17. Shortened Turbo Codes

    E-Print Network [OSTI]

    David J.C. MacKay

    Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

  18. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  19. Code Red 2 kills off Code Red 1

    E-Print Network [OSTI]

    Paxson, Vern

    #12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

  20. Scott Shreeve, MD Chief Executive Officer

    E-Print Network [OSTI]

    Rose, Michael R.

    is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

  1. A Market Feasibility Study Executive Summary

    E-Print Network [OSTI]

    popular areblack,green,andoolongteas.Lesswellknowntypesincludewhiteand Puer tea. There is a high levelA Market Feasibility Study Executive Summary Hawai`i-Grown Tea Pacific Asian Center for Entrepreneurship #12;Overview This report is a feasibility study for developing tea into a viable and sustainable

  2. Executive Education Program Freight Transportation and

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

  3. February 1, 2006 Emmett Brown, Executive Director

    E-Print Network [OSTI]

    Arnold, Douglas N.

    February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

  4. NSTX Upgrade Project Project Execution Plan

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    NSTX Upgrade Project Project Execution Plan 6 PPPL Laboratory Director S.Prager Deputy Director.Gentile Centerstack Dsgn & Fab J. Chrzanowski NSTX Upgrade Project Manager R. Strykowsky Deputy and Construction Manager E. Perry Project Controls S. Langish NSTXCenterstack Manager L. Dudek NSTXNeutral Beam Manager T

  5. NSTX Upgrade Project Project Execution Plan

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    NSTX Upgrade Project Project Execution Plan Appendix 1 - WBS Dictionary 25 Appendix 1 - NSTX Upgrade Project Work Breakdown Structure This Work Breakdown Structure (WBS) organizes and defines the scope of the NSTX Upgrade using the WBS as established by the original NSTX project and modified

  6. Executive Vice President La-Verna Fountain

    E-Print Network [OSTI]

    Kim, Philip

    construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

  7. Academic Integrity Task Force Report Executive Summary

    E-Print Network [OSTI]

    Roy, Subrata

    . For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

  8. Hawaii energy strategy: Executive summary, October 1995

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  9. Curtin University Organisational Chart * Executive Managers

    E-Print Network [OSTI]

    Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

  10. TABLE OF CONTENTS 3 Executive Summary

    E-Print Network [OSTI]

    Rigor, Ignatius G.

    . JISAO's four major research themes, Fisheries Recruitment (Marine Ecosystems), Climate, Environmental Ecosystems 34 Climate 60 Environmental Chemistry 70 Coastal Oceanography 75 Appendices 75 Appendix 1 Senior;3 EXECUTIVE SUMMARY The Joint Institute for the Study of the Atmosphere and Ocean (JISAO) fosters

  11. How to Apply for Senior Executive positions

    Broader source: Energy.gov [DOE]

    To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you.

  12. Darden Executive Education Management Development Program

    E-Print Network [OSTI]

    Acton, Scott

    , or will soon undergo, the transition from a functional to a general management role. They may alsoDarden Executive Education Management Development Program: Driving Vision, Action, and Results ... Change the Way You Think! #12;The Program Organizations globally need to prepare middle management

  13. A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    12.02.2006 1 A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY A GULF OF MEXICO AND OCS ENERGY DISCUSSION) AND THE FLORIDA COASTAL OCEAN OBSERVING SYSTEMS (FLORIDA COOS) AS AN IOOS INITIATIVE · The Gulf of Mexico Energy necessary to protect and sustain the Gulf of Mexico's natural resources. · Failing to share qualified OCS

  14. EXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS

    E-Print Network [OSTI]

    Fernandez, Eduardo

    , and implementation of the program. a. Multiple new programs were enhanced and added to make New Student OrientationEXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS 2012-2013 Overview The Office of New Student and Owl Family Programs plays an integral role within the University by offering a supportive, innovative

  15. Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM

    E-Print Network [OSTI]

    Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

  16. Executive Summaries for the Hydrogen Storage Materials Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

  17. Executive Function and Pediatric Overweight: A Problem-Solving Framework

    E-Print Network [OSTI]

    Johnson, Audrea

    2012-10-19T23:59:59.000Z

    . The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

  18. A Hybrid Procedural Deductive Executive For Autonomous Spacecraft

    E-Print Network [OSTI]

    Williams, Brian C.

    autonomy, including robust plan execution Pell et al. 1997b. Since aborting a plan and taking time to re of robust plans, which incorpo- rate exibility to be used by the execution system in case problems

  19. A Principal Components Analysis of Executive Processes: Exploring the Structure of Executive Functions using Neuropsychological Tests 

    E-Print Network [OSTI]

    Maner, Safir

    2011-11-23T23:59:59.000Z

    ”, “Dual-Tasking” and “Planning”) and their relationship to “Intelligence”. The separability of these executive functions was explored. Ten neuropsychological tests were administered to young and healthy participants (N =103). Correlations between tests...

  20. RH-TRU Waste Content Codes (RH-TRUCON)

    SciTech Connect (OSTI)

    Washington TRU Solutions LLC

    2007-08-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

  1. RH-TRU Waste Content Codes (RH-TRUCON)

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2007-05-30T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code. Requests for new or revised content codes may be submitted to the WIPP RH-TRU Payload Engineer for review and approval, provided all RH-TRAMPAC requirements are met.

  2. The Implementation of a Hybrid-Execute-In-Place Architecture to Reduce the Embedded System Memory Footprint and Minimize Boot Time

    E-Print Network [OSTI]

    Chang, Weide

    Footprint and Minimize Boot Time Tony Benavides, Justin Treon, Jared Hulbert, and Willie Chang1 Flash Memory effectiveness and performance. The ability for an operating system to boot quickly combined with speedy-system where the code gets copied to RAM at boot time and executes out of the RAM. This paper explores

  3. NSTX Upgrade Project Execution Plan NSTX Upgrade Project

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    #12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record 10/12/2012 Update to WBS Level 2 Threshold (top of page 20), Change DOE Federal Project Director and Deputy Federal Project Director. Various OBS changes. #12;NSTX Upgrade Project Execution Plan NSTX

  4. Contracts for Model Execution Verification Eric Cariou1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Contracts for Model Execution Verification Eric Cariou1 , Cyril Ballagny2 , Alexandre Feugas3 a contract-based approach to specify an execution semantics for a meta-model. We show that an execution model transformation contracts for controlling the dynamic con- sistent evolution of a model during its

  5. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  6. UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee

    E-Print Network [OSTI]

    (UEH-UC Collaboration) is a broad- based collaboration among university community members (eg. Students remotely. Focus groups will be organized as the UEH Rectorat prioritizes but will likely be broad areas-cultural, multi-disciplinary environment. · Conversational in French and/or Haitian Kreyol #12;

  7. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    SciTech Connect (OSTI)

    Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  8. Difficulties in vector-parallel processing of Monte Carlo codes

    SciTech Connect (OSTI)

    Higuchi, Kenji; Asai, Kiyoshi [Japan Atomic Energy Research Inst., Tokyo (Japan). Center for Promotion of Computational Science and Engineering; Hasegawa, Yukihiro [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan)

    1997-09-01T23:59:59.000Z

    Experiences with vectorization of production-level Monte Carlo codes such as KENO-IV, MCNP, VIM, and MORSE have shown that it is difficult to attain high speedup ratios on vector processors because of indirect addressing, nests of conditional branches, short vector length, cache misses, and operations for realization of robustness and generality. A previous work has already shown that the first, second, and third difficulties can be resolved by using special computer hardware for vector processing of Monte Carlo codes. Here, the fourth and fifth difficulties are discussed in detail using the results for a vectorized version of the MORSE code. As for the fourth difficulty, it is shown that the cache miss-hit ratio affects execution times of the vectorized Monte Carlo codes and the ratio strongly depends on the number of the particles simultaneously tracked. As for the fifth difficulty, it is shown that remarkable speedup ratios are obtained by removing operations that are not essential to the specific problem being solved. These experiences have shown that if a production-level Monte Carlo code system had a capability to selectively construct source coding that complements the input data, then the resulting code could achieve much higher performance.

  9. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    SciTech Connect (OSTI)

    kelkar, sharad

    2013-04-30T23:59:59.000Z

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  10. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  11. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J. (Idaho Falls, ID); Roberts, Mark P. (Arco, ID)

    2006-03-21T23:59:59.000Z

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  12. Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner

    E-Print Network [OSTI]

    Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

  13. Graph Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

    2010-02-03T23:59:59.000Z

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

  14. RH-TRU Waste Content Codes (RH TRUCON)

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2007-05-01T23:59:59.000Z

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: • A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. • A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is “3.” The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code.

  15. Mission Need Statement for the Idaho National Laboratory Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Lisa Harvego

    2009-06-01T23:59:59.000Z

    The Idaho National Laboratory proposes to establish replacement remote-handled low-level waste disposal capability to meet Nuclear Energy and Naval Reactors mission-critical, remote-handled low-level waste disposal needs beyond planned cessation of existing disposal capability at the end of Fiscal Year 2015. Remote-handled low-level waste is generated from nuclear programs conducted at the Idaho National Laboratory, including spent nuclear fuel handling and operations at the Naval Reactors Facility and operations at the Advanced Test Reactor. Remote-handled low-level waste also will be generated by new programs and from segregation and treatment (as necessary) of remote-handled scrap and waste currently stored in the Radioactive Scrap and Waste Facility at the Materials and Fuels Complex. Replacement disposal capability must be in place by Fiscal Year 2016 to support uninterrupted Idaho operations. This mission need statement provides the basis for the laboratory’s recommendation to the Department of Energy to proceed with establishing the replacement remote-handled low-level waste disposal capability, project assumptions and constraints, and preliminary cost and schedule information for developing the proposed capability. Without continued remote-handled low-level waste disposal capability, Department of Energy missions at the Idaho National Laboratory would be jeopardized, including operations at the Naval Reactors Facility that are critical to effective execution of the Naval Nuclear Propulsion Program and national security. Remote-handled low-level waste disposal capability is also critical to the Department of Energy’s ability to meet obligations with the State of Idaho.

  16. TESLA Technical Design Report Executive Summary

    E-Print Network [OSTI]

    TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

  17. Budget Formulation & Execution | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution Budget

  18. Budget Formulation and Execution | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution

  19. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

  20. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime...

  1. V-075: EMC AlphaStor Command Injection and Format String Flaws...

    Broader source: Energy.gov (indexed) [DOE]

    5: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users Execute Arbitrary Code V-075: EMC AlphaStor Command Injection and Format String Flaws Let Remote Users...

  2. Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms

    E-Print Network [OSTI]

    Kapralova, Olga

    2013-01-01T23:59:59.000Z

    Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

  3. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    the target user opens a valid Remote Desktop configuration file (.rdp) from the same directory as the DLL file, the application may load the remote user's DLL instead of the...

  4. Universal space-time codes from demultiplexed trellis codes

    E-Print Network [OSTI]

    Kose, Cenk; Wesel, R D

    2006-01-01T23:59:59.000Z

    and A. R. Calderbank, “Space-time codes for high data ratePerformance criteria and code construction,” IEEE Trans.of space–time trellis codes,” IEEE Trans. Commun. , vol. 51,

  5. Relation Between Surface Codes and Hypermap-Homology Quantum Codes

    E-Print Network [OSTI]

    Pradeep Sarvepalli

    2014-03-14T23:59:59.000Z

    Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

  6. Remote-handled transuranic waste study

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    The Waste Isolation Pilot Plant (WIPP) was developed by the US Department of Energy (DOE) as a research and development facility to demonstrate the safe disposal of transuranic (TRU) radioactive wastes generated from the Nation`s defense activities. The WIPP disposal inventory will include up to 250,000 cubic feet of TRU wastes classified as remote handled (RH). The remaining inventory will include contact-handled (CH) TRU wastes, which characteristically have less specific activity (radioactivity per unit volume) than the RH-TRU wastes. The WIPP Land Withdrawal Act (LWA), Public Law 102-579, requires a study of the effect of RH-TRU waste on long-term performance. This RH-TRU Waste Study has been conducted to satisfy the requirements defined by the LWA and is considered by the DOE to be a prudent exercise in the compliance certification process of the WIPP repository. The objectives of this study include: conducting an evaluation of the impacts of RH-TRU wastes on the performance assessment (PA) of the repository to determine the effects of Rh-TRU waste as a part of the total WIPP disposal inventory; and conducting a comparison of CH-TRU and RH-TRU wastes to assess the differences and similarities for such issues as gas generation, flammability and explosiveness, solubility, and brine and geochemical interactions. This study was conducted using the data, models, computer codes, and information generated in support of long-term compliance programs, including the WIPP PA. The study is limited in scope to post-closure repository performance and includes an analysis of the issues associated with RH-TRU wastes subsequent to emplacement of these wastes at WIPP in consideration of the current baseline design. 41 refs.

  7. Remote imaging of concealed objects

    SciTech Connect (OSTI)

    Lev, Aner, E-mail: lev@soreq.gov.il; Sfez, Bruno, E-mail: lev@soreq.gov.il [Soreq NRC, Yavne, 81800 (Israel)

    2014-05-27T23:59:59.000Z

    Optical detection of objects hidden behind opaque screening layers is a challenging problem. We demonstrate an optically detected echographic-like method that combines collimated acoustic and laser beams. The acoustic waves cross the screening layers and their back-reflection from the hidden objects is detected through the analysis of a dynamic laser speckle pattern created at the outer surface of the screening layer. Real-time remote detection of moving targets 15 meters away, with a few mm resolutions is demonstrated using a very sensitive camera detection scheme.

  8. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access Ames

  9. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access

  10. Remote Sensing R. E. Mcintosh

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote

  11. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N. (ed.)

    1985-05-01T23:59:59.000Z

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  12. Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 1484-1497; doi:10.3390/rs5031484 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal and the Community Land Model version 4 (CLM4), we investigated percent changes and controlling factors of global vegetation growth for the period 1982 to 2009. Over that 28-year period, both the remote-sensing estimate

  13. Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing

    E-Print Network [OSTI]

    Myneni, Ranga B.

    Remote Sens. 2013, 5, 2857-2882; doi:10.3390/rs5062857 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Evaluation of CLM4 Solar Radiation Partitioning Scheme Using Remote Sensing and Site Level FPAR.e., that of the Community Land Model version 4 (CLM4) with coupled carbon and nitrogen cycles. Taking advantage of a unique

  14. CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of

    E-Print Network [OSTI]

    Gilbes, Fernando

    - and middle-infrared regions, water bodies appear very dark even black becausebodies appear very dark, even and pure and contains little suspended sediment or organic matter. Water Penetration Cozumel Island1 CHAPTER 12:CHAPTER 12: Remote Sensing ofRemote Sensing of WaterWaterWaterWater REFERENCE: Remote

  15. Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing

    E-Print Network [OSTI]

    Stephens, Scott L.

    Remote Sens. 2013, 5, 5173-5192; doi:10.3390/rs5105173 Remote Sensing ISSN 2072-4292 www for a geosynchronous OPEN ACCESS #12;Remote Sens. 2013, 5 5174 satellite with modern imaging detectors, software, and algorithms able to detect heat from early and small fires, and yield minute-scale detection times. Keywords

  16. Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing

    E-Print Network [OSTI]

    Crawford, Ian

    Remote Sens. 2013, 5, 5969-5998; doi:10.3390/rs5115969 Remote Sensing ISSN 2072-4292 www, the technique presented in this paper would help them to quantify the impacts of OPEN ACCESS #12;Remote Sens; urban heat island effect; NDVI; artificial neural network; Markov chain; Dhaka 1. Introduction Urban

  17. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29T23:59:59.000Z

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  18. Quantum convolutional stabilizer codes

    E-Print Network [OSTI]

    Chinthamani, Neelima

    2004-09-30T23:59:59.000Z

    constructions of good quantum error-correcting codes were given by Steane [2] and Calderbank and Shor [3]. These codes protect the quantum information using additional qubits and make it possible to reverse the e®ects of the most likely errors. 10 Encouraged... is that accurate computation does not require perfect physical devices. B. Background The Żrst quantum error correcting codes were discovered independently by Shor [1] and Steane [2], as mentioned in the previous section. Shor proved that 9 qubits could be used...

  19. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli

    2008-10-14T23:59:59.000Z

    The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

  20. Unequal Error Protection Turbo Codes

    E-Print Network [OSTI]

    Henkel, Werner

    Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

  1. Rateless Codes for AVC Models

    E-Print Network [OSTI]

    Sarwate, A D; Gastpar, M

    2010-01-01T23:59:59.000Z

    2004. [7] M. Luby, “LT codes,” in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, “Fountain codes,” in Proc. 41st AllertonChannel capacities for list codes,” J. Appl. Probabil. ,

  2. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert (Santa Fe, NM); Swift, Gregory W. (Los Alamos, NM); Garrett, Steven L. (Pebble Beach, CA)

    1986-01-01T23:59:59.000Z

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  3. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05T23:59:59.000Z

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  4. No Code: Null Programs

    E-Print Network [OSTI]

    Montfort, Nick

    2014-06-05T23:59:59.000Z

    To continue the productive discussion of uninscribed artworks in Craig Dworkin’s No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

  5. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    E-Print Network [OSTI]

    Dave Bacon; Andrea Casaccino

    2006-10-17T23:59:59.000Z

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

  6. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  7. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Environmental Management (EM)

    have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

  8. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| Department of

  9. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA document

  10. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  11. Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich

  12. Executive Order 13007 Indian Sacred Sites (1996)

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResources DOEElectricalonJusticeEnergy Efficiency|Friday,Executive|6771 Federal

  13. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10T23:59:59.000Z

    QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  14. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-25T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  15. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.; Smith, Brian E.

    2013-01-29T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  16. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-18T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  17. A New Project Execution Methodology; Integrating Project Management Principles with Quality Project Execution Methodologies

    E-Print Network [OSTI]

    Schriner, Jesse J.

    2008-07-25T23:59:59.000Z

    On an annual basis, there are numerous reports in regards to a particular company or function’s inability to execute on a large number of projects. The reasons vary widely from a lack of an initial understanding of what the customer was really...

  18. Optimal Execution Under Jump Models For Uncertain Price Impact

    E-Print Network [OSTI]

    2012-08-13T23:59:59.000Z

    May 12, 2011 ... Indeed price impact of large trades have been considered as one of the ... Investment performance is substantially related to the execution cost ...

  19. NREL: News - NREL Announces Participants in National Executive...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NREL Announces Participants in National Executive Education Program May 12, 2014 The Energy Department's National Renewable Energy Laboratory (NREL) has selected 17 leaders to...

  20. assessment program executive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  1. Optimal Execution Under Jump Models For Uncertain Price Impact

    E-Print Network [OSTI]

    Somayeh Moazeni

    2012-08-13T23:59:59.000Z

    Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

  2. The Health Benefits of Tackling Climate Change: An Executive...

    Open Energy Info (EERE)

    Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Health Benefits of Tackling Climate...

  3. DOE executes a diverse portfolio of capital asset projects supporting...

    Broader source: Energy.gov (indexed) [DOE]

    impacting the project must be endorsed by the project's Acquisition Executive per DOE Order 413.3B (the Order). Selecting an appropriate acquisition strategy, establishing a...

  4. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    SciTech Connect (OSTI)

    Haase, S.

    2009-11-01T23:59:59.000Z

    This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

  5. CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture

    E-Print Network [OSTI]

    CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture Paul Resources and Envir. Tom Ossinger, President, Bottomline Construction Consultants. Mark Calhoon, Program

  6. Engaging Non-IT Executives in IT Infrastructure Decisions

    E-Print Network [OSTI]

    Fonstad, Nils O.

    2008-07-01T23:59:59.000Z

    This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

  7. Nested Quantum Error Correction Codes

    E-Print Network [OSTI]

    Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

    2009-09-28T23:59:59.000Z

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  8. U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...

    Broader source: Energy.gov (indexed) [DOE]

    1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass...

  9. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

  10. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  11. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  12. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  13. availiable remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote SensingThermal Infrared Remote Sensing Thermal infrared) and thermal infrared energy (3.0 - 14 m). However, thermal infrared sensors allow humans to sense 2 Thermal...

  14. Code: A Lightweight and Flexible Mobile Code Toolkit

    E-Print Network [OSTI]

    Picco, Gian Pietro

    evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of client­server and mobile code in reducing the network traffic generated by management. The theoreticalŻCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

  15. Trusted Computing Technologies, Intel Trusted Execution Technology.

    SciTech Connect (OSTI)

    Guise, Max Joseph; Wendt, Jeremy Daniel

    2011-01-01T23:59:59.000Z

    We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

  16. Use of CADD/CAE for remote vehicle system mission planning

    SciTech Connect (OSTI)

    Auclair, K.D.; Palau, G.L.

    1986-01-01T23:59:59.000Z

    Many factors contribute to the successful completion of a remotely operated vehicle mission. Among the most important is mission planning: a comprehensive evaluation of the objectives of the mission, the equipment and operator capabilities, and the physical constraints within the environment into which the equipment will be deployed. Experience gained during the recovery of Three Mile Island Unit 2 (TMI-2) indicates that computerized design and drafting systems (CADD) can be used as an effective aid in mission planning which can improve the efficiency, quality, and execution of tasks using remote vehicle systems. CADD systems can be utilized for pretask identification of alternative vehicle transit routes, interferences and obstructions to remote equipment movement, identification of landmarks from which the equipment operators can navigate, and operator familiarization with the physical layout and work area constraints. All of this can result in a reduction in the time and cost required to perform a job, and in a nuclear environment can also result in a significant reduction in personnel radiation exposure.

  17. A Fault-Oblivious Extreme-Scale Execution Environment (FOX)

    SciTech Connect (OSTI)

    Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

    2013-03-15T23:59:59.000Z

    IBM Research’s contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPA’s HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energy’s FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBM’s approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

  18. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

  19. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Arbitrary Code A vulnerability was reported in HP SiteScope. September 20, 2012 U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges...

  20. U-100: Google Chrome Multiple Vulnerabilities

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted content that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  1. MHD Generation Code

    E-Print Network [OSTI]

    Frutos-Alfaro, Francisco

    2015-01-01T23:59:59.000Z

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  2. Extended quantum color coding

    SciTech Connect (OSTI)

    Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

    2005-01-01T23:59:59.000Z

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

  3. Coding for Cooperative Communications

    E-Print Network [OSTI]

    Uppal, Momin Ayub

    2011-10-21T23:59:59.000Z

    develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

  4. Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control

    SciTech Connect (OSTI)

    Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

    1995-12-31T23:59:59.000Z

    COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

  5. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01T23:59:59.000Z

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  6. 11/24/13 Committee Reports Executive Report

    E-Print Network [OSTI]

    Royer, Dana

    Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

  7. Project Execution Plan Electron Beam Ion Source Project

    E-Print Network [OSTI]

    Project Execution Plan for the Electron Beam Ion Source Project (EBIS) Project # 07-SC-02 at Brookhaven National Laboratory Upton, NY For the U.S. Department of Energy Office of Science Office of Nuclear Physics (SC ­ 26) Rev. 1 May 2008 #12;#12;#12;4 Project Execution Plan for the Electron Beam Ion

  8. Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi

    E-Print Network [OSTI]

    Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi AICES, RWTH Aachen occurring in higher- level algorithms--like a matrix factorization--is then pre- dicted by combining a priori; the prediction of performance therefore reduces to the pre- diction of Execution time. Our

  9. Developing and Executing Goal-Based, Adjustably Autonomous Procedures

    E-Print Network [OSTI]

    Kortenkamp, David

    Developing and Executing Goal-Based, Adjustably Autonomous Procedures David Kortenkamp, R. Peter@jsc.nasa.gov This paper describes an approach to representing, authoring and executing procedures during human spaceflight missions. The approach allows for the explicit incorporation of goals into procedures. The approach also

  10. Software Pipelined Execution of Stream Programs on GPUs

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    Software Pipelined Execution of Stream Programs on GPUs Abhishek Udupa, R. Govindarajan, Matthew J task, data and pipeline parallelism which can be exploited on modern Graphics Processing Units (GPUsIt to GPUs and propose an efficient technique to software pipeline the execution of stream programs on GPUs

  11. Certifying Program Execution with Secure Processors Benjie Chen Robert Morris

    E-Print Network [OSTI]

    for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects computing architecture, Cerium, that uses a se- cure processor to protect a program's execution, so. Instead, Cerium tells a user what pro- gram executed and what hardware and software envir- onment

  12. Executive Budget Support Team Office of the President

    E-Print Network [OSTI]

    Jacobs, Laurence J.

    Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

  13. NARSTO Quality Planning and Data Management Handbooks Executive Summary

    E-Print Network [OSTI]

    'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

  14. Robert D. Kimble Deputy Program Executive Officer for Strike

    E-Print Network [OSTI]

    and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

  15. Method of remote powering and detecting multiple UWB passive tags in an RFID system

    DOE Patents [OSTI]

    Dowla, Farid U. (Castro Valley, CA); Nekoogar, Faranak (San Ramon, CA); Benzel, David M. (Livermore, CA); Dallum, Gregory E. (Livermore, CA); Spiridon, Alex (Palo Alto, CA)

    2012-05-29T23:59:59.000Z

    A new Radio Frequency Identification (RFID), tracking, powering apparatus/system and method using coded Ultra-wideband (UWB) signaling is introduced. The proposed hardware and techniques disclosed herein utilize a plurality of passive UWB transponders in a field of an RFID-radar system. The radar system itself enables multiple passive tags to be remotely powered (activated) at about the same time frame via predetermined frequency UWB pulsed formats. Once such tags are in an activated state, an UWB radar transmits specific "interrogating codes" to put predetermined tags in an awakened status. Such predetermined tags can then communicate by a unique "response code" so as to be detected by an UWB system using radar methods.

  16. On-road remote sensing of vehicle emissions in

    E-Print Network [OSTI]

    Denver, University of

    On-road remote sensing of vehicle emissions in the Auckland Region August 2003 Technical 1877353000 www.arc.govt.nz #12;TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region #12;Page i TP 198 On-Road Remote Sensing of Vehicle Emissions in the Auckland Region On-road remote sensing

  17. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  18. Remote-handled transuranic system assessment appendices. Volume 2

    SciTech Connect (OSTI)

    NONE

    1995-11-01T23:59:59.000Z

    Volume 2 of this report contains six appendices to the report: Inventory and generation of remote-handled transuranic waste; Remote-handled transuranic waste site storage; Characterization of remote-handled transuranic waste; RH-TRU waste treatment alternatives system analysis; Packaging and transportation study; and Remote-handled transuranic waste disposal alternatives.

  19. applied remote sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Thermal Infrared Remote Sensing Thermal Infrared Remote Sensing 12;0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4 Infrared Remote SensingThermal Infrared Remote SensingThermal Infrared...

  20. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  1. "Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors

    E-Print Network [OSTI]

    Frank, Thomas D.

    "Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor be constructed and then attached to a platform that provides an aerial view of the landscape. "Whiskbrooms" and"Pushbrooms" Remote Sensing Platforms and Sensors Remote sensing requires that a sensor

  2. The Woodland Carbon Code

    E-Print Network [OSTI]

    The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

  3. Course Code: Course Title

    E-Print Network [OSTI]

    Painter, Kevin

    - Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

  4. Hydrogen Production CODES & STANDARDS

    E-Print Network [OSTI]

    Hydrogen Production DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES & STANDARDS for 2010 · Reduce the cost of distributed production of hydrogen from natural gas and/or liquid fuels to $1 SYSTEMS INTEGRATION / ANALYSES SAFETY EDUCATION RESEARCH & DEVELOPMENT Economy Pete Devlin #12;Hydrogen

  5. Chaotic Turbo Codes

    E-Print Network [OSTI]

    S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

    This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

  6. Minor Codes Accounting 1100

    E-Print Network [OSTI]

    Bolding, M. Chad

    Minor Codes Accounting 1100 Adult/Extension Education 1220 Aerospace Studies 1225 Agricultural Business Management 1250 Agricultural Mechanization and Business 1600 American Sign Language Studies 5650 and Policy 3790 Equine Business 4690 Film Studies 7756 Financial Management 3900 Food Science 4100 Forest

  7. Remote Sensing of Soils, Minerals, and Geomorphology

    E-Print Network [OSTI]

    ,Remote Sensing of Soils, Minerals, and GeomorphologyMinerals, and Geomorphology · Soil is unconsolidated material). ·· SoilSoil is unconsolidated material at the surface of the Earth thatis unconsolidated material

  8. Erasure Techniques in MRD codes

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

    2012-05-03T23:59:59.000Z

    This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

  9. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10T23:59:59.000Z

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  10. 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...

    Broader source: Energy.gov (indexed) [DOE]

    1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

  11. REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

  12. Optimized Generation of Data-Path from C Codes for FPGAs

    E-Print Network [OSTI]

    Guo, Zhi; Najjar, Walid; Vissers, Kees

    2011-01-01T23:59:59.000Z

    FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

  13. Adaptive code generators for tree coding of speech

    E-Print Network [OSTI]

    Dong, Hui

    1998-01-01T23:59:59.000Z

    Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

  14. Nevada Energy Code for Buildings

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energy’s (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  15. Matlab-Kinect Interface Code

    E-Print Network [OSTI]

    Kowalski, Kevin

    2012-06-01T23:59:59.000Z

    This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

  16. City of Austin- Zoning Code

    Broader source: Energy.gov [DOE]

    The Zoning Code (Chapter 25-2) of the Austin City Code provides a height limitation exemption for solar installations. Solar installations may exceed the zoning district height limit by 15% or the...

  17. Code of Practice Research Degrees

    E-Print Network [OSTI]

    Evans, Paul

    ........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

  18. MELCOR computer code manuals

    SciTech Connect (OSTI)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01T23:59:59.000Z

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  19. What's coming in 2012 codes

    E-Print Network [OSTI]

    Lacey, E

    2011-01-01T23:59:59.000Z

    Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

  20. 2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    2007 Urban Remote Sensing Joint Event Application of satellite Remote Sensing for Urban Risk Analysis: a case study of the 2003 extreme heat wave in Paris Bénédicte Dousset Hawaii Institute@ogs.trieste.it Abstract ­ Satellite observations are used to monitor the August 2003 heat wave in Paris

  1. Energy Codes and Standards: Facilities

    SciTech Connect (OSTI)

    Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

    2007-01-01T23:59:59.000Z

    Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

  2. Design of proximity detecting codes

    E-Print Network [OSTI]

    Perisetty, Srinivas

    1997-01-01T23:59:59.000Z

    class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

  3. Code for Hydrogen Hydrogen Pipeline

    E-Print Network [OSTI]

    #12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

  4. PERFORMANCE EVALUATION OF TURBO CODES

    E-Print Network [OSTI]

    Alajaji, Fady

    PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

  5. Travel Codes Traveler Is Employee

    E-Print Network [OSTI]

    Arnold, Jonathan

    Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

  6. Southeast Energy Efficiency Alliance's Building Energy Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

  7. 2013 Reporting Unit Codes | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

  8. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

  9. Renewable Energy Executive Summary High-Yield Scenario

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Efficiency & Renewable Energy Executive Summary High-Yield Scenario Workshop Series Report INLEXT-10-18930 December 2009 The 2005 Billion-Ton Study a (BTS) esti- mates the...

  10. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE)

    This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

  11. Robust Execution of Bipedal Walking Tasks From Biomechanical Principles

    E-Print Network [OSTI]

    Hofmann, Andreas

    2006-04-28T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  12. Continuous execution : improving user feedback in the development cycle

    E-Print Network [OSTI]

    Su, Kevin

    2007-01-01T23:59:59.000Z

    Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

  13. Nuclear Energy In the United States Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    0 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear...

  14. Robust execution of bipedal walking tasks from biomechanical principles

    E-Print Network [OSTI]

    Hofmann, Andreas G. (Andreas Gunther)

    2006-01-01T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  15. Summary of Differences in Approach to Executing the NGNP Project

    SciTech Connect (OSTI)

    P.C. Hildebrandt

    2010-08-01T23:59:59.000Z

    The following discuss the summary differences between the NGNP Industry Alliance’s approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOE’s Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

  16. Robust, goal-directed plan execution with bounded risk

    E-Print Network [OSTI]

    Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

  17. PROGRAM INFORMATION This executive master's program with a

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    , they have helped healthcare facilities improve total-quality management, scheduling and sequencingPROGRAM INFORMATION This executive master's program with a health systems concentration: · takes and construction firms · Management consulting firms · Health insurance companies · Research and planning

  18. Error Floors of LDPC Codes and Related Topics

    E-Print Network [OSTI]

    Butler, Brian K.

    Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

  19. Energy Codes at a Glance

    SciTech Connect (OSTI)

    Cole, Pamala C.; Richman, Eric E.

    2008-09-01T23:59:59.000Z

    Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energy’s Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code® and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

  20. Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding

    E-Print Network [OSTI]

    Yang, Yang

    2005-11-01T23:59:59.000Z

    to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

  1. U-081: McAfee SaaS 'myCIOScn.dll' ActiveX Control Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)

  2. A Study of Execution Environments for Software Kung-Kiu Lau and Vladyslav Ukis

    E-Print Network [OSTI]

    Lau, Kung-Kiu

    A Study of Execution Environments for Software Components Kung-Kiu Lau and Vladyslav Ukis School-kiu,vukis}@cs.man.ac.uk Abstract. Software components are deployed into an execution environment be- fore runtime. The execution environment influences the runtime execution of a component. Therefore, it is important to study existing

  3. Forest Research Executive Board Meeting 16 April 2008 by video conference

    E-Print Network [OSTI]

    Forest Research Executive Board Meeting ­ 16 April 2008 by video conference Present: NRS Alice Holt

  4. Job submission system and its execution monitoring for improving data processing in high energy physics experiments

    E-Print Network [OSTI]

    Jurkowski, Igor; Czekierda, ?ukasz

    Job submission system and its execution monitoring for improving data processing in high energy physics experiments

  5. CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment

    E-Print Network [OSTI]

    CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment Document Number 003-001/002.01 DRAFT-Mellon University Schenley Park Pittsburgh, PA 15213 #12;The ICE Execution Environment DRAFT 003- 001/002.01 U ncla ssified ( 2 The ICE Execution Environment #12;The ICE Execution Environment DRAFT 003

  6. Midwest Energy Codes Project

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F S i DOE TribaltheMy nameMid-LevelMidwest Energy Codes Project 2014

  7. Low power reactor for remote applications

    SciTech Connect (OSTI)

    Meier, K.L.; Palmer, R.G.; Kirchner, W.L.

    1985-01-01T23:59:59.000Z

    A compact, low power reactor is being designed to provide electric power for remote, unattended applications. Because of the high fuel and maintenance costs for conventional power sources such as diesel generators, a reactor power supply appears especially attractive for remote and inaccessible locations. Operating at a thermal power level of 135 kWt, the power supply achieves a gross electrical output of 25 kWe from an organic Rankine cycle (ORC) engine. By intentional selection of design features stressing inherent safety, operation in an unattended mode is possible with minimal risk to the environment. Reliability is achieved through the use of components representing existing, proven technology. Low enrichment uranium particle fuel, in graphite core blocks, cooled by heat pipes coupled to an ORC converter insures long-term, virtually maintenance free, operation of this reactor for remote applications. 10 refs., 7 figs., 3 tabs.

  8. Photovoltaic applications for remote-island needs

    SciTech Connect (OSTI)

    Schaller, D.A.

    1983-01-01T23:59:59.000Z

    Electric power supply options available to many of the central and south Pacific island governments are severely constrained by remoteness, limited infrastructures, a corrosive natural environment, and the high delivered costs of many conventional energy sources. Photovoltaic energy systems offer a currently available, practical, and cost-effective source of electricity for many stand-alone applications in remote areas of the Pacific. Photovoltaic system definitions and cost analyses are provided for selected applications in the Republic of Palau, the Federated States of Micronesia, the Republic of the Marshall Islands, and the Territory of American Samoa.

  9. Valve assembly having remotely replaceable bearings

    DOE Patents [OSTI]

    Johnson, Evan R. (San Diego, CA); Tanner, David E. (Poway, CA)

    1980-01-01T23:59:59.000Z

    A valve assembly having remotely replaceable bearings is disclosed wherein a valve disc is supported within a flow duct for rotation about a pair of axially aligned bearings, one of which is carried by a spindle received within a diametral bore in the valve disc, and the other of which is carried by a bearing support block releasably mounted on the duct circumferentially of an annular collar on the valve disc coaxial with its diametrical bore. The spindle and bearing support block are adapted for remote removal to facilitate servicing or replacement of the valve disc support bearings.

  10. Remote/New sites: Many Field

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemoteSpectrumRemote/New

  11. Quantum serial turbo-codes

    E-Print Network [OSTI]

    David Poulin; Jean-Pierre Tillich; Harold Ollivier

    2009-06-10T23:59:59.000Z

    We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.

  12. Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on

    E-Print Network [OSTI]

    Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on MFE Priorities to consider the following high-level recommendations: 1. The EPR

  13. EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE

    E-Print Network [OSTI]

    Hung, I-Kuai

    EAST TEXAS FOREST INVENTORY (ETFI) PILOT PROJECT REMOTE SENSING PHASE Dr. Daniel R. Unger, Remote) or the United States Forest Service (USFS) via the Southern Forest Inventory and Analysis Program (SFIA

  14. Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites

    E-Print Network [OSTI]

    Remote sensing of terrestrial tropospheric aerosols from aircraft and satellites M I Mishchenko1 instruments suitable for aerosol remote sensing and give examples of aerosol retrievals obtained forcing directly by absorbing and reflecting sunlight, thereby cooling or heating the atmosphere

  15. Remote Sensing for Biodiversity Conservation of the Albertine Rift

    E-Print Network [OSTI]

    Wang, Y.Q. "Yeqiao"

    183 10 Remote Sensing for Biodiversity Conservation of the Albertine Rift in Eastern Africa Samuel of biodiversity conservation is understanding how environmental factors influence species abundance 2003). The rapidly developing field of remote sensing has been invaluable to biodiversity conservation

  16. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

  17. Turbo and LDPC Codes: Implementation, Simulation,

    E-Print Network [OSTI]

    Valenti, Matthew C.

    1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes ­ the MAP algorithm Turbo codes ­ Standard binary turbo codes: UMTS and cdma2000 ­ Duobinary CRSC turbo codes: DVB

  18. Conjugate Codes and Applications to Cryptography

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-23T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

  19. Distributed video coding for arrays of remote sensing nodes : final report.

    SciTech Connect (OSTI)

    Mecimore, Ivan (New Mexico State University); Creusere, Chuck D. (New Mexico State University); Merchant, Bion John

    2010-06-01T23:59:59.000Z

    This document is the final report for the Sandia National Laboratory funded Student Fellowship position at New Mexico State University (NMSU) from 2008 to 2010. Ivan Mecimore, the PhD student in Electrical Engineering at NMSU, was conducting research into image and video processing techniques to identify features and correlations within images without requiring the decoding of the data compression. Such an analysis technique would operate on the encoded bit stream, potentially saving considerable processing time when operating on a platform that has limited computational resources. Unfortunately, the student has elected in mid-year not to continue with his research or the fellowship position. The student is unavailable to provide any details of his research for inclusion in this final report. As such, this final report serves solely to document the information provided in the previous end of year summary.

  20. AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution time of scientificreduce the execution time of scientific

    E-Print Network [OSTI]

    Giménez, Domingo

    AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution problems AutoAuto--tuned nested parallelism: a way to reduce the execution time of scientific software in NUMA systemstuned nested parallelism: a way to reduce the execution time of scientific software in NUMA

  1. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  2. E-Print Network 3.0 - aerospace remote sensing Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    within aerospace engineering Astrodynamics Remote... dynamics and control Aerodynamics Remote sensing Computational fluid dynamics Systems engineering... to explore the...

  3. REFERENCE: Introduction to Remote Sensing. James B.

    E-Print Network [OSTI]

    Gilbes, Fernando

    Temperature #12;ACTIVE REMOTE SENSING The sensor illuminates the terrain with its own energy, then records the reflected energy as it has been altered by the earth's surface. #12;SIDE-LOOKING AIRBORNE RADAR SLAR #12 JUAN VENICE #12;EARTH TOPOGRAPHY USING MULTISPECTRAL SCANNERS MT. PINATUBO MT. EVEREST #12;APPLICATIONS

  4. A Modular Control System for Remote Subsea Eric Stephen Smith

    E-Print Network [OSTI]

    Wood, Stephen L.

    A Modular Control System for Remote Subsea Equipment by Eric Stephen Smith Bachelor of Science the undersigned committee hereby approve the attached thesis A Modular Control System for Remote Subsea Equipment and Environmental Systems #12;iv Abstract Title: A Modular Control System for Remote Subsea Equipment Author: Eric

  5. Clark County- Energy Conservation Code

    Broader source: Energy.gov [DOE]

    In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

  6. Nonbinary Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Xie Chen; Bei Zeng; Isaac L. Chuang

    2008-08-22T23:59:59.000Z

    The codeword stabilized (CWS) quantum codes formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes (arXiv:0708.1021 [quant-ph]), but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimension) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

  7. Marin County- Solar Access Code

    Broader source: Energy.gov [DOE]

    Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

  8. SHEAN (Simplified Human Error Analysis code) and automated THERP

    SciTech Connect (OSTI)

    Wilson, J.R.

    1993-06-01T23:59:59.000Z

    One of the most widely used human error analysis tools is THERP (Technique for Human Error Rate Prediction). Unfortunately, this tool has disadvantages. The Nuclear Regulatory Commission, realizing these drawbacks, commissioned Dr. Swain, the author of THERP, to create a simpler, more consistent tool for deriving human error rates. That effort produced the Accident Sequence Evaluation Program Human Reliability Analysis Procedure (ASEP), which is more conservative than THERP, but a valuable screening tool. ASEP involves answering simple questions about the scenario in question, and then looking up the appropriate human error rate in the indicated table (THERP also uses look-up tables, but four times as many). The advantages of ASEP are that human factors expertise is not required, and the training to use the method is minimal. Although not originally envisioned by Dr. Swain, the ASEP approach actually begs to be computerized. That WINCO did, calling the code SHEAN, for Simplified Human Error ANalysis. The code was done in TURBO Basic for IBM or IBM-compatible MS-DOS, for fast execution. WINCO is now in the process of comparing this code against THERP for various scenarios. This report provides a discussion of SHEAN.

  9. Quantum Quasi-Cyclic LDPC Codes

    E-Print Network [OSTI]

    Manabu Hagiwara; Hideki Imai

    2010-08-28T23:59:59.000Z

    In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.

  10. Super Special Codes using Super Matrices

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; K. Ilanthenral

    2010-06-30T23:59:59.000Z

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  11. On the logical operators of quantum codes

    E-Print Network [OSTI]

    Mark M. Wilde

    2009-03-30T23:59:59.000Z

    I show how applying a symplectic Gram-Schmidt orthogonalization to the normalizer of a quantum code gives a different way of determining the code's logical operators. This approach may be more natural in the setting where we produce a quantum code from classical codes because the generator matrices of the classical codes form the normalizer of the resulting quantum code. This technique is particularly useful in determining the logical operators of an entanglement-assisted code produced from two classical binary codes or from one classical quaternary code. Finally, this approach gives additional formulas for computing the amount of entanglement that an entanglement-assisted code requires.

  12. Rate-Adaptive Codes for Distributed Source Coding David Varodayan

    E-Print Network [OSTI]

    Girod, Bernd

    S with respect to a channel code C. Upon receipt of the syndrome, the distributed source decoder can narrow down- proach with their DISCUS framework [7]. The distributed source encoder compresses X into its syndrome is an at- tractive solution. The encoder transmits a short syndrome based on an aggressive code

  13. FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes

    E-Print Network [OSTI]

    Harms, Kyle E.

    FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

  14. Non-Residential Energy Code National and Regional Codes

    E-Print Network [OSTI]

    Non-Residential Energy Code Comparison National and Regional Codes David Baylon Mike Kennedy #12 2003 · ASHRAE 90.1 2001 & addenda · E-Benchmark Guidelines (NBI) #12;Approach · Comparison of the State;Approach (cont.) · Provisions compared ­ Lighting power ­ Lighting controls ­ Mechanical systems ­ Building

  15. Building and Facility Codes Code Building Location Bldg # Coordinates

    E-Print Network [OSTI]

    Russell, Lynn

    Building and Facility Codes Code Building Location Bldg # Coordinates APM Applied Physics & Mathematics Building Muir 249 F7 ASANT Asante Hall Eleanor Roosevelt 446 F5 BIO Biology Building Muir 259 F7 BIRCH Birch Aquarium SIO 2300 S-D7 BONN Bonner Hall Revelle 131 G8 BSB Biomedical Sciences Building

  16. Space time coded code division multiplexing on SC140 DSP

    E-Print Network [OSTI]

    Menon, Murali P

    2001-01-01T23:59:59.000Z

    The aim of this research is to design a high data rate wireless communication system for multi-path fading channels. Code-division multiplexing is proposed as a modulation scheme for a space-time coded multiple antenna system that would guarantee...

  17. VOLTTRON: An Agent Execution Platform for the Electric Power System

    SciTech Connect (OSTI)

    Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

    2012-06-05T23:59:59.000Z

    Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

  18. Training program requirements for remote equipment operators in nuclear facilities

    SciTech Connect (OSTI)

    Palau, G.L.; Auclair, K.D.

    1986-01-01T23:59:59.000Z

    One of the most neglected areas in the engineering development of remotely operated equipment applications in nuclear environments is the planning of adequate training programs for the equipment operators. Remote equipment accidents cannot be prevented solely by engineered safety features on the equipment. As a result of the experiences in using remote equipment in the recovery effort at Three Mile Island Unit 2 (TMI-2), guidelines for the development of remote equipment operator training programs have been generated. The result is that a successful education and training program can create an environment favorable to the safe and effective implementation of a remote equipment program in a nuclear facility.

  19. LFSC - Linac Feedback Simulation Code

    SciTech Connect (OSTI)

    Ivanov, Valentin; /Fermilab

    2008-05-01T23:59:59.000Z

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  20. Secure Symmetrical Multilevel Diversity Coding

    E-Print Network [OSTI]

    Li, Shuo

    2012-07-16T23:59:59.000Z

    Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...