Sample records for rsa access manager

  1. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  2. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  3. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  4. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Energy Savers [EERE]

    Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

  5. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  6. User Guide Remote Access to VDI/Workplace Using RSA

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access to VDI/Workplace Using PIV

  7. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  8. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  9. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  10. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

  11. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian Security Advisoryand

  12. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19T23:59:59.000Z

    To establish requirements and responsibilities for DOE identity, credential, and access management program.

  13. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  14. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  15. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  16. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  17. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  18. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  19. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  20. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  1. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

  3. Performance Modeling and Access Methods for Temporal Database Management Systems

    E-Print Network [OSTI]

    North Carolina at Chapel Hill, University of

    implementation issues. Database systems with temporal support maintain history data on line together with current. Performance Modeling and Access Methods for Temporal Database Management Systems TR86-018 August. #12;Performance Modeling and Access Methods for Temporal Database Management Systems by Ilsoo Ahn

  4. Transmission Pricing and Congestion Management: Efficiency, Simplicity and Open Access

    E-Print Network [OSTI]

    Oren, Shmuel S.

    Transmission Pricing and Congestion Management: Efficiency, Simplicity and Open Access Shmuel S-1403 Email OREN@IEOR.Berkeley.edu Abstract Transmission pricing and congestion management are the key the objectives of a transmission pricing and congestion management scheme. I contrast two extreme approaches

  5. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  6. Practice Note Managing woodland access and

    E-Print Network [OSTI]

    during forest operations has never been more important. This is both to comply with health and safety clear steps to achieve this aim, including advice on early engagement with stakeholders and careful at this time to meet existing health and safety duties and to comply with forest managers' obligations under

  7. Web Service Access Management for Integration with Agent Systems

    E-Print Network [OSTI]

    Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

  8. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  9. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  10. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  11. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  12. T-581: Novell Access Manager Java Double Literal Denial of Service...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

  13. MOTOR VEHICLE (Pursuant to RSA 260:14)

    E-Print Network [OSTI]

    New Hampshire, University of

    permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

  14. Web Accessibility Accessibility

    E-Print Network [OSTI]

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  15. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  16. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  17. Request Access to the PARSIIe Project Management Lessons Learned...

    Broader source: Energy.gov (indexed) [DOE]

    receive PARSIIe credentials through this process are not required to register within DOE ESS system. As such, Users receiving access through this process will not be able to obtain...

  18. Title of Project: Scoping Data Access and Integration Needs to Facilitate Better Management of Research Innovation

    E-Print Network [OSTI]

    Illinois at Chicago, University of

    Title of Project: Scoping Data Access and Integration Needs to Facilitate Better Management-Madison Participants: P.S. Sriraj, Paul Metaxatos, Piyushimita (Vonu) Thakuriah Status: Active Objective: This project of the intended use and value of these databases. 3. Identify existing access procedures to WisDOT databases

  19. Physical Resource Management and Access Mediation Within the Cloud Computing Paradigm

    E-Print Network [OSTI]

    Betts, Hutson

    2012-10-19T23:59:59.000Z

    PHYSICAL RESOURCE MANAGEMENT AND ACCESS MEDIATION WITHIN THE CLOUD COMPUTING PARADIGM A Thesis by HUTSON KEITH BETTS Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree... of MASTER OF SCIENCE August 2012 Major Subject: Computer Engineering PHYSICAL RESOURCE MANAGEMENT AND ACCESS MEDIATION WITHIN THE CLOUD COMPUTING PARADIGM A Thesis by HUTSON KEITH BETTS Submitted to the O ce of Graduate Studies of Texas A...

  20. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  1. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access

  2. Directory Information Restriction Use this form to manage public access to your data at Boston University

    E-Print Network [OSTI]

    Guenther, Frank

    Directory Information Restriction Use this form to manage public access to your data at Boston identifiable information as "Directory Information." A list of this information is below. Unless restricted, Boston University may disclose any of the items of Directory Information without your consent. Boston

  3. Access Management in Multi-Administration Networks S. P. Lord, N.H. Pope, and Susan Stepney

    E-Print Network [OSTI]

    Stepney, Susan

    Access Management in Multi-Administration Networks S. P. Lord, N.H. Pope, and Susan Stepney GEC of linking together networks controlled by different administrations, and allowing these administrations and representations. S. P. Lord, N. H. Pope, and Susan Stepney. Access Management in multi-administration networks

  4. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  5. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  6. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  7. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  8. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma , Ondej Pokorn1 and Toms Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  9. The Human Genome Project: Information access, management, and regulation. Final report

    SciTech Connect (OSTI)

    McInerney, J.D.; Micikas, L.B.

    1996-08-31T23:59:59.000Z

    The Human Genome Project is a large, internationally coordinated effort in biological research directed at creating a detailed map of human DNA. This report describes the access of information, management, and regulation of the project. The project led to the development of an instructional module titled The Human Genome Project: Biology, Computers, and Privacy, designed for use in high school biology classes. The module consists of print materials and both Macintosh and Windows versions of related computer software-Appendix A contains a copy of the print materials and discs containing the two versions of the software.

  10. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  12. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  13. Notice of Intent to Develop Department of Energy Order 206.2 on Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    The purpose of the proposed directive is to replace the information contained in DOE N 206.4, "Personal Identity Verification," approved June 29, 2007, and to establish a DOE directive on Identity, Credential, and Access Management (ICAM). Implementation of ICAM will result in cost avoidance and cost savings allowing reinvestment in DOE mission related work.

  14. V-192: Symantec Security Information Manager Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    Input Validation Flaws U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks T-731:Symantec IM Manager Code Injection Vulnerability...

  15. Security analysis of RSA cryptosystem algorithm and its properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  16. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  17. User Guide for Remote Access to VDI/Workplace Using RSA | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,Potomac

  18. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsers Deny

  19. Managing the Life Cycle of Access Rules in CEOSIS Stefanie Rinderle-Ma, Manfred Reichert

    E-Print Network [OSTI]

    Ulm, Universitt

    and business func- tions) is an important task within any enterprise informa- tion systems (EIS). Many EIS framework for the con- trolled evolution of access rules in EIS. Specifically, we de- fine change operations contributes to comprehensive life cycle support for access rules in (adaptive) EIS. 1 Introduction

  20. Mercury: An Example of Effective Software Reuse for Metadata Management, Data Discovery and Access

    SciTech Connect (OSTI)

    Devarakonda, Ranjeet [ORNL] [ORNL

    2008-01-01T23:59:59.000Z

    Mercury is a federated metadata harvesting, data discovery and access tool based on both open source packages and custom developed software. Though originally developed for NASA, the Mercury development consortium now includes funding from NASA, USGS, and DOE. Mercury supports the reuse of metadata by enabling searching across a range of metadata specification and standards including XML, Z39.50, FGDC, Dublin-Core, Darwin-Core, EML, and ISO-19115. Mercury provides a single portal to information contained in distributed data management systems. It collects metadata and key data from contributing project servers distributed around the world and builds a centralized index. The Mercury search interfaces then allow the users to perform simple, fielded, spatial and temporal searches across these metadata sources. One of the major goals of the recent redesign of Mercury was to improve the software reusability across the 12 projects which currently fund the continuing development of Mercury. These projects span a range of land, atmosphere, and ocean ecological communities and have a number of common needs for metadata searches, but they also have a number of needs specific to one or a few projects. To balance these common and project-specific needs, Mercury's architecture has three major reusable components; a harvester engine, an indexing system and a user interface component. The harvester engine is responsible for harvesting metadata records from various distributed servers around the USA and around the world. The harvester software was packaged in such a way that all the Mercury projects will use the same harvester scripts but each project will be driven by a set of project specific configuration files. The harvested files are structured metadata records that are indexed against the search library API consistently, so that it can render various search capabilities such as simple, fielded, spatial and temporal. This backend component is supported by a very flexible, easy to use Graphical User Interface which is driven by cascading style sheets, which make it even simpler for reusable design implementation. The new Mercury system is based on a Service Oriented Architecture and effectively reuses components for various services such as Thesaurus Service, Gazetteer Web Service and UDDI Directory Services. The software also provides various search services including: RSS, Geo-RSS, OpenSearch, Web Services and Portlets, integrated shopping cart to order datasets from various data centers (ORNL DAAC, NSIDC) and integrated visualization tools. Other features include: Filtering and dynamic sorting of search results, book- markable search results, save, retrieve, and modify search criteria.

  1. Energy Data Access | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Data Management Building Energy Use Benchmarking Benchmarking & Disclosure Policy Data-Driven, Strategic Energy Management Data Access Evaluation, Measurement, & Verification...

  2. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03) OMB Control2: AppleSessions |

  3. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a command

  4. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

  5. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

  6. RSA SecurId Token User's Guide Version 1.0 IT Support

    E-Print Network [OSTI]

    Gesbert, David

    .eurecom.fr) ............................................................................................................................. 7 3 The SSL VPN (https ............................................................................................................................................................ 8 3.2 Accessing the SIFI through the SSL VPN........................................................................................................ 10 3.3 Accessing your homedir and the teaching repository through the SSL VPN

  7. OPEN ACCESS

    E-Print Network [OSTI]

    Thomas F. Kresina; Robert Lubran

    Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best one stop shopping approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

  8. Revised June 2014 Training Management System (TMS)

    E-Print Network [OSTI]

    Heller, Eric

    Revised June 2014 Training Management System (TMS) User Manual Contents Accessing the TMS.................................................................................................................15 #12;2 Accessing the TMS Before accessing the Training Management System you must know your Harvard...........................................................................................................................................2 Training Director, Training Manager, and Course Director Access

  9. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access to VDI/Workplace Under

  10. RESEARCH Open Access Probabilistic framework for opportunistic

    E-Print Network [OSTI]

    Perkins, Dmitri

    approaches. Keywords: Cognitive radio networks, Opportunistic spectrum management, Medium access control 1 that the licensed spectrum is underutilized for 15 to 85% of the time depending on the spatial location [1]. ThusRESEARCH Open Access Probabilistic framework for opportunistic spectrum management in cognitive ad

  11. Accessibility | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility

  12. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGateAccessing PDSF

  13. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratorySpeeding access1 TechnicalOilOnline Application Process

  14. access to information: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Protocol of Corporate Governance in the Public Sector (1997), the Public Finance Management Act of 1999 Jarrett, Thomas H. 2 Access to Geographic Information: Openness versus...

  15. Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc

    Broader source: Energy.gov (indexed) [DOE]

    Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing,...

  16. Guidelines for left-turn bays at unsignalized access locations on arterial roadways

    E-Print Network [OSTI]

    Hawley, Patrick Emmett

    1994-01-01T23:59:59.000Z

    It has long been recognized that effective access management along arterial streets can alleviate traffic congestion. A major goal within access management is to limit the speed differential between turning and through vehicles. Left-turn bays...

  17. Capital Access Program (Vermont)

    Broader source: Energy.gov [DOE]

    The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

  18. ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Revision 01

    E-Print Network [OSTI]

    Weston, Ken

    ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE SP-18 Page 1 Revision 01 April 17, 2007 NATIONAL HIGH ______________________________________________________ ASSOCIATE DIRECTOR for MANAGEMENT & ADMINISTRATION Brian Fairhurst #12;ELECTRICAL AREA CONTROLLED ACCESS TITLE: ELECTRICAL AREA CONTROLLED ACCESS PROCEDURE 1.0 PURPOSE 1.1 This document establishes policy

  19. UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control

    E-Print Network [OSTI]

    Bigelow, Stephen

    property. A successful program is dependent on every member of the community being diligent access controls are to enhance the personal safety of the campus community and to secure University physical access controls for all facilities managed by UCSB (University facilities). Physical access

  20. Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register

    E-Print Network [OSTI]

    Gupta, Minaxi

    SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

  1. addressing waste management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    outside the Former Hazardous Waste Management Homes, Christopher C. 25 Beyond 70%: Assessing Alternative Waste Management Opportunities for Institutions. Open Access Theses and...

  2. Data-Driven, Strategic Energy Management | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Energy Use Benchmarking Benchmarking & Disclosure Policy Data-Driven, Strategic Energy Management Data Access Evaluation, Measurement, & Verification Energy Technologies...

  3. Demystifying Open Access

    SciTech Connect (OSTI)

    Mele, Salvatore

    2007-05-14T23:59:59.000Z

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  4. Human Resources Department Procedure: Public Records Access, Document

    E-Print Network [OSTI]

    Human Resources Department Procedure: Public Records Access, Document Page 1 of 2 Printing of benefits, medical, and FMLA records; and the Payroll Manager is the custodian of payroll records Department Procedure: Public Records Access, Document Printing and Copying Page 2 of 2 Issued: October 3

  5. E-Print Network 3.0 - access control transportation Sample Search...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety Analysis (4) CE 551 Traffic Control & Analysis (4) CE 552 Highway Design for Capacity... 559 Transportation Operations (4) CE 560 Access Management (4) ...

  6. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  7. ATLAS Data Access Policy

    E-Print Network [OSTI]

    The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  8. E-Print Network 3.0 - access team sri-cat Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Restoration Technologies 5 Version 10.0 Page 1 of 13 July 2007 StaffOnline User Guide Summary: Management folder gives managers access to basic details of their team...

  9. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11T23:59:59.000Z

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  10. Capital Access Program (CAP) (Michigan)

    Broader source: Energy.gov [DOE]

    The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

  11. Virginia Capital Access Program (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Capital Access Program (CAP), in partnership with Virginias Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

  12. Utility Access Questionnaire | Utility Access Questionnaire

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip: 84111Jump to:Access Questionnaire

  13. A Role-involved Conditional Purpose-based Access Control Model

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    control to achieve database security and available in database management systems. The structure helps. Access control is the process of limiting access to the re- sources of a system only to authorized users a secure privacy policy to remove the fear of customers. Thus in an internal management system, a reliable

  14. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility VitalyGate Access Access to

  15. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access yourAccess

  16. Management Plan Management Plan

    E-Print Network [OSTI]

    ; and 5) consistency with the Endangered Species Act and Clean Water Act. In addition, the management plan Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have

  17. Accessibility | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access

  18. Accessibility-based transit planning

    E-Print Network [OSTI]

    Busby, Jeffrey R

    2004-01-01T23:59:59.000Z

    A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

  19. Open Access Week Planning Materials

    E-Print Network [OSTI]

    TAMUemployees list TAMUemployees list KAMU-TV Magazine TAMU Landing-page for Open Access Week library.tamu.edu/oaweek Open Access Week (organized by SPARC) www.openaccessweek.org Digital Repository Disseminate your work... via the Texas A&M University Digital Repository and get ? ?more exposure universal access easier information discovery persistent access wide range of content? SPARC http://www.arl.org/sparc...

  20. National Radiobiology Archives distributed access programmer's guide

    SciTech Connect (OSTI)

    Prather, J. C. [Linfield Coll., McMinnville, OR (United States); Smith, S. K.; Watson, C. R. [Pacific Northwest Lab., Richland, WA (United States)

    1991-12-01T23:59:59.000Z

    The National Radiobiology Archives is a comprehensive effort to gather, organize, and catalog original data, representative specimens, and supporting materials related to significant radiobiology studies. This provides researchers with information for analyses which compare or combine results of these and other studies and with materials for analysis by advanced molecular biology techniques. This Programmer's Guide document describes the database access software, NRADEMO, and the subset loading script NRADEMO/MAINT/MAINTAIN, which comprise the National Laboratory Archives Distributed Access Package. The guide is intended for use by an experienced database management specialist. It contains information about the physical and logical organization of the software and data files. It also contains printouts of all the scripts and associated batch processing files. It is part of a suite of documents published by the National Radiobiology Archives.

  1. Policy Name: Asbestos Management Policy Originating/Responsible Department: Facilities Management and Planning

    E-Print Network [OSTI]

    Carleton University

    or unintentional disturbance of asbestos- containing materials in University-owned or managed buildings. The Asbestos Management Program will address access to areas which house asbestos-containing materials as wellPolicy Name: Asbestos Management Policy Originating/Responsible Department: Facilities Management

  2. Role-Based Access Controls

    E-Print Network [OSTI]

    Ferraiolo, David F

    2009-01-01T23:59:59.000Z

    While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

  3. Access for All

    E-Print Network [OSTI]

    Stearns, Linda Lea Merenda

    2012-07-16T23:59:59.000Z

    ?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

  4. Accessibility - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About Us

  5. Accessibility | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home | SHARE

  6. Access to Capital

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access your

  7. SLAC Management Systems Larry Dardzinski/Ops/x4794

    E-Print Network [OSTI]

    Wechsler, Risa H.

    SLAC Management Systems PPA Update 24 May 12 Larry Dardzinski/Ops/x4794 #12;Outline · Management · Discussion Page 2 #12;A simple definition of a Management System A management system is the means by which of Management Systems? · Allow your customers and users to efficiently and effectively access your services

  8. adults pharmacological management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jose Manuel Garca-verdugo 2002-01-01 159 HOW EMPLOYABLE ARE PEOPLE WITH SERIOUS MENTAL ILLNESS? CASE MANAGERS AND UNDERGRADUATES EXPECTATIONS. Open Access Theses and...

  9. Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

    E-Print Network [OSTI]

    Mantravadi, Sirisha 1987-

    2012-08-21T23:59:59.000Z

    . . . . . . . . . . . . . . . . . . . . 5 B. Interference Management in Femtocell Networks . . . . . . 9 C. Access Control in Femtocell Networks . . . . . . . . . . . . . 11 D. Thesis Contribution . . . . . . . . . . . . . . . . . . . . . . 15 E. Organization of Thesis... . . . . . . . . . . . . . . . . . . . . 16 II STANDARD ITERATIVE POWER CONTROL ALGORITHMS 17 A. Distributed Power Control with Fixed SINR . . . . . . . . 20 B. Standard Interference Function . . . . . . . . . . . . . . . 23 C. Iterative Power Control in a Two-Tier Femtocell Network . 30...

  10. Hospitality Management Hospitality Management

    E-Print Network [OSTI]

    McConnell, Terry

    of the global hospitality industry. Academic Offerings HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR HOSPITALITY AND FOOD SERVICE MANAGEMENT MINOR Students pursuing programs in other areas of study may choose a minor Lodging Management 3 HPM 309 Sports Arena Management 3 HPM 312* Cost Control in Food Services (Prereq

  11. Microsoft Word - CX-GrandCouleeDistrictWoodPoleReplacementsAccessRoads...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2013 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Todd Wehner Civil DesignAccess Roads - TELF-TPP-3 James Semrau Project Manager - TEP-TPP-1...

  12. Microsoft Word - CX-CentraliaAreaAccessRoadsFY13_WEB.doc

    Broader source: Energy.gov (indexed) [DOE]

    Darin Bowman Project Manager TELF-TPP-3 Proposed Action: Access Road maintenance on the Chehalis-Centralia No. 1, Chehalis-Covington No. 1, Paul-Allston No. 2, and Paul-Napavine...

  13. Community-based Natural Resource Management

    E-Print Network [OSTI]

    with respect to access, use or management of a resource (e.g. grass, water, trees, wildlife) #12;Right to sellCommunity-based Natural Resource Management: State of the Science--Global Perspectives María E stocking rates to within carrying capacity) Management Obtain resource units (e.g. hunt wildlife, graze

  14. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03T23:59:59.000Z

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  15. Pennsylvania Capital Access Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

  16. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  17. Mobile Information Access M. Satyanarayanan

    E-Print Network [OSTI]

    Carnegie Mellon University Pittsburgh, PA 15213 To appear in IEEE Personal Communications, Volume 3, No. 1, February 1996 Abstract The ability to access information on demand when mobile will be a criticalMobile Information Access M. Satyanarayanan January 1996 CMU­CS­96­107 School of Computer Science

  18. Cough REVIEW Open Access

    E-Print Network [OSTI]

    unknown authors

    Cough in chronic obstructive pulmonary disease: is it important and what are the effects of treatment? Peter MA Calverley 1,2 Over the last 40 years the assessment and treatment of chronic obstructive pulmonary disease has focused primarily on airflow obstruction with little significance given to the problem of cough. The reasons for this include a view that cough arises simply from the direct irritant and inflammatory effect of cigarette smoke or the presence of excess mucus in the airways. Doubt that cough is of any consequence to patients or responsive to current therapies has reinforced this opinion. At odds with this is the emerging evidence that cough impacts adversely on patients health status and forms an important component of recently validated quality of life instruments. This article presents the arguments why the assessment and treatment of cough should have a more prominent place in the clinical management of COPD.

  19. Hospitality, Tourism and Event Management

    E-Print Network [OSTI]

    Liley, David

    Practical cooking Public speaking Responsible Service of Alcohol (RSA) certification Small to medium the best university in Melbourne for teaching quality (2007­2010) and graduate satisfaction (2007, 2008. As a Swinburne graduate you'll be in high demand, with a long menu of career prospects to select from. Swinburne

  20. Florida Capital Access Program (Florida)

    Broader source: Energy.gov [DOE]

    The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

  1. Globus Platform-as-a-Service for Federating Identity and Access

    E-Print Network [OSTI]

    Tennessee, University of

    #12;Our Generous Sponsors U . S . D E P A R T M E N T O F ENERGY #12;Globus Platform-as-a-Service for Federating Identity and Access Management Vas Vasiliadis #12;Current State · Identity provider (federation root) · Basic profile management (tied to Globus

  2. Hybrid Decision Algorithm for Access Selection in Multi-Operator Networks

    E-Print Network [OSTI]

    Boyer, Edmond

    a hybrid decision algorithm for the selection of the access in multi-operator networks environment, where Resource Management (RRM) jointly done among the different RATs. It creates a multi-RATs environment under the management of a single operator, and a joint RRM begins by optimizing users association to the different RATs

  3. access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  4. accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  5. Improving Access to Foundational Energy Performance Data

    SciTech Connect (OSTI)

    Studer, D.; Livingood, W.; Torcellini, P.

    2014-08-01T23:59:59.000Z

    Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

  6. SPS access control system a new user interface

    E-Print Network [OSTI]

    Riesco, T

    1999-01-01T23:59:59.000Z

    This document describes the project to implement at CERN new trends in industrial control systems and integrate new requirements and functions requested by users. This project will be the testing ground for the specification of procedures in the Access Control and Machine Interlock of LHC. The last modification in the Access Control System to the primary beam areas was made in 1995, and this new project is to improve the fields of personal security, access security and the introduction of modern communication networks used in the industrial control systems. Inside the cycle model of project life, it is at the present time in the test phase in terms of security and exploitation inside the Accelerator Decelerator (AD) project. The presence of Authorization Management System (AMS) to guarantee the automatic information distribution of authorizations to controlled areas is in line with this project.

  7. A Survey on Dynamic Spectrum Access Techniques for Cognitive Radio

    E-Print Network [OSTI]

    Garhwal, Anita

    2012-01-01T23:59:59.000Z

    Cognitive radio (CR) is a new paradigm that utilizes the available spectrum band. The key characteristic of CR system is to sense the electromagnetic environment to adapt their operation and dynamically vary its radio operating parameters. The technique of dynamically accessing the unused spectrum band is known as Dynamic Spectrum Access (DSA). The dynamic spectrum access technology helps to minimize unused spectrum bands. In this paper, main functions of Cognitive Radio (CR) i.e. spectrum sensing, spectrum management, spectrum mobility and spectrum sharing are discussed. Then DSA models are discussed along with different methods of DSA such as Command and Control, Exclusive-Use, Shared Use of Primary Licensed User and Commons method. Game-theoretic approach using Bertrand game model, Markovian Queuing Model for spectrum allocation in centralized architecture and Fuzzy logic based method are also discussed and result are shown.

  8. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    International Electricity Trade - Open Access International Electricity Trade - Open Access DOE has consistently expressed its policy that international electricity trade should be...

  9. INDEXING DEER NUMBERS WITH SPOTLIGHTING: A LONG-TERM STUDY OF A MANAGED DEER POPULATION

    E-Print Network [OSTI]

    -access program has been employed to manage deer at the Mary Flagler Cary Arboretum (MFCA) in southeastern New at the MFCA to assess the effectiveness of these controlled-access hunts in reaching that objective. #12

  10. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems Operation deals with keeping the network up (and the service provided by the network) Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  11. Tri-party agreement databases, access mechanism and procedures. Revision 2

    SciTech Connect (OSTI)

    Brulotte, P.J.

    1996-01-01T23:59:59.000Z

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc.

  12. Bibliography on transmission access issues

    SciTech Connect (OSTI)

    Lankford, C.B. [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States)] [Oklahoma Gas and Electric Co., Oklahoma City, OK (United States); McCalley, J.D. [Iowa State Univ., Ames, IA (United States)] [Iowa State Univ., Ames, IA (United States); Saini, N.K. [Entergy Services Corp., Metairie, LA (United States)] [Entergy Services Corp., Metairie, LA (United States)

    1996-02-01T23:59:59.000Z

    This paper presents a bibliography on issues related to transmission access in electric power systems. There are 233 citations referenced in this bibliography. This bibliography presents a collection of selected literature on issues related to transmission access. It does not contain all of the material available on this subject or the categories contained herein. Some readers may feel that citations within this bibliography should be strictly limited to transmission system issues and not include energy pricing or reliability issues. However, it was the decision of the Subcommittee of the IEEE Task Force on Transmission Access and Nonutility Generation that selected entries relating to reliability and energy pricing, most relevant to transmission access, should be included. This decision was made because certain issues relating to reliability, transmission and energy pricing are perceived by the industry to be critical in the discussion of transmission access. The bibliography has been divided into the following sections or sub-sections: 2.0 Operational (Engineering) Issues, 3.0 Planning, 4.0 Reliability, 5.1 Economics: Costing, 5.2(a) Economics: Location-Differentiated Pricing, 5.2(b) Economics: Time-Differentiated Pricing, 5.3 Economics: Brokering, Bidding, and Auctioning, 6.0 Regulatory, and 7.0 General. Although the content of many publications spanned two or more of these sections, the desire to limit document length required that all publications be placed in the single most appropriate section. Publications are sorted according to author or publication resource.

  13. Webmail access and helpful tips Purpose ...................................................................................................................................3

    E-Print Network [OSTI]

    product installed using SSL certificate management, you will need to disable SSL certificate management

  14. Forests for People Access, recreation & tourism

    E-Print Network [OSTI]

    Strategy Forests for People Access, recreation & tourism on the national forest estate #12;#12;Access, recreation and tourism on the national forest estate | 3 Forests for People Access, recreation and tourism on the national forest estate Setting the scene Everyone has a right of responsible access

  15. Idaho - Access Management: Standards and Procedures for Highway...

    Open Energy Info (EERE)

    EncroachmentsPermittingRegulatory GuidanceGuideHandbook Author Idaho Transportation Department Published Idaho Transportation Department, 042001 DOI Not Provided...

  16. Access Control and Key Management for Mobile Volker Roth 1

    E-Print Network [OSTI]

    Roth, Volker

    Fraunhofer Institute for Computer Graphics, Rundeturmstr. 6, 64283 Darmstadt, Germany Abstract Security, computer code known as agents represent the next great wave of innovation and development across

  17. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP...

  18. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    at IBM Research - Zurich in collaboration with ETH Zurich. 1 #12; of the authorization mechanism and its integration with KMIP. IBM Research - Zurich, CH-8803 R¨uschlikon, Switzerland. {cca,gka}@zurich.ibm.com Adnovum Informatik AG, CH-8005 Zurich. divay.bansal@adnovum.ch. Work done

  19. Request Access to the PARSIIe Project Management Lessons Learned (PMLL)

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department of EnergyReporting

  20. Cough REVIEW Open Access Cough management: a practical approach

    E-Print Network [OSTI]

    Francesco De Blasio; Johann C Virchow; Mario Polverino; Ro Zanasi; Panagiotis K Behrakis; Gunsely Kilin; Rossella Balsamo; Gianluca De Danieli; Luigi Lanata

    Cough is one of the most common symptoms for which patients seek medical attention from primary care physicians and pulmonologists. Cough is an important defensive reflex that enhances the clearance of secretions and particles from the airways and protects the lower airways from the aspiration of foreign materials. Therapeutic suppression of cough may be either disease-specific or symptom related. The potential benefits of an early treatment of cough could include the prevention of the vicious cycle of cough. There has been a long tradition in acute cough, which is frequently due to upper respiratory tract infections, to use symptom-related anti-tussives. Suppression of cough (during chronic cough) may be achieved by disease-specific therapies, but in many patients it is often necessary to use symptomatic anti-tussives, too. According to the current guidelines of the American College of Chest Physician on Cough Suppressants and Pharmacologic Protussive Therapy and additional clinical trials on the most frequent anti-tussive drugs, it should be possible to diagnose and treat cough successfully in a majority of cases. Among drugs used for the symptomatic treatment of cough, peripherally acting anti-tussives such as levodropropizine and moguisteine show the highest level of benefit and should be recommended especially in children. By improving our understanding of the specific effects of these anti-tussive agents, the therapeutic use of these drugs may be refined. The present review provides a summary of the most clinically relevant anti-tussive drugs in addition to their potential mechanism of action.

  1. Using Sleepers to Manage Batch Access to HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser GuideHadoop

  2. Idaho - Access Management: Standards and Procedures for Highway

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:GreerHiCalifornia:ISI Solar Jump to: navigation,Icon SolarRight-of-Way

  3. Asset Management System (AMS) for Property Custodians Quick Reference Guide Page 1 of 31

    E-Print Network [OSTI]

    Stephens, Jacqueline

    Asset Management System (AMS) for Property Custodians ­ Quick Reference Guide Page 1 of 31 Accessing the Asset Management System (AMS) 1) Sign into MyLSU #12;Asset Management System (AMS Management" 3) When you see the SSO Welcome screen (above), click "OK". #12;Asset Management System (AMS

  4. Nolij academic appointment files roles and document indices access_10May2013.xlsx, DOCUMENT INDICES ACCESS BY ROLE, 5/30/13 1 Role and Permitted Actions on a document in an

    E-Print Network [OSTI]

    Sonnenburg, Justin L.

    Nolij academic appointment files roles and document indices access_10May2013.xlsx, DOCUMENT INDICES ACCESS BY ROLE, 5/30/13 1 Role and Permitted Actions on a document in an authorized document index type Manage Authority (may delegate) APT-ACTIVITIES APT-AGREEMENTS APT-APPLICATION APT-APPTDEPT APT

  5. Collection Management Policy Executive Summary

    E-Print Network [OSTI]

    Levi, Ran

    Collection Development Budget Allocation 1.4 Responsibility for Collection Development within the Library 2 Management 3.1 Locations and Availability of Material 3.1.1 Heavy Demand 3.1.2 Closed access and remote - Collection Maintenance and Evaluation 4.1 De-Selection of Materials #12;4.1.1 Criteria for Retention

  6. Web Data Accessing and the Web Searching Process S. Petridou G. Pallis A. Vakali G. Papadimitriou A. Pomportsis

    E-Print Network [OSTI]

    Pallis, George

    Web Data Accessing and the Web Searching Process S. Petridou G. Pallis A. Vakali G. Papadimitriou A apompo@csd.auth.gr Abstract The enormous growth in the number of documents circulated over the Web increases the need for improved Web data management systems. Web data accessing and Web searching

  7. DOE Announces Nearly $3.2 Million to Help Consumers Better Manage...

    Office of Environmental Management (EM)

    consumers to better manage their electricity use through improved access to their own electricity consumption data. These projects will complement the Apps for Energy prizes,...

  8. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuel

  9. SUBCONTRACT MANAGEMENT

    Energy Savers [EERE]

    0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

  10. Environmental management activities

    SciTech Connect (OSTI)

    NONE

    1997-07-01T23:59:59.000Z

    The Office of Environmental Management (EM) has been delegated the responsibility for the Department of Energy`s (DOE`s) cleanup of the nuclear weapons complex. The nature and magnitude of the waste management and environmental remediation problem requires the identification of technologies and scientific expertise from domestic and foreign sources. Within the United States, operational DOE facilities, as well as the decontamination and decommissioning of inactive facilities, have produced significant amounts of radioactive, hazardous, and mixed wastes. In order to ensure worker safety and the protection of the public, DOE must: (1) assess, remediate, and monitor sites and facilities; (2) store, treat, and dispose of wastes from past and current operations; and (3) develop and implement innovative technologies for environmental restoration and waste management. The EM directive necessitates looking beyond domestic capabilities to technological solutions found outside US borders. Following the collapse of the Soviet regime, formerly restricted elite Soviet scientific expertise became available to the West. EM has established a cooperative technology development program with Russian scientific institutes that meets domestic cleanup objectives by: (1) identifying and accessing Russian EM-related technologies, thereby leveraging investments and providing cost-savings; (2) improving access to technical information, scientific expertise, and technologies applicable to EM needs; and (3) increasing US private sector opportunities in Russian in EM-related areas.

  11. City of Boulder- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

  12. Metropolitan Accessibility and Transportation Sustainability:Sustainability

    E-Print Network [OSTI]

    Papalambros, Panos

    Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

  13. Evaluation of the Tellabs 1150 GPON multiservice access platform.

    SciTech Connect (OSTI)

    Brenkosh, Joseph Peter; Wolf, Jimmie V.

    2014-11-01T23:59:59.000Z

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  14. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  15. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  16. AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS

    E-Print Network [OSTI]

    Samarati, Pierangela

    AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS E. Damiani1, S. De Capitani di Vimercati2, E. Fern controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector such as GIF, JPEG, and PNG, SVG has many advantages: SVG documents are plain text, so they can be read

  17. Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS

    E-Print Network [OSTI]

    Kieu, Khanh

    Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS is around 340m/s. #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Homework Problem 2: Calculate

  18. Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS

    E-Print Network [OSTI]

    Kieu, Khanh

    Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS OPTI · Metropolitan and local area networks #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS OPTI500C Syllabus

  19. Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS

    E-Print Network [OSTI]

    Kieu, Khanh

    Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS multiplexing · Network topology #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS Communication Source

  20. Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS

    E-Print Network [OSTI]

    Kieu, Khanh

    Slide #1CENTER FOR INTEGRATED ACCESS NETWORKS Photonics Communication Engineering Khanh Kieu, Ph.D. College of Optical Sciences, University of Arizona #12;Slide #2CENTER FOR INTEGRATED ACCESS NETWORKS Significant progress #12;Slide #3CENTER FOR INTEGRATED ACCESS NETWORKS What else can we multiplex

  1. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03T23:59:59.000Z

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  2. GEOSCIENCE INFORMATION: MAKING THE EARTH SCIENCES ACCESSIBLE FOR EVERYONE - Proceedings of the 42nd Meeting of the Geoscience Information Society

    E-Print Network [OSTI]

    GeoScience Information Society

    2007-01-01T23:59:59.000Z

    ................................................................................................................ 5 DIGITIZATION OF GEOLOGY THESES AND DISSERTATIONS Deborah McCarthy and Tamsen Hert ........................................................................................................ 9 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L... streamlined the process and improved access to this important collection. 13 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L. Whitehead Arthur Lakes Library Colorado School of Mines Golden, CO 80401 hwhitehe@mines.edu Abstract...

  3. Demil planning and management system

    SciTech Connect (OSTI)

    Huber, C.C.; Bormet, S.M.; Whitfield, R.G.; Bowen, M.; Chun, K.C. [Argonne National Lab., IL (United States); Golden, R.E. [Army Pacific, Fort Shafter, HI (United States); Fuller, R. [Army Industrial Operations Command, Rock Island, IL (United States). National Maintenance Point Branch

    1997-08-01T23:59:59.000Z

    The National Maintenance Point (NMP) Branch of the US Army Industrial Operations Command (IOC) serves as the Single Manager for Conventional Ammunition (SMCA) agent for managing the renovation, modification, recycling, and disposal of conventional ammunition, thereby improving readiness. The mission of the NMP includes program management for demilitarization (demil) activities, ammunition maintenance, and ammunition peculiar equipment (APE) projects. Through an Interagency Agreement between the US Army and the US Department of Energy, Argonne National Laboratory (ANL) is developing an integrated data management system, called the Demil Planning and Management System (DPMS), for IOC. DPMS is intended to help NMP efficiently manage information on ongoing demil project activities and asset inventories, plan future projects, and allocate budgets. This system, when fully implemented, will also make it possible for the user community to interactively access the DPMS database; perform data entry and queries; and run reports through network, modem, and Internet access to the system. This paper describes the principal components of the DPMS, current capabilities, and planned enhancements.

  4. Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process

    E-Print Network [OSTI]

    Arnold, Jonathan

    Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

  5. Solar access of residential rooftops in four California cities

    E-Print Network [OSTI]

    Levinson, Ronnen

    2010-01-01T23:59:59.000Z

    rooftops in four California cities Solar access ofcomputed. Solar access violation California Public ResourcesSolar access of residential rooftops in four California

  6. Instructions for Accessing FedConnect Postings, June 30, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

  7. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

  8. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST31 ORV 15051 ModificationRemote Access Ames

  9. An Access Control Solution For The Inter-Organizational Use Of ITIL Federated

    E-Print Network [OSTI]

    An Access Control Solution For The Inter-Organizational Use Of ITIL Federated Configuration. Fulfilling these new requirements is supplemented by best practice frameworks, such as ITIL, which define for enterprises of any size. IT Service Management (ITSM) frameworks such as the IT Infrastructure Library (ITIL

  10. PROCEDURES FOR ACCESS TO AND CORRECTION OF INFORMATION Procedural Authority: University Secretary Effective Date: January, 2010

    E-Print Network [OSTI]

    Victoria, University of

    PROCEDURES FOR ACCESS TO AND CORRECTION OF INFORMATION Procedural Authority: University Secretary Effective Date: January, 2010 Procedural Officer: University Archivist Supersedes: New Last Editorial Change of these procedures is to set out how the university will manage: · freedom of information requests; · requests

  11. EA-1980: Spar Canyon-Round Valley Access Road System Improvements, Custer County, Idaho

    Broader source: Energy.gov [DOE]

    Bonneville Power Administration is preparing an EA to assess potential environmental impacts of proposed improvements to the access road system for its existing Spar Canyon-Round Valley Transmission Line located on Bureau of Land Management land in Custer County, Idaho.

  12. Inspection of selected intelligence and special access program work-for-others projects

    SciTech Connect (OSTI)

    Not Available

    1993-10-08T23:59:59.000Z

    At the request of the former Secretary, an inspection of six classified intelligence and special access program work-for-others projects was conducted. The purpose of this inspection was to evaluate managements, effectiveness regarding these work-for-others projects and included tests for financial integrity and adherence to applicable laws and regulations. Details of the inspection are provided in this report.

  13. Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks

    E-Print Network [OSTI]

    Garcia, Alfredo

    of the cognitive radio network (CRN). Most of the current works dealing with spectrum management in the CRN focus) spectrum mobility, rules that require the CUs to leave the channel if licensed users are detected. Many1 Joint Distributed Access Point Selection and Power Allocation in Cognitive Radio Networks Mingyi

  14. Project Management Plan Resident Management System (RMS)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

  15. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  16. Request for Access to the Student Admin System Please complete the form and email to Student Business Systems: sbs.help@anu.edu.au

    E-Print Network [OSTI]

    Botea, Adi

    of Information Technology: https://policies.anu.edu.au/ppl/document/ANUP_000704 - Account Management and Access: https://policies.anu.edu.au/ppl/document/ANUP_000709 - Privacy Policy: https://policies.anu.edu.au/ppl

  17. Better accessibility for Paramaribo / Paramaribo beter bereikbaar:.

    E-Print Network [OSTI]

    Flu, M.E.

    2012-01-01T23:59:59.000Z

    ??A quantitative study for increasing the accessibility of Paramaribo, the capital of Suriname. The analysis was done with the help of a traffic demand model (more)

  18. Access Control for SAR Systems Stephen Quirolgico

    E-Print Network [OSTI]

    Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

  19. The Ohio Capital Access Program (OCAP) (Ohio)

    Broader source: Energy.gov [DOE]

    The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

  20. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    SciTech Connect (OSTI)

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01T23:59:59.000Z

    As early as 2014, mobile network operators spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  1. Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship

    E-Print Network [OSTI]

    Rosenblum, Brian

    2010-07-06T23:59:59.000Z

    This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

  2. The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009

    E-Print Network [OSTI]

    Grishok, Alla

    The NIH Public Access PolicyThe NIH Public Access Policy April 21, 2009 http://publicaccess.nih.gov/ 11 #12;The NIH Public Access Policy Is Mandatory · The Policy implements Division G, Title II of the National Institutes of Health shall require that all investigators funded by the NIH submit or have

  3. Metering Schemes for General Access Structures

    E-Print Network [OSTI]

    Stinson, Douglas

    Metering Schemes for General Access Structures Barbara Masucci Dipartimento di Informatica ed, Canada E­mail: dstinson@cacr.math.uwaterloo.ca Abstract A metering scheme is a method by which an audit time frame. In this paper we construct metering schemes for more general access structures, which

  4. RESEARCH & INNOVATION OFFICE EASY ACCESS IP

    E-Print Network [OSTI]

    University of Technology, Sydney

    RESEARCH & INNOVATION OFFICE EASY ACCESS IP AN INTRODUCTION FOR INDUSTRY PARTNERS FEBRUARY 2014 #12 to economic, environmental and social benefits. We believe there are some significant benefits to Easy Access, design and innovation Simple template license agreements means no lengthy and expensive negotiations

  5. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  6. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  7. Revised Spring 2008 NIH Public Access Policy

    E-Print Network [OSTI]

    Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory funded by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central

  8. Web Accessibility Office of Diversity and Inclusion

    E-Print Network [OSTI]

    Jones, Michelle

    Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

  9. Usability and Accessibility in Consumer Health Informatics

    E-Print Network [OSTI]

    Shneiderman, Ben

    Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

  10. Towards a sustainable web accessibility Giorgio Brajnik

    E-Print Network [OSTI]

    Brajnik, Giorgio

    this is by focussing on sustainable accessibility, i.e. by shaping and establishing effective acces- sibility processes;processes that can be sustained mainly by their own return on investment and by minimal additional resourcesTowards a sustainable web accessibility Giorgio Brajnik Dip. di Matematica e Informatica Universit

  11. National Radiobiology Archives Distributed Access user's manual

    SciTech Connect (OSTI)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01T23:59:59.000Z

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  12. Interactive Database Access with Statistics and Graphics

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

  13. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  14. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability

    SciTech Connect (OSTI)

    Sellers, C.; Fox, B.; Paulz, J.

    1996-03-01T23:59:59.000Z

    The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

  15. Managing Records for the Long Term - 12363

    SciTech Connect (OSTI)

    Montgomery, John V. [U.S. Department of Energy, Office of Legacy Management, Morgantown, West Virginia (United States); Gueretta, Jeanie [U.S. Department of Energy, Office of Legacy Management, Grand Junction, Colorado (United States)

    2012-07-01T23:59:59.000Z

    The U.S. Department of Energy (DOE) is responsible for managing vast amounts of information documenting historical and current operations. This information is critical to the operations of the DOE Office of Legacy Management. Managing legacy records and information is challenging in terms of accessibility and changing technology. The Office of Legacy Management is meeting these challenges by making records and information management an organizational priority. The Office of Legacy Management mission is to manage DOE post-closure responsibilities at former Cold War weapons sites to ensure the future protection of human health and the environment. These responsibilities include environmental stewardship and long-term preservation and management of operational and environmental cleanup records associated with each site. A primary organizational goal for the Office of Legacy Management is to 'Preserve, Protect, and Share Records and Information'. Managing records for long-term preservation is an important responsibility. Adequate and dedicated resources and management support are required to perform this responsibility successfully. Records tell the story of an organization and may be required to defend an organization in court, provide historical information, identify lessons learned, or provide valuable information for researchers. Loss of records or the inability to retrieve records because of poor records management processes can have serious consequences and even lead to an organisation's downfall. Organizations must invest time and resources to establish a good records management program because of its significance to the organization as a whole. The Office of Legacy Management will continue to research and apply innovative ways of doing business to ensure that the organization stays at the forefront of effective records and information management. DOE is committed to preserving records that document our nation's Cold War legacy, and the Office of Legacy Management will keep records management as a high priority. (authors)

  16. LRRB Pavement Management Systems Pavement Management Systems

    E-Print Network [OSTI]

    Minnesota, University of

    LRRB Pavement Management Systems Pavement Management Systems Presented by: Michael Marti SRF for implementing and monitoring research results (RIC) #12;LRRB Pavement Management Systems LRRB Structure LRRB Current Pavement Management System Used ICON (Goodpointe) Year of Pavement Management System

  17. UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE

    E-Print Network [OSTI]

    Oliver, Douglas L.

    UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE POLICY AND PROCEDURES Managed Health Care (CMHC) shall ensure that newly admitted inmates to Connecticut Department include, but is not limited to, emergency health care, sick call, access to medication, dental and mental

  18. Autonomic Privilege Management -extending PERMIS to contribute to the

    E-Print Network [OSTI]

    Kent, University of

    privilege management infrastructure (PMI), the new Integrated Project TrustCoM, and autonomic security. It then provides the business case for an autonomic PMI, and looks at the issues that will need to be resolved] is a standard's based Privilege Management Infrastructure (PMI), built according to the ISO 10181-3 Access

  19. Collection Policy: Policy Analysis & Management 1.0 The Department

    E-Print Network [OSTI]

    Angenent, Lars T.

    The economics of the health care system: covering issues such as Medicare, Medicaid, managed care delivery systems, the organization and financing of #12;2 personal health services; the structure of health care health networks. o Access to, and quality of, health care services: covering issues such as managed care

  20. CENTRAL EUROPE MANAGING AUTHORITY CITY OF VIENNA

    E-Print Network [OSTI]

    Genova, Universit degli Studi di

    CENTRAL EUROPE MANAGING AUTHORITY CITY OF VIENNA Municipal Department for European affairs (MA 27 PROGRAMME Thematic study: Energy efficiency and renewable energies in the CENTRAL EUROPE Programme Request European regions more competitive, innovative, attractive and accessible. The Central Europe Programme area

  1. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins

    2009-09-01T23:59:59.000Z

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tools design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  2. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  3. Water Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Management This department applies multi-disciplinary science and technology-based modeling to assess complex environmental systems. It integrates ecology, anthropology, and...

  4. Program Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will participate in a wide spectrum of program and project management activities involving systems engineering and integration support for Defense Programs...

  5. MANAGEMENT (MNG)

    Broader source: Energy.gov (indexed) [DOE]

    and recommendations is adequately implemented. (DOE Order 414.1A, Criterion 3; 10 CFR 830, Subpart A) Approach Record Review * Review the SWS issues management systems and...

  6. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  7. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14T23:59:59.000Z

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  8. A Framework for Flexible Access Control in Digital Library Systems

    E-Print Network [OSTI]

    Ray, Indrajit

    to merely control access to documents local to the digital library. The access control policies are often called DACM (Document Access Control Methods). The basic idea is geared toward discretionary accessA Framework for Flexible Access Control in Digital Library Systems Indrajit Ray and Sudip

  9. Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122

    SciTech Connect (OSTI)

    Montgomery, John; Gueretta, Jeanie [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States)] [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States); McKinney, Ruth; Anglim, Cliff [Source One Management, Inc. (United States)] [Source One Management, Inc. (United States)

    2013-07-01T23:59:59.000Z

    The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. To fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)

  10. Access to UCNI | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, ChapterAccess

  11. BachelorofManagement InternationalManagement

    E-Print Network [OSTI]

    Seldin, Jonathan P.

    on the official transcript (see Part 11 - Faculty of Management in the 2007/2008 Calendar). Program Planning Guide Management 3050/Political Science 3420 - Human Resource Management Management 3061 - Information Systems Environment Management 3640 - Cross-Cultural Management Practices Management 3660/Geography 3225 - Industrial

  12. Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary Institute and the

    E-Print Network [OSTI]

    Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary Institute;Contribution 517 Monitoring and Managing Water Quality in the San Francisco Estuary San Francisco Estuary information generated each year on water quality in the Estu- ary accessible to water quality managers

  13. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

  14. Accessing MDS with IDL February 1993

    E-Print Network [OSTI]

    California at San Diego, University of

    Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

  15. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E. (Richland, WA)

    1982-01-01T23:59:59.000Z

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  16. Cognitive Medium Access: Exploration, Exploitation and Competition

    E-Print Network [OSTI]

    El-Gamal, Hesham

    1 Cognitive Medium Access: Exploration, Exploitation and Competition Lifeng Lai, Hesham El Gamal, Hai Jiang and H. Vincent Poor Abstract-- This paper establishes the equivalence between cognitive cognitive user wishes to opportunistically exploit the availability of empty fre- quency bands

  17. Rail Access to Yucca Mountain: Critical Issues

    SciTech Connect (OSTI)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25T23:59:59.000Z

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  18. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

  19. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect (OSTI)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01T23:59:59.000Z

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  20. North Carolina Capital Access Program (North Carolina)

    Broader source: Energy.gov [DOE]

    The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lenders usual standards. The average CAP loan is ...

  1. A Dyslexic Perspective on e-Content Accessibility

    E-Print Network [OSTI]

    Brajnik, Giorgio

    an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

  2. ad libitum access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  3. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  4. SVOPME: A scalable virtual organization privileges management environment

    SciTech Connect (OSTI)

    Garzoglio, Gabriele; /Fermilab; Wang, Nanbor; /Tech-X, Boulder; Sfiligoi, Igor; Levshina, Tanya; /Fermilab; Anathan, Balamurali; /Tech-X, Boulder

    2009-05-01T23:59:59.000Z

    Grids enable uniform access to resources by implementing standard interfaces to resource gateways. In the Open Science Grid (OSG), privileges are granted on the basis of the user's membership to a Virtual Organization (VO). However, Grid sites are solely responsible to determine and control access privileges to resources using users identity and personal attributes, which are available through Grid credentials. While this guarantees full control on access rights to the sites, it makes VO privileges heterogeneous throughout the Grid and hardly fits with the Grid paradigm of uniform access to resources. To address these challenges, we are developing the Scalable Virtual Organization Privileges Management Environment (SVOPME), which provides tools for VOs to define and publish desired privileges and assists sites to provide the appropriate access policies. Moreover, SVOPME provides tools for Grid sites to analyze site access policies for various resources, verify compliance with preferred VO policies, and generate directives for site administrators on how the local access policies can be amended to achieve such compliance without taking control of local configurations away from site administrators. This paper discusses what access policies are of interest to the OSG community and how SVOPME implements privilege management for OSG.

  5. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Broader source: Energy.gov (indexed) [DOE]

    on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

  6. Bursting at the Seams: Water Access and Housing in Luanda

    E-Print Network [OSTI]

    Bulfin, Michael Patrick

    2009-01-01T23:59:59.000Z

    constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

  7. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

  8. SBA Expands Access to Contracting Opportunities for Women-Owned...

    Office of Environmental Management (EM)

    SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses SBA Expands Access to Contracting Opportunities for Women-Owned Small Businesses January 22, 2013 -...

  9. access system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  10. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

  11. access control policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

  12. Public Roundtable- Data Access and Privacy Issues Related to...

    Office of Environmental Management (EM)

    Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies Transcript...

  13. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  14. National Geothermal Data Systems Data Acquisition and Access...

    Broader source: Energy.gov (indexed) [DOE]

    National Geothermal Data Systems Data Acquisition and Access National Geothermal Data Systems Data Acquisition and Access Project objective: To support the acquisition of new and...

  15. Pre-Packaged Commercial Property-Accessed Clean Energy Financing...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO Peer Review Pre-Packaged Commercial Property-Accessed Clean Energy Financing Solutions - 2014 BTO...

  16. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    /POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 21 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT. PROCEDURAL DETAILS 2.1. Responsibilities Entity / Officer Responsibilities Planning and Management Committee

  17. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  18. Project Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

  19. Stormwater Management

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23T23:59:59.000Z

    management program must be developed that would meet the standard of reducing pollutants to the maximum extent practicable. Stormwater management programs for medium and large MS4s include measures to: ? Identify major outfalls and pollutant loadings... seeding: The vegetation used will be part of final landscaping, but during construction it prevents soil erosion. ? Mulching: Materials such as hay, grass, woodchips, gravel, or straw are placed on top of the soil to keep it from eroding. Structural...

  20. Challenges in Obtaining Property Access: The FUSRAP Maywood Site Experience - 13433

    SciTech Connect (OSTI)

    Kollar, William [Shaw Environmental, Inc., 100 West Hunter Avenue, Maywood, NJ 07607 (United States)] [Shaw Environmental, Inc., 100 West Hunter Avenue, Maywood, NJ 07607 (United States)

    2013-07-01T23:59:59.000Z

    The Formerly Utilized Sites Remedial Action Program (FUSRAP) is the US government program started in 1974 to identify, investigate and clean up or control sites that became contaminated as a result of the nation's early atomic programs. Many of these sites are not owned by the federal government and therefore require owner permission to enter. The experience in pursuing such access at the FUSRAP Maywood Superfund Site (the Maywood Site or the Site) in Bergen County, New Jersey, is extensive. Since the US Army Corps of Engineers (the Corps) assumed responsibility for the Maywood Site from the US Department of Energy in 1997, at least 186 separate property access agreements (known in FUSRAP as a Real Estate Right-of- Entry or ROE) have been executed between the Corps and approximately 55 different land owners and tenant occupants at the Maywood Site (agreement renewals with the same owners over time account for the difference). Maywood's experience during the Corps' tenure, reflected here in three case studies of representative property access efforts, offers some lessons and best practices that may apply to other remedial programs. While the Site Community Relations Manager (the author of this paper) managed the property access task, multi-disciplinary support from across the project was also critical to success in this endeavor. (authors)

  1. Environmental Compliance Management System

    SciTech Connect (OSTI)

    Brownson, L.W.; Krsul, T.; Peralta, R.A. [Argonne National Lab., Idaho Falls, ID (United States); Knudson, D.A.; Rosignolo, C.L. [Argonne National Lab., IL (United States)

    1992-09-01T23:59:59.000Z

    Argonne National Laboratory (ANL) is developing the Environmental Compliance Management System (ECMS) as a comprehensive, cost-effective tool to ensure (1) that the Laboratory complies with all applicable federal and state environmental laws and regulations, (2) that environmental issues and concerns are recognized and considered in the early phases of projects; and (3) that Laboratory personnel conduct Laboratory operations in the most environmentally acceptable manner. The ECMS is an expert computer system which is designed to allow project engineers to perform an environmental evaluation of their projects. The system includes a Master Program which collects basic project information, provide utility functions, and access the environmental expert modules, environmental expert system modules for each federal and state environmental law which allows the user to obtain specific information on how an individual law may affect his project; and site-specific databases which contain information necessary for effective management of the site under environmental regulations. The ECMS will have the capability to complete and print many of the necessary environmental forms required by federal and state agencies, including the Department of Energy.

  2. Managing the Management: CORBAbased Instrumentation of Management Systems

    E-Print Network [OSTI]

    Managing the Management: CORBA­based Instrumentation of Management Systems A. Keller Munich Network to dynamically exchange customer­ and technology­related data. In this context, management systems are crucial providers: On the one hand, different service providers have chosen different management systems

  3. Business Management Analyst Business Manager Director of Communication Contracts Manager

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    · Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

  4. Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)

    E-Print Network [OSTI]

    Whalley, David

    of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

  5. The UCSB Access ID Card Application for Department Use Door Access will be needed

    E-Print Network [OSTI]

    Bigelow, Stephen

    of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

  6. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  7. Student On Line Access to Records Provides on-line, self service access to

    E-Print Network [OSTI]

    SOLAR Student On Line Access to Records #12;Provides on-line, self service access to: Registrar Enrollment Appointments · Review Solar Messages Student Account/ Financial Aid: · View Support offered (available aid ­ i.e. Federal loans, scholarships, etc.) · Accept financial aid (i.e. loans, etc.) ­ loan

  8. Participant Name:_____________________________ Canadian Access Federation: Trust Assertion Document (TAD)

    E-Print Network [OSTI]

    Northern British Columbia, University of

    (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation Access Federation: Trust Assertion Document (TAD) CANARIE Inc. - Canadian Access Federation Service Page Greg.Condon@unbc.ca (250) 960-5289 #12;Canadian Access Federation: Trust Assertion Document (TAD

  9. Measuring the Potential to Adopt Self Governance for the Management of a Common Pool Resource

    E-Print Network [OSTI]

    Colin Castillo, Sergio

    2012-02-14T23:59:59.000Z

    Self governance has proved to be a suitable instrument for the management of a common pool resource like fisheries. Under self governance, individuals organize themselves for the use of a resource, to deal with problems derived from the free access...

  10. Performance estimates for personnel access control systems

    SciTech Connect (OSTI)

    Bradley, R. G.

    1980-10-01T23:59:59.000Z

    Current performance estimates for personnel access control systems use estimates of Type I and Type II verification errors. A system performance equation which addresses normal operation, the insider, and outside adversary attack is developed. Examination of this equation reveals the inadequacy of classical Type I and II error evaluations which require detailed knowledge of the adversary threat scenario for each specific installation. Consequently, new performance measures which are consistent with the performance equation and independent of the threat are developed as an aid in selecting personnel access control systems.

  11. Access to OUO | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess to OUO Access to OUO DOE M 471.3-1, Admin Chg 1, Chapter II,

  12. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect (OSTI)

    Matthew Vranicar; John Weicher

    2006-04-17T23:59:59.000Z

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicists computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications. There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratorys (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS projects current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

  13. Managing Solutions

    E-Print Network [OSTI]

    Baker, Emily

    2007-01-01T23:59:59.000Z

    tx H2O | pg. 19 Texas Water Resources Institute (TWRI) project managers work together with scientists and educators as well as government funding agencies to address water quality and quantity issues in Texas. Each of TWRI?s five project... the funds.? Gregory began his role at TWRI in 2006 upon com- pletion of a master?s degree in water management and hydrological science at Texas A&M University. A former Mills Scholar, Gregory was familiar with TWRI. He saw that the institute...

  14. Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance

    E-Print Network [OSTI]

    Tompa, Frank

    and implementing complex workflow based constraints, temporal access control constraints, and records retention authorities can demand access to a database system and conduct a thorough forensic analysis of corporate internal and external), who are responsible for verifying that corporate records management practices

  15. CA557 Information Access Cathal Gurrin (c) 2003-2005 C A 5 5 7 -I n f o r m a t I o n A c c e s s -

    E-Print Network [OSTI]

    Smeaton, Alan F.

    CA557 ­ Information Access Cathal Gurrin (c) 2003-2005 - - - 1 - CA557 C A 5 5 7 - I n f o r m a t I o n A c c e s s - Chapter 1 CA557 Information Access - 2 - CA557 C A 5 5 7 - I n f o r m a t I o n as much about managing it? #12;CA557 ­ Information Access Cathal Gurrin (c) 2003-2005 - - - 3 - CA557

  16. OFC'13 Summary ---Access Networks-I

    E-Print Network [OSTI]

    California at Davis, University of

    They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

  17. Example School Communications Email about Open Access

    E-Print Network [OSTI]

    Tate, Dominic

    2015-03-23T23:59:59.000Z

    This is an example text for an email to be sent to the School of Mathematics as part of preparations for implementing Open Access requirements for the post-2014 REF. This is made available here as part of the Jisc-funded LOCH Project....

  18. Caf Systems Central Security Access Form

    E-Print Network [OSTI]

    Shull, Kenneth R.

    and Procurement Tracking Reports (Encumbrances, Delivery, Change Order History) SCH_SUPPLY_CHAIN Ad Hoc Query Runner Ability to run reports created by Ad Hoc Query Authors CAFE_NU_COGNOS_AD_HOC_VIEWERS Ad Hoc Query Author (Training Required) Access to Query Studio to create, build, and save reports CAFE_NU_COGNOS_AD_HOC

  19. ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION

    E-Print Network [OSTI]

    Jarrett, Thomas H.

    ACCESS TO INFORMATION MANUAL FOR THE NATIONAL RESEARCH FOUNDATION Manual in terms of section 14 ............................................................................................. 1 2.2 A SCHEMATIC DIARAM OF THE STRUCTURE OF THE NATIONAL RESEARCH FOUNDATION......... 2 2 BODIES #12;© National Research Foundation Malefyane Mogale i FOREWORD In order to present a balanced

  20. RESEARCH & INNOVATION OFFICE EASY ACCESS IP

    E-Print Network [OSTI]

    University of Technology, Sydney

    the barriers to internal investment in development by offering the IP for free and using quick and simple university and an international partner of the initiative for Australasia in December 2013. This new approach Access IP? Whilst we will still protect and commercialise some IP as before, we will offer some of our IP

  1. Improving School Governance | 3 Open access publishing

    E-Print Network [OSTI]

    Rambaut, Andrew

    Access Article Processing Charges Bo-Christer Björk and David Solomon March 2014 #12;1 Developing, Finland and Haslett, Michigan, USA Bo-Christer Björk, Dr. Tech. David J Solomon, PhD Professor Professor.............................................................................................................................................................7 1.2 Methodology

  2. REVIEW Open Access Pulmonary arterial hypertension

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    REVIEW Open Access Pulmonary arterial hypertension David Montani1,2,3 , Sven Günther1,2,3 , Peter,2,3 and Olivier Sitbon1,2,3* Abstract Pulmonary arterial hypertension (PAH) is a chronic and progressive disease and designated as clinical group 1'. Group 2 'Pulmonary hypertension due to left heart diseases' is divided

  3. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit Manoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

  4. Access Agreement Principal Contact for Enquiries

    E-Print Network [OSTI]

    Stell, John

    Access Agreement 2014/15 Contents 1) Introduction 3 2) Fees, Student Numbers and Fee Income 4 3, strong community spirit and excellent student life. Observing Keele's founding ethos of 'the pursuit of education for individuals, communities and society and equality of opportunity. 1.2 Our University Mission

  5. Technology Access Deutsches Patent; Internationale Patentanmeldung (PCT)

    E-Print Network [OSTI]

    Haller-Dintelmann, Robert

    Technology Access offered by Deutsches Patent; Internationale Patentanmeldung (PCT) TM 586 besitzt einen so gro?en Einfluss auf eine Vielzahl zellulä- in zahlreichen Signalwegen #12; Deutsches Störungen, Depression, Schizophrenie sowie Haarausfall und verringerte Spermienmotilität. #12; Deutsches

  6. Characterizing Open Access Publishing at Your Institution

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

  7. Grid Data Access on Widely Distributed Worker Nodes Using Scalla and SRM

    SciTech Connect (OSTI)

    Jakl, Pavel; /Prague, Inst. Phys.; Lauret, Jerome; /Brookhaven; Hanushevsky, Andrew; /SLAC; Shoshani, Arie; /LBL, Berkeley; Sim, Alex; /LBL, Berkeley; Gu, Junmin; /LBL, Berkeley

    2011-11-10T23:59:59.000Z

    Facing the reality of storage economics, NP experiments such as RHIC/STAR have been engaged in a shift of the analysis model, and now heavily rely on using cheap disks attached to processing nodes, as such a model is extremely beneficial over expensive centralized storage. Additionally, exploiting storage aggregates with enhanced distributed computing capabilities such as dynamic space allocation (lifetime of spaces), file management on shared storages (lifetime of files, pinning file), storage policies or a uniform access to heterogeneous storage solutions is not an easy task. The Xrootd/Scalla system allows for storage aggregation. We will present an overview of the largest deployment of Scalla (Structured Cluster Architecture for Low Latency Access) in the world spanning over 1000 CPUs co-sharing the 350 TB Storage Elements and the experience on how to make such a model work in the RHIC/STAR standard analysis framework. We will explain the key features and approach on how to make access to mass storage (HPSS) possible in such a large deployment context. Furthermore, we will give an overview of a fully 'gridified' solution using the plug-and-play features of Scalla architecture, replacing standard storage access with grid middleware SRM (Storage Resource Manager) components designed for space management and will compare the solution with the standard Scalla approach in use in STAR for the past 2 years. Integration details, future plans and status of development will be explained in the area of best transfer strategy between multiple-choice data pools and best placement with respect of load balancing and interoperability with other SRM aware tools or implementations.

  8. Object Management Systems

    E-Print Network [OSTI]

    Gollu, Aleks Ohannes

    1995-01-01T23:59:59.000Z

    Object-Oriented Database Management Systems for EngineeringR. Cassel. Distribution Management Systems: Functions and8-PWR 1988. Network Management Systems 52 Subodh Bapat.

  9. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    R-3 Environmental Management System Plan References 30.of Energy, Safety Management System Policy, DOE P 450.4 (E), Environmental Management Systems ? Requirements with

  10. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    Management Program, R-3 Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  11. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  12. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

  13. Waste Management Program management plan. Revision 1

    SciTech Connect (OSTI)

    NONE

    1997-02-01T23:59:59.000Z

    As the prime contractor to the Department of Energy Idaho Operations Office (DOE-ID), Lockheed Martin Idaho Technologies Company (LMITCO) provides comprehensive waste management services to all contractors at the Idaho National Engineering and Environmental Laboratory (INEEL) through the Waste Management (WM) Program. This Program Management Plan (PMP) provides an overview of the Waste Management Program objectives, organization and management practices, and scope of work. This document will be reviewed at least annually and updated as needed to address revisions to the Waste Management`s objectives, organization and management practices, and scope of work. Waste Management Program is managed by LMITCO Waste Operations Directorate. The Waste Management Program manages transuranic, low-level, mixed low-level, hazardous, special-case, and industrial wastes generated at or transported to the INEEL.

  14. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

  15. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  16. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  17. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  18. Environmental Management

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  19. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  20. Contract Management Certificate Program

    E-Print Network [OSTI]

    Rose, Michael R.

    Contract Management Certificate Program Accelerate Your Career BusinessandManagement extension bearing the UC seal signifies a well- known, uncompromising standard of academic excellence. #12;Contract Management Certificate Program UC Irvine Extension's Contract Management Certificate Program focuses on core

  1. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23T23:59:59.000Z

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  2. Energy, Data Management, Reporting

    Broader source: Energy.gov (indexed) [DOE]

    About Schneider Electric Enterprise wide Data Management Outputs Foundation and results Part of a complete energy management solution Schneider Electric...

  3. Channel Access Client Toolbox for Matlab

    SciTech Connect (OSTI)

    Terebilo, Andrei

    2002-08-07T23:59:59.000Z

    This paper reports on MATLAB Channel Access (MCA) Toolbox--MATLAB [1] interface to EPICS Channel Access (CA) client library. We are developing the toolbox for SPEAR3 accelerator controls, but it is of general use for accelerator and experimental physics applications programming. It is packaged as a MATLAB toolbox to allow easy development of complex CA client applications entirely in MATLAB. The benefits include: the ability to calculate and display parameters that use EPICS process variables as inputs, availability of MATLAB graphics tools for user interface design, and integration with the MATLAB-based accelerator modeling software--Accelerator Toolbox [2-4]. Another purpose of this paper is to propose a feasible path to a synergy between accelerator control systems and accelerator simulation codes, the idea known as on-line accelerator model.

  4. Non-Markovianity through accessible information

    E-Print Network [OSTI]

    F. F. Fanchini; G. Karpat; B. akmak; L. K. Castelano; G. H. Aguilar; O. Jimnez Faras; S. P. Walborn; P. H. Souto Ribeiro; M. C. de Oliveira

    2014-06-04T23:59:59.000Z

    The degree of non-Markovianity of quantum processes has been characterized in several different ways in the recent literature. However, the relationship between the non-Markovian behavior and the flow of information between the system and the environment through an entropic measure has not been yet established. We propose an entanglement-based measure of non-Markovianity by employing the concept of assisted knowledge, where the environment E, acquires information about a system S, by means of its measurement apparatus A. The assisted knowledge, based on the accessible information in terms of von-Neumann entropy, monotonically increases in time for all Markovian quantum processes. We demonstrate that the signatures of non-Markovianity can be captured by the nonmonotonic behaviour of the assisted knowledge. We explore this scenario for a two-level system undergoing a relaxation process, through an experimental implementation using an optical approach that allows full access to the state of the environment.

  5. The Human Right to Access Electricity

    SciTech Connect (OSTI)

    Tully, Stephen

    2006-04-15T23:59:59.000Z

    Electricity access is already well established within the framework of human rights, either as an implicit attribute of a pre-existing right (such as non-discrimination or sustainable development) or explicitly in the context of eliminating discrimination against women. There is also broad acknowledgement by states of the desirability of eliminating energy poverty - for all, but particularly for the rural poor, and women. (author)

  6. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  7. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  8. Auctions to gas transmission access : the British experience

    E-Print Network [OSTI]

    McDaniel, Tanga

    2002-01-01T23:59:59.000Z

    When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

  9. Distributed Random Access Algorithm: Scheduling and Congesion Control

    E-Print Network [OSTI]

    Jiang, Libin

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

  10. Phase II Smart Grid Data Access Funding Opportunity Winner Announced...

    Broader source: Energy.gov (indexed) [DOE]

    Phase II Smart Grid Data Access Funding Opportunity Winner Announced Phase II Smart Grid Data Access Funding Opportunity Winner Announced January 8, 2014 - 12:00am Addthis The...

  11. THE INTRODUCTION OF DIRECT ACCESS IN NEW ZEALAND'S ELECTRICITY MARKET

    E-Print Network [OSTI]

    California at Berkeley. University of

    of the reform: namely, direct access from consumers to the energy suppliers, or direct access, for short the negotiations between the distributing company and the energy supplier could be sufficient to generate

  12. amigo online access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  13. Landscape Management Systems The Visual Management System

    E-Print Network [OSTI]

    Standiford, Richard B.

    Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

  14. Management Overview

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls over

  15. Management Overview

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview -

  16. Management Overview

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls overOverview

  17. Management Overview

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement Controls

  18. Management Overview

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office0-72.pdfGeorgeDoesn't HappenLow-Cost ProductionManagement ControlsVHTR Materials

  19. DEACTIVATION MANAGEMENT

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergy Cooperation |South42.2Consolidated Edison5 by ISA -ofDATA REPORT ON7 DATE:AFPsMANAGEMENT The

  20. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management Alert:Used

  1. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and InterfacesAdministration -Lowellfor 2013Malcolm J.Management

  2. NIF Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries & FuelTechnologies |T I OPSNIF Management

  3. Bibliographic Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6 M. Babzien, I.Program InformationBibliographic Managment

  4. ibm.com/redbooks iNotes Web Access

    E-Print Network [OSTI]

    environment secure Plan for capacity Front cover #12;#12;iNotes Web Access Deployment and Administration

  5. Legal Protection of Solar Access under Japanese Law

    E-Print Network [OSTI]

    Bennett Jr., Frank G.

    1986-01-01T23:59:59.000Z

    solar access protection were considered one of the purposes behind a 20 meter height restriction in such districts, the roadway

  6. User Effort and Network Structure Mediate Access to Information in Networks

    E-Print Network [OSTI]

    Kang, Jeon-Hyung

    2015-01-01T23:59:59.000Z

    Individuals' access to information in a social network depends on its distributed and where in the network individuals position themselves. However, individuals have limited capacity to manage their social connections and process information. In this work, we study how this limited capacity and network structure interact to affect the diversity of information social media users receive. Previous studies of the role of networks in information access were limited in their ability to measure the diversity of information. We address this problem by learning the topics of interest to social media users by observing messages they share online with their followers. We present a probabilistic model that incorporates human cognitive constraints in a generative model of information sharing. We then use the topics learned by the model to measure the diversity of information users receive from their social media contacts. We confirm that users in structurally diverse network positions, which bridge otherwise disconnected...

  7. G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library

    E-Print Network [OSTI]

    Sussex, University of

    G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library Collection Management Policy 1. Introduction The University of Sussex Library contains 800,000 books, to which about 15,000 new items are added each year. The Library also provides access to over 20,000 print and online

  8. Proceedings of the sixth Berkeley workshop on distributed data management and computer networks

    SciTech Connect (OSTI)

    Various Authors

    1982-01-01T23:59:59.000Z

    A distributed data base management system allows data to be stored at multiple locations and to be accessed as a single unified data base. In this workshop, seventeen papers were presented which have been prepared separately for the energy data base. These items deal with data transfer, protocols and management. (GHT)

  9. Invited Viewer Invited Viewer iSIS Portal Access

    E-Print Network [OSTI]

    Dennett, Daniel

    1 Invited Viewer Invited Viewer iSIS Portal Access Tufts "Invited Viewers" such as parents and spouses can be granted view-only access to a student's iSIS secure personal information. Students previously registered by another student or you do not have a Tufts Username and active iSIS access (most

  10. UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA

    E-Print Network [OSTI]

    Levi, Ran

    UNIVERSITY OF ABERDEEN POLICY FOR ACCESS TO PERSONAL DATA Policy for dealing with either external or internal requests to the University for access to personal and sensitive personal data in terms of the Data and outside of the University for access to personal data of staff or students held by the University

  11. PeopleSoft (ERP) Finance Access Request Form User Guide

    E-Print Network [OSTI]

    de Lijser, Peter

    PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

  12. Measuring Accessibility by Automobile Report # 11 in the series

    E-Print Network [OSTI]

    Levinson, David M.

    Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

  13. CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE

    E-Print Network [OSTI]

    Foltz, Jeremy D.

    CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

  14. Access Control Policies and Languages in Open Environments

    E-Print Network [OSTI]

    Samarati, Pierangela

    systems is specifying and enforcing access control security policies regulating interactions between languages and coming from different systems can be combined. 1 Introduction Access control is the process should be granted or denied. Access control plays an important role in overall system security

  15. Statler College Research Data Center Access and Usage Policy

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    Statler College Research Data Center Access and Usage Policy Objective Access to the Statler under WVU and federal guidelines. Scope This policy applies to all Statler staff, faculty, administrators, officers, contractors and students. Policy Access to the RDC shall be limited to those authorized

  16. XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH

    E-Print Network [OSTI]

    Samarati, Pierangela

    the characteristics of XML documents, allowing the definition of access control policies that operate with a fine to the integration of the access control system with Web based systems. #12;The analysis contained in this paperCHAPTER 4 XML ACCESS CONTROL SYSTEMS: A COMPONENT-BASED APPROACH E. Damiani1 S. De Capitani di

  17. Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Pipelined Memory Controllers for DSP Applications Handling Unpredictable Data Accesses Bertrand Le pipelined memory access controllers can be generated improving the pipeline access mode to RAM. We focus as unpredictable ones (dynamic address computations) in a pipeline way. 1 Introduction Actual researches

  18. A Smart Energy System with Distributed Access Control

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    systems to date support remote control and automation but not access control, making them applicable to HVAC (heating, ventilation, and air conditioning) systems. SE has the potential of significantly access from a remote site over the Internet, in which case access control in the form of a shared key

  19. Competitive Interference-aware Spectrum Access in Cognitive Radio Networks

    E-Print Network [OSTI]

    Boyer, Edmond

    Competitive Interference-aware Spectrum Access in Cognitive Radio Networks Jocelyne Elias, Fabio studies the spectrum access problem in cognitive radio networks from a game theoretical perspective. Finally, we provide numerical results of the proposed spectrum access game in several cognitive radio

  20. Cooperation and Learning in Multiuser Opportunistic Spectrum Access

    E-Print Network [OSTI]

    Islam, M. Saif

    for the efficient utilization of the radio frequency spectrum is opportunistic spectrum access (OSA), whereCooperation and Learning in Multiuser Opportunistic Spectrum Access Hua Liu§ , Bhaskar spectrum access net- work where spectrum opportunities are time varying and spatially inhomogeneous

  1. MAP: Multiauctioneer Progressive Auction for Dynamic Spectrum Access

    E-Print Network [OSTI]

    Wang, Xinbing

    to access the licensed spectrum, and dynamic spectrum access (DSA) is one of the fundamental functions of CR solution according to the length of step. Index Terms--Cognitive radio, dynamic spectrum access, auction from scarcity in spectrum resource and inefficiency in spectrum usage. Cognitive radio (CR) or dynamic

  2. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  3. Student Brand Manager and Related Vacancies Student Information

    E-Print Network [OSTI]

    Stevenson, Mark

    The Careers Service. Student Brand Manager and Related Vacancies Student Information Context and vacancy service to current students and recent graduates of the University. While recognising it also students and graduates. Students and graduates can expect to access a range of vacancy information

  4. Sustainable Campus Transportation through Transit Partnership and Transportation Demand Management: A Case Study from the University of Florida

    E-Print Network [OSTI]

    Bond, Alex; Steiner, Ruth

    2006-01-01T23:59:59.000Z

    A. 2005. The impacts of transportation demand management andUnlimited access. Transportation 28 (3): 233267. Cervero,transit. Journal of Public Transportation 3 (4):1019. ???.

  5. SUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request access to any personal

    E-Print Network [OSTI]

    Mumby, Peter J.

    access to any personal data that the University is holding about them. This is known as a `Subject Access Request' (SAR). This information explains the process for obtaining your personal data. The Process AllSUBJECT ACCESS REQUEST PROCEDURE The Data Protection Act 1998 (DPA) entitles individuals to request

  6. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  7. File: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Remote Access Service

    E-Print Network [OSTI]

    Jiang, Huiqiang

    to connecting. You must be approved by your Responsibility Center Administrator to access Network ConnectFile: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Restricted University Online Resources Using Network Connect on the Secure Remote Access Service Table

  8. Composition of Management System for Smart Homes

    E-Print Network [OSTI]

    Levin, Mark Sh; Klapproth, Alexander

    2011-01-01T23:59:59.000Z

    The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm control), comfort subsystem (temperature, etc.), intelligence subsystem (multimedia, houseware). The design solving process is based on Hierarchical Morphological Multicriteria Design (HMMD) approach: (1) design of a tree-like system model, (2) generation of design alternatives for leaf nodes of the system model, (3) Bottom-Up process: (i) multicriteria selection of design alternatives for system parts/components and (ii) composing the selected alternatives into a resultant combination (while taking into account ordinal quality of the alternatives above and their compatibility). A realistic numerical example illustrates the design process of a management system for smart homes.

  9. Open Access: From Myth to Paradox

    ScienceCinema (OSTI)

    Paul Ginsparg

    2010-01-08T23:59:59.000Z

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

  10. Access Venture Partners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWende NewSowitecAWS Ocean Energy Ltd JumpAbraxa IFSAccentAccess

  11. Accessibility Standard Statement | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility About

  12. Accessing the Laboratory | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home |

  13. Accounts & Access | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuelAbout Us > Accessibility Home | Account

  14. Access to Clean Water | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects ofAboutTest Facility Vitaly YakimenkoAccess

  15. Utility Data Accessibility Map | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place: Salt Lake City, Utah Zip: 84111Jump to:AccessUtility

  16. ACCESS 2010 Level 1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment(October-DecemberBasedToward a MoreA RisingA1AFromDepartmentACCESS

  17. 2e Carbon Access | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 South Place:ReferenceEditWisconsin:YBR14Information 20ElectionAccess

  18. Remote Access Options | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalancedDepartment ofColumbusReport #Study |RegionalRelated LinksAccess to

  19. Access Your Files | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building Technologies Office WorkshopYour Files Access your files

  20. DOE Jobs Online (Hiring Manager), Office of Human Capitol Management...

    Energy Savers [EERE]

    Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and Solutions DOE Jobs Online (Hiring Manager), Office of Human Capitol Management Innovation and...

  1. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  2. The NORM technology connection web site : streamlined access to NORM-related service company and regulatory information.

    SciTech Connect (OSTI)

    Smith, K. P.; Richmond, P.; LePoire, D. J.; Arnish, J. J.; Johnson, R.

    2000-11-08T23:59:59.000Z

    Argonne National Laboratory has developed an Internet web site providing access to critical information needed to support decisions on the management and disposal of wastes containing naturally occurring radioactive material (NORM). The NORM Technology Connection web site provides current information on (1) service companies that provide support on NORM issues (e.g., site characterization and remediation, sample analysis, radiation safety training, disposal) and (2) existing applicable NORM regulations and guidelines. A third element of the site is an electronic mail list that allows users to post or respond to questions about the management of NORM. Development of the NORM Technology Connection web site was funded by the U.S. Department of Energy, Office of Fossil Energy. It is hosted and maintained by the Interstate Oil and Gas Compact Commission. The web site is publicly available; access is free, as is participation by any of the service companies.

  3. Dynamic access policies for unconditionally secure secret

    E-Print Network [OSTI]

    Martin, Keith

    generation of cryptographic secrets · Key management in distributed environments · Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders · Choose a topic related to information theoretic security · Provide an overview · Identify some open problems · Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

  4. DAS: a data management system for instrument tests and operations

    E-Print Network [OSTI]

    Frailis, Marco; Zacchei, Andrea; Lodi, Marcello; Cirami, Roberto; Pasian, Fabio; Trifoglio, Massimo; Bulgarelli, Andrea; Gianotti, Fulvio; Franceschi, Enrico; Nicastro, Luciano; Conforti, Vito; Zoli, Andrea; Smart, Ricky; Morbidelli, Roberto; Dadina, Mauro

    2014-01-01T23:59:59.000Z

    The Data Access System (DAS) is a metadata and data management software system, providing a reusable solution for the storage of data acquired both from telescopes and auxiliary data sources during the instrument development phases and operations. It is part of the Customizable Instrument WorkStation system (CIWS-FW), a framework for the storage, processing and quick-look at the data acquired from scientific instruments. The DAS provides a data access layer mainly targeted to software applications: quick-look displays, pre-processing pipelines and scientific workflows. It is logically organized in three main components: an intuitive and compact Data Definition Language (DAS DDL) in XML format, aimed for user-defined data types; an Application Programming Interface (DAS API), automatically adding classes and methods supporting the DDL data types, and providing an object-oriented query language; a data management component, which maps the metadata of the DDL data types in a relational Data Base Management Syste...

  5. Accessing TRANSP Output: A User's Guide Accessing TRANSP Output: A User's Guide

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    of such TRANSP analyses are stored on magnetic and laser disk on a VMS VAX cluster. The purpose of this User's . Guide is to describe how to access these analysis results in graphical form on a VAX system. The reader is not expected to have specialized VAX knowledge, although familiarity with fundamentals (e.g. how to log in

  6. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  7. Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik Chuo N. Lau Matilde Montealegre

    E-Print Network [OSTI]

    Gruenwald, Le

    Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik, transaction management, ad-hoc networks. 1. INTRODUCTION Rapid developments in wireless technology have enabled mobile users to access data from different sites. The Mobile MultiDatabase Management Systems

  8. A Light-weight Approach to Reducing Energy Management Delays in Disks Guanying Wang, Ali R. Butt, Chris Gniady, Puranjoy Bhattacharjee

    E-Print Network [OSTI]

    Butt, Ali R.

    A Light-weight Approach to Reducing Energy Management Delays in Disks Guanying Wang, Ali R. Butt techniques such as turning machines off overnight and dynamic energy management during the business hours. Unfortunately, dynamic energy management, especially that for disks, introduces delays when an accessed disk

  9. Functional Facilities Management Energy Management Structure

    E-Print Network [OSTI]

    Gulliver, Robert

    Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

  10. Load Management for Industry

    E-Print Network [OSTI]

    Konsevick, W. J., Jr.

    1982-01-01T23:59:59.000Z

    In the electric utility industry, load management provides the opportunity to control customer loads to beneficially alter a utility's load curve Load management alternatives are covered. Load management methods can be broadly classified into four...

  11. IT Project Manager

    Broader source: Energy.gov [DOE]

    This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

  12. U-090: RSA enVision Discloses Environment Variable Information...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

  13. Exploratory Group Problem: RSA Encryption November 5, 2008

    E-Print Network [OSTI]

    Stange, Katherine E.

    result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

  14. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

  15. FUEL DEVICE APPLICATION Use this application to request a fuel device to access the University of Michigan (U-M) Parking and Transportation

    E-Print Network [OSTI]

    Kirschner, Denise

    FUEL DEVICE APPLICATION Use this application to request a fuel device to access the University of Michigan (U-M) Parking and Transportation Services (PTS) service stations for fuel. A fuel device owned and managed by PTS Fleet Services equipped with an automated fuel device. Please read the Use

  16. CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file

    E-Print Network [OSTI]

    Wu, Shin-Tson

    CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

  17. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  18. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

  19. Target Cost Management Strategy

    E-Print Network [OSTI]

    Okano, Hiroshi

    1996-01-01T23:59:59.000Z

    Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

  20. Stormwater Management Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    Stormwater Management program of the Department of Environmental Protection's Bureau of Conservation and Restoration administers the rules and regulations for stormwater management for Pennsylvania...

  1. Stormwater Management (Maryland)

    Broader source: Energy.gov [DOE]

    Maryland's Stormwater Management Program, administered by the Department of the Environment, aims to reduce stormwater runoff. The program requires the submission of a stormwater management plan...

  2. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  3. Records Management Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Records Management Specialist in the Richland Operations Office (RL), Assistant Manager for Mission Support (AMMS), Infrastructure, Services...

  4. Physics Department Management Review

    E-Print Network [OSTI]

    Homes, Christopher C.

    ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

  5. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  6. Instruction sets for Parallel Random Access Machines

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-01-01T23:59:59.000Z

    The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

  7. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  8. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  9. EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel

    E-Print Network [OSTI]

    Kirschner, Denise

    EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel access device. In order to obtain fuel from for access. Employee access is not required for the U-M fleet vehicle equipped with an automated fuel device

  10. Law-Aware Access Control and its Information Model

    E-Print Network [OSTI]

    Stieghahn, Michael

    2010-01-01T23:59:59.000Z

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  11. Symmetrical Multilevel Diversity Coding with an All-Access Encoder

    E-Print Network [OSTI]

    Marukala, Neeharika

    2012-07-16T23:59:59.000Z

    and L randomly accessible en- coders 1 to L. A total of L + 1 independent discrete memoryless sources (S0, S1, . . . , SL) are to be encoded at the encoders. The decoder, which has access to encoder 0 and a subset U of the ran- domly accessible... with polyhedral cone being the first quadrant and L + 2 faces. . . . . . . . . . . . . . 24 3 An illustration of the sliding windows of length ? when the in- tegers 1, . . . , L are circularly placed (clockwise) based on their natural order...

  12. accessible surface area: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  13. access program eap: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  14. accessible surface areas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  15. access programs evidence: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  16. Using Digital Technology to Access And Store African Art

    E-Print Network [OSTI]

    Blake, Edwin

    Using Digital Technology to Access And Store African Art Gary Marsden, Katherine Malan & Edwin Blake Collaborative Visual Computing Group, Department of Computer Science, University of Cape Town +27

  17. access control mechanism: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  18. access control framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  19. access industry profile: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hired can help you build a career Access information about713 Complete Your Profile -- Logging into Huskies Get Hired Log into your Huskies Get Hired account...

  20. access communication datac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Open learner models, communication, multiple users. 1 Introduction Open learner models (OLM) are learner models that are accessible Bull, Susan 111 Channel modelling and relay for...

  1. access memory devices: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

  2. access devices evaluation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    unnecessarily long query processing times, since web accesses exhibit high and variable latency. Fortunately, web sources can be probed in parallel, and each source can typically...

  3. accelerating access initiative: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 455 Dynamical...

  4. University of Utah Registrar's Office Security Access Deletion Form

    E-Print Network [OSTI]

    Feschotte, Cedric

    Access Student Records Web Reports DARS (Class rolls, picture rosters, etc.) Comments/Additional Information FOR REGISTRAR'S OFFICE USE ONLY ACS Administrator Date Student Systems Administrator Date DARS

  5. arabidopsis thaliana accessions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    occurring variation is an important alternative resource for functional genetics and genomics research.; In a well-characterized collection of Arabidopsis thaliana accessions, we...

  6. Health care access, utilization and barriers among injection drug users.

    E-Print Network [OSTI]

    Oche, Ishaka

    2015-01-01T23:59:59.000Z

    ?? Background: To curb the transmission of HIV/AIDS and other infectious diseases several studies indicate the need for improved access to medical care for injection (more)

  7. Tri-Party Agreement databases, access mechanism and procedures

    SciTech Connect (OSTI)

    Brulotte, P.J.; Christensen, K.C.

    1993-10-01T23:59:59.000Z

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the US Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order [also known as the Tri-Party Agreement (TPA)] (Ecology et al. 1992). It identifies the procedure required to obtain access to the Hanford computer networks and the TPA related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford networks.

  8. access policies tutela: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    os estudantes lembraram a Jos Ferreira Gomes Instituto de Sistemas e Robotica 3 Policy 3507 Information Technology Accessibility 1 OLD DOMINION UNIVERSITY Computer...

  9. Application for Permit to Construct Access Driveway Facilities...

    Open Energy Info (EERE)

    ROW Jump to: navigation, search OpenEI Reference LibraryAdd to library Legal Document- Permit ApplicationPermit Application: Application for Permit to Construct Access Driveway...

  10. Accessing Low-Cost Capital Through Securitization (Poster)

    SciTech Connect (OSTI)

    Mendelsohn, M.

    2014-10-01T23:59:59.000Z

    Poster for Solar Power International conference presents information on NREL's effort to open capital markets through securitization via Solar Access to Public Capital (SAPC) working group's efforts.

  11. Reducing rural poverty through increased access to energy services...

    Open Energy Info (EERE)

    rural poverty through increased access to energy services: a review of the multifunctional platform project in Mali Jump to: navigation, search Tool Summary LAUNCH TOOL Name:...

  12. Boyer-Tillamook Access Road Improvement Project 1 Finding of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    dangerous. In addition, improvements to access road stream crossings would facilitate fish passage. Construction is expected to last from 2 to 4 months, although work may need to...

  13. Effect of memory access and caching on high performance computing.

    E-Print Network [OSTI]

    Groening, James

    2012-01-01T23:59:59.000Z

    ??High-performance computing is often limited by memory access. As speeds increase, processors are often waiting on data transfers to and from memory. Classic memory controllers (more)

  14. National Geothermal Data Systems Data Acquisition and Access

    Broader source: Energy.gov (indexed) [DOE]

    and Access Principal Investigator Walter S. Snyder Boise State University National Geothermal Data System May 18, 2010 This presentation does not contain any proprietary...

  15. City of San Jose- Solar Access Design Guidelines

    Broader source: Energy.gov [DOE]

    The San Jose Environmental Services Department has developed voluntary guidelines to encourage solar orientation in new construction. These Solar Access Design Guidelines specify that the long...

  16. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

  17. Environmental Best Management Practices

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

  18. Sport Management Academic Offerings

    E-Print Network [OSTI]

    Mather, Patrick T.

    production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

  19. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  20. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  1. REMOTE ACCESS SERVICES | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles »ExchangeDepartment ofManagement PropertyQuiz: KnowSmart

  2. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  3. Proposal for Fermilab remote access via ISDN (Ver. 1.0)

    SciTech Connect (OSTI)

    Lidinsky, W.P.; Martin, D.E.

    1993-07-02T23:59:59.000Z

    Currently, most users at remote sites connect to the Fermilab network via dial-up over analog modems using a dumb terminal or a personal computer emulating a dumb terminal. This level of connectivity is suitable for accessing a single, character-based application. The power of personal computers that are becoming ubiquitous is under-utilized. National HEPnet Management (NHM) has been monitoring and experimenting with remote access via the integrated services digital network (ISDN) for over two years. Members of NHM felt that basic rate ISDN had the potential for providing excellent remote access capability. Initially ISDN was not able to achieve this, but recently the situation has improved. The authors feel that ISDN can now provide, at a remote site such as a user`s home, a computing environment very similar to that which is available at Fermilab. Such an environment can include direct LAN access, windowing systems, graphics, networked file systems, and demanding software applications. This paper proposes using ethernet bridging over ISDN for remote connectivity. With ISDN remote bridging, a remote Macintosh, PC, X-terminal, workstation, or other computer will be transparently connected to the Fermilab LAN. Except for a slight speed difference, the remote machine should function just as if it were on the LAN at Fermilab, with all network services-file sharing, printer sharing, X-windows, etc. - fully available. There are two additional reasons for exploring technologies such as ISDN. First, by mid-decade environmental legislation such as the Federal Clean Air Act of 1990 and Illinois Senate Bill 2177 will likely force increased remote-worker arrangements. Second, recent pilot programs and studies have shown that for many types of work there may be a substantial cost benefits to supporting work away from the site.

  4. Coastal Underwater Field Observer with Remote IP Access

    E-Print Network [OSTI]

    ) Power Supply (Battery Selection) Unit Charging (Solar Panel Sizing and Selection) Power Management

  5. Student Financial Services Division of Enrollment and Access

    E-Print Network [OSTI]

    Student Financial Services Division of Enrollment and Access 2011-2012 Tuition Scholarship Program: Student Financial Services Division of Enrollment and Access Centennial Hall-1065 Campus Delivery Fort Collins, CO 80523-1065 FAX (970) 491-5010 Eligibility Criteria* For a student to qualify

  6. access hiv-1 test: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access hiv-1 test First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 REVIEW Open Access The macrophage in...

  7. Papers from the 2008 Joint Session Phenomenal and Access Consciousness

    E-Print Network [OSTI]

    Block, Ned

    Papers from the 2008 Joint Session Phenomenal and Access Consciousness Ned Block and Cynthia Mac.1111/j.1467-9264.2008.00247.x CONSCIOUSNESS AND COGNITIVE ACCESS NED BLOCK This article concerns presented here derives from Block (2007a, 2007b, forthcoming). #12;NED BLOCK290 ©2008 The Aristotelian

  8. UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY

    E-Print Network [OSTI]

    Hemmers, Oliver

    UNLV OFFICE OF INFORMATION TECHNOLOGY NETWORK ACCESS COMPLIANCE POLICY RESPONSIBLE ADMINISTRATOR: Create a secure network environment for UNLV's computer and network resources by establishing different levels of network access to meet the needs of UNLV staff and students as well as the general public

  9. Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume

    E-Print Network [OSTI]

    Chakrabarty, Krishnendu

    Test Access Mechanism Optimization, Test Scheduling, and Tester Data Volume Reduction for System Marinissen, Senior Member, IEEE Abstract--We describe an integrated framework for system-on-chip (SOC) test automation. Our framework is based on a new test access mechanism (TAM) architecture consisting of flexible

  10. The Energy Harvesting Multiple Access Channel with Energy Storage Losses

    E-Print Network [OSTI]

    Yener, Aylin

    The Energy Harvesting Multiple Access Channel with Energy Storage Losses Kaya Tutuncuoglu and Aylin considers a Gaussian multiple access channel with two energy harvesting transmitters with lossy energy storage. The power allocation policy maximizing the average weighted sum rate given the energy harvesting

  11. University of Pennsylvania Libraries 1 The NIH Public Access Policy

    E-Print Network [OSTI]

    Bushman, Frederic

    University of Pennsylvania Libraries 1 The NIH Public Access Policy Provost's Council on Research March 18, 2008 Anne Seymour Bob Krall #12;University of Pennsylvania Libraries 2 The NIH Public Access by the NIH submit or have submitted for them to the National Library of Medicine's PubMed Central

  12. POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES,

    E-Print Network [OSTI]

    Arnold, Jonathan

    POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES, PROGRAMS, SERVICES AND ACTIVITIES This policy ("Policy") is to implement federal and state laws regarding access for service animals, for purposes of this Policy, "Service Animals" are collectively defined to include those that are defined

  13. access control policy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access control policy First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Resiliency Policies in Access...

  14. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Watt, Stephen M.

    1 Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  15. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Perry, Mark

    Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  16. Access Control in Publicly Verifiable Outsourced Computation James Alderman

    E-Print Network [OSTI]

    Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted re- sources to delegate. Thus there is a need to apply access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC) that applies

  17. A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous

    E-Print Network [OSTI]

    Keinan, Alon

    A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources1 of resources such as computing resources, storage resources, instrument resources, data resources, etc. However, because of the differences of formats, descriptions, structures, and access modes of these resources, grid

  18. SPECTRUM OPPORTUNITY AND INTERFERENCE CONSTRAINT IN OPPORTUNISTIC SPECTRUM ACCESS

    E-Print Network [OSTI]

    Islam, M. Saif

    of the radio spec- trum? Actual spectrum usage measurements obtained by the FCC's Spectrum Policy Task Force [1SPECTRUM OPPORTUNITY AND INTERFERENCE CONSTRAINT IN OPPORTUNISTIC SPECTRUM ACCESS Qing Zhao@ece.ucdavis.edu ABSTRACT In this paper, we study two important concepts in opportunis- tic spectrum access: spectrum

  19. ACCESS America's Great Outdoors: Public Lands Are for Everyone!1

    E-Print Network [OSTI]

    Standiford, Richard B.

    Universal Access to Outdoor Recreation: A Design Guide. This state-of-the-art design guide is breaking new ground in the area of accessibility by focusing on integrating universal design into all outdoor experience are limited. Historically, recreation facilities and programs were created by traditional design

  20. Dynamic Resource Provisioning for Energy Efficiency in Wireless Access Networks

    E-Print Network [OSTI]

    Wichmann, Felix

    of controlling how much of the network infrastructure is actually needed and which parts can be temporarily. Considering that most of the energy in wireless access networks is consumed in the radio part, a dynamic the two most common wireless access technologies, namely cellular and WLAN. Main features of the proposed

  1. A Distributed Metadata Management, Data Discovery and Access System Giriprakash Palanisamy1

    E-Print Network [OSTI]

    development consortium now includes funding from NASA, USGS, and DOE. A major new version of Mercury. Mercury has been used by various scientific projects that are funded by NASA, USGS and DOE (ORNL DAAC, Dublin- Core, Darwin-Core, EML, and ISO-19115. The new Mercury system is based on open source and Service

  2. V-120: EMC Smarts Network Configuration Manager Java RMI Access Control

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartmentofDepartment

  3. Utah - UAC R930-6 - Access Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401Upson County,Monkeymosaic JumpUsina2-40 -R930-6 -

  4. Mead-Liberty 345-kV Transmission Line Access Road Maintenance and Localized Vegetation Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces andMapping the Nanoscale LandscapeImportsBG4, 2012 1:00 -2 Mead-Liberty

  5. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  6. Management and Program Analyst (Operations Manager)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

  7. Data Management System of the DIRAC Project

    E-Print Network [OSTI]

    Haen, Christophe; Tsaregorodtsev, Andrei

    2015-01-01T23:59:59.000Z

    The DIRAC Interware provides a development framework and a complete set of components for building distributed computing systems. The DIRAC Data Management System (DMS) offers all the necessary tools to ensure data handling operations for small and large user communities. It supports transparent access to storage resources based on multiple technologies, and is easily expandable. The information on data files and replicas is kept in a File Catalog of which DIRAC offers a powerful and versatile implementation (DFC). Data movement can be performed using third party services including FTS3. Bulk data operations are resilient with respect to failures due to the use of the Request Management System (RMS) that keeps track of ongoing tasks. In this contribution we will present an overview of the DIRAC DMS capabilities and its connection with other DIRAC subsystems such as the Transformation System. The DIRAC DMS is in use by several user communities now. The contribution will present the experience of the LHCb exper...

  8. The Marshall Islands Data Management Program

    SciTech Connect (OSTI)

    Stoker, A.C.; Conrado, C.L.

    1995-09-01T23:59:59.000Z

    This report is a resource document of the methods and procedures used currently in the Data Management Program of the Marshall Islands Dose Assessment and Radioecology Project. Since 1973, over 60,000 environmental samples have been collected. Our program includes relational database design, programming and maintenance; sample and information management; sample tracking; quality control; and data entry, evaluation and reduction. The usefulness of scientific databases involves careful planning in order to fulfill the requirements of any large research program. Compilation of scientific results requires consolidation of information from several databases, and incorporation of new information as it is generated. The success in combining and organizing all radionuclide analysis, sample information and statistical results into a readily accessible form, is critical to our project.

  9. Duopoly Interaction and Expected Price for Local Access Running Heading: Duopoly Interaction and Expected Price for Local Access

    E-Print Network [OSTI]

    1 Duopoly Interaction and Expected Price for Local Access Running Heading: Duopoly Interaction and Expected Price for Local Access Judith A. Molka-Danielsen Department of Informatics Molde College P.O. Box. Competition brings pricing flexibility, so that one could expect implicit subsidies, like geographic averaging

  10. 61CanCer InformatICs 2014:13(s5) Open Access: Full open access to

    E-Print Network [OSTI]

    Geman, Donald

    61CanCer InformatICs 2014:13(s5) Open Access: Full open access to this and thousands of other papers at http://www.la-press.com. Cancer Informatics Supplementary Issue: Network and Pathway Analysis of Cancer Susceptibility (A) Introduction Cellular signaling generates a chain of protein

  11. Efficient Memory Access with NumPy Global Arrays using Local Memory Access

    SciTech Connect (OSTI)

    Daily, Jeffrey A.; Berghofer, Dan C.

    2013-08-03T23:59:59.000Z

    This paper discusses the work completed working with Global Arrays of data on distributed multi-computer systems and improving their performance. The tasks completed were done at Pacific Northwest National Laboratory in the Science Undergrad Laboratory Internship program in the summer of 2013 for the Data Intensive Computing Group in the Fundamental and Computational Sciences DIrectorate. This work was done on the Global Arrays Toolkit developed by this group. This toolkit is an interface for programmers to more easily create arrays of data on networks of computers. This is useful because scientific computation is often done on large amounts of data sometimes so large that individual computers cannot hold all of it. This data is held in array form and can best be processed on supercomputers which often consist of a network of individual computers doing their computation in parallel. One major challenge for this sort of programming is that operations on arrays on multiple computers is very complex and an interface is needed so that these arrays seem like they are on a single computer. This is what global arrays does. The work done here is to use more efficient operations on that data that requires less copying of data to be completed. This saves a lot of time because copying data on many different computers is time intensive. The way this challenge was solved is when data to be operated on with binary operations are on the same computer, they are not copied when they are accessed. When they are on separate computers, only one set is copied when accessed. This saves time because of less copying done although more data access operations were done.

  12. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01T23:59:59.000Z

    DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

  13. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  14. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01T23:59:59.000Z

    Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

  15. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  16. Scientific Data Management Center for Enabling Technologies

    SciTech Connect (OSTI)

    Vouk, Mladen A.

    2013-01-15T23:59:59.000Z

    Managing scientific data has been identified by the scientific community as one of the most important emerging needs because of the sheer volume and increasing complexity of data being collected. Effectively generating, managing, and analyzing this information requires a comprehensive, end-to-end approach to data management that encompasses all of the stages from the initial data acquisition to the final analysis of the data. Fortunately, the data management problems encountered by most scientific domains are common enough to be addressed through shared technology solutions. Based on community input, we have identified three significant requirements. First, more efficient access to storage systems is needed. In particular, parallel file system and I/O system improvements are needed to write and read large volumes of data without slowing a simulation, analysis, or visualization engine. These processes are complicated by the fact that scientific data are structured differently for specific application domains, and are stored in specialized file formats. Second, scientists require technologies to facilitate better understanding of their data, in particular the ability to effectively perform complex data analysis and searches over extremely large data sets. Specialized feature discovery and statistical analysis techniques are needed before the data can be understood or visualized. Furthermore, interactive analysis requires techniques for efficiently selecting subsets of the data. Finally, generating the data, collecting and storing the results, keeping track of data provenance, data post-processing, and analysis of results is a tedious, fragmented process. Tools for automation of this process in a robust, tractable, and recoverable fashion are required to enhance scientific exploration. The SDM center was established under the SciDAC program to address these issues. The SciDAC-1 Scientific Data Management (SDM) Center succeeded in bringing an initial set of advanced data management technologies to DOE application scientists in astrophysics, climate, fusion, and biology. Equally important, it established collaborations with these scientists to better understand their science as well as their forthcoming data management and data analytics challenges. Building on our early successes, we have greatly enhanced, robustified, and deployed our technology to these communities. In some cases, we identified new needs that have been addressed in order to simplify the use of our technology by scientists. This report summarizes our work so far in SciDAC-2. Our approach is to employ an evolutionary development and deployment process: from research through prototypes to deployment and infrastructure. Accordingly, we have organized our activities in three layers that abstract the end-to-end data flow described above. We labeled the layers (from bottom to top): a) Storage Efficient Access (SEA), b) Data Mining and Analysis (DMA), c) Scientific Process Automation (SPA). The SEA layer is immediately on top of hardware, operating systems, file systems, and mass storage systems, and provides parallel data access technology, and transparent access to archival storage. The DMA layer, which builds on the functionality of the SEA layer, consists of indexing, feature identification, and parallel statistical analysis technology. The SPA layer, which is on top of the DMA layer, provides the ability to compose scientific workflows from the components in the DMA layer as well as application specific modules. NCSU work performed under this contract was primarily at the SPA layer.

  17. Integrated Distribution Management System for Alabama Principal Investigator

    SciTech Connect (OSTI)

    Schatz, Joe

    2013-03-31T23:59:59.000Z

    Southern Company Services, under contract with the Department of Energy, along with Alabama Power, Alstom Grid (formerly AREVA T&D) and others moved the work product developed in the first phase of the Integrated Distribution Management System (IDMS) from Proof of Concept to true deployment through the activity described in this Final Report. This Project Integrated Distribution Management Systems in Alabama advanced earlier developed proof of concept activities into actual implementation and furthermore completed additional requirements to fully realize the benefits of an IDMS. These tasks include development and implementation of a Distribution System based Model that enables data access and enterprise application integration.

  18. Computerized Maintenance Management Systems

    Broader source: Energy.gov [DOE]

    Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

  19. Environmental Management Systems (Iowa)

    Broader source: Energy.gov [DOE]

    A solid waste planning area (e.g., the land encompassed by a municipality with a comprehensive solid waste management policy) may qualify to be an Environmental Management System if it provides...

  20. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

  1. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  2. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  3. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    management Water conservation LBNLs approach to sustainable environmentalWater Discharges) of Introduction Environmental Managementenvironmental compliance programs, such as air and water quality, as well as less traditional programs, such as wildland fire management,

  4. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  5. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

  6. DECENTRALIZED WASTEWATER MANAGEMENT

    E-Print Network [OSTI]

    Rosemond, Amy Daum

    1 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES Katie Sheehan wastewater treatment technologies. www.njunsystems.com Version 1.0, April 2013 #12; 2 DECENTRALIZED WASTEWATER MANAGEMENT: A GUIDEBOOK FOR GEORGIA COMMUNITIES PART ONE: BACKGROUND, ISSUES, AND PROGRAM

  7. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  8. Managing Director Buildings, Transportation

    E-Print Network [OSTI]

    Seamons, Kent E.

    Site Development Will Terris Manager Gardening Maintenance Jim Gish Manager Landscape Specialty Tegwyn Maintenance and project Delivery Scott Sherwood Director Transportation Services Glenl Wear Director Grounds Supervisor Specialty Crews 17 Area supervisors Custodial Maintenance Charles Anderson Supervisor Activity

  9. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18T23:59:59.000Z

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

  10. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Disposal of Farm Medical Wastes Dan Vitamins and minerals Topical Medications Sprays Dewormers Ointments #12;Best Environmental Management of environmental contamination with chemicals or infectious agents. These include, among others: Injectable

  11. Remote power and console management in large datacenters

    E-Print Network [OSTI]

    Horvath, A

    2010-01-01T23:59:59.000Z

    Todays datacenters are often built of a large number of commodity hardware components. A number of common tasks including operating system installation, hardware and OSlevel troubleshooting require low-level control of the machines console and power buttons, yet local physical access is not only impractical and errorprone but often impossible. We report on the approach used at CERN for lowlevel remote management of more than 9000 machines in multiple datacenters.

  12. Cybersecurity Risk Management Process (RMP) | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccessCO2AdministrativeCriticality(RMP) Cybersecurity Risk Management

  13. Method and apparatus for globally-accessible automated testing

    DOE Patents [OSTI]

    Layne, Scott P. (Los Angeles, CA); Beugelsdijk, Tony J. (Los Alamos, NM)

    1998-01-01T23:59:59.000Z

    A method and apparatus for sharing integrated testing services with a plurality of autonomous remote clients is disclosed. In the disclosed method, in response to an access request message, a process controller transmits an access enabling message to the remote client. The access enabling message includes instructions performable by a remote client to generate test equipment commands. A process controller interprets and transforms these commands into automated test instrument suite commands, which are provided to laboratory modules to perform the indicated tests. Test data results are then obtained and transmitted to the remote client.

  14. Benchmarking Corporate Energy Management

    E-Print Network [OSTI]

    Norland, D. L.

    BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

  15. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  16. Workforce Management Office (WFMO) Functional Statements WORKFORCE MANAGEMENT OFFICE

    E-Print Network [OSTI]

    , and destruction. BMD oversees WFMO's personal property management, Freedom of Information Act responses, Entry, organizing, and administering comprehensive human resources management programs in collaboration wMay 2014 Workforce Management Office (WFMO) ­ Functional Statements WORKFORCE MANAGEMENT OFFICE

  17. Medical Management Treatment Manual

    E-Print Network [OSTI]

    Bezrukov, Sergey M.

    Medical Management Treatment Manual: A Clinical Guide for Researchers and Clinicians) This manual is an adaptation of: Medical Management Treatment Manual: A Clinical Research Guide for Medically, Maryland #12;Message to the Users of this Medical Management (MM) Manual from the Editors Background

  18. Operating System Resource Management

    E-Print Network [OSTI]

    Operating System Resource Management Date: Monday, September 27, 2010 Time: 2:00 ­ 3:00 pm Location constrained. This talk will propose a scheme for addressing the operating system resource management problem Sciences Seminar Series presents Pacific Northwest National Laboratory Resource management is the dynamic

  19. FRESH THINKING FOR MANAGEMENT

    E-Print Network [OSTI]

    Yang, Eui-Hyeok

    FOR TECHNOLOGY MANAGEMENT Technology Acceptance in Organizations: What Can We Do to Improve it? by Patricia in organizations is thus an important topic in both management research and management practice. Technology choice of a mobile phone. In organizations, there are two steps in technology adoption. First

  20. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics in International Accounting and Corporate Governance MSc in International Finance MSc in International Management

  1. Financial Management Oversight

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-08-31T23:59:59.000Z

    The Order defines requirements for effective financial management and adherence to DOE and applicable external financial management requirements and sets forth standards for ensuring the integrity and responsiveness of financial management and the accuracy and reliability of DOEs financial statements. Cancels DOE O 2200.13.

  2. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Land Application of Manure management practices to avoid polluting surface or groundwater. 1. Public and private water wells Public pollution of surface waters increases. Therefore, to avoid this risk, manure P loadings should be managed

  3. Database Management Certificate Program

    E-Print Network [OSTI]

    Rose, Michael R.

    Database Management Certificate Program DATABASE TECHNOLOGIES 13 Today, organizations in every to obtain general data analysis and management skills or apply both Oracle and Microsoft SQL Server database capabilities of relational databases in conjunction with the new "Big Data" management frameworks for data

  4. Sport Management Academic Offerings

    E-Print Network [OSTI]

    Raina, Ramesh

    production and programming of events; marketing and public relations; technological operations management Exploration of a topic (to be determined) not covered by the standard curriculum but of interest to faculty and sponsoring events. Management process, including theory of management and practical applications within

  5. Environmental Management at

    E-Print Network [OSTI]

    : ANUgreen for the HotRot Organic Recycling Project Sustainable Transport Category Winner: LEAD Development Themes: 1. Community Engagement 2. Energy and Greenhouse Management 3. Water Management 4. Recycling and Waste Management 5. Transport 6. Pollution Prevention and Environmental Risk 7. Biodiversity The Future

  6. RCRA Facility Investigation/Remedial Investigation Report for the Gunsite 113 Access Road Unit (631-24G) - March 1996

    SciTech Connect (OSTI)

    Palmer, E. [Westinghouse Savannah River Company, AIKEN, SC (United States)

    1996-03-01T23:59:59.000Z

    Gunsite 113 Access Road Unit is located in the northeast corner of SRS. In the mid 1980`s, sparse vegetation, dead trees, and small mounds of soil were discovered on a portion of the road leading to Gunsite 113. This area became the Gunsite 113 Access Road Unit (Gunsite 113). The unit appears to have been used as a spoil dirt and / or road construction debris disposal area. There is no documentation or record of any hazardous substance management, disposal, or any type of waste disposal at this unit. Based upon the available evidence, there are no potential contaminants of concern available for evaluation by a CERCLA baseline risk assessment. Therefore, there is no determinable health risk associated with Gunsite 113. In addition, it is also reasonable to conclude that, since contamination is below risk-based levels, the unit presents no significant ecological risk. It is recommended that no further remedial action be performed at this unit.

  7. HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM

    E-Print Network [OSTI]

    Sethi, Adarshpal

    HIERARCHICAL MANAGEMENT OF BATTLEFIELD NETWORKS WITH THE SHAMAN MANAGEMENT SYSTEM Adarshpal S with a description of the SHAMAN system and briefly introduces its applica- tions to the management of tactical for MANagement). This management system developed at the Network Management Laboratory of the Univer- sity

  8. The role of accessibility in a universal web

    E-Print Network [OSTI]

    Henry, Shawn Lawton

    "Universal design" is the process of creating products that are usable by people with the widest possible range of abilities, operating within the widest possible range of situations; whereas "accessibility" primarily ...

  9. Full-Arm Haptics in an Accessibility Task Matthew Frey

    E-Print Network [OSTI]

    Hollerbach, John M.

    Full-Arm Haptics in an Accessibility Task Matthew Frey Department of Mechanical Engineering University of Utah David E. Johnson John Hollerbach School of Computing University of Utah ABSTRACT

  10. achieving universal access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    principles and guidance detailed in the W3C's Web Content Accessibility Guidelines (WCAG) 2.0 - www.w3.org Levi, Ran 166 Education Goals at the University of New Mexico Below is...

  11. RESEARCH Open Access Impact of routine percutaneous coronary

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH Open Access Impact of routine percutaneous coronary intervention after out Introduction: Since 2003, we have routinely used percutaneous coronary intervention (PCI) and mild therapeutic angiography associated with percuta- neous coronary intervention (PCI) has been recommended in the presence

  12. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    The vendor has issued a fix (7.0R9, 7.1R). Addthis Related Articles V-193: Barracuda SSL VPN Input Validation Hole Permits Cross-Site Scripting Attacks T-701: Citrix Access...

  13. Packing efficiency and accessible surface area of crumpled graphene

    E-Print Network [OSTI]

    Cranford, Steven Wayne

    Graphene holds promise as an ultracapacitor due to its high specific surface area and intrinsic capacitance. To exploit both, a maximum surface area must be accessible while the two-dimensional (2D) graphene is deformed ...

  14. THE PUSH TOWARD GRID REGIONALIZATION IN OPEN ACCESS TRANSMISSION SYSTEMS

    E-Print Network [OSTI]

    Gross, George

    THE PUSH TOWARD GRID REGIONALIZATION IN OPEN ACCESS TRANSMISSION SYSTEMS ProfessorGeorge Gross Universityof Illinois atUrbana-Champaign USA E-mail:gross@uiuc.edu ExtendedSummary Keywords:RTO, ISO

  15. Does anyone have access to 2012 average residential rates by...

    Open Energy Info (EERE)

    Does anyone have access to 2012 average residential rates by utility company? I'm seeing an inconsistency between the OpenEI website and EIA 861 data set. Home > Groups > Utility...

  16. A Calculus for Access Control in Distributed Systems

    E-Print Network [OSTI]

    Abadi, Martin; Burrows, Michael; Lampson, Butler; Plotkin, Gordon

    1993-01-01T23:59:59.000Z

    We study some of the concepts, protocols, and algorithms for access control in distributed systems, from a logical perspective. We account for how a principal may come to believe that another principal is making a request, ...

  17. Clearance Access Matrix - January 19, 2012 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Clearance Access Matrix - January 19, 2012 More Documents & Publications DOE F 470.1 DOE F 470.2 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security...

  18. NMDOT Application for Permit to Construct an Access or Median...

    Open Energy Info (EERE)

    Reference LibraryAdd to library Legal Document- OtherOther: NMDOT Application for Permit to Construct an Access or Median Opening on Public Right of WayLegal Published NA...

  19. METHOD Open Access Rapid haplotype inference for nuclear families

    E-Print Network [OSTI]

    Gifford, David K.

    METHOD Open Access Rapid haplotype inference for nuclear families Amy L Williams1* , David E-recombinant and maximum likelihood haplotypes. When applied to a dataset con- taining 103 families, Hapi performs 3

  20. Accessing Future Flashpoints in the South China Sea

    E-Print Network [OSTI]

    KAPLAN, Brad

    2013-01-01T23:59:59.000Z

    and D. MacDonald, U.S. -China Relations: Policy Is- sues,Bilateral consultations with China which stress both U.S.other regional actors, including China. Increased access to

  1. Optimal Channel Probing and Transmission Scheduling for Opportunistic Spectrum Access

    E-Print Network [OSTI]

    Chang, Nicholas B.

    In this study, we consider optimal opportunistic spectrum access (OSA) policies for a transmitter in a multichannel wireless system, where a channel can be in one of multiple states. In such systems, the transmitter typically ...

  2. Electrifying the bottom of the pyramid : improving access in slums

    E-Print Network [OSTI]

    Scott, Cecilia (Cecilia Lauren)

    2010-01-01T23:59:59.000Z

    Slums are expanding in Latin America, Asia, and Africa, and as a result, the lack of safe, reliable electricity access in these regions is expanding. Addressing this issue will require a comprehensive strategy that caters ...

  3. Recommendations concerning energy information model documentation, public access, and evaluation

    E-Print Network [OSTI]

    Wood, David O.

    1979-01-01T23:59:59.000Z

    In this study we provide an analysis of the factors underlying Congressional concern regarding model documentation, policies for public access, and evaluation procedures of the Energy Information Administration (EIA) and ...

  4. Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks

    E-Print Network [OSTI]

    Sarkar, Saswati

    1 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks Gaurav S. Kasbekar does not exist. Index Terms Cognitive Radio Networks, Spectrum Auctions, Algorithms I. INTRODUCTION, Wireless Meteropolitan Area networks etc., demand for radio spectrum is increasing. Currently, spectrum

  5. Transpiring purging access probe for particulate laden or hazardous environments

    DOE Patents [OSTI]

    VanOsdol, John G

    2013-12-03T23:59:59.000Z

    An access probe for remote-sensing access through a viewing port, viewing volume, and access port into a vessel. The physical boundary around the viewing volume is partially formed by a porous sleeve lying between the viewing volume and a fluid conduit. In a first mode of operation, a fluid supplied to the fluid conduit encounters the porous sleeve and flows through the porous material to maintain the viewing volume free of ash or other matter. When additional fluid force is needed to clear the viewing volume, the pressure of the fluid flow is increased sufficiently to slidably translate the porous sleeve, greatly increasing the flow into the viewing volume. The porous sleeve is returned to position by an actuating spring. The access probe thereby provides for alternate modes of operation based on the pressure of an actuating fluid.

  6. RESEARCH Open Access The fate of lignin during hydrothermal

    E-Print Network [OSTI]

    California at Riverside, University of

    RESEARCH Open Access The fate of lignin during hydrothermal pretreatment Heather L Trajano1 lignin removal, relocation, and/or modification during hydrothermal pretreatment. Phase transition, depolymerization/repolymerization, and solubility effects may all influence these lignin changes. To better

  7. Building Access Policy Responsible Administrative Unit: Finance & Administration

    E-Print Network [OSTI]

    Page 1 of 5 1.0 BACKGROUND AND PURPOSE This policy establishes guidelines for facilitating access and thoughtfully controlled as a campus security measure. The desired outcomes for this policy are to streamline

  8. Drive-access transit : a regional analytical framework

    E-Print Network [OSTI]

    Sorensen, James B

    2005-01-01T23:59:59.000Z

    A framework for analyzing drive-access transit at a regional level is developed in this research. This framework is intended primarily for in-house use by regional transit agencies, yet has implications for the regional ...

  9. An evaluation of Access Tier local area network switches.

    SciTech Connect (OSTI)

    Eldridge, John M.; Olsberg, Ronald R.

    2004-06-01T23:59:59.000Z

    This reports tabulates the Test and Evaluation results of the Access Class Switch tests conducted by members of Department 9336. About 15 switches were reviewed for use in the enterprise network as access tier switches as defined in a three tier architecture. The Access Switch Tier has several functions including: aggregate customer desktop ports, preserve and apply QoS tags, provide switched LAN access, provide VLAN assignment, as well as others. The typical switch size is 48 or less user ports. The evaluation team reviewed network switch evaluation reports from the Tolly Group as well as other sources. We then used these reports as a starting point to identify particular switches for evaluation. In general we reviewed the products of dominant equipment manufacturers. Also, based on architectural design requirements, the majority of the switches tested were of relatively small monolithic unit variety.

  10. CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S

    E-Print Network [OSTI]

    Powers, Robert

    CAMPUS BLUEPRINT ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012'S ENROLLMENT MANAGEMENT COUNCIL'S STRATEGIC ENROLLMENT MANAGEMENT PLAN 2012-2017 Report Outline Building a Big: Student Recruitment Initiatives Sharing Our Story of Quality Improving the Academic Profile and Student

  11. CSREES Nutrient Management Working Meeting

    E-Print Network [OSTI]

    planning process Nutrient management training P-Indexes and tools developed Educational materials #12Welcome CSREES Nutrient Management Working Meeting May 4 and 5, 2004 Atlanta, GA #12;University Objectives Information Sharing Among States Nutrient management regulations Nutrient management

  12. Radioactive Waste Management Basis

    SciTech Connect (OSTI)

    Perkins, B K

    2009-06-03T23:59:59.000Z

    The purpose of this Radioactive Waste Management Basis is to describe the systematic approach for planning, executing, and evaluating the management of radioactive waste at LLNL. The implementation of this document will ensure that waste management activities at LLNL are conducted in compliance with the requirements of DOE Order 435.1, Radioactive Waste Management, and the Implementation Guide for DOE Manual 435.1-1, Radioactive Waste Management Manual. Technical justification is provided where methods for meeting the requirements of DOE Order 435.1 deviate from the DOE Manual 435.1-1 and Implementation Guide.

  13. Estimating solar access of typical residential rooftops: A case study in San Jose, CA

    E-Print Network [OSTI]

    Levinson, Ronnen M

    2008-01-01T23:59:59.000Z

    a wider study of the solar access of California homes. High-computed. 2.3.7 Solar Access Violation California Publicrooftop solar access in various California cities, including

  14. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticat...

    Broader source: Energy.gov (indexed) [DOE]

    11: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users Access FilesDirectories U-211: EMC CelerraVNXVNXe Access Control Bug Lets Remote Authenticated Users...

  15. Data Management Group Annual Report

    E-Print Network [OSTI]

    Toronto, University of

    universal access. The Cordon Count data, which allows access only to funding agencies or their agents, had in Transportation University of Toronto Telephone: (416) 978-7282 #12;TABLE OF CONTENTS SUMMARY ............................................................................ 16 UNIVERSITY RESEARCH ....................................................................... 16

  16. Web-based feedback system: the life cycle management as continuous maintenance of apartment facility information

    E-Print Network [OSTI]

    Jeong, Jin Su

    2006-10-30T23:59:59.000Z

    to make it efficient. A database requires a database management system (DBMS), a set of computer programs for organizing the information in a database, to manage its structure and control access to the data stored in the database [9]. A DBMS supports... the structuring of the database in a standard format and provides tools for data input, verification, storage, retrieval, query, and manipulation. According to Ramakishman [26], DBMS is software, designed to assist in maintaining and utilizing large collection...

  17. Structuring Access to a Dynamic Collection of Digital Documents

    E-Print Network [OSTI]

    Francisco-Revilla, Luis

    for managing dynamic collections of digital documents. These directories are not physically present in the file by their location in the document hierarchy. Most file systems are created and managed by trained system collections of documents are manageable, users find it difficult to remember long paths to documents

  18. Strategies for Successful Energy Management

    Broader source: Energy.gov [DOE]

    This presentation, given through the DOE's Technical Assitance Program (TAP), provides information on energy management for the portfolio manager initiative

  19. Energy Management Working Group: Accelerating Energy Management

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01T23:59:59.000Z

    Countries participating in the Global Superior Energy Performance (GSEP) Energy Management Working Group (EMWG) are leveraging their resources and taking collective action to strengthen national and international efforts to facilitate the adoption...

  20. Rangeland Drought Management for Texans: Livestock Management

    E-Print Network [OSTI]

    Carpenter, Bruce B.; Hart, Charles R.

    2001-04-24T23:59:59.000Z

    Livestock producers need to create flexible plans for dealing with drought. This publication explains the steps that should be included in such a plan, including taking a forage inventory, using stocker animals, establishing a livestock management...