Sample records for rsa access manager

  1. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  2. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  3. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  4. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  5. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  6. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  8. BUILDING MANAGEMENT & RESTRICTED ACCESS

    E-Print Network [OSTI]

    Johnston, Daniel

    BUILDING MANAGEMENT & RESTRICTED ACCESS Plan Annex 2014 VIII #12;#12;#12;The University of Texas at Austiniv #12;Building Management & Restricted Access Plan Annex v CONTENTS RECORD OF CHANGES .......................................................................................................15 J. BUILDING SECURITY OPERATIONS RESTRICTED ACCESS PROCEDURES FOR BUILDINGS ON ELECTRONIC ACCESS

  9. Identity and Access Management: Access Management Survey 1 Access Management Survey Questions

    E-Print Network [OSTI]

    Maroncelli, Mark

    Identity and Access Management: Access Management Survey 1 Access Management Survey Questions has developed a survey to solicit your input for Access Management. Please take a moment to complete be submitted by Friday May 14, 2010. #12;Identity and Access Management: Access Management Survey 2 Group

  10. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  11. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  12. Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-02-19T23:59:59.000Z

    To establish requirements and responsibilities for DOE identity, credential, and access management program.

  13. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  14. Access Management Software Requirements Specification

    E-Print Network [OSTI]

    Maroncelli, Mark

    with a digital identity record. Attributes may be general or personal. A subset of all attributes defines. IAM Defined #12;· Access to Protected Library Resources · Library Staff Access to Integrated Library System · Access to Library Public Workstations · HMC Affiliate · Access to Library Resources · Access

  15. Request Access to the PARSIIe Project Management Lessons Learned...

    Energy Savers [EERE]

    Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository Request Access to the PARSIIe Project Management Lessons Learned (PMLL) Repository PURPOSE...

  16. V-120: EMC Smarts Network Configuration Manager Java RMI Access...

    Broader source: Energy.gov (indexed) [DOE]

    0: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control V-120: EMC Smarts Network Configuration Manager Java RMI Access Control...

  17. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  18. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  19. Key Management with Policy-based Access Control Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    a crucial role for the security of network-based key management. Modern access-control systems are policy in policies. In this presentation we discuss how to integrate a policy-based access control system using XACMLKey Management with Policy-based Access Control Christian Cachin Divay Bansal G¨unter Karjoth 27

  20. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  1. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  2. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  3. Energy-Efficient Management of UMTS Access Networks

    E-Print Network [OSTI]

    Energy-Efficient Management of UMTS Access Networks Luca Chiaraviglio, Delia Ciullo, Michela Meo by the telecommunication sector in Italy in the next ten years, the main culprit being customer premises networking

  4. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  5. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  7. Managed Access by Controlled Sensing (MACS)

    SciTech Connect (OSTI)

    Curtiss, J.A.; Indusi, J.P.

    1994-08-01T23:59:59.000Z

    During chemical weapons challenge inspections, the CWC treaty allows ``alternate means`` of access to be proposed by the nation challenged. BNL`s Safeguards, Safety and Nonproliferation Division is funded by the Defense Nuclear Agency to develop a system to provide the challenge inspection team with a ``virtual presence`` within the facility while denying personal access. A general purpose configuration of a mobile station manned by site personnel and a base station manned by the challenge inspector, supported by a flexible communication system, will allow facility personnel to tailor the basic model to their site. Design of the MACS system is based on maximum use of commercial equipment that is available on the international market. Design requirements for the MACS system include methods of establishing geographical position, distance measuring equipment for use in verifying dimensions on floor plans, video and two-way audio links between the mobile unit and the base station, and portability and versatility of the equipment. The MACS platform will also support deployment of selected instrumentation which the site may offer to the challenge inspection team. This paper describes the design and construction of the prototype MACS system.

  8. Web Service Access Management for Integration with Agent Systems

    E-Print Network [OSTI]

    Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

  9. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  10. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  11. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  12. T-581: Novell Access Manager Java Double Literal Denial of Service...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability Report: Novell Access Manager 3.x Oracle FPUpdater Tool IMPACT ASSESSMENT: Medium Discussion: The Double.parseDouble method in Java Runtime Environment in Oracle...

  13. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  14. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  15. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  16. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  17. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  18. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  19. Web Accessibility Accessibility

    E-Print Network [OSTI]

    Oklahoma, University of

    Web Accessibility #12;Accessibility Webaim This is a pre-y prolific site that vary based on the type of web content. StaFc, content managed and dynamic web sites can benefit from our accessibility review service. Rich media

  20. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  1. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems --- Can side­channel threats Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro­ cessors. Of independent interest, we

  2. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems -- Can side-channel threats Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro- cessors. Of independent interest, we

  3. Physical Resource Management and Access Mediation Within the Cloud Computing Paradigm

    E-Print Network [OSTI]

    Betts, Hutson

    2012-10-19T23:59:59.000Z

    are typically assumed vulnerable, including parts of the virtual private cloud hosted within other cloud providers. However, as noted earlier, compromised virtual private clouds should not imply a higher risk to cloud providers whose infrastructures... 4.10 Access Pathway Manager integration into a generic infrastructure man- agement tool-kit. : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 40 4.11 Access Pathway Manager integration into the OpenNebula software stack. Figure...

  4. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

  5. User Guide Remote Access to VDI/Workplace Using RSA

    Office of Environmental Management (EM)

    benefits include the following. * Full-featured Microsoft Outlook client * Microsoft Word, Excel, and other Microsoft Office applications * Network files, such as the N, O, and...

  6. Design and implementation of wavescope storage manager and access scheduler

    E-Print Network [OSTI]

    Smith, Jeremy Elliot

    2010-01-01T23:59:59.000Z

    In this thesis, I designed, implemented, and analyzed the performance of an optimized storage manager for the Wavescope project. In doing this, I implemented an importation system that converts CENSAM data into a format ...

  7. REVIEW Open Access Soil nutrient management in Haiti, pre-Columbus

    E-Print Network [OSTI]

    Raizada, Manish N.

    REVIEW Open Access Soil nutrient management in Haiti, pre-Columbus to the present day: lessons been reported to contribute to chronic poverty and malnutrition in rural Haiti is soil infertility. There has been no systematic review of past and present soil interventions in Haiti that could provide

  8. Access Management in Multi-Administration Networks S. P. Lord, N.H. Pope, and Susan Stepney

    E-Print Network [OSTI]

    Stepney, Susan

    Access Management in Multi-Administration Networks S. P. Lord, N.H. Pope, and Susan Stepney GEC of linking together networks controlled by different administrations, and allowing these administrations and representations. S. P. Lord, N. H. Pope, and Susan Stepney. Access Management in multi-administration networks

  9. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  10. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  11. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  12. The Human Genome Project: Information access, management, and regulation. Final report

    SciTech Connect (OSTI)

    McInerney, J.D.; Micikas, L.B.

    1996-08-31T23:59:59.000Z

    The Human Genome Project is a large, internationally coordinated effort in biological research directed at creating a detailed map of human DNA. This report describes the access of information, management, and regulation of the project. The project led to the development of an instructional module titled The Human Genome Project: Biology, Computers, and Privacy, designed for use in high school biology classes. The module consists of print materials and both Macintosh and Windows versions of related computer software-Appendix A contains a copy of the print materials and discs containing the two versions of the software.

  13. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  14. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  15. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  16. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  17. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma , Ondej Pokorný1 and Tomás Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  18. Virtual venue management users manual : access grid toolkit documentation, version 2.3.

    SciTech Connect (OSTI)

    Judson, I. R.; Lefvert, S.; Olson, E.; Uram, T. D.; Mathematics and Computer Science

    2007-10-24T23:59:59.000Z

    An Access Grid Venue Server provides access to individual Virtual Venues, virtual spaces where users can collaborate using the Access Grid Venue Client software. This manual describes the Venue Server component of the Access Grid Toolkit, version 2.3. Covered here are the basic operations of starting a venue server, modifying its configuration, and modifying the configuration of the individual venues.

  19. Access to digital collections of public domain works: Enclosure of the commons managed by libraries and museums

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    by libraries and museums M. Dulong de Rosnay1 Abstract Digital copies of physical books and art objects curated, digitisation, enclosure, governance. 1. INTRODUCTION Libraries and museums are digitizing their collections1 Access to digital collections of public domain works: Enclosure of the commons managed

  20. Notice of Intent to Develop Department of Energy Order 206.2 on Identity, Credential, and Access Management (ICAM)

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    The purpose of the proposed directive is to replace the information contained in DOE N 206.4, "Personal Identity Verification," approved June 29, 2007, and to establish a DOE directive on Identity, Credential, and Access Management (ICAM). Implementation of ICAM will result in cost avoidance and cost savings allowing reinvestment in DOE mission related work.

  1. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  2. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  3. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  4. Stix: a goal-oriented distributed management system for large-scale broadband wireless access networks 

    E-Print Network [OSTI]

    Bernardi, Giacomo; Calder, Matt; Fenacci, Damon; Macmillan, Alexander; Marina, Mahesh

    2010-10-25T23:59:59.000Z

    management infrastructure scalable and flexible. Stix is based on the notions of goal-oriented and in-network management. With Stix, administrators graphically specify network management activities as workflows, which are deployed at a distributed set...

  5. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can partially access data on the target...

  6. Managing the Life Cycle of Access Rules in CEOSIS Stefanie Rinderle-Ma, Manfred Reichert

    E-Print Network [OSTI]

    Ulm, Universität

    and business func- tions) is an important task within any enterprise informa- tion systems (EIS). Many EIS framework for the con- trolled evolution of access rules in EIS. Specifically, we de- fine change operations contributes to comprehensive life cycle support for access rules in (adaptive) EIS. 1 Introduction

  7. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  8. User guide for remote access to VDI and Workplace using RSA token |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFact

  9. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:Users

  10. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  11. 327USDA Forest Service Gen.Tech.Rep. PSW-GTR-166. 1998. Effective management of forest resources requires access to current and consistent geospatial information

    E-Print Network [OSTI]

    Standiford, Richard B.

    resources requires access to current and consistent geospatial information that can be shared by resource managers and the public. Geospatial information describing our land and natural resources comes from many sources and is most effective when stored in a geospatial database and used in a geographic information

  12. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFactEnergy Bob UnderYour RSA

  13. OPEN ACCESS

    E-Print Network [OSTI]

    Thomas F. Kresina; Robert Lubran

    Abstract: Providing access to and utilization of medication assisted treatment (MAT) for the treatment of opioid abuse and dependence provides an important opportunity to improve public health. Access to health services comprising MAT in the community is fundamental to achieve broad service coverage. The type and placement of the health services comprising MAT and integration with primary medical care including human immunodeficiency virus (HIV) prevention, care and treatment services are optimal for addressing both substance abuse and co-occurring infectious diseases. As an HIV prevention intervention, integrated (same medical record for HIV services and MAT services) MAT with HIV prevention, care and treatment programs provides the best “one stop shopping ” approach for health service utilization. Alternatively, MAT, medical and HIV services can be separately managed but co-located to allow convenient utilization of primary care, MAT and HIV services. A third approach is coordinated care and treatment, where primary care, MAT and HIV services are provided at distinct locations and case managers, peer facilitators, or others promote direct service utilization at the various locations. Developing a continuum of care for patients with opioid dependence throughout

  14. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users

  15. U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOE O

  16. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  17. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere is a

  18. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  19. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  20. Index Calculation Attacks on RSA Signature and Encryption Jean-Sebastien Coron1, Yvo Desmedt2, David Naccache1,

    E-Print Network [OSTI]

    Minnesota, University of

    a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following the attack iso/iec 9796-1 was withdrawn and iso/iec 9796-2 amended. In this paper, we recall Desmedt and Odlyzko's attack as well as its application to the cryptanalysis of iso/iec

  1. RSA SecurId Token User's Guide Version 1.0 IT Support

    E-Print Network [OSTI]

    Gesbert, David

    .eurecom.fr) ............................................................................................................................. 7 3 The SSL VPN (https ............................................................................................................................................................ 8 3.2 Accessing the SIFI through the SSL VPN........................................................................................................ 10 3.3 Accessing your homedir and the teaching repository through the SSL VPN

  2. ACCESS 2010 Level 1 | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and modify new databases. Course Goals: Identify the basic components of an Access database. Build the structure of a database. Manage data in tables. Query a database. Design...

  3. Fleet Management | Department of Energy

    Energy Savers [EERE]

    DOE Fleet Management Contact your Fleet manager for access to these systems Federal Automotive Statistical Tool (FAST): Supports EPAct of 1992 requirements , the Energy...

  4. Remote File Access 2010

    E-Print Network [OSTI]

    University of Technology, Sydney

    Remote File Access 2010 Mac Users Guide #12;Remote File Access: MAC Users Guide 2010 2 Table Remote File Access 11 Part IV: Using Remote File Access 15 Part V: FAQ 24 #12;Remote File Access: MAC Users Guide 2010 3 1. What is Remote File Access? UTS Remote File Access service is provided to enable

  5. Accessing PDSF

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS

  6. Open Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest and Evaluation |quasicrystals65 (9/12) Page 1 of

  7. Guidelines for left-turn bays at unsignalized access locations on arterial roadways

    E-Print Network [OSTI]

    Hawley, Patrick Emmett

    1994-01-01T23:59:59.000Z

    It has long been recognized that effective access management along arterial streets can alleviate traffic congestion. A major goal within access management is to limit the speed differential between turning and through vehicles. Left-turn bays...

  8. A Hardware Approach for Trusted Access and

    E-Print Network [OSTI]

    Global is prohibited. IntroductIon In computer systems, access control models management in the database context, trying to ABStrAct ThischapteradvocatestheconvergencebetweenAccessControl(AC)models. The convergence is also expected in terms of control enforcement considering that both AC and DRM models must

  9. access to information: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Protocol of Corporate Governance in the Public Sector (1997), the Public Finance Management Act of 1999 Jarrett, Thomas H. 2 Access to Geographic Information: Openness versus...

  10. U-144:Juniper Secure Access Input Validation Flaw Permits Cross...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the VPN management interface, access data recently submitted by the target user via...

  11. A Utility Regulator's Guide to Data Access for Commercial Building...

    Broader source: Energy.gov (indexed) [DOE]

    This guide offers policy options and considerations to state utility commissions in providing access to energy use data to help commercial customers manage energy costs through...

  12. Microsoft Word - CX-Ross-Lexington_access_road_WEB.doc

    Broader source: Energy.gov (indexed) [DOE]

    Darin Bowman Project Manager - TELF-TPP-3 Proposed Action: Access road repair including reconstructing, grading, and shaping of roads, placing and compacting of rock surfacing,...

  13. Characterizing Open Access Publishing at Your Institution 

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    Medical Library, 2008) Open Access (OA) “… digital, online, free of charge, and free of most copyright and licensing restrictions.” (Suber, 2012, p. 4) “Flavors” of Open Access Gold: provide immediate open access, peer reviewed; authors retain copyright...://becker.wustl.edu/services/scholarly/whatis.html. Ali, A., Shah, T. A., & Mirza, I. Z. (2011). Open Access Research Output of the University of Kashmir. Trends in Information Management, 7(2), 237-243. Amos, K., Mower, A., James, M. A., Weber, A., Yaffe, J., & Youngkin, M. (2012). Exploring...

  14. ACCESS TO INFORMATION MANUAL NATIONAL RESEARCH FOUNDATION

    E-Print Network [OSTI]

    Jarrett, Thomas H.

    of poverty, wealth creation and knowledge generation and preservation. The NRF views the Promotion of Access an opportunity to deal with knowledge and information management in a holistic and integrated manner so, but rather an opportunity to deal with information management in a holistic and integrated manner. The NRF

  15. UC SANTA BARBARA POLICY AND PROCEDURE Physical Access Control

    E-Print Network [OSTI]

    Bigelow, Stephen

    property. A successful program is dependent on every member of the community being diligent access controls are to enhance the personal safety of the campus community and to secure University physical access controls for all facilities managed by UCSB (University facilities). Physical access

  16. Capital Access Program (Vermont)

    Broader source: Energy.gov [DOE]

    The Capital Access Program provides loan guarantees to small businesses seeking access to commercial credit. Premiums paid by the borrower and matched by Vermont Economic Development Authority fund...

  17. Open Access Task Force Open Access to

    E-Print Network [OSTI]

    Jiang, Huiqiang

    Libraries Initiative launched by National Science Foundation; Social Sciences Research Network (SSRN Library System rgmiller@pitt.edu #12;Open Access Task Force Open Access is... · A family of copyright · The only constraint on reproduction and distribution, and the only role for copyright in this domain

  18. addressing waste management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    outside the Former Hazardous Waste Management Homes, Christopher C. 25 Beyond 70%: Assessing Alternative Waste Management Opportunities for Institutions. Open Access Theses and...

  19. Accessibility to dental services 

    E-Print Network [OSTI]

    Evenden, Craig Andrew

    2007-08-15T23:59:59.000Z

    . Accessibility indexes need to be developed that incorporate a number of characteristics that are currently affecting accessibility to dental services. More research needs to be conducted at a local level to provide better advice to health planners and policy...

  20. Resource Access Pattern Mining for Dynamic Energy Dinesh Rajan, Christian Poellabauer, Nitesh Chawla

    E-Print Network [OSTI]

    Chawla, Nitesh V.

    Resource Access Pattern Mining for Dynamic Energy Management Dinesh Rajan, Christian Poellabauer, University of Notre Dame, USA. Abstract. Energy management mechanisms in resource constrained environments their resource usage, termed Resource Access Patterns, are then employed in a novel dynamic energy management

  1. Human Resources Department Procedure: Public Records Access, Document

    E-Print Network [OSTI]

    Human Resources Department Procedure: Public Records Access, Document Page 1 of 2 Printing of benefits, medical, and FMLA records; and the Payroll Manager is the custodian of payroll records Department Procedure: Public Records Access, Document Printing and Copying Page 2 of 2 Issued: October 3

  2. Demystifying Open Access

    SciTech Connect (OSTI)

    Mele, Salvatore

    2007-05-14T23:59:59.000Z

    The tenets of Open Access are to grant anyone, anywhere and anytime free access to the results of scientific research. HEP spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-WWW era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peer-review system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a possible plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs incurred to organise the peer-review service and give Open Access to the final version of articles. SCOAP3 will be funded by all countries active in HEP under a 'fair share' scenario, according to their production of HEP articles. In this talk I will present a short overview of the history of Open Access in HEP, the details of the SCOAP3 model and the outlook for its implementation.

  3. Public Key Cryptography and Key Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-06-11T23:59:59.000Z

    Information in this chapter of the directive has been consolidated into the Identity, Credential, and Access Management (ICAM) Program as defined in DOE O 206.2.

  4. Internet architecture Access networks

    E-Print Network [OSTI]

    access points switch cellular tower Optical 8iber Network Core Internet links " connect end systems/routers/switches/access points " fiber, copper and radio " transmission rate " Message placed on one link end is delivered to the other end " No contention for use of transmission media

  5. ATLAS Data Access Policy

    E-Print Network [OSTI]

    The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS has fully supported the principle of open access in its publication policy. This document outlines the policy of ATLAS as regards open access to data at different levels as described in the DPHEP model. The main objective is to make the data available in a usable way to people external to the ATLAS collaboration.

  6. Computerized dairy records management systems

    E-Print Network [OSTI]

    Acosta, Alejandro E. Gonzalez

    1992-01-01T23:59:59.000Z

    . . . . . . 1. 3. Management Tools. . . . . . . . . . . . . . . . . . . . . . 1. 3. 1. Record Keeping History. . . . . . . . . . . . . . . . . . . . . . . . . . . 3 . . . . . . . 3 . . . . . 3 . . . . . . . 4 4 . . . . . . . 5 1. 3. 2. Hand-Kept v. s.... Computerized Records. . . . . . . . . . . 6 1. 3. 3. Direct Access to Records by Telephone. . . . . . . . . 6 II. HEIFER MANAGEMENT. 2. 1. Dairy Replacements. . 2. 2. Heifers Breeding Management . . . . . . . . . . . 7 . . . . . . . 7 . . . . . . . 8...

  7. access study access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  8. Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic Center: Email Security Compliance Patch Management Financial Services Health care RSA 2008 RSS | Login | Register

    E-Print Network [OSTI]

    Gupta, Minaxi

    SEARCH Home News Products Blogs Buyers Guide Whitepapers Jobs Events Subscribe Issue Archive Topic located the malicious files, mostly MP3 or AVI in format, on popular peer-to- peer (P2P) websites appear when users employ certain terms when searching for music and video, he said. Once the files

  9. Records Management Vice-Chancellor's Directive 1 Records Management Vice-Chancellor's Directive

    E-Print Network [OSTI]

    University of Technology, Sydney

    Records Management Vice-Chancellor's Directive 1 Records Management Vice-Chancellor's Directive-Chancellor's Directive Privacy Management Plan Intellectual Property Policy UTS Records Management Procedures Privacy Access) Act 2009 (NSW) (GIPA Act) File number UR07/1205 Superseded documents Records Management Vice

  10. A Role-involved Conditional Purpose-based Access Control Model

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    control to achieve database security and available in database management systems. The structure helps. Access control is the process of limiting access to the re- sources of a system only to authorized users a secure privacy policy to remove the fear of customers. Thus in an internal management system, a reliable

  11. Special Access Programs

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-03-29T23:59:59.000Z

    This Order is for OFFICIAL USE ONLY and will not be distributed on the Directives' Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at (202) 586-3345. Does not cancel other directives.

  12. Virginia Capital Access Program (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Capital Access Program (CAP), in partnership with Virginia’s Small Business Financing Authority, provides access to capital for small businesses. Businesses must apply to...

  13. Capital Access Program (CAP) (Michigan)

    Broader source: Energy.gov [DOE]

    The Capital Access Program (CAP), utilizes public resources to generate private financing for small business in Michigan seeking access to capital. Funding from the Michigan Strategic Fund is...

  14. Management Plan Management Plan

    E-Print Network [OSTI]

    Plan, Management Plan Page MP­ 1 #12;Management Plan water quality standards, instream flows, privateManagement Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids

  15. Accessing HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean WaterAccessing HPSS Accessing

  16. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2014-2015 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2014-2015 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  17. Library Guide Access ... 3

    E-Print Network [OSTI]

    Steiner, Ullrich

    ____________________________ Library Guide 2012-2013 #12;Contents Access ... 3 Finding things ... 4-6 Layout and classification... 7 Floor plans ... 8-9 Borrowing things ... 10 Renewing and returning things;Sidney Sussex Library Guide 2012-2013 Welcome to the Richard Powell Library Tel: (01223) 338852 e

  18. Policy Name: Asbestos Management Policy Originating/Responsible Department: Facilities Management and Planning

    E-Print Network [OSTI]

    Carleton University

    or unintentional disturbance of asbestos- containing materials in University-owned or managed buildings. The Asbestos Management Program will address access to areas which house asbestos-containing materials as wellPolicy Name: Asbestos Management Policy Originating/Responsible Department: Facilities Management

  19. UNC CHARLOTTE EXPORT MANAGEMENT PLAN JULY 25, 2012 Page 1 of 21 Export Management Plan

    E-Print Network [OSTI]

    Howitt, Ivan

    UNC CHARLOTTE EXPORT MANAGEMENT PLAN ­ JULY 25, 2012 Page 1 of 21 Export Management Plan I. Export laws and regulations are the bases for restricting use and access to this information. In particular, a "deemed export" (one requiring a license and imposing access restrictions) exists whenever

  20. adults pharmacological management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jose Manuel Garca-verdugo 2002-01-01 159 HOW EMPLOYABLE ARE PEOPLE WITH SERIOUS MENTAL ILLNESS? CASE MANAGERS AND UNDERGRADUATES EXPECTATIONS. Open Access Theses and...

  1. T-693: Symantec Endpoint Protection Manager Input Validation...

    Broader source: Energy.gov (indexed) [DOE]

    user's cookies (including authentication cookies), if any, associated with the site running the Symantec Endpoint Protection Manager software, access data recently submitted by...

  2. Accessibility-based transit planning

    E-Print Network [OSTI]

    Busby, Jeffrey R

    2004-01-01T23:59:59.000Z

    A method for evaluating transit planning proposals using accessibility metrics is advanced in this research. A transit-accessibility model is developed intended for use by in-house transit agency planning staff as a ...

  3. CONTROLLING ACCESS TO UNIVERSITY FACILITIES 1. It is the Policy of Syracuse University that all electronically secured University buildings will

    E-Print Network [OSTI]

    Mather, Patrick T.

    that all electronically secured University buildings will have a single access control system for managing) and the Department of Energy and Computing Management (ECM). B. INFORMATION 1.The policy establishes responsibility of electronic security systems and provides for the monitoring of external access to University facilities

  4. Role-Based Access Controls

    E-Print Network [OSTI]

    Ferraiolo, David F

    2009-01-01T23:59:59.000Z

    While Mandatory Access Controls (MAC) are appropriate for multilevel secure military applications, Discretionary Access Controls (DAC) are often perceived as meeting the security processing needs of industry and civilian government. This paper argues that reliance on DAC as the principal method of access control is unfounded and inappropriate for many commercial and civilian government organizations. The paper describes a type of non-discretionary access control - role-based access control (RBAC) - that is more central to the secure processing needs of non-military systems then DAC.

  5. Web-Based Services for Building Energy Management - WEBE

    E-Print Network [OSTI]

    Paiho, S.; Pietilainen, J.; Ala-Juusela, M.

    2004-01-01T23:59:59.000Z

    Nowadays, internet can be accessed anywhere, and www-based applications are widespread. Utilizing internet also for energy management and commissioning purposes will be a future trend. A web-based service for building energy management, called Web...

  6. Access for All

    E-Print Network [OSTI]

    Stearns, Linda Lea Merenda

    2012-07-16T23:59:59.000Z

    ?s Algebra 1 final grades to examine correlation with the students? grade in Algebra. Each scatter plot contained a solid linear regression line and a dashed line, y = x. The data points with a square shape represent the scores of students who were Waived... classes in a central Texas school district to determine if there is fair and equitable access for all students. The paper contains two major components. The first is quantitative study of the four entrance requirements for 8th grade Algebra I Pre-AP at a...

  7. LANL access restrictions lifted

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as ReadyAppointedKyungmin Ham, Ph.D.access restrictions

  8. Access to the ALS

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS Print

  9. Accessibility | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In theACME -ToggleAccess to the ALS

  10. Remote Access to Large Spatial Databases Egemen Tanin

    E-Print Network [OSTI]

    Samet, Hanan

    --Spatial databases and GIS This work was supported in part by the National Sci- ence Foundation under Grants EIA-99Remote Access to Large Spatial Databases Egemen Tanin Frantisek Brabec Hanan Samet Computer--Client/server, Distributed applications, Distributed databases; H.2.8 [Database Management]: Database Applications

  11. RESEARCH Open Access Pavement crack characteristic detection based

    E-Print Network [OSTI]

    Joensuu, University of

    RESEARCH Open Access Pavement crack characteristic detection based on sparse representation Xiaoming Sun1 , Jianping Huang1 , Wanyu Liu1* and Mantao Xu2 Abstract Pavement crack detection plays an important role in pavement maintaining and management. The three- dimensional (3D) pavement crack detection

  12. Accessing Heritage Documents according to Space Criteria within Digital Libraries

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Accessing Heritage Documents according to Space Criteria within Digital Libraries Christophe, Geographic Information Retrieval and Visualization, Non-Structured Documents, Digital Libraries, Cultural on digital libraries and proposes to extend the basic services of existing Library Management System with new

  13. Microsoft Word - CX-CentraliaAreaAccessRoadsFY13_WEB.doc

    Broader source: Energy.gov (indexed) [DOE]

    Darin Bowman Project Manager TELF-TPP-3 Proposed Action: Access Road maintenance on the Chehalis-Centralia No. 1, Chehalis-Covington No. 1, Paul-Allston No. 2, and Paul-Napavine...

  14. Microsoft Word - CX-GrandCouleeDistrictWoodPoleReplacementsAccessRoads...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2013 REPLY TO ATTN OF: KEPR-Bell-1 SUBJECT: Environmental Clearance Memorandum Todd Wehner Civil DesignAccess Roads - TELF-TPP-3 James Semrau Project Manager - TEP-TPP-1...

  15. Pennsylvania Capital Access Program (Pennsylvania)

    Broader source: Energy.gov [DOE]

    The Pennsylvania Capital Access Program provides loan guarantees for all businesses for the purchase of land, buildings, machinery, equipment and working capital through participating banks. The...

  16. Vehicle barrier with access delay

    DOE Patents [OSTI]

    Swahlan, David J; Wilke, Jason

    2013-09-03T23:59:59.000Z

    An access delay vehicle barrier for stopping unauthorized entry into secure areas by a vehicle ramming attack includes access delay features for preventing and/or delaying an adversary from defeating or compromising the barrier. A horizontally deployed barrier member can include an exterior steel casing, an interior steel reinforcing member and access delay members disposed within the casing and between the casing and the interior reinforcing member. Access delay members can include wooden structural lumber, concrete and/or polymeric members that in combination with the exterior casing and interior reinforcing member act cooperatively to impair an adversarial attach by thermal, mechanical and/or explosive tools.

  17. Bridging By Design: The Curation and Management of Digital Assets

    E-Print Network [OSTI]

    Oard, Doug

    on instruction in the creation, management and use, long-term preservation, and access to digital assets.5 million managers and analysts will need to have the knowledge to use managed digital assets in strategicBridging By Design: The Curation and Management of Digital Assets Specialization at the University

  18. Data Transfer and Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDanielDTN Data Transfer Nodes

  19. Querying Schemas With Access Restrictions

    E-Print Network [OSTI]

    Benedikt, Michael; Ley, Clemens

    2012-01-01T23:59:59.000Z

    We study verification of systems whose transitions consist of accesses to a Web-based data-source. An access is a lookup on a relation within a relational database, fixing values for a set of positions in the relation. For example, a transition can represent access to a Web form, where the user is restricted to filling in values for a particular set of fields. We look at verifying properties of a schema describing the possible accesses of such a system. We present a language where one can describe the properties of an access path, and also specify additional restrictions on accesses that are enforced by the schema. Our main property language, AccLTL, is based on a first-order extension of linear-time temporal logic, interpreting access paths as sequences of relational structures. We also present a lower-level automaton model, Aautomata, which AccLTL specifications can compile into. We show that AccLTL and A-automata can express static analysis problems related to "querying with limited access patterns" that h...

  20. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11T23:59:59.000Z

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  1. A quantum access network

    E-Print Network [OSTI]

    Bernd Fröhlich; James F. Dynes; Marco Lucamarini; Andrew W. Sharpe; Zhiliang Yuan; Andrew J. Shields

    2014-09-02T23:59:59.000Z

    The theoretically proven security of quantum key distribution (QKD) could revolutionise how information exchange is protected in the future. Several field tests of QKD have proven it to be a reliable technology for cryptographic key exchange and have demonstrated nodal networks of point-to-point links. However, so far no convincing answer has been given to the question of how to extend the scope of QKD beyond niche applications in dedicated high security networks. Here we show that adopting simple and cost-effective telecommunication technologies to form a quantum access network can greatly expand the number of users in quantum networks and therefore vastly broaden their appeal. We are able to demonstrate that a high-speed single-photon detector positioned at a network node can be shared between up to 64 users for exchanging secret keys with the node, thereby significantly reducing the hardware requirements for each user added to the network. This point-to-multipoint architecture removes one of the main obstacles restricting the widespread application of QKD. It presents a viable method for realising multi-user QKD networks with resource efficiency and brings QKD closer to becoming the first widespread technology based on quantum physics.

  2. V-194: Citrix XenServer Memory Management Error Lets Local Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    a memory management page reference counting error to gain access on the target host server. IMPACT: A local user on the guest operating system can obtain access on the target...

  3. INDEXING DEER NUMBERS WITH SPOTLIGHTING: A LONG-TERM STUDY OF A MANAGED DEER POPULATION

    E-Print Network [OSTI]

    -access program has been employed to manage deer at the Mary Flagler Cary Arboretum (MFCA) in southeastern New at the MFCA to assess the effectiveness of these controlled-access hunts in reaching that objective. #12

  4. Access Digital Library, Search, News and more

    E-Print Network [OSTI]

    Goodrich, Lisa V.

    [General] Access Digital Library, Search, News and more [Education] Access MyCourses content [Research] Access Digital Library, NCBI Blast and more [Personal] Access your portable bookmarks using My and 500 textbooks via the Digital Library, one click access to NCBI Blast sequence databases. [General

  5. Hybrid Decision Algorithm for Access Selection in Multi-Operator Networks

    E-Print Network [OSTI]

    Boyer, Edmond

    a hybrid decision algorithm for the selection of the access in multi-operator networks environment, where Resource Management (RRM) jointly done among the different RATs. It creates a multi-RATs environment under the management of a single operator, and a joint RRM begins by optimizing users association to the different RATs

  6. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  7. A sustainable business model for Open-Access journal publishing a proposed plan for High-Energy Physics

    E-Print Network [OSTI]

    Vigen, Jens

    2007-01-01T23:59:59.000Z

    The High Energy Physics community over the last 15 years has achieved so-called full green Open Access through the wide dissemination of preprints via arXiv, a central subject repository managed by Cornell University. However, green Open Access does not alleviate the economic difficulties of libraries as they are still expected to offer access to versions of record of the peer-reviewed literature. For this reason the particle physics community is now addressing the issue of gold Open Access by converting a set of the existing core journals to Open Access. A Working Party has been established to bring together funding agencies, laboratories and libraries into a single consortium, called SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). This consortium will engage with publishers to build a sustainable model for Open Access publishing. In this model, subscription fees from multiple institutions are replaced by contracts with publishers of Open Access journals, where the SCOAP3 conso...

  8. Hospitality, Tourism and Event Management

    E-Print Network [OSTI]

    Liley, David

    Practical cooking Public speaking Responsible Service of Alcohol (RSA) certification Small to medium the best university in Melbourne for teaching quality (2007­2010) and graduate satisfaction (2007, 2008. As a Swinburne graduate you'll be in high demand, with a long menu of career prospects to select from. Swinburne

  9. access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  10. accessibility: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility Biotechnology Websites Summary: Web Accessibility...

  11. Dynamic, Flexible, and Optimistic Access Control

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt

    2013-01-01T23:59:59.000Z

    and N. Dulay. Rumpole: A Flexible Break-Glass Access ControlDynamic, Flexible, and Optimistic Access Control Seannor are they intended to be flexible enough to reduce access

  12. Florida Capital Access Program (Florida)

    Broader source: Energy.gov [DOE]

    The Florida Capital Access Program, run by the Florida Department of Economic Development, is a loan portfolio insurance program enabling lenders to make loans to credit-worthy small businesses. ...

  13. Improving Access to Foundational Energy Performance Data

    SciTech Connect (OSTI)

    Studer, D.; Livingood, W.; Torcellini, P.

    2014-08-01T23:59:59.000Z

    Access to foundational energy performance data is key to improving the efficiency of the built environment. However, stakeholders often lack access to what they perceive as credible energy performance data. Therefore, even if a stakeholder determines that a product would increase efficiency, they often have difficulty convincing their management to move forward. Even when credible data do exist, such data are not always sufficient to support detailed energy performance analyses, or the development of robust business cases. One reason for this is that the data parameters that are provided are generally based on the respective industry norms. Thus, for mature industries with extensive testing standards, the data made available are often quite detailed. But for emerging technologies, or for industries with less well-developed testing standards, available data are generally insufficient to support robust analysis. However, even for mature technologies, there is no guarantee that the data being supplied are the same data needed to accurately evaluate a product?s energy performance. To address these challenges, the U.S. Department of Energy funded development of a free, publically accessible Web-based portal, the Technology Performance Exchange(TM), to facilitate the transparent identification, storage, and sharing of foundational energy performance data. The Technology Performance Exchange identifies the intrinsic, technology-specific parameters necessary for a user to perform a credible energy analysis and includes a robust database to store these data. End users can leverage stored data to evaluate the site-specific performance of various technologies, support financial analyses with greater confidence, and make better informed procurement decisions.

  14. Collection Management Policy Executive Summary

    E-Print Network [OSTI]

    Levi, Ran

    Collection Development Budget Allocation 1.4 Responsibility for Collection Development within the Library 2 Management 3.1 Locations and Availability of Material 3.1.1 Heavy Demand 3.1.2 Closed access and remote - Collection Maintenance and Evaluation 4.1 De-Selection of Materials #12;4.1.1 Criteria for Retention

  15. Access Business Systems | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Business Systems Dash provides access to select Argonne business systems without VPN. Dash is a secure platform, based on Citrix, for accessing Argonne business systems. Dash is...

  16. Nolij academic appointment files roles and document indices access_10May2013.xlsx, DOCUMENT INDICES ACCESS BY ROLE, 5/30/13 1 Role and Permitted Actions on a document in an

    E-Print Network [OSTI]

    Sonnenburg, Justin L.

    Nolij academic appointment files roles and document indices access_10May2013.xlsx, DOCUMENT INDICES ACCESS BY ROLE, 5/30/13 1 Role and Permitted Actions on a document in an authorized document index type Manage Authority (may delegate) APT-ACTIVITIES APT-AGREEMENTS APT-APPLICATION APT-APPTDEPT APT

  17. Web Data Accessing and the Web Searching Process S. Petridou G. Pallis A. Vakali G. Papadimitriou A. Pomportsis

    E-Print Network [OSTI]

    Pallis, George

    Web Data Accessing and the Web Searching Process S. Petridou G. Pallis A. Vakali G. Papadimitriou A apompo@csd.auth.gr Abstract The enormous growth in the number of documents circulated over the Web increases the need for improved Web data management systems. Web data accessing and Web searching

  18. UW-Madison Records Management Public Records Campus Resources

    E-Print Network [OSTI]

    Sheridan, Jennifer

    UW-Madison Records Management Public Records Campus Resources Attached are some documents which are on the UW-Madison Records management website regarding Public Records, Email and Retention schedules. (May/ This one is about 20 minutes long. Both of these can also be access through the UW Records Management

  19. Webmail access and helpful tips Purpose ...................................................................................................................................3

    E-Print Network [OSTI]

    product installed using SSL certificate management, you will need to disable SSL certificate management

  20. Idaho - Access Management: Standards and Procedures for Highway...

    Open Energy Info (EERE)

    EncroachmentsPermittingRegulatory GuidanceGuideHandbook Author Idaho Transportation Department Published Idaho Transportation Department, 042001 DOI Not Provided...

  1. Request Access to the PARSIIe Project Management Lessons Learned (PMLL)

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR -Department ofEM CommunicationsReportingReportsRepository |

  2. Idaho - Access Management: Standards and Procedures for Highway

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty, Texas:ITC Transmission Jump to:IcelandRight-of-Way

  3. Using Sleepers to Manage Batch Access to HPSS at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUserHadoop SCP/SFTP UsingSleepers

  4. TxDOT Access Management Manual | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga, IndianaTurtle Airships Jump to:TwiggsJemezwells.

  5. LOCH: Open Access Implementation Responsibility Matrix 

    E-Print Network [OSTI]

    Krzak, Anna

    2015-02-05T23:59:59.000Z

    Draft Responsibility Matrix for College of Medicine and Veterinary Medicine for REF Open Access requirements implementation.

  6. 2020 Vision The Trinity Access Programmes

    E-Print Network [OSTI]

    O'Mahony, Donal E.

    2020 Vision The Trinity Access Programmes Strategic Plan to 2020 #12;2020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 20202020 VISION - THE TRINITY ACCESS PROGRAMMES STRATEGIC PLAN TO 2020 Trinity Access Programmes "Our vision for 2014 is of a university providing further leadership

  7. Open Source in accessibility analyses Open Source in accessibility analyses

    E-Print Network [OSTI]

    Köbben, Barend

    petrol station accessibility in Germany by Stefan Neumeier Johann Heinrich von Thünen-Institut, Federal The paper relates two closely intertwined story lines. A socioeconomic one concentrating on street petrol- sibility of street petrol stations as one core service of general interest important for the overall

  8. SUBCONTRACT MANAGEMENT

    Energy Savers [EERE]

    0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT (Revised October 19, 2011) WHAT ARE THE BASIC PRINCIPLES AND OBJECTIVES OF SUBCONTRACT MANAGEMENT? 1. To ensure contractors establish,...

  9. California State University, Fullerton Human Resources Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    Resources Access Request Form ** CISO Signature Date Employee Name Date Date I certify that this access

  10. Environmental management activities

    SciTech Connect (OSTI)

    NONE

    1997-07-01T23:59:59.000Z

    The Office of Environmental Management (EM) has been delegated the responsibility for the Department of Energy`s (DOE`s) cleanup of the nuclear weapons complex. The nature and magnitude of the waste management and environmental remediation problem requires the identification of technologies and scientific expertise from domestic and foreign sources. Within the United States, operational DOE facilities, as well as the decontamination and decommissioning of inactive facilities, have produced significant amounts of radioactive, hazardous, and mixed wastes. In order to ensure worker safety and the protection of the public, DOE must: (1) assess, remediate, and monitor sites and facilities; (2) store, treat, and dispose of wastes from past and current operations; and (3) develop and implement innovative technologies for environmental restoration and waste management. The EM directive necessitates looking beyond domestic capabilities to technological solutions found outside US borders. Following the collapse of the Soviet regime, formerly restricted elite Soviet scientific expertise became available to the West. EM has established a cooperative technology development program with Russian scientific institutes that meets domestic cleanup objectives by: (1) identifying and accessing Russian EM-related technologies, thereby leveraging investments and providing cost-savings; (2) improving access to technical information, scientific expertise, and technologies applicable to EM needs; and (3) increasing US private sector opportunities in Russian in EM-related areas.

  11. Hospitality Management Hospitality Management

    E-Print Network [OSTI]

    McConnell, Terry

    of the Department of Hospitality Management and to the recorder in the College of Human Ecology. Required HPM 114 Food Safety and Quality Assurance 2 AND HPM 115 Food Science I 3 AND HPM 216 Restaurant and Food Service Operations 4 OR NSD 225 Nutrition in Health 3 12 credits needed: HPM 300 Selected Topics: Advanced

  12. open access journal Public Health

    E-Print Network [OSTI]

    Oakley, Jeremy

    open access journal Journal of Public Health in AfricaeISSN 2038-9930 i www the Journal of Public Health in Africa is a peer-reviewed, electronic quarterly, that focuses on health issues in the African continent. The journal editors seek high quality original articles on public health related issues

  13. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-03T23:59:59.000Z

    To establish requirements and responsibilities with respect to managing conferences sponsored by the Department of Energy (DOE) or by DOE management and operating contractors and other contractors who perform work at DOE-owned or -leased facilities, including management and integration contractors and environmental restoration management contractors (when using funds that will be reimbursed by DOE). Cancels DOE N 110.3.

  14. Demil planning and management system

    SciTech Connect (OSTI)

    Huber, C.C.; Bormet, S.M.; Whitfield, R.G.; Bowen, M.; Chun, K.C. [Argonne National Lab., IL (United States); Golden, R.E. [Army Pacific, Fort Shafter, HI (United States); Fuller, R. [Army Industrial Operations Command, Rock Island, IL (United States). National Maintenance Point Branch

    1997-08-01T23:59:59.000Z

    The National Maintenance Point (NMP) Branch of the US Army Industrial Operations Command (IOC) serves as the Single Manager for Conventional Ammunition (SMCA) agent for managing the renovation, modification, recycling, and disposal of conventional ammunition, thereby improving readiness. The mission of the NMP includes program management for demilitarization (demil) activities, ammunition maintenance, and ammunition peculiar equipment (APE) projects. Through an Interagency Agreement between the US Army and the US Department of Energy, Argonne National Laboratory (ANL) is developing an integrated data management system, called the Demil Planning and Management System (DPMS), for IOC. DPMS is intended to help NMP efficiently manage information on ongoing demil project activities and asset inventories, plan future projects, and allocate budgets. This system, when fully implemented, will also make it possible for the user community to interactively access the DPMS database; perform data entry and queries; and run reports through network, modem, and Internet access to the system. This paper describes the principal components of the DPMS, current capabilities, and planned enhancements.

  15. V-182: Symantec Endpoint Protection Manager Buffer Overflow Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    can be exploited to cause a buffer overflow via the web-based management console. IMPACT: Manipulation of data System Access SOLUTION: Vendor recommends updating to version 12.1...

  16. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWP TWP Related LinksATHENA couldAboutClean Water Innovations

  17. Accessibility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become agovEducationWelcome FinancialScience at

  18. GEOSCIENCE INFORMATION: MAKING THE EARTH SCIENCES ACCESSIBLE FOR EVERYONE - Proceedings of the 42nd Meeting of the Geoscience Information Society 

    E-Print Network [OSTI]

    GeoScience Information Society

    2007-01-01T23:59:59.000Z

    ................................................................................................................ 5 DIGITIZATION OF GEOLOGY THESES AND DISSERTATIONS Deborah McCarthy and Tamsen Hert ........................................................................................................ 9 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L... streamlined the process and improved access to this important collection. 13 MANAGING AN OIL SHALE LEGACY COLLECTION Heather L. Whitehead Arthur Lakes Library Colorado School of Mines Golden, CO 80401 hwhitehe@mines.edu Abstract...

  19. Site Access Policy | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Site Access Policy All visitors to Argonne require appropriate authorization before they are allowed on the Argonne site. For information regarding site access for a U.S. citizen...

  20. City of Boulder- Solar Access Ordinance

    Broader source: Energy.gov [DOE]

    The City of Boulder's solar access ordinance guarantees access, or "solar fences," to sunlight for homeowners and renters in the city. This is done by setting limits on the amount of permitted...

  1. Metropolitan Accessibility and Transportation Sustainability:Sustainability

    E-Print Network [OSTI]

    Papalambros, Panos

    Metropolitan Accessibility and Transportation Sustainability:Sustainability: Comparative Reduce (fulfillment of)Promote Sustainability: Meet needs of (fulfillment of) needs present Institute SMART Sustainable Mobility and Accessibility Research andSMART Sustainable Mobility

  2. Alexandria Digital Library Project Content Access Characterization

    E-Print Network [OSTI]

    Janée, Greg

    Alexandria Digital Library Project Content Access Characterization in Digital Libraries Greg Janée · James Frew · David Valentine University of California, Santa Barbara #12;Alexandria Digital Library environments e.g., GIS #12;Alexandria Digital Library Project Janée, Frew, Valentine · Content Access

  3. Argonne Site Access | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Site Access Argonne National Laboratory is a controlled-access facility. You will need a visitor's pass or a user badge to enter the Argonne campus. You must notify us of...

  4. Fast Access Data Acquisition System

    SciTech Connect (OSTI)

    Dr. Vladimir Katsman

    1998-03-17T23:59:59.000Z

    Our goal in this program is to develop Fast Access Data Acquisition System (FADAS) by combining the flexibility of Multilink's GaAs and InP electronics and electro-optics with an extremely high data rate for the efficient handling and transfer of collider experimental data. This novel solution is based on Multilink's and Los Alamos National Laboratory's (LANL) unique components and technologies for extremely fast data transfer, storage, and processing.

  5. Subject Access to Your Information 

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Subject Access to Your Information Sandy Tucker Texas A&M University Libraries August 1, 2006 Second International Symposium on Transportation Technology Transfer Introduction You have packages ? books, pamphlets, files, electronic documents. You... have records of packages ? cards or an online database. Other? We?re talking about adding subject information to the records of packages. Specifically, we?ll talk about using a ?controlled vocabulary.? Controlled Vocabulary Using a fixed list...

  6. Evaluation of the Tellabs 1150 GPON multiservice access platform.

    SciTech Connect (OSTI)

    Brenkosh, Joseph Peter; Wolf, Jimmie V.

    2014-11-01T23:59:59.000Z

    For over two years, Sandia National Laboratories has been using a Gigabit Passive Optical Network (GPON) access layer for selected networks. The GPON equipment includes the Tellabs 1150 Multiservice Access Platform (MSAP) Optical Line Terminal (OLT), the Tellabs ONT709 and ONT709GP Optical Network Terminals (ONTs), and the Panorama PON Network Manager. In late 2013, the Tellabs equipment was updated to Software Release FP27.1_015130. Because a new software release has the potential to affect performance and functionality, it needed to be thoroughly tested. This report documents that testing. It also provides a comparison between the current release and the previous Software Release FP25.5.1_013274 that was being used.

  7. Human Resources Security Access Matrix Function Training

    E-Print Network [OSTI]

    Wu, Shin-Tson

    June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

  8. Revised Spring 2008 NIH Public Access Policy

    E-Print Network [OSTI]

    Revised Spring 2008 NIH Public Access Policy Notice Number: NOT-OD-08-033 - (See Notice NOT-OD-08-161 (Consolidated Appropriations Act, 2008), the NIH voluntary Public Access Policy (NOT-OD-05-022) is now mandatory shall implement the public access policy in a manner consistent with copyright law. Specifics 1. The NIH

  9. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  10. Instructions for Accessing FedConnect Postings, June 30, 2009...

    Broader source: Energy.gov (indexed) [DOE]

    Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings, June 30, 2009 Instructions for Accessing FedConnect Postings and...

  11. Acronyms A AAAP Accelerated Access Authorization Program ACREM...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    S S Secret SRD SecretRestricted Data SAACS Security Alarm and Access Control System SAP Special Access Program SAPOC Special Access Program Oversight Committee SC Office...

  12. Administrative Access Policy Exception Process & Request Form Administrative Access Policy Exception Process

    E-Print Network [OSTI]

    Arnold, Jonathan

    Administrative Access Policy ­ Exception Process & Request Form (Page 1) Administrative Access Policy ­ Exception Process Administrative Access Policy Overview According to the Franklin College Administrative Access Policy , all IT devices with a UGA control number will be setup with user

  13. Project Management Plan Resident Management System (RMS)

    E-Print Network [OSTI]

    US Army Corps of Engineers

    1 Project Management Plan Resident Management System (RMS) And Quality Control System (QCS Resident Management System.........................................................................................................3 Project Management Plan - Purpose

  14. Accessing Creative Revenue Sources for Energy Efficiency Webinar |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platform is alwaysISO 50001 Energy ManagementPatriciaUCNI Access to UCNI

  15. Utility+Utility Access Map | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin BaxinUmwelt Management AGUser pageUtility+Utility Access Map Home

  16. Subject Access to Your Information

    E-Print Network [OSTI]

    Tucker, Sandra

    2006-08-01T23:59:59.000Z

    Lists Transportation Research Thesaurus Your own list Use a Short List or a Long List of Terms? If you have a small collection, a short list of terms is appropriate. If you have a large collection, a longer list of more specific terms..., such as the Transportation Research Thesaurus, may be helpful. Longer list will help describe your packages in more specific ways. Subject Access to Other Kinds of Information People ? Expertise Groups of People Projects Equipment, Facilities Use the same set of subject...

  17. Laboratory Access | Sample Preparation Laboratories

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home asLCLS ExperimentalFiveVentureFrontiers inAccess

  18. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical s o Freiberge s 3 c/) ReleaseRemote Access Ames Laboratory

  19. New data access with HTTP/WebDAV in the ATLAS experiment

    E-Print Network [OSTI]

    Elmsheuser, Johannes; The ATLAS collaboration; Serfon, Cedric; Garonne, Vincent; Blunier, Sylvain; Lavorini, Vincenzo; Nilsson, Paul

    2015-01-01T23:59:59.000Z

    With the exponential growth of LHC (Large Hadron Collider) data in the years 2010-2012, distributed computing has become the established way to analyse collider data. The ATLAS experiment Grid infrastructure includes more than 130 sites worldwide, ranging from large national computing centres to smaller university clusters. So far the storage technologies and access protocols to the clusters that host this tremendous amount of data vary from site to site. HTTP/WebDAV offers the possibility to use a unified industry standard to access the storage. We present the deployment and testing of HTTP/WebDAV for local and remote data access in the ATLAS experiment for the new data management system Rucio and the PanDA workload management system. Deployment and large scale tests have been performed using the Grid testing system HammerCloud and the ROOT HTTP plugin Davix.

  20. Open Access Policy as adopted by Council, March 2014 UNIVERSITY OF CAPE TOWN

    E-Print Network [OSTI]

    Jarrett, Thomas H.

    and training of students, and the advancement, preservation and dissemination of knowledge. UCT encourages at UCT · preserve, present and facilitate access to the institution's research and knowledge production and region by sharing research knowledge and practices; · manage the rising costs of library materials

  1. An Access Control Solution For The Inter-Organizational Use Of ITIL Federated

    E-Print Network [OSTI]

    An Access Control Solution For The Inter-Organizational Use Of ITIL Federated Configuration. Fulfilling these new requirements is supplemented by best practice frameworks, such as ITIL, which define for enterprises of any size. IT Service Management (ITSM) frameworks such as the IT Infrastructure Library (ITIL

  2. EA-1980: Spar Canyon-Round Valley Access Road System Improvements, Custer County, Idaho

    Broader source: Energy.gov [DOE]

    Bonneville Power Administration is preparing an EA to assess potential environmental impacts of proposed improvements to the access road system for its existing Spar Canyon-Round Valley Transmission Line located on Bureau of Land Management land in Custer County, Idaho.

  3. Inspection of selected intelligence and special access program work-for-others projects

    SciTech Connect (OSTI)

    Not Available

    1993-10-08T23:59:59.000Z

    At the request of the former Secretary, an inspection of six classified intelligence and special access program work-for-others projects was conducted. The purpose of this inspection was to evaluate managements, effectiveness regarding these work-for-others projects and included tests for financial integrity and adherence to applicable laws and regulations. Details of the inspection are provided in this report.

  4. Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD)

    E-Print Network [OSTI]

    Shoubridge, Eric

    http://kb.mcgill.ca/it/easylink/article.html?id=1018 Other identity management documents exist Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1 on "best effort" and transparency of practice. Each Participant documents, for other Participants

  5. Request for Access to the Student Admin System Please complete the form and email to Student Business Systems: sbs.help@anu.edu.au

    E-Print Network [OSTI]

    Botea, Adi

    of Information Technology: https://policies.anu.edu.au/ppl/document/ANUP_000704 - Account Management and Access: https://policies.anu.edu.au/ppl/document/ANUP_000709 - Privacy Policy: https://policies.anu.edu.au/ppl

  6. Managing Records for the Long Term - 12363

    SciTech Connect (OSTI)

    Montgomery, John V. [U.S. Department of Energy, Office of Legacy Management, Morgantown, West Virginia (United States); Gueretta, Jeanie [U.S. Department of Energy, Office of Legacy Management, Grand Junction, Colorado (United States)

    2012-07-01T23:59:59.000Z

    The U.S. Department of Energy (DOE) is responsible for managing vast amounts of information documenting historical and current operations. This information is critical to the operations of the DOE Office of Legacy Management. Managing legacy records and information is challenging in terms of accessibility and changing technology. The Office of Legacy Management is meeting these challenges by making records and information management an organizational priority. The Office of Legacy Management mission is to manage DOE post-closure responsibilities at former Cold War weapons sites to ensure the future protection of human health and the environment. These responsibilities include environmental stewardship and long-term preservation and management of operational and environmental cleanup records associated with each site. A primary organizational goal for the Office of Legacy Management is to 'Preserve, Protect, and Share Records and Information'. Managing records for long-term preservation is an important responsibility. Adequate and dedicated resources and management support are required to perform this responsibility successfully. Records tell the story of an organization and may be required to defend an organization in court, provide historical information, identify lessons learned, or provide valuable information for researchers. Loss of records or the inability to retrieve records because of poor records management processes can have serious consequences and even lead to an organisation's downfall. Organizations must invest time and resources to establish a good records management program because of its significance to the organization as a whole. The Office of Legacy Management will continue to research and apply innovative ways of doing business to ensure that the organization stays at the forefront of effective records and information management. DOE is committed to preserving records that document our nation's Cold War legacy, and the Office of Legacy Management will keep records management as a high priority. (authors)

  7. UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE

    E-Print Network [OSTI]

    Oliver, Douglas L.

    UNIVERSITY OF CONNECICUT HEALTH CENTER CORRECTIONAL MANAGED HEALTH CARE POLICY AND PROCEDURES Managed Health Care (CMHC) shall ensure that newly admitted inmates to Connecticut Department include, but is not limited to, emergency health care, sick call, access to medication, dental and mental

  8. Autonomic Privilege Management -extending PERMIS to contribute to the

    E-Print Network [OSTI]

    Kent, University of

    privilege management infrastructure (PMI), the new Integrated Project TrustCoM, and autonomic security. It then provides the business case for an autonomic PMI, and looks at the issues that will need to be resolved] is a standard's based Privilege Management Infrastructure (PMI), built according to the ISO 10181-3 Access

  9. CENTRAL EUROPE MANAGING AUTHORITY CITY OF VIENNA

    E-Print Network [OSTI]

    Genova, Università degli Studi di

    CENTRAL EUROPE MANAGING AUTHORITY CITY OF VIENNA Municipal Department for European affairs (MA 27 PROGRAMME Thematic study: Energy efficiency and renewable energies in the CENTRAL EUROPE Programme Request European regions more competitive, innovative, attractive and accessible. The Central Europe Programme area

  10. Replica Management and Optimisation for Data Grids

    E-Print Network [OSTI]

    Glasgow, University of

    - ments. A strategy to optimise data access based on an economic model for #12;le trading is introducedReplica Management and Optimisation for Data Grids David Gordon Cameron Department of Physics-handling requirements of the next generation of high energy physics experiments. This emerging paradigm enables

  11. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins

    2009-09-01T23:59:59.000Z

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  12. Supporting Dynamic Spectrum Access in Heterogeneous LTE+ Networks

    SciTech Connect (OSTI)

    Luiz A. DaSilva; Ryan E. Irwin; Mike Benonis

    2012-08-01T23:59:59.000Z

    As early as 2014, mobile network operators’ spectral capac- ity is expected to be overwhelmed by the demand brought on by new devices and applications. With Long Term Evo- lution Advanced (LTE+) networks likely as the future one world 4G standard, network operators may need to deploy a Dynamic Spectrum Access (DSA) overlay in Heterogeneous Networks (HetNets) to extend coverage, increase spectrum efficiency, and increase the capacity of these networks. In this paper, we propose three new management frameworks for DSA in an LTE+ HetNet: Spectrum Accountability Client, Cell Spectrum Management, and Domain Spectrum Man- agement. For these spectrum management frameworks, we define protocol interfaces and operational signaling scenar- ios to support cooperative sensing, spectrum lease manage- ment, and alarm scenarios for rule adjustment. We also quan- tify, through integer programs, the benefits of using DSA in an LTE+ HetNet, that can opportunistically reuse vacant TV and GSM spectrum. Using integer programs, we consider a topology using Geographic Information System data from the Blacksburg, VA metro area to assess the realistic benefits of DSA in an LTE+ HetNet.

  13. Accessing graphic information: Challenges of tomorrow

    SciTech Connect (OSTI)

    Frazer, G. Jr. [Power System Engineering, Inc., Madison, WI (United States). AM/FM Service Div.

    1995-12-31T23:59:59.000Z

    During the justification process of AM/FM projects, utilities seek to find as many benefits as possible using AM/FM technology. In many cases the ultimate benefit of simply providing users the ability to access the digital information is overlooked. This paper outlines why access may be overlooked, why providing access is important and what kind of tool is needed in the long term.

  14. SLAC All Access: Laser Labs

    SciTech Connect (OSTI)

    Minitti, Mike; Woods Mike

    2013-03-01T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  15. SLAC All Access: Laser Labs

    ScienceCinema (OSTI)

    Minitti, Mike; Woods Mike

    2014-06-03T23:59:59.000Z

    From supermarket checkouts to video game consoles, lasers are ubiquitous in our lives. Here at SLAC, high-power lasers are critical to the cutting-edge research conducted at the laboratory. But, despite what you might imagine, SLAC's research lasers bear little resemblance to the blasters and phasers of science fiction. In this edition of All Access we put on our safety goggles for a peek at what goes on inside some of SLAC's many laser labs. LCLS staff scientist Mike Minitti and SLAC laser safety officer Mike Woods detail how these lasers are used to study the behavior of subatomic particles, broaden our understanding of cosmic rays and even unlock the mysteries of photosynthesis.

  16. LEGACY MANAGEMENT REQUIRES INFORMATION

    SciTech Connect (OSTI)

    CONNELL, C.W.; HILDEBRAND, R.D.

    2006-12-14T23:59:59.000Z

    ''Legacy Management Requires Information'' describes the goal(s) of the US Department of Energy's Office of Legacy Management (LM) relative to maintaining critical records and the way those goals are being addressed at Hanford. The paper discusses the current practices for document control, as well as the use of modern databases for both storing and accessing the data to support cleanup decisions. In addition to the information goals of LM, the Hanford Federal Facility Agreement and Consent Order, known as the ''Tri-Party Agreement'' (TPA) is one of the main drivers in documentation and data management. The TPA, which specifies discrete milestones for cleaning up the Hanford Site, is a legally binding agreement among the US Department of Energy (DOE), the Washington State Department of Ecology (Ecology), and the US Environmental Protection Agency (EPA). The TPA requires that DOE provide the lead regulatory agency with the results of analytical laboratory and non-laboratory tests/readings to help guide them in making decisions. The Agreement also calls for each signatory to preserve--for at least ten years after the Agreement has ended--all of the records in its or its contractors, possession related to sampling, analysis, investigations, and monitoring conducted. The tools used at Hanford to meet TPA requirements are also the tools that can satisfy the needs of LM.

  17. Position Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    The order prescribes the policies, responsibilities, and procedures for position management within (DOE). Canceled by DOE N 1321.140. Cancels DOE 3510.1

  18. Management Analyst

    Broader source: Energy.gov [DOE]

    The Wind and Water Power Technologies Office (WWPTO) manages efforts to improve performance, lower costs, and accelerate deployment of wind and water power technologies, which can play a...

  19. Quality Management

    Broader source: Energy.gov [DOE]

    The Office of Quality Management, within the Office of Health, Safety and Security develops policies and procedures to ensure the classification and control of information is effective and...

  20. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply...

  1. The Ohio Capital Access Program (OCAP) (Ohio)

    Broader source: Energy.gov [DOE]

    The Ohio Capital Access Program (OCAP) encourages state depository financial institutions to make loans to for-profit or nonprofit small businesses that are having difficulty obtaining business...

  2. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Pacific Ocean Science & Technology Kuykendall Annex Information Technology Center Krauss Hall Holmes HallStairs Pond UH Parking Access & Mid-Pacific Institute Exit Dole Street Offices Multipurpose

  3. Access Control for SAR Systems Stephen Quirolgico

    E-Print Network [OSTI]

    Access Control for SAR Systems Stephen Quirolgico Vincent Hu Tom Karygiannis NIST IR 7815 #12;NIST Systems Stephen Quirolgico Vincent Hu Tom Karygiannis Computer Security Division Information Technology

  4. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    consultants, contractors, employees of contractors, licensees, certificate holders or grantees and their employees and other individuals who require access to classified...

  5. BPO crude oil analysis data base user`s guide: Methods, publications, computer access correlations, uses, availability

    SciTech Connect (OSTI)

    Sellers, C.; Fox, B.; Paulz, J.

    1996-03-01T23:59:59.000Z

    The Department of Energy (DOE) has one of the largest and most complete collections of information on crude oil composition that is available to the public. The computer program that manages this database of crude oil analyses has recently been rewritten to allow easier access to this information. This report describes how the new system can be accessed and how the information contained in the Crude Oil Analysis Data Bank can be obtained.

  6. Academic Libraries and Open Access: Policies, Services and Resources for Increasing Access to Scholarship

    E-Print Network [OSTI]

    Rosenblum, Brian

    2010-07-06T23:59:59.000Z

    This presentation will focus on emerging roles for academic libraries in supporting access to scholarship through open access policies and practices. The University of Kansas recently became the first public university in ...

  7. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program DRAFT Introduction to Enterprise Risk Management at UVM 1 #12;Enterprise Risk Management Program DRAFT What is Enterprise Risk Management? Enterprise risk management governance, and accountability · Facilitates effective management of the uncertainty and associated risks

  8. DISSERTATION ETH No. 12374 Spatial Raster Data Management

    E-Print Network [OSTI]

    Giger, Christine

    -Object and Inter-Object Access 53 3.7 File- versus DBMS-Based Raster Data Management 55 3.7.1 File-based Raster Data Management 55 3.7.2 DBMS-based Raster Data Management 55 3.7.3 Hybrid Solutions 57 3.8 Data Models and Raster Data Support 58 3.8.1 Relational Model and DBMS Technology 58 3.8.2 Object-Oriented Model and DBMS

  9. The NASA Program Management Tool: A New Vision in Business Intelligence

    E-Print Network [OSTI]

    Maluf, David A.

    life cycle costs; accessing convenient aggregated views; automatically creating Earned Value Management1 The NASA Program Management Tool: A New Vision in Business Intelligence David G. Bell dbell describes a novel approach to business intelligence and program management for large technology enterprises

  10. Web Accessibility Office of Diversity and Inclusion

    E-Print Network [OSTI]

    Jones, Michelle

    Web Accessibility Office of Diversity and Inclusion Applies to: Any website conducting university of the art digital and web based information delivery of information is increasingly central in carrying out constituencies. This policy establishes minimum standards for the accessibility of web based information

  11. AN ACCESS CONTROL SYSTEM FOR SVG DOCUMENTS

    E-Print Network [OSTI]

    Samarati, Pierangela

    - ever, XML-based graphics formats such as the Scalable Vector Graphics (SVG) standard are becoming by means of new XML-based standards such as the World Wide Web Consortium's Scalable Vector Graphics (SVG controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector

  12. Interactive Database Access with Statistics and Graphics

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    DbAccess The Manual Interactive Database Access with Statistics and Graphics Version 2.1.1 D. M and graphical needs of NSTX Physicists. Flexible views and joins are possible, including options for complex SQL General Atomics (GA Plot Objects) adds extensive graphical and interactive capabilities (and documentation

  13. Usability and Accessibility in Consumer Health Informatics

    E-Print Network [OSTI]

    Shneiderman, Ben

    Usability and Accessibility in Consumer Health Informatics Current Trends and Future Challenges, for innovative eHealth systems to have true value and impact, they must first and foremost be usable challenges in the usability and accessibility of consumer health informatics will be described. Consumer

  14. National Radiobiology Archives Distributed Access user's manual

    SciTech Connect (OSTI)

    Watson, C.; Smith, S. (Pacific Northwest Lab., Richland, WA (United States)); Prather, J. (Linfield Coll., McMinnville, OR (United States))

    1991-11-01T23:59:59.000Z

    This User's Manual describes installation and use of the National Radiobiology Archives (NRA) Distributed Access package. The package consists of a distributed subset of information representative of the NRA databases and database access software which provide an introduction to the scope and style of the NRA Information Systems.

  15. University Library Fact Sheet Sconul Access

    E-Print Network [OSTI]

    Brierley, Andrew

    University Library Fact Sheet Sconul Access Opening Hours Please consult the library website for our current opening hours: http://www.st-andrews.ac.uk/library/ Library Cards To borrow books and access the Library you must bring your card with you to the library on each visit. Please notify

  16. Database Hints for Readex's AccessUN

    E-Print Network [OSTI]

    Stowell, Michael

    Database Hints for Readex's AccessUN Direct Link to Database: http://infoweb.newsbank.com/?db=UNAD Database Scope Readex's AccessUN database provides an index to United Nations documents from the six main Council, Secretariat and International Court of Justice. This database covers documents from 1946

  17. Locally Accessible Information and Distillation of Entanglement

    E-Print Network [OSTI]

    Sibasish Ghosh; Pramod Joag; Guruprasad Kar; Samir Kunkri; Anirban Roy

    2004-03-18T23:59:59.000Z

    A new type of complementary relation is found between locally accessible information and final average entanglement for given ensemble. It is also shown that in some well known distillation protocol, this complementary relation is optimally satisfied. We discuss the interesting trade-off between locally accessible information and distillable entanglement for some states.

  18. Foreign National Access to DOE Cyber Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1999-11-01T23:59:59.000Z

    DOE N 205.16, dated 9-15-05, extends this Notice until 9-30-06, unless sooner rescinded. To ensure foreign national access to DOE cyber systems continues to advance DOE program objectives while enforcing information access restrictions.

  19. SVOPME: A scalable virtual organization privileges management environment

    SciTech Connect (OSTI)

    Garzoglio, Gabriele; /Fermilab; Wang, Nanbor; /Tech-X, Boulder; Sfiligoi, Igor; Levshina, Tanya; /Fermilab; Anathan, Balamurali; /Tech-X, Boulder

    2009-05-01T23:59:59.000Z

    Grids enable uniform access to resources by implementing standard interfaces to resource gateways. In the Open Science Grid (OSG), privileges are granted on the basis of the user's membership to a Virtual Organization (VO). However, Grid sites are solely responsible to determine and control access privileges to resources using users identity and personal attributes, which are available through Grid credentials. While this guarantees full control on access rights to the sites, it makes VO privileges heterogeneous throughout the Grid and hardly fits with the Grid paradigm of uniform access to resources. To address these challenges, we are developing the Scalable Virtual Organization Privileges Management Environment (SVOPME), which provides tools for VOs to define and publish desired privileges and assists sites to provide the appropriate access policies. Moreover, SVOPME provides tools for Grid sites to analyze site access policies for various resources, verify compliance with preferred VO policies, and generate directives for site administrators on how the local access policies can be amended to achieve such compliance without taking control of local configurations away from site administrators. This paper discusses what access policies are of interest to the OSG community and how SVOPME implements privilege management for OSG.

  20. Long-Term Surveillance and Maintenance Records: Maintaining Access to the Knowledge - 13122

    SciTech Connect (OSTI)

    Montgomery, John; Gueretta, Jeanie [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States)] [U.S. Department of Energy Office of Legacy Management, 99 Research Park Road Morgantown, WV 26505 (United States); McKinney, Ruth; Anglim, Cliff [Source One Management, Inc. (United States)] [Source One Management, Inc. (United States)

    2013-07-01T23:59:59.000Z

    The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is an integral part of DOE's strategy to ensure that legacy liabilities of former nuclear weapons production sites are properly managed following the completion of environmental cleanup activities. In the area of environmental legacy management, records management is crucial to the protection of health, environmental, and legal interests of the Department and the public. LM is responsible for maintaining long-term surveillance and maintenance (LTS and M) records in performance of its mission. Maintaining access to the knowledge contained in these record collections is one of LM's primary responsibilities. To fulfill this responsibility, LM established a consolidated records management facility, the LM Business Center (LMBC), to house physical media records and electronic records. A new electronic record keeping system (ERKS) was needed to replace an obsolete system while helping to ensure LM is able to meet ongoing responsibilities to maintain access to knowledge and control the life cycle management of records. (authors)

  1. Conference Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-01-25T23:59:59.000Z

    The Order establishes requirements and responsibilities for managing conferences sponsored or co-sponsored by the Department of Energy, including the National Nuclear Security Administration. Cancels DOE O 110.3. Canceled by DOE N 251.97.

  2. Project Manager

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a project manager in the Fuel Cell Technologies Office in the DOE-EERE Office of Transportation responsible for a wide variety of highly...

  3. Management Analyst

    Broader source: Energy.gov [DOE]

    The incumbent in this position will serve as a Management Analyst in the Strategy Execution group of the Corporate Strategy organization (SE). The Strategy Execution group develops and coordinates...

  4. Managing Solutions

    E-Print Network [OSTI]

    Baker, Emily

    2007-01-01T23:59:59.000Z

    , and Texas Water --------------------------------------------- Project Managers Cecilia Wagner, Kevin Wagner, Danielle Supercinski, Dr. Bill Fox and Lucas Gregory work to link university researchers and Extension specialists to appropriate funding agen... Irrigators Network. Kevin Wagner, who joined TWRI in 2005 from TSSWCB, has spent several years working with environmental issues. He is currently pursuing his doctorate evaluating best management practices for reducing bacterial runoff from cattle wastes...

  5. Managing Risk in a Dynamic World Economy

    E-Print Network [OSTI]

    Harris, Harold M.; Benson, Geoffrey A.; Rosson, C. Parr

    1999-06-23T23:59:59.000Z

    Agreement on Tariffs and Trade (GATT). This leaflet, along with the others in this series, provides and overview of the globalization of U.S. agriculture, with special emphasis on implications for risk management. To be successful in a rapidly changing... trade since many countries already have low duty access to the U.S. market, while U.S. access to foreign markets may be limited by high tariffs or quotas. The value of U.S. agricultural exports consis- tently exceeds the cost of imports. It has been...

  6. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  7. Hybrid Access Control Mechanism in Two-Tier Femtocell Networks

    E-Print Network [OSTI]

    Mantravadi, Sirisha 1987-

    2012-08-21T23:59:59.000Z

    remains a challenge. Decentralized strategies such as femtocell access control have been identified as an effective means to mitigate cross-tier interference in two-tier networks. Femtocells can be configured to be either open access or closed access...

  8. ETSU College of Medicine Onity Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine Onity Door Access Authorization Form Please grant access to: 6 access. ____ ALL AREAS (ETSU Service Personnel Only) Medical School Research & Training, VA Bldg. #119-Mail: johnsodl@etsu.edu #12;

  9. A Dyslexic Perspective on e-Content Accessibility

    E-Print Network [OSTI]

    Brajnik, Giorgio

    an insight into the issues of web accessibility for users with Dyslexia (and/or other specific learning and accessibility issues of electronic educational content. Keywords: dyslexia, SLD, web accessibility, usability...................................................................................................2 2. Explaining Dyslexia

  10. ad libitum access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: studi diTrieste 12;Access E' un programma di gestione di database (DBMS) Access offre: un supporto;Aprire Access Appare una finestra di dialogo Microsoft...

  11. Office of Energy Project Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's Possible for RenewableSpeeding accessSpeedingOctober 1996 -Energy Project Management 726D000000

  12. Business Management Analyst Business Manager Director of Communication Contracts Manager

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    · Business Management Analyst · Business Manager · Director of Communication · Contracts Manager of Sales · President/Owner · Instructor of Business · Senior Buyer · North American Sales Manager · Talent graduation. You will have the skills & knowledge to manage and grow a successful business. You will be able

  13. Conjunctive Query Containment under Access Limitations

    E-Print Network [OSTI]

    Martinenghi, Davide

    2 both represent city names, and similarly the attributes named Artist represent artist names.1 to access r2. In turn, new tuples from r2 may provide new constants representing city names, that can

  14. Metadata Value Chain for Open Access Journals

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly communication lifecycle...

  15. COMMENTARY Open Access Effectively incorporating selected multimedia

    E-Print Network [OSTI]

    Hammerton, James

    COMMENTARY Open Access Effectively incorporating selected multimedia content into medical Schöbel5 , Markus Sellerer6 , Andreas Ziegler1 Abstract Until fairly recently, medical publications have significantly profit from advances in electronic publishing that permit the inclusion of multimedia content

  16. Random access wireless networks with controlled mobility

    E-Print Network [OSTI]

    Modiano, Eytan H.

    This paper considers wireless networks where messages arriving randomly (in time and space) are collected by a mobile receiver. The messages are transmitted to the mobile receiver according to a random access scheme and ...

  17. Practical API Protocol Checking with Access Permissions

    E-Print Network [OSTI]

    for a large Java standard API with our approach. We also specify several other Java APIs and identify standard APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 4.2 ProtocolPractical API Protocol Checking with Access Permissions Kevin Bierhoff Nels E. Beckman Jonathan

  18. Accessing MDS with IDL February 1993

    E-Print Network [OSTI]

    California at San Diego, University of

    Accessing MDS with IDL Reference Manual February 1993 Software Version: MDS 5.2 VAX/VMS Version 4 Equipment Corporation: CDD DECnet VAX DATATRIEVE DECUS VAXcluster DEC MicroVAX VAX Information Architecture

  19. JOBAID-ACCESSING AND MODIFYING TALENT PROFILE

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of accessing their talent profiles, adding information to their profiles, and editing existing talent profile...

  20. Metadata Value Chain for Open Access Journals 

    E-Print Network [OSTI]

    Mercer, Holly; Dyas-Correia, Sharon

    2011-01-01T23:59:59.000Z

    In this session, Holly Mercer presented a case for finding global solutions to improve the metadata that is available for journals, particularly small, independent open access journals. She discussed the scholarly ...

  1. Decision Analysis of Dynamic Spectrum Access Rules

    SciTech Connect (OSTI)

    Juan D. Deaton; Luiz A. DaSilva; Christian Wernz

    2011-12-01T23:59:59.000Z

    A current trend in spectrum regulation is to incorporate spectrum sharing through the design of spectrum access rules that support Dynamic Spectrum Access (DSA). This paper develops a decision-theoretic framework for regulators to assess the impacts of different decision rules on both primary and secondary operators. We analyze access rules based on sensing and exclusion areas, which in practice can be enforced through geolocation databases. Our results show that receiver-only sensing provides insufficient protection for primary and co-existing secondary users and overall low social welfare. On the other hand, using sensing information between the transmitter and receiver of a communication link, provides dramatic increases in system performance. The performance of using these link end points is relatively close to that of using many cooperative sensing nodes associated to the same access point and large link exclusion areas. These results are useful to regulators and network developers in understanding in developing rules for future DSA regulation.

  2. North Carolina Capital Access Program (North Carolina)

    Broader source: Energy.gov [DOE]

    The North Carolina Capital Access Program provides matching reserve funds for business loans that are beyond the traditional lending means of a lender’s usual standards. The average CAP loan is ...

  3. Radioactive hot cell access hole decontamination machine

    DOE Patents [OSTI]

    Simpson, William E. (Richland, WA)

    1982-01-01T23:59:59.000Z

    Radioactive hot cell access hole decontamination machine. A mobile housing has an opening large enough to encircle the access hole and has a shielding door, with a door opening and closing mechanism, for uncovering and covering the opening. The housing contains a shaft which has an apparatus for rotating the shaft and a device for independently translating the shaft from the housing through the opening and access hole into the hot cell chamber. A properly sized cylindrical pig containing wire brushes and cloth or other disks, with an arrangement for releasably attaching it to the end of the shaft, circumferentially cleans the access hole wall of radioactive contamination and thereafter detaches from the shaft to fall into the hot cell chamber.

  4. Adjudicative Guidelines for Determining Eligibility for Access...

    Broader source: Energy.gov (indexed) [DOE]

    access to classified information take into account factors that could cause a conflict of interest and place a person in the position of having to choose between his or her...

  5. LOCH: Open Access Facilitator Job Description (DRAFT) 

    E-Print Network [OSTI]

    McMahon, Jacqueline

    2015-03-23T23:59:59.000Z

    DRAFT Job Description for an Open Access Facilitator job in the University of Edinburgh's College of Humanities and Social Sciences. This draft job description is being made available as part of the Jisc-funded LOCH Project....

  6. Rail Access to Yucca Mountain: Critical Issues

    SciTech Connect (OSTI)

    Halstead, R. J.; Dilger, F.; Moore, R. C.

    2003-02-25T23:59:59.000Z

    The proposed Yucca Mountain repository site currently lacks rail access. The nearest mainline railroad is almost 100 miles away. Absence of rail access could result in many thousands of truck shipments of spent nuclear fuel and high-level radioactive waste. Direct rail access to the repository could significantly reduce the number of truck shipments and total shipments. The U.S. Department of Energy (DOE) identified five potential rail access corridors, ranging in length from 98 miles to 323 miles, in the Final Environmental Impact Statement (FEIS) for Yucca Mountain. The FEIS also considers an alternative to rail spur construction, heavy-haul truck (HHT) delivery of rail casks from one of three potential intermodal transfer stations. The authors examine the feasibility and cost of the five rail corridors, and DOE's alternative proposal for HHT transport. The authors also address the potential for rail shipments through the Las Vegas metropolitan area.

  7. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  8. Equitable Access: Remote and Rural Communities 'Transport Needs...

    Open Energy Info (EERE)

    Equitable Access: Remote and Rural Communities 'Transport Needs' Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Equitable Access: Remote and Rural Communities...

  9. NBP RFI: Data Access Honeywell Responses To Request for Information...

    Broader source: Energy.gov (indexed) [DOE]

    on Implementing the National Broadband Plan by Empowering Consumers and the Smart Grid: Data Access, Third Party Use, and Privacy NBP RFI: Data Access Honeywell Responses To...

  10. Bursting at the Seams: Water Access and Housing in Luanda

    E-Print Network [OSTI]

    Bulfin, Michael Patrick

    2009-01-01T23:59:59.000Z

    constructed areas. The lack of water access and properand how the lack of access to clean water, coupled withmost slum residents lack knowledge about the basics of water

  11. access control scheme: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  12. access control mac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  13. access control transportation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  14. access system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    are becoming controlling access to graphic information on the Internet. Keywords: Access Control, SVG Documents, Vector graphic 1. INTRODUCTION Vector graphics is a time-honored...

  15. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System (Fact Sheet), U.S. Department of Energy (DOE) Increasing Community Access to...

  16. accessing integrated genomic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 RESEARCH ARTICLE Open Access Integrating cytogenetics and genomics in Environmental Sciences and Ecology Websites Summary: RESEARCH ARTICLE Open Access...

  17. access control policies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Resiliency Policies in Access Control , Mahesh Tripunitara Computer Technologies and Information Sciences Websites Summary: Resiliency Policies in Access...

  18. Challenges in Obtaining Property Access: The FUSRAP Maywood Site Experience - 13433

    SciTech Connect (OSTI)

    Kollar, William [Shaw Environmental, Inc., 100 West Hunter Avenue, Maywood, NJ 07607 (United States)] [Shaw Environmental, Inc., 100 West Hunter Avenue, Maywood, NJ 07607 (United States)

    2013-07-01T23:59:59.000Z

    The Formerly Utilized Sites Remedial Action Program (FUSRAP) is the US government program started in 1974 to identify, investigate and clean up or control sites that became contaminated as a result of the nation's early atomic programs. Many of these sites are not owned by the federal government and therefore require owner permission to enter. The experience in pursuing such access at the FUSRAP Maywood Superfund Site (the Maywood Site or the Site) in Bergen County, New Jersey, is extensive. Since the US Army Corps of Engineers (the Corps) assumed responsibility for the Maywood Site from the US Department of Energy in 1997, at least 186 separate property access agreements (known in FUSRAP as a Real Estate Right-of- Entry or ROE) have been executed between the Corps and approximately 55 different land owners and tenant occupants at the Maywood Site (agreement renewals with the same owners over time account for the difference). Maywood's experience during the Corps' tenure, reflected here in three case studies of representative property access efforts, offers some lessons and best practices that may apply to other remedial programs. While the Site Community Relations Manager (the author of this paper) managed the property access task, multi-disciplinary support from across the project was also critical to success in this endeavor. (authors)

  19. Lifecycle Management of Relational Records for External Auditing and Regulatory Compliance

    E-Print Network [OSTI]

    Tompa, Frank

    and implementing complex workflow based constraints, temporal access control constraints, and records retention authorities can demand access to a database system and conduct a thorough forensic analysis of corporate internal and external), who are responsible for verifying that corporate records management practices

  20. University Faculty Awareness and Attitudes towards Open Access Publishing and the Institutional Repository: A Case Study

    E-Print Network [OSTI]

    Yang, Zheng Ye; Li, Yu

    2015-05-06T23:59:59.000Z

    mentioned by faculty, such as OA publishing and repository services, copyright, data management, a seminar on how to most effectively make their research available to others, and a workshop on tools for data deposit for OA. Some faculty expressed...Journal of Librarianship and Scholarly Communication Volume 3 | Issue 1 eP1210 University Faculty Awareness and Attitudes towards Open Access Publishing and the Institutional Repository: A Case Study Zheng Y. Yang, Yu Li © 2015 by the author...

  1. Risk Management Policy Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Policy Category: Strategic Management 1. PURPOSE To support the University will be encouraged to speak openly and honestly. (iii) Managers will monitor risk and will disclose risks identified's risk appetite. 2.3. Risk management standards 2.3.1 The University's risk management framework

  2. Conference Topic: Integrated Water Resources and Coastal Areas Management National Water Information Systems: A Tool to Support Integrated Water Resources

    E-Print Network [OSTI]

    Barthelat, Francois

    of compartmentalized data, lack of central storage, and limited access to data for decision-making in water managementConference Topic: Integrated Water Resources and Coastal Areas Management National Water Information Systems: A Tool to Support Integrated Water Resources Management in the Caribbean Marie-Claire St

  3. Environmental Management System Plan

    E-Print Network [OSTI]

    Fox, Robert

    2009-01-01T23:59:59.000Z

    Management Program, R-3 • Environmental Management SystemEnvironmental policy 3. Environmental aspects 4. Legal andObjectives, targets, and Environmental Management Programs

  4. Data Management Policy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policy Data Management Policy The data management resource information and data release policies below are provided to help researchers understand the data...

  5. NERSC Data Management Policies

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Management Policies NERSC Data Management Policies Introduction NERSC provides its users with the means to store, manage, and share their research data products. In addition...

  6. Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook

    E-Print Network [OSTI]

    Balasundaram, Balabhaskar "Baski"

    ..............................................................................................................19 Bruce Hoagland, Oklahoma Biological Survey and the University of Oklahoma Forest Management Riparian Area. . . . . . . . . . . . . . . . . . . . Management Handbook E-952 Oklahoma Cooperative . . . . . . . . . . . . . Oklahoma Conservation Commission Management Handbook #12

  7. Office of Legacy Management FY 2009 Energy Management Data Report...

    Office of Environmental Management (EM)

    Office of Legacy Management FY 2009 Energy Management Data Report Office of Legacy Management FY 2009 Energy Management Data Report FY 2009 Energy Management Performance Summary...

  8. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  9. Security Survey of Internet Browsers Data Managers

    E-Print Network [OSTI]

    Boja, Catalin

    2011-01-01T23:59:59.000Z

    The paper analyses current versions of top three used Internet browsers and compare their security levels to a research done in 2006. The security is measured by analyzing how user data is stored. Data recorded during different browsing sessions and by different password management functions it is considered sensitive data. The paper describes how the browser protects the sensitive data and how an attacker or a forensic analyst can access it.

  10. Open Access Publishing in Particle Physics

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Particle Physics, often referred to as High Energy Physics (HEP), spearheaded the Open Access dissemination of scientific results with the mass mailing of preprints in the pre-Web era and with the launch of the arXiv preprint system at the dawn of the '90s. The HEP community is now ready for a further push to Open Access while retaining all the advantages of the peerreview system and, at the same time, bring the spiralling cost of journal subscriptions under control. I will present a plan for the conversion to Open Access of HEP peer-reviewed journals, through a consortium of HEP funding agencies, laboratories and libraries: SCOAP3 (Sponsoring Consortium for Open Access Publishing in Particle Physics). SCOAP3 will engage with scientific publishers towards building a sustainable model for Open Access publishing, which is as transparent as possible for HEP authors. The current system in which journals income comes from subscription fees is replaced with a scheme where SCOAP3 compensates publishers for the costs...

  11. Access Control Taxonomy for Social Networks Adnan Ahmad, Brian Whitworth

    E-Print Network [OSTI]

    Whitworth, Brian

    of access control models for social networks based on lattice taxonomy where axes represent the properties users should be allowed to perform certain action. There are few access control models for social-Anwar- Zhao [6], Distributed access control [7] and Tie-RBAC [8]. The lattice classifies access control models

  12. California State University, Fullerton Finance System Access Request Form

    E-Print Network [OSTI]

    de Lijser, Peter

    #12;California State University, Fullerton Finance System Access Request Form CISO Signature Employee

  13. ETSU College of Medicine CBORD Door Access Authorization Form

    E-Print Network [OSTI]

    Karsai, Istvan

    ETSU College of Medicine CBORD Door Access Authorization Form 6/13/2011 Please grant access to: This access will remain in effect until the individual is no longer an active ETSU faculty list areas this individual will need access to: ____ ALL AREAS - ETSU Service Personnel Only ­ (i

  14. Security and Access Policy Security of and access to campus facilities, including campus residences

    E-Print Network [OSTI]

    Escher, Christine

    Security and Access Policy Security of and access to campus facilities, including campus residences facilities. Residence halls are secured 24 hours a day. Over extended breaks, the doors of all residence halls will be secured around the clock. Some facilities may have individual hours, which may vary

  15. Improving Data Access Efficiency by Using a Tagless Access Buffer (TAB)

    E-Print Network [OSTI]

    Whalley, David

    of the processor's energy expenditure. We describe the implemen- tation and use of a tagless access buffer (TAB University of Technology [perla/mckee/pers]@chalmers.se Abstract The need for energy efficiency continues) that greatly improves data access energy efficiency while slightly im- proving performance. The compiler

  16. The UCSB Access ID Card Application for Department Use Door Access will be needed

    E-Print Network [OSTI]

    Bigelow, Stephen

    of the University and must be returned to the department access controller (DAC) upon demand or when affiliation signature below asserts your identification information is correct and acknowledges your responsibility this or their own department's form/system to document approvals and record authorized access levels. Retention: One

  17. Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia

    E-Print Network [OSTI]

    Scheel, David

    Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

  18. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    Review your system access with your company's Information Security Officer. Access and downloading of information from laptop computers. Beware that your conversations may not be private or secure to be someone you trust in order to obtain personal or sensitive information. Additional travel security tips

  19. MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT

    E-Print Network [OSTI]

    of solid and liquid wastes generated at mushroom producing facilities. Environmental guidelines#12;MUSHROOM WASTE MANAGEMENT PROJECT LIQUID WASTE MANAGEMENT PHASE I: AUDIT OF CURRENT PRACTICE The Mushroom Waste Management Project (MWMP) was initiated by Environment Canada, the BC Ministry

  20. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL Record of Property Transferred from ______ ___________________________________ 2. DEAN (If Applies) ______ ___________________________________ 5. UNIVERSITY DIRECTOR OF MATERIALS MANAGEMENT ______ ___________________________________ 3. HOSPITAL DIRECTOR (If Applies) ______ IF YOU NEED

  1. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  2. High-Performance Secure Database Access Technologies for HEP Grids

    SciTech Connect (OSTI)

    Matthew Vranicar; John Weicher

    2006-04-17T23:59:59.000Z

    The Large Hadron Collider (LHC) at the CERN Laboratory will become the largest scientific instrument in the world when it starts operations in 2007. Large Scale Analysis Computer Systems (computational grids) are required to extract rare signals of new physics from petabytes of LHC detector data. In addition to file-based event data, LHC data processing applications require access to large amounts of data in relational databases: detector conditions, calibrations, etc. U.S. high energy physicists demand efficient performance of grid computing applications in LHC physics research where world-wide remote participation is vital to their success. To empower physicists with data-intensive analysis capabilities a whole hyperinfrastructure of distributed databases cross-cuts a multi-tier hierarchy of computational grids. The crosscutting allows separation of concerns across both the global environment of a federation of computational grids and the local environment of a physicist’s computer used for analysis. Very few efforts are on-going in the area of database and grid integration research. Most of these are outside of the U.S. and rely on traditional approaches to secure database access via an extraneous security layer separate from the database system core, preventing efficient data transfers. Our findings are shared by the Database Access and Integration Services Working Group of the Global Grid Forum, who states that "Research and development activities relating to the Grid have generally focused on applications where data is stored in files. However, in many scientific and commercial domains, database management systems have a central role in data storage, access, organization, authorization, etc, for numerous applications.” There is a clear opportunity for a technological breakthrough, requiring innovative steps to provide high-performance secure database access technologies for grid computing. We believe that an innovative database architecture where the secure authorization is pushed into the database engine will eliminate inefficient data transfer bottlenecks. Furthermore, traditionally separated database and security layers provide an extra vulnerability, leaving a weak clear-text password authorization as the only protection on the database core systems. Due to the legacy limitations of the systems’ security models, the allowed passwords often can not even comply with the DOE password guideline requirements. We see an opportunity for the tight integration of the secure authorization layer with the database server engine resulting in both improved performance and improved security. Phase I has focused on the development of a proof-of-concept prototype using Argonne National Laboratory’s (ANL) Argonne Tandem-Linac Accelerator System (ATLAS) project as a test scenario. By developing a grid-security enabled version of the ATLAS project’s current relation database solution, MySQL, PIOCON Technologies aims to offer a more efficient solution to secure database access.

  3. Best Management Practice #1: Water Management Planning

    Broader source: Energy.gov [DOE]

    A successful water management program starts with developing a comprehensive water management plan. This plan should be included within existing facility operating plans.

  4. Environmental Management Waste Management Facility (EMWMF) at...

    Office of Environmental Management (EM)

    Technical Review Report: Oak Ridge Reservation Review of the Environmental Management Waste Management Facility (EMWMF) at Oak Ridge By Craig H. Benson, PhD, PE; William H....

  5. Stormwater Management 

    E-Print Network [OSTI]

    Jaber, Fouad

    2008-10-23T23:59:59.000Z

    . Stormwater also may wash bacteria and other pathogens into swimming areas, creating health hazards that often close beaches. Stormwater may carry debris, such as plastic bags, six-pack rings, and cigarette butts, into water bodies; such debris can choke... the development and implementation of best management practices (BMPs) and achievement of measurable goals at levels sufficient to satisfy each of six minimum control measures and an optional seventh control measure: 1. Public education and outreach...

  6. Access Venture Partners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki HomeASN Power ProjectsAbrahamAccess FundAccess

  7. Environmental Management

    ScienceCinema (OSTI)

    None

    2015-01-07T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  8. Environmental Management

    SciTech Connect (OSTI)

    None

    2014-11-12T23:59:59.000Z

    Another key aspect of the NNSS mission is Environmental Management program, which addresses the environmental legacy from historic nuclear weapons related activities while also ensuring the health and safety of present day workers, the public, and the environment as current and future missions are completed. The Area 5 Radioactive Waste Management site receives low-level and mixed low-level waste from some 28 different generators from across the DOE complex in support of the legacy clean-up DOE Environmental Management project. Without this capability, the DOE would not be able to complete the clean up and proper disposition of these wastes. The program includes environmental protection, compliance, and monitoring of the air, water, plants, animals, and cultural resources at the NNSS. Investigation and implementation of appropriate corrective actions to address the contaminated ground water facilities and soils resulting from historic nuclear testing activities, the demolition of abandoned nuclear facilities, as well as installation of ground water wells to identify and monitor the extent of ground water contamination.

  9. Guide to the Management of Scientific and Technical Information

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-11-23T23:59:59.000Z

    This Guide to the management of scientific and technical information (STI) provides nonmandatory guidelines for implementing the objective, requirements, and responsibilities of Department of Energy (DOE) O 241.1A, Scientific and Technical Information Management. Cancels DOE G 241.1-1. Canceled by DOE N 251.83. Best practices, instructions, and additional information are now accessible at www.osti.gov/stip.

  10. Grid Data Access on Widely Distributed Worker Nodes Using Scalla and SRM

    SciTech Connect (OSTI)

    Jakl, Pavel; /Prague, Inst. Phys.; Lauret, Jerome; /Brookhaven; Hanushevsky, Andrew; /SLAC; Shoshani, Arie; /LBL, Berkeley; Sim, Alex; /LBL, Berkeley; Gu, Junmin; /LBL, Berkeley

    2011-11-10T23:59:59.000Z

    Facing the reality of storage economics, NP experiments such as RHIC/STAR have been engaged in a shift of the analysis model, and now heavily rely on using cheap disks attached to processing nodes, as such a model is extremely beneficial over expensive centralized storage. Additionally, exploiting storage aggregates with enhanced distributed computing capabilities such as dynamic space allocation (lifetime of spaces), file management on shared storages (lifetime of files, pinning file), storage policies or a uniform access to heterogeneous storage solutions is not an easy task. The Xrootd/Scalla system allows for storage aggregation. We will present an overview of the largest deployment of Scalla (Structured Cluster Architecture for Low Latency Access) in the world spanning over 1000 CPUs co-sharing the 350 TB Storage Elements and the experience on how to make such a model work in the RHIC/STAR standard analysis framework. We will explain the key features and approach on how to make access to mass storage (HPSS) possible in such a large deployment context. Furthermore, we will give an overview of a fully 'gridified' solution using the plug-and-play features of Scalla architecture, replacing standard storage access with grid middleware SRM (Storage Resource Manager) components designed for space management and will compare the solution with the standard Scalla approach in use in STAR for the past 2 years. Integration details, future plans and status of development will be explained in the area of best transfer strategy between multiple-choice data pools and best placement with respect of load balancing and interoperability with other SRM aware tools or implementations.

  11. REVIEW Open Access Pulmonary arterial hypertension

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    REVIEW Open Access Pulmonary arterial hypertension David Montani1,2,3 , Sven Günther1,2,3 , Peter,2,3 and Olivier Sitbon1,2,3* Abstract Pulmonary arterial hypertension (PAH) is a chronic and progressive disease and designated as clinical group 1'. Group 2 'Pulmonary hypertension due to left heart diseases' is divided

  12. Revised 26 January2011 LCLS Access Policy

    E-Print Network [OSTI]

    Wechsler, Risa H.

    1 Revised 26 January2011 LCLS Access Policy Introduction and Goals As a national user facility, LCLS aims to attract diverse users and to enable a broad set of impor- tant science that takes advantage of its unique capabilities. With these aims in mind, LCLS has been designed to include six

  13. TRANSMISSION OPEN ACCESS IN CHILE Hugh Rudnick

    E-Print Network [OSTI]

    Catholic University of Chile (Universidad Católica de Chile)

    considered or are considering deregulating their electric power sectors to allow for competition among implemented in Chilean electric power systems, the incorporation of an open access scheme, the application conditions in interconnected power systems. One line of thinking has viewed the third party use

  14. Special Access Program Policies, Responsibilities, and Procedures

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-07-11T23:59:59.000Z

    Special Access Program Policies, Responsibilities, and Procedures This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Director, Office of Security, at 202-586-6775. Cancels: DOE M 471.2-3

  15. Special Access Program Policies, Responsibilities, and Procedure

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-10-29T23:59:59.000Z

    This Manual is for OFFICIAL USE ONLY and will not be distributed on the Directives Portal. For distribution, please contact the Executive Secretary of the Special Access Program Oversight Committee at 202-586-6775. Cancels DOE M 471.2-3A. Canceled by DOE O 471.5.

  16. Example School Communications Email about Open Access 

    E-Print Network [OSTI]

    Tate, Dominic

    2015-03-23T23:59:59.000Z

    This is an example text for an email to be sent to the School of Mathematics as part of preparations for implementing Open Access requirements for the post-2014 REF. This is made available here as part of the Jisc-funded LOCH Project....

  17. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall AnnexStairs Pond UH Parking Access & Mid-Pacific Institute Exit M¯anoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

  18. UH Parking Access & Mid-Pacific Institute

    E-Print Network [OSTI]

    Hall Keller Hall Physical Science Building Pacific Ocean Science & Technology Kuykendall Annex44 44 Stairs Pond UH Parking Access & Mid-Pacific Institute Exit M¯anoa Innovation Center and Kau Auxiliary Services Pacific Biomedical Warehouse Agricultural Science Shops Campus Security n Landscaping

  19. RESEARCH Open Access Reconciling taxonomy and phylogenetic

    E-Print Network [OSTI]

    Matsen, Frederick A. "Erick"

    RESEARCH Open Access Reconciling taxonomy and phylogenetic inference: formalism and algorithms: Although taxonomy is often used informally to evaluate the results of phylogenetic inference and the root that solves a "subcoloring" problem to express the difference between a taxonomy and a phylogeny at a given

  20. Top Tips for Accessing Oxford's Information Resources

    E-Print Network [OSTI]

    Oxford, University of

    Top Tips for Accessing Oxford's Information Resources And How Brasenose College Library Fits In #12, electronic journals and books Top Tip 1: Attend the induction session in your departmental library #12;Oxford ­ departmental, faculty, college Top Tip 2: Explore smaller libraries ­ www

  1. Top Tips for Accessing Oxford's Information Resources

    E-Print Network [OSTI]

    Oxford, University of

    Top Tips for Accessing Oxford's Information Resources And How Brasenose College Library Fits In #12, electronic journals and books Top Tip 1: Attend the Bodleian induction sessions for your subject #12;Oxford ­ departmental, faculty, college Top Tip 2: Explore smaller libraries ­ www

  2. Characterizing Open Access Publishing at Your Institution

    E-Print Network [OSTI]

    Hubbard, David E.; Li, Yu

    2014-11-03T23:59:59.000Z

    access scholarly communication in Tanzanian public universities. 76th IFLA General Conference and Assembly, Gothenburg, Sweden. Retrieved March 3, 2014, from http://conference.ifla.org/past-wlic/2010/138-dulle-en.pdf. Gul, S., Shah, T. A., & Bhagwan, T. A...

  3. RESEARCH Open Access The Being of Leadership

    E-Print Network [OSTI]

    Myers, Lawrence C.

    RESEARCH Open Access The Being of Leadership Wiley W Souba Abstract The ethical foundation that a realigned leadership framework - one that distinguishes being a leader as the ontological basis for what pillars of leadership - awareness, commitment, integrity, and authenticity - are proposed as fundamental

  4. OFC'13 Summary ---Access Networks-I

    E-Print Network [OSTI]

    California at Davis, University of

    They Be A Blueprint for Optical Networks? Ali Khayrallah Ericsson Research USA Spectrum crunch, Feedback from receiver's residential network model to a converged access/aggregation platform based on SDN. Network convergence to reduce number of devices such as PON for residential, business as well as mobile backhauling ­ Long reach

  5. Bonus points The National Access Scheme

    E-Print Network [OSTI]

    Chen, Ying

    Bonus points The National Access Scheme ANU offers bonus points for nationally strategic senior secondary subjects, and in recognition of difficult circumstances that students face in their studies. Bonus) will be awarded. Bonus points to do not apply to programs with an ATAR cut-off of 98 or higher. Bonus Points

  6. REVIEW Open Access Micro computed tomography for

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    REVIEW Open Access Micro computed tomography for vascular exploration Lyubomir Zagorchev1 studies. Micro Computed Tomography (micro-CT) has emerged in recent years as the preferred modality and suggestions aimed at making micro-CT more accurate, replicable, and robust. Introduction Micro Computed

  7. Access to Solar: Designing and Developing a

    E-Print Network [OSTI]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System Updated guide highlights project models, policies, and financing Community shared solar programs enable members of a neighborhood or community to pool resources and share the benefits of a single solar

  8. Accessibility Application Blue Badge Car Park UK

    E-Print Network [OSTI]

    Painter, Kevin

    i Accessibility Application Blue Badge Car Park UK Konstantinos Grassos H00113751 August 2012. In this project, Blue Badge Car Park (BBCP) is presented which is actually a mobile-based park finder application. It specifically focuses on finding parking spaces for wheelchair users, which are indicated by the blue badge

  9. Risk Management, Mar 2012 Risk Management

    E-Print Network [OSTI]

    Risk Management, Mar 2012 Risk Management Conditions of Volunteer Service (Please send completed form to the Office of Risk Management) riskmanagement@uoregon.edu Fax: 541-346-7008 As a volunteer Tort Claims Act, ORS 30.260-300, and Oregon Department of Administrative Services Risk Management

  10. Risk Management Procedures Category: Strategic Management

    E-Print Network [OSTI]

    1 Risk Management Procedures Category: Strategic Management 1. LEGISLATION/ENTERPRISE AGREEMENT/POLICY SUPPORTED Risk Management Policy Tertiary Education Quality Standards Agency Act 2011 (TEQSA Act 2011) 2 (a) Advise the Vice-Chancellor on the effective management of the University's risk profile

  11. Landscape Management Systems The Visual Management System

    E-Print Network [OSTI]

    Standiford, Richard B.

    Landscape Management Systems The Visual Management System of the Forest Service, USDA1 Warren R presentation on how the Visual Management System (VMS) functions. 1/ Presented at the National Conference Manual 2380, Landscape Management, USDA. INTRODUCTION The American people are concerned about the quality

  12. Management 301 Management and Organizational Behavior

    E-Print Network [OSTI]

    Young, Paul Thomas

    Management 301 Management and Organizational Behavior Section 003 Fall 2013 (8/20-12/3) College approaches management as that process of reaching organizational goals by working with and through people. Course Objectives 1. To understand management and organizational behavior (ob) concepts associated

  13. Proceedings of the sixth Berkeley workshop on distributed data management and computer networks

    SciTech Connect (OSTI)

    Various Authors

    1982-01-01T23:59:59.000Z

    A distributed data base management system allows data to be stored at multiple locations and to be accessed as a single unified data base. In this workshop, seventeen papers were presented which have been prepared separately for the energy data base. These items deal with data transfer, protocols and management. (GHT)

  14. Management of a Smart Grid with Controlled-Delivery of Discrete Power Levels

    E-Print Network [OSTI]

    Rojas-Cessa, Roberto

    Management of a Smart Grid with Controlled-Delivery of Discrete Power Levels Roberto Rojas an architecture of the controlled-delivery power grid and analyze a management scheme for the distribution properties for the distribution of electrical power: perpetually energized and with discretionary access

  15. OFFICE OF THE VICE-PRESIDENT, LEGAL AFFAIRS Archives and Records Management Department

    E-Print Network [OSTI]

    OFFICE OF THE VICE-PRESIDENT, LEGAL AFFAIRS Archives and Records Management Department Administrative Record A document that has been preserved because it facilitates the operations and management 1 Glossary of Archival Terms Access The use of records, papers and collections

  16. G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library

    E-Print Network [OSTI]

    Sussex, University of

    G:\\library-management\\Policies\\Coll_Man_PolicySept08.doc 1 University of Sussex Library Collection Management Policy 1. Introduction The University of Sussex Library contains 800,000 books, to which about 15,000 new items are added each year. The Library also provides access to over 20,000 print and online

  17. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service FirstData

  18. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID Service

  19. Data Management

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract Management Fermi SitePARTOfficeOctoberDaniel WoodID ServiceData

  20. SUBCONTRACT MANAGEMENT

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE0-1 CHAPTER 10 SUBCONTRACT MANAGEMENT

  1. Management Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your Home and It'll LoveMail andAbout UsManagement

  2. Ubiquitous Media Agents for Managing Personal Multimedia Files

    E-Print Network [OSTI]

    Liu, Wenyin

    1 Ubiquitous Media Agents for Managing Personal Multimedia Files Liu Wenyin, Zheng Chen, Fan Lin personalized semantic indices of multimedia data on behalf of the user whenever and wherever he/she accesses/uses these multimedia data. The sources of these semantic descriptions are the textual context of the same documents

  3. Research Summary The Impact of Legislation on Collaborative Management

    E-Print Network [OSTI]

    the structure and historical development of legislation affecting deer management. o Establish how & safety, animal welfare, natural heritage and biodiversity, and land access. Associated rules and #12 impacts ­ e.g. the requirement to cull deer to protect natural heritage in Scotland. Establishment

  4. Secure Streaming Media and Digital Rights Management Deepali Holankar

    E-Print Network [OSTI]

    Stamp, Mark

    Secure Streaming Media and Digital Rights Management Deepali Holankar Department of Computer of our secure streaming media system and we give some performance results. 1 #12;2 Digital rights. Company A only wants to allow paying customers to have access to the media stream. Digital rights

  5. Sustainable Campus Transportation through Transit Partnership and Transportation Demand Management: A Case Study from the University of Florida

    E-Print Network [OSTI]

    Bond, Alex; Steiner, Ruth

    2006-01-01T23:59:59.000Z

    A. 2005. The impacts of transportation demand management andUnlimited access. Transportation 28 (3): 233–267. Cervero,transit. Journal of Public Transportation 3 (4):10–19. ???.

  6. Composition of Management System for Smart Homes

    E-Print Network [OSTI]

    Levin, Mark Sh; Klapproth, Alexander

    2011-01-01T23:59:59.000Z

    The paper addresses modular hierarchical design (composition) of a management system for smart homes. The management system consists of security subsystem (access control, alarm control), comfort subsystem (temperature, etc.), intelligence subsystem (multimedia, houseware). The design solving process is based on Hierarchical Morphological Multicriteria Design (HMMD) approach: (1) design of a tree-like system model, (2) generation of design alternatives for leaf nodes of the system model, (3) Bottom-Up process: (i) multicriteria selection of design alternatives for system parts/components and (ii) composing the selected alternatives into a resultant combination (while taking into account ordinal quality of the alternatives above and their compatibility). A realistic numerical example illustrates the design process of a management system for smart homes.

  7. Optimal Energy Savings in Cellular Access Networks

    E-Print Network [OSTI]

    , for a holistic approach to energy efficient networking. In this paper we tackle the issue of energy-aware manage customer premises networking equipment. This situation, coupled with increasing energy costs, has generated

  8. Distributed Random Access Algorithm: Scheduling and Congesion Control

    E-Print Network [OSTI]

    Jiang, Libin

    This paper provides proofs of the rate stability, Harris recurrence, and ?-optimality of carrier sense multiple access (CSMA) algorithms where the random access (or backoff) parameter of each node is adjusted dynamically. ...

  9. Auctions to gas transmission access : the British experience

    E-Print Network [OSTI]

    McDaniel, Tanga

    2002-01-01T23:59:59.000Z

    When access to monopoly owned networks is constrained auctioning access rights can increase the efficiency of allocations relative to negotiation and grandfathering when there is sufficient competition among network users. ...

  10. Sensing-based Opportunistic Channel Access Department of Computer Science

    E-Print Network [OSTI]

    Liu, Xin

    and adapt to appropriate frequency, power, and transmission schemes. They can opportunistically access initiatives and advanced radio technology, more flexible opportunistic spectrum access has great potential initiatives towards flexible and dynamic spectrum policies, including regulation recommendations [7

  11. agreement databases access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  12. amigo online access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  13. accession medical standards: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    list at http:isguides.hw.ac.ukdatabases Mathematics Websites Summary: .g.: Enter search terms here and click Go' 12;You can access anything that says: You cannot access...

  14. Evaluation of Jumboframes Feasibility in LTE Access Networks

    E-Print Network [OSTI]

    Gesbert, David

    Evolution (LTE) represents the cutting- edge broadband wireless access technology in providing ubiqui- tous, such as video. A typical assessment factor of the performance of an access network is its throughput capability

  15. RESEARCH Open Access Impact of physical incompatibility on drug mass

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RESEARCH Open Access Impact of physical incompatibility on drug mass flow rates: example drugs simultaneously but through limited venous accesses. Several intravenous therapies have rates of drugs infused simultaneously to the patient, through an in vitro study. Methods: Furosemide

  16. Dynamic Optimal Random Access for Vehicle-to-Roadside Communications

    E-Print Network [OSTI]

    Huang, Jianwei

    significant momentum in recent years, especially after the Federal Communications Commission (FCCDynamic Optimal Random Access for Vehicle-to-Roadside Communications Man Hon Cheung, Fen Hou access, efficient resource allocation schemes are required to fully utilize the limited communication

  17. LOCH/ARMA Open Access Good Practice - University of Edinburgh 

    E-Print Network [OSTI]

    Tate, Dominic

    2015-03-19T23:59:59.000Z

    Presentation delivered by Dominic Tate at ARMA Open Access Good Practice event (London 19-03-2015). These slides detail the University of Edinbugh's approach to implementing Open Access requirements for the post-2014 REF....

  18. LOCH/ARMA Open Access Good Practice - St Andrews University 

    E-Print Network [OSTI]

    Aucock, Janet

    2015-03-19T23:59:59.000Z

    Presentation delivered by Janet Aucock at ARMA Open Access Good Practice event (London 19-03-2015). These slides detail St Andrews University's approach to implementing Open Access requirements for the post-2014 REF....

  19. access site bleeding: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    project Granger Morgan 5 TouchNet's Terms and Conditions By accessing and using this web site, you agree that your access to and use of this site is subject to the...

  20. The Human Right to Access Electricity

    SciTech Connect (OSTI)

    Tully, Stephen

    2006-04-15T23:59:59.000Z

    Electricity access is already well established within the framework of human rights, either as an implicit attribute of a pre-existing right (such as non-discrimination or sustainable development) or explicitly in the context of eliminating discrimination against women. There is also broad acknowledgement by states of the desirability of eliminating energy poverty - for all, but particularly for the rural poor, and women. (author)

  1. User Effort and Network Structure Mediate Access to Information in Networks

    E-Print Network [OSTI]

    Kang, Jeon-Hyung

    2015-01-01T23:59:59.000Z

    Individuals' access to information in a social network depends on its distributed and where in the network individuals position themselves. However, individuals have limited capacity to manage their social connections and process information. In this work, we study how this limited capacity and network structure interact to affect the diversity of information social media users receive. Previous studies of the role of networks in information access were limited in their ability to measure the diversity of information. We address this problem by learning the topics of interest to social media users by observing messages they share online with their followers. We present a probabilistic model that incorporates human cognitive constraints in a generative model of information sharing. We then use the topics learned by the model to measure the diversity of information users receive from their social media contacts. We confirm that users in structurally diverse network positions, which bridge otherwise disconnected...

  2. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY), Vranas; Pavlos M. (Bedford Hills, NY)

    2010-10-19T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Bach processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  3. Low latency memory access and synchronization

    DOE Patents [OSTI]

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton On Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Ohmacht, Martin (Brewster, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2007-02-06T23:59:59.000Z

    A low latency memory system access is provided in association with a weakly-ordered multiprocessor system. Each processor in the multiprocessor shares resources, and each shared resource has an associated lock within a locking device that provides support for synchronization between the multiple processors in the multiprocessor and the orderly sharing of the resources. A processor only has permission to access a resource when it owns the lock associated with that resource, and an attempt by a processor to own a lock requires only a single load operation, rather than a traditional atomic load followed by store, such that the processor only performs a read operation and the hardware locking device performs a subsequent write operation rather than the processor. A simple prefetching for non-contiguous data structures is also disclosed. A memory line is redefined so that in addition to the normal physical memory data, every line includes a pointer that is large enough to point to any other line in the memory, wherein the pointers to determine which memory line to prefetch rather than some other predictive algorithm. This enables hardware to effectively prefetch memory access patterns that are non-contiguous, but repetitive.

  4. Industrial engineering study of tank farm access qualifications and validations

    SciTech Connect (OSTI)

    Sterling, S.G., Westinghouse Hanford

    1996-07-01T23:59:59.000Z

    Engineering study of alternatives to reduce costs of validation worker`s qualification prior to Tank Farm area access.

  5. LOCH: Planning for Open Access in REF - Discussion Points 

    E-Print Network [OSTI]

    Tate, Dominic; Aucock, Janet

    2015-03-19T23:59:59.000Z

    Slides and checklist from facilitated discussion session from ARMA Open Access Good Practice event (London 19-03-2015)....

  6. Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik Chuo N. Lau Matilde Montealegre

    E-Print Network [OSTI]

    Gruenwald, Le

    Managing Real-Time Database Transactions in Mobile Ad-Hoc Networks ** Le Gruenwald Shankar M. Banik, transaction management, ad-hoc networks. 1. INTRODUCTION Rapid developments in wireless technology have enabled mobile users to access data from different sites. The Mobile MultiDatabase Management Systems

  7. Statler College Research Data Center Access and Usage Policy

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    Statler College Research Data Center Access and Usage Policy Objective Access to the Statler under WVU and federal guidelines. Scope This policy applies to all Statler staff, faculty, administrators, officers, contractors and students. Policy Access to the RDC shall be limited to those authorized

  8. Analyzing and Developing Role-Based Access Control Models

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Analyzing and Developing Role-Based Access Control Models by Liang Chen A thesis submitted-based access control (RBAC) has become today's dominant access control model, and many of its theoretical and practical aspects are well understood. However, certain aspects of more advanced RBAC models

  9. A Provenance-based Access Control Model Jaehong Park

    E-Print Network [OSTI]

    Sandhu, Ravi

    A Provenance-based Access Control Model Jaehong Park Institute for Cyber Security University of protecting provenance data. In this paper, we propose a novel provenance-based access control model additional capabilities beyond those available in traditional access control models. We utilize a notion

  10. USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS

    E-Print Network [OSTI]

    Ray, Indrakshi

    USING PARAMETERIZED UML TO SPECIFY AND COMPOSE ACCESS CONTROL MODELS Indrakshi Ray, Na Li, Dae is to model the access control frameworks, compose the models, and analyze the resulting model to identify problems. In this pa- per we outline a technique for modeling and composing access control policy

  11. Comparing the Expressive Power of Access Control Mahesh V. Tripunitara

    E-Print Network [OSTI]

    Li, Ninghui

    Comparing the Expressive Power of Access Control Models Mahesh V. Tripunitara tripunit the expressive power of access control models is rec- ognized as a fundamental problem in computer security the expressive power of access control models into a single context and to compare such models to one another

  12. Benefits of Location-Based Access Control: A Literature Study

    E-Print Network [OSTI]

    Wieringa, Roel

    Benefits of Location-Based Access Control: A Literature Study Andr´e van Cleeff, Wolter Pieters.pieters, r.j.wieringa}@utwente.nl Abstract--Location-based access control (LBAC) has been suggested-based, physical and logical access control, (ii) improving the transparency of LBAC decision making, and (iii

  13. CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE

    E-Print Network [OSTI]

    Foltz, Jeremy D.

    CREDIT MARKET ACCESS AND PROFITABILITY IN TUNISIAN AGRICULTURE Abstract This work develops an econometric model that links credit access with agricultural profitability and investment. Using data. Econometric estimates are run for agricultural investment and profitability as a function of credit access

  14. CONTENT ADAPTION FOR A STREAMING ENVIRONMENT UNIVERSAL MULTIMEDIA ACCESS

    E-Print Network [OSTI]

    Perkis, Andrew

    CONTENT ADAPTION FOR A STREAMING ENVIRONMENT ENABLING UNIVERSAL MULTIMEDIA ACCESS Andrew Perkis Multimedia Access (UMA) is about how users can access the same media resources with different terminal developed taking advantage of some of the possibilities in the upcoming Multimedia Framework, MPEG-21 A test

  15. Access Control Policies and Languages in Open Environments

    E-Print Network [OSTI]

    Samarati, Pierangela

    systems is specifying and enforcing access control security policies regulating interactions between languages and coming from different systems can be combined. 1 Introduction Access control is the process should be granted or denied. Access control plays an important role in overall system security

  16. Harvard Open Access Project Good Practices For University

    E-Print Network [OSTI]

    Chen, Yiling

    Talking about a policy 66 Revising this guide 67 Additional resources 71 (Endnotes) #12;Good Practices Practices for University Open-Access Policies Preface This is a guide to good practices for university open2013-09-30 Harvard Open Access Project Good Practices For University Open-Access Policies Edited

  17. A Smart Energy System with Distributed Access Control

    E-Print Network [OSTI]

    Shinozuka, Masanobu

    systems to date support remote control and automation but not access control, making them applicable to HVAC (heating, ventilation, and air conditioning) systems. SE has the potential of significantly access from a remote site over the Internet, in which case access control in the form of a shared key

  18. Invited Viewer Invited Viewer iSIS Portal Access

    E-Print Network [OSTI]

    Dennett, Daniel

    1 Invited Viewer Invited Viewer iSIS Portal Access Tufts "Invited Viewers" such as parents and spouses can be granted view-only access to a student's iSIS secure personal information. Students previously registered by another student or you do not have a Tufts Username and active iSIS access (most

  19. IBM Human Ability and Accessibility Center Executive brief

    E-Print Network [OSTI]

    to making products and services accessible, to its commitment to research, IBM has been an industry leader graduated from New York's Pace University with a Master's degree in computer science. A skilled and highlyIBM Human Ability and Accessibility Center Executive brief Accessibility at IBM: An integrated

  20. PeopleSoft (ERP) Finance Access Request Form User Guide

    E-Print Network [OSTI]

    de Lijser, Peter

    PeopleSoft (ERP) Finance Access Request Form User Guide Last Revised: 3/22/11 #12;PeopleSoft ERP Finance Access Request Form User Guide FINAL Last Revised: 3/22/11 Page ii REVISION CONTROL Document Title: PeopleSoft ERP Finance Access Request Form User Guide Author: IT Training & Support File Reference

  1. accurate web accessible: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    accurate web accessible First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Web Accessibility Accessibility...

  2. Measuring Accessibility by Automobile Report # 11 in the series

    E-Print Network [OSTI]

    Levinson, David M.

    Measuring Accessibility by Automobile Report # 11 in the series Access to Destinations Study Report by Automobile March 2010 6. 7. Author(s) 8. Performing Organization Report No. David Levinson, Bernadette Marion measures for the Twin Cities region that measure accessibility by the automobile mode over the period from

  3. BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN

    E-Print Network [OSTI]

    Florida, University of

    BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PL LDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A R RISK MANAGEMENT PLAN BUILDING A RISK MANAGEMENT PLAN BUILDIN T PLAN BUILDING A RISK MANAGEMENT PLAN BUILDING A RISK MANAGEM

  4. Enterprise Risk Management Program

    E-Print Network [OSTI]

    Hayden, Nancy J.

    Enterprise Risk Management Program Guide to Risk Assessment & Response August 16, 2012 #12; i ...........26 List of Figures Figure 1: The Risk Management Process.......................................................................................................12 #12; 1 Overview The risk management process--of identifying, analyzing, evaluating

  5. IT Project Manager

    Broader source: Energy.gov [DOE]

    This position is located in the IT Project Management Office (JP). A successful candidate in this position will serve as an IT Program Manager and technical expert responsible for directly managing...

  6. environmental management radiation protection

    E-Print Network [OSTI]

    Entekhabi, Dara

    EHS environmental management biosafety radiation protection industrial hygiene safety Working: Biosafety, Environmental Management, Industrial Hygiene, Radiation Protection and Safety. Each specialized Management Program, Industrial Hygiene, Radiation Protection Program, and the Safety Program. (http

  7. Functional Facilities Management Energy Management Structure

    E-Print Network [OSTI]

    Gulliver, Robert

    Functional Facilities Management Energy Management Structure Jerome Malmquist Director Erick Van Controls Systems Jeff Davis Assistant Director, Facilities Engineering & Energy Efficiency Gene Husted Principal Engineer / Commissioning Emily Robin-Abbott St. Paul Energy Engineer & Technicians Supervisor Dan

  8. Energy Management Working Group: Accelerating Energy Management

    E-Print Network [OSTI]

    Scheihing, P.

    2014-01-01T23:59:59.000Z

    for Standardization (ISO) published the ISO 50001 energy management standard in 2011. ISO 50001 provides industrial companies with guidelines for integrating energy efficiency into their management practices— including fine-tuning production processes... efficiency. GSEP’s Energy Management Working Group (EMWG) advocates the increased adoption of EnMS or ISO 50001 in industry and commercial buildings. It goal is to accelerate the adoption and use of energy management systems in industrial facilities...

  9. Load Management for Industry

    E-Print Network [OSTI]

    Konsevick, W. J., Jr.

    1982-01-01T23:59:59.000Z

    customer management programs exist. EPRI Report (EM-1606) loads to beneficially alter a'utility's load curve. (Page 1-2) list them as: Load management alternatives are covered. 1. Direct or voluntary control of customer Load management methods can... and Electric Power Research Institute (EPRI) Report energy management programs. (EM-1606) states that "the objective of load manage ment is to alter the real or apparent pattern of Our load management program was designed electricity use in order to...

  10. File: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Remote Access Service

    E-Print Network [OSTI]

    Jiang, Huiqiang

    to connecting. You must be approved by your Responsibility Center Administrator to access Network ConnectFile: Accessing Restricted Resources Using Network Connect Page 1 of 6 Dec. 2012 on the Secure Restricted University Online Resources Using Network Connect on the Secure Remote Access Service Table

  11. AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND My signature on the "Mobile Technology Access and Payment Option Request"

    E-Print Network [OSTI]

    Oregon, University of

    AGREEMENT FOR MOBILE TECHNOLOGY ACCESS AND ALLOWANCE My signature on the "Mobile Technology Access and conditions identified in the Access to Mobile Technology and the Payment Options for Mobile Technology policies [http://hr.uoregon.edu/policy/MobileTechnologyDevice.html]. 2. I understand that that I must

  12. The NORM technology connection web site : streamlined access to NORM-related service company and regulatory information.

    SciTech Connect (OSTI)

    Smith, K. P.; Richmond, P.; LePoire, D. J.; Arnish, J. J.; Johnson, R.

    2000-11-08T23:59:59.000Z

    Argonne National Laboratory has developed an Internet web site providing access to critical information needed to support decisions on the management and disposal of wastes containing naturally occurring radioactive material (NORM). The NORM Technology Connection web site provides current information on (1) service companies that provide support on NORM issues (e.g., site characterization and remediation, sample analysis, radiation safety training, disposal) and (2) existing applicable NORM regulations and guidelines. A third element of the site is an electronic mail list that allows users to post or respond to questions about the management of NORM. Development of the NORM Technology Connection web site was funded by the U.S. Department of Energy, Office of Fossil Energy. It is hosted and maintained by the Interstate Oil and Gas Compact Commission. The web site is publicly available; access is free, as is participation by any of the service companies.

  13. Managing Web Data Managing Web Data

    E-Print Network [OSTI]

    Davulcu, Hasan

    Managing Web Data Dan Suciu AT&T Labs Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 1 #12;How the Web is Today HTML documents all intended for human consumption many are generated automatically by applications Managing Web Data Sigmod, 1999 Dan Suciu AT&T Labs 2 #12;Paradigm Shift on the Web applications

  14. MATERIALS MANAGEMENT MATERIALS MANAGEMENT -INVENTORY CONTROL

    E-Print Network [OSTI]

    Oliver, Douglas L.

    MATERIALS MANAGEMENT MATERIALS MANAGEMENT - INVENTORY CONTROL NOTICE OF DESIGNATED DEPARTMENTAL OF MATERIALS MANAGEMENT ______ FURTHER INSTRUCTIONS 1. Include a copy of any relevant documents. 2. Item MATERIALS COORDINATOR ­ IC-8 Mail, Fax or PDF the entire package to: MC 2010 Fax: 679-4240 REFERENCE # DMC

  15. Physics Department Management Review

    E-Print Network [OSTI]

    Homes, Christopher C.

    ESSH Committee and Work Planning Security Cyber Security Accident and Incident Management was distributed to the ESSH Committee, Group Leaders, Group Safety Coordinators, and Line Management #12;Areas

  16. Contract/Project Management

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 85% Cleanup EVM represents Earned Value Management. FY2011 Second Quarter Overall Contract and Project Management Improvement...

  17. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 Fourth Quarter Overall Contract and Project Management Improvement...

  18. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 100% Line Item 88% Cleanup EVM represents Earned Value Management. FY2011 First Quarter Overall Contract and Project Management Performance...

  19. Contract/Project Management

    Energy Savers [EERE]

    by FY12. 95% Line Item 85% Cleanup 97% Line Item 89% Cleanup EVM represents Earned Value Management. FY2011 Third Quarter Overall Contract and Project Management Improvement...

  20. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 5660.1B.

  1. Contract/Project Management

    Broader source: Energy.gov (indexed) [DOE]

    3 rd Quarter Overall Contract and Project Management Performance Metrics and Targets ContractProject Management Performance Metrics FY 2009 Target FY 2009 Actual Comment 1....

  2. Target Cost Management Strategy

    E-Print Network [OSTI]

    Okano, Hiroshi

    1996-01-01T23:59:59.000Z

    Target cost management (TCM) is an innovation of Japanese management accounting system and by common sense has been considered with great interest by practitioners. Nowadays, TCM related

  3. Security Requirements for Remote Access to DOE and Applicable Contractor Information Technology Systems

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice establishes DOE policy requirements and responsibilities for remote connections to DOE and contractor information technology systems. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, to protect DOE information and information technology systems commensurate with the risk and magnitude of harm that could result from their unauthorized access, use, disclosure, modification or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06. No cancellations.

  4. Water Supply Challenges in Cities as a Result of Urbanization: Analyzing the Hurdles of Achieving Universal Water Access in Kampala

    E-Print Network [OSTI]

    Felter, Greg

    2014-07-09T23:59:59.000Z

    is inevitable and therefore planning for such settlement should be undertaken by the government (Parikh and Parikh, 2009). 3.5. Environmental Impacts The pollution of Lake Victoria is a significant issue. Sanitation facilities lag behind potable water access... and Constraints of Sustainable Water Management in Oaxaca City, Mexico. Master of Philosophy. University of Cambridge. 14 SDI. 2011. Transforming the Settlements of the Urban Poor in Uganda. [report] Kampala: Slum Dwellers International, pp. 1-4. Ssemmanda...

  5. Open Access: From Myth to Paradox

    ScienceCinema (OSTI)

    Paul Ginsparg

    2010-01-08T23:59:59.000Z

    True open access to scientific publications not only gives readers the possibility to read articles without paying subscription, but also makes the material available for automated ingestion and harvesting by 3rd parties. Once articles and associated data become universally treatable as computable objects, openly available to 3rd party aggregators and value-added services, what new services can we expect, and how will they change the way that researchers interact with their scholarly communications infrastructure? I will discuss straightforward applications of existing ideas and services, including citation analysis, collaborative filtering, external database linkages, interoperability, and other forms of automated markup, and speculate on the sociology of the next generation of users.

  6. Access to OUO | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you0 ARRA Newsletters 20103-03 AUDIT REPORT:Patricia DaviesEnergyAccess to

  7. 2e Carbon Access | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind ProjectsourceInformationColorado School20090:Access

  8. UF Access List | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence may bedieselsummer gasoline price to averageUF Access

  9. Access Fund Partners LP | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki HomeASN Power ProjectsAbrahamAccess Fund

  10. McMaster University Libraries library.mcmaster.ca 905.525.9140 x22081 library@mcmaster.ca Helping Organizations Access, Share and

    E-Print Network [OSTI]

    Haykin, Simon

    @mcmaster.ca Organization Library of Congress Classification · Combination of letters and numbers that group materialsMaster University Libraries · library.mcmaster.ca · 905.525.9140 x22081 · library@mcmaster.ca Week 9 Helping Organizations Access, Share and Use Information Information Management: The Library Perspective Ines Perkovic

  11. FUEL DEVICE APPLICATION Use this application to request a fuel device to access the University of Michigan (U-M) Parking and Transportation

    E-Print Network [OSTI]

    Kirschner, Denise

    FUEL DEVICE APPLICATION Use this application to request a fuel device to access the University of Michigan (U-M) Parking and Transportation Services (PTS) service stations for fuel. A fuel device owned and managed by PTS Fleet Services equipped with an automated fuel device. Please read the Use

  12. DTEVISUAL: A VISUALIZATION SYSTEM FOR TEACHING ACCESS CONTROL USING DOMAIN TYPE ENFORCEMENT *

    E-Print Network [OSTI]

    Wang, Chaoli

    of these modern systems. This paper presents DTEvisual, a visualization system for teaching access control usingDTEVISUAL: A VISUALIZATION SYSTEM FOR TEACHING ACCESS CONTROL USING DOMAIN TYPE ENFORCEMENT * Yifei access control and modern models of access control. DTEvisual facilitatesgraphicaldepiction

  13. Dynamic access policies for unconditionally secure secret

    E-Print Network [OSTI]

    Martin, Keith

    generation of cryptographic secrets · Key management in distributed environments · Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders · Choose a topic related to information theoretic security · Provide an overview · Identify some open problems · Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

  14. Information Access and Privacy Protection Office

    E-Print Network [OSTI]

    deYoung, Brad

    Management. (Policy R-2) All records you create in carrying out your responsibilities as a University are considered to be sensitive personal information. EMAIL AND FAXES ARE OFFICIAL RECORDS Email and faxed transmissions are official records of the University in accordance with University Policy R-2: Records

  15. Best Environmental Management Practices

    E-Print Network [OSTI]

    Best Environmental Management Practices Farm Animal Production Comprehensive Nutrient Management with regulatory guidelines by addressing items such as manure management, field crop nutrients, and storm water What is a CNMP? A Comprehensive Nutrient Management Plan (CNMP) is a total planning tool that details

  16. Environmental Best Management Practices

    E-Print Network [OSTI]

    Liskiewicz, Maciej

    Environmental Best Management Practices for Virginia's Golf Courses Prepared by Virginia Golf Course Superintendents Association #12;#12;EnvironmEntal BEst managEmEnt PracticEs for virginia's golf III I am pleased to endorse the Environmental Best Management Practices for Virginia's Golf Courses

  17. Sport Management Academic Offerings

    E-Print Network [OSTI]

    Mather, Patrick T.

    production and programming of events; marketing and public relations; technological operations management including (but not limited to) digital advertising, media law, new media business, operations managementSport Management Academic Offerings M.S. In Sport Venue And Event Management GRADUATE Chad Mc

  18. Chemical Management Contacts

    Broader source: Energy.gov [DOE]

    Contacts for additional information on Chemical Management and brief description on Energy Facility Contractors Group

  19. Accessing TRANSP Output: A User's Guide Accessing TRANSP Output: A User's Guide

    E-Print Network [OSTI]

    Princeton Plasma Physics Laboratory

    of such TRANSP analyses are stored on magnetic and laser disk on a VMS VAX cluster. The purpose of this User's . Guide is to describe how to access these analysis results in graphical form on a VAX system. The reader is not expected to have specialized VAX knowledge, although familiarity with fundamentals (e.g. how to log in

  20. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management`s goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  1. EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel

    E-Print Network [OSTI]

    Kirschner, Denise

    EMPLOYEE FUEL ACCESS APPLICATION Use this application to request access for employees to use the campus service stations in conjunction with a fuel access device. In order to obtain fuel from for access. Employee access is not required for the U-M fleet vehicle equipped with an automated fuel device

  2. Law-Aware Access Control and its Information Model

    E-Print Network [OSTI]

    Stieghahn, Michael

    2010-01-01T23:59:59.000Z

    Cross-border access to a variety of data such as market information, strategic information, or customer-related information defines the daily business of many global companies, including financial institutions. These companies are obliged by law to keep a data processing legal for all offered services. They need to fulfill different security objectives specified by the legislation. Therefore, they control access to prevent unauthorized users from using data. Those security objectives, for example confidentiality or secrecy, are often defined in the eXtensible Access Control Markup Language that promotes interoperability between different systems. In this paper, we show the necessity of incorporating the requirements of legislation into access control. Based on the work flow in a banking scenario we describe a variety of available contextual information and their interrelations. Different from other access control systems our main focus is on law-compliant cross-border data access. By including legislation dir...

  3. The DIRAC Data Management System (poster)

    E-Print Network [OSTI]

    Haen, Christophe

    2015-01-01T23:59:59.000Z

    The DIRAC Interware provides a development framework and a complete set of components for building distributed computing systems. The DIRAC Data Management System (DMS) offers all the necessary tools to ensure data handling operations for small and large user communities. It supports transparent access to storage resources based on multiple technologies, and is easily expandable. The information on data files and replicas is kept in a File Catalog of which DIRAC offers a powerful and versatile implementation (DFC). Data movement can be performed using third party services including FTS3. Bulk data operations are resilient with respect to failures due to the use of the Request Management System (RMS) that keeps track of ongoing tasks. In this contribution we will present an overview of the DIRAC DMS capabilities and its connection with other DIRAC subsystems such as the Transformation System. The DIRAC DMS is in use by several user communities now. The contribution will present the experience of the LHCb exper...

  4. Data Management System of the DIRAC Project

    E-Print Network [OSTI]

    Haen, Christophe; Tsaregorodtsev, Andrei

    2015-01-01T23:59:59.000Z

    The DIRAC Interware provides a development framework and a complete set of components for building distributed computing systems. The DIRAC Data Management System (DMS) offers all the necessary tools to ensure data handling operations for small and large user communities. It supports transparent access to storage resources based on multiple technologies, and is easily expandable. The information on data files and replicas is kept in a File Catalog of which DIRAC offers a powerful and versatile implementation (DFC). Data movement can be performed using third party services including FTS3. Bulk data operations are resilient with respect to failures due to the use of the Request Management System (RMS) that keeps track of ongoing tasks. In this contribution we will present an overview of the DIRAC DMS capabilities and its connection with other DIRAC subsystems such as the Transformation System. The DIRAC DMS is in use by several user communities now. The contribution will present the experience of the LHCb exper...

  5. Management and Program Analyst (Operations Manager)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Management and Program Analyst in the Office of Strategic Programs in the DOE-EERE.

  6. Information resource management concepts for records managers

    SciTech Connect (OSTI)

    Seesing, P.R.

    1992-10-01T23:59:59.000Z

    Information Resource Management (ERM) is the label given to the various approaches used to foster greater accountability for the use of computing resources. It is a corporate philosophy that treats information as it would its other resources. There is a reorientation from simply expenditures to considering the value of the data stored on that hardware. Accountability for computing resources is expanding beyond just the data processing (DP) or management information systems (MIS) manager to include senior organization management and user management. Management's goal for office automation is being refocused from saving money to improving productivity. A model developed by Richard Nolan (1982) illustrates the basic evolution of computer use in organizations. Computer Era: (1) Initiation (computer acquisition), (2) Contagion (intense system development), (3) Control (proliferation of management controls). Data Resource Era: (4) Integration (user service orientation), (5) Data Administration (corporate value of information), (6) Maturity (strategic approach to information technology). The first three stages mark the growth of traditional data processing and management information systems departments. The development of the IRM philosophy in an organization involves the restructuring of the DP organization and new management techniques. The three stages of the Data Resource Era represent the evolution of IRM. This paper examines each of them in greater detail.

  7. Direct memory access transfer completion notification

    DOE Patents [OSTI]

    Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN); Steinmacher-Burow, Burkhard D. (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-07-27T23:59:59.000Z

    Methods, compute nodes, and computer program products are provided for direct memory access (`DMA`) transfer completion notification. Embodiments include determining, by an origin DMA engine on an origin compute node, whether a data descriptor for an application message to be sent to a target compute node is currently in an injection first-in-first-out (`FIFO`) buffer in dependence upon a sequence number previously associated with the data descriptor, the total number of descriptors currently in the injection FIFO buffer, and the current sequence number for the newest data descriptor stored in the injection FIFO buffer; and notifying a processor core on the origin DMA engine that the message has been sent if the data descriptor for the message is not currently in the injection FIFO buffer.

  8. Instruction sets for Parallel Random Access Machines

    SciTech Connect (OSTI)

    Trahan, J.L.

    1988-01-01T23:59:59.000Z

    The computational powers of time-bounded Parallel Random Access Machines (PRAMs) with different instruction sets are compared. A basic PRAM can perform the following operations in unit-time: addition, subtraction, Boolean operations, comparisons, and indirect addressing. Multiple processors may concurrently read and concurrently write a single cell. This thesis establishes that the class of languages accepted in polynomial time on a PRAM(*, {up arrow}, {down arrow}) contains the class of languages accepted in exponential time on a nondeterministic Turing machine (NEXPTIME) and is contained in the class of languages accepted in exponential space on a Turing machine. Efficient simulations are presented of PRAMs with enhanced instruction sets by sequential RAMs with the same instruction sets; also simulations of probabilistic PRAMs by deterministic PRAMs, using parallelism to replace randomness. Also given are simulations of PRAM(op)s by PRAMs, where both the simulated machine and the simulating machine are exclusive-read, exclusive-write machines.

  9. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02T23:59:59.000Z

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  10. Public Roundtable- Data Access and Privacy Issues Related to...

    Broader source: Energy.gov (indexed) [DOE]

    to Smart Grid Technologies Public Roundtable- Data Access and Privacy Issues Related to Smart Grid Technologies More Documents & Publications Testimony Public Meeting Transcript:...

  11. access spatial methods: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 The mqr-tree: improving upon a 2-dimensional spatial access method Marc Moreau, Wendy Osborn Mathematics Websites Summary: , overcoverage and overlap than is necessary. The...

  12. access policies tutela: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    os estudantes lembraram a Jos Ferreira Gomes Instituto de Sistemas e Robotica 3 Policy 3507 Information Technology Accessibility 1 OLD DOMINION UNIVERSITY Computer...

  13. Boyer-Tillamook Access Road Improvement Project 1 Finding of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    dangerous. In addition, improvements to access road stream crossings would facilitate fish passage. Construction is expected to last from 2 to 4 months, although work may need to...

  14. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  15. access industry profile: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hired can help you build a career Access information about713 Complete Your Profile -- Logging into Huskies Get Hired Log into your Huskies Get Hired account...

  16. access communication datac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Open learner models, communication, multiple users. 1 Introduction Open learner models (OLM) are learner models that are accessible Bull, Susan 111 Channel modelling and relay for...

  17. access memory devices: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Information Sciences Websites Summary: magnetic disks, such as lower access latency, lower power consumption, lack of noise, and shock resistance of traditional...

  18. access devices evaluation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    unnecessarily long query processing times, since web accesses exhibit high and variable latency. Fortunately, web sources can be probed in parallel, and each source can typically...

  19. NBP RFI: Data Access, Third Party Use, and Privacy- Comments...

    Energy Savers [EERE]

    Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC NBP RFI: Data Access, Third Party Use, and Privacy- Comments of Oncor Electric Deliverty Company LLC Oncor...

  20. Accessing Low-Cost Capital Through Securitization (Poster)

    SciTech Connect (OSTI)

    Mendelsohn, M.

    2014-10-01T23:59:59.000Z

    Poster for Solar Power International conference presents information on NREL's effort to open capital markets through securitization via Solar Access to Public Capital (SAPC) working group's efforts.

  1. accessible surface area: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  2. access program eap: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  3. accessible surface areas: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  4. access programs evidence: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    INFORMATION supervisor, UCPD and the issuing department's Access Controller. A UC police report reference number or card key to anyone, unless told to do so by the issuing...

  5. Using Digital Technology to Access And Store African Art

    E-Print Network [OSTI]

    Blake, Edwin

    Using Digital Technology to Access And Store African Art Gary Marsden, Katherine Malan & Edwin Blake Collaborative Visual Computing Group, Department of Computer Science, University of Cape Town +27

  6. Microsoft Word - Accessing Gulf Resources article.doc

    Office of Environmental Management (EM)

    necessary to efficiently access and support this very significant amount of energy production, given the growing challenges that coastal areas are facing?" My prediction is...

  7. accessible sites application: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  8. access control framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  9. access delay applications: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: protected by the same origin policy. This opens the door to fracking attacks, which allow foreign-origin Web and directly access device resources....

  10. aps collaborative access: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Access Model for Shared Virtual Environments Steve Pettifer and James Marsh of computer graphics techniques, and evolve more meaningful content, issues such as ownership' or...

  11. accelerating access initiative: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 455 Dynamical...

  12. accessibility global gateway: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 389 RESEARCH...

  13. arterial access site: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nuovo database 12;26-04-2010 2 7 programma di gestione di database (cio un DBMS) Access offre: un supporto transazionale limitato Anselma, Luca 225 Site: a...

  14. University of Utah Registrar's Office Security Access Deletion Form

    E-Print Network [OSTI]

    Feschotte, Cedric

    Access Student Records Web Reports DARS (Class rolls, picture rosters, etc.) Comments/Additional Information FOR REGISTRAR'S OFFICE USE ONLY ACS Administrator Date Student Systems Administrator Date DARS

  15. Application for Permit to Construct Access Driveway Facilities...

    Open Energy Info (EERE)

    Application for Permit to Construct Access Driveway Facilities on Highway Right of Way DOI Not Provided Check for DOI availability: http:crossref.org Online Internet link...

  16. FACT SHEET: SOLAR AND LED ENERGY ACCESS PROGRAM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    billion people current lacking access to modern energy - simultaneously alleviating poverty, improving human health, and reducing emissions of greenhouse gases. The Solar and...

  17. Increasing Community Access to Solar: Designing and Developing...

    Broader source: Energy.gov (indexed) [DOE]

    Increasing Community Access to Solar: Designing and Developing a Shared Solar Photovoltaic System Updated guide highlights project models, policies, and financing Community shared...

  18. access ad hoc: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  19. access control mechanism: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the channel utilization of multihop wireless networks. Keywords: Mobile ad hoc networks, medium access control, this is not necessarily true in a mobile ad hoc network (MANET)...

  20. arabidopsis thaliana accessions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    occurring variation is an important alternative resource for functional genetics and genomics research.; In a well-characterized collection of Arabidopsis thaliana accessions, we...

  1. access health corp: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Request Broker Architecture specifies a system which - provides interoperability 6 Health Care Access to and Utilization of Health Care CiteSeer Summary: Core item-...

  2. The Waste Management Quality Assurance Implementing Management Plan (QAIMP)

    E-Print Network [OSTI]

    Albert editor, R.

    2009-01-01T23:59:59.000Z

    DIVISION Waste Management Quality Assurance ImplementingI I IMPLEMENTING MANAGEMENT QUALITY PLAN ASSURANCE I lilillI WM-QAIMP Waste Management Quality Assurance Implementing

  3. Effective Materials Property Information Management for the 21st Century

    SciTech Connect (OSTI)

    Ren, Weiju [ORNL; Cebon, David [Cambridge University; Barabash, Oleg M [ORNL

    2011-01-01T23:59:59.000Z

    This paper discusses key principles for the development of materials property information management software systems. There are growing needs for automated materials information management in various organizations. In part these are fuelled by the demands for higher efficiency in material testing, product design and engineering analysis. But equally important, organizations are being driven by the needs for consistency, quality and traceability of data, as well as control of access to proprietary or sensitive information. Further, the use of increasingly sophisticated nonlinear, anisotropic and multi-scale engineering analyses requires both processing of large volumes of test data for development of constitutive models and complex materials data input for Computer-Aided Engineering (CAE) software. And finally, the globalization of economy often generates great needs for sharing a single gold source of materials information between members of global engineering teams in extended supply-chains. Fortunately material property management systems have kept pace with the growing user demands and evolved to versatile data management systems that can be customized to specific user needs. The more sophisticated of these provide facilities for: (i) data management functions such as access, version, and quality controls; (ii) a wide range of data import, export and analysis capabilities; (iii) data pedigree traceability mechanisms; (iv) data searching, reporting and viewing tools; and (v) access to the information via a wide range of interfaces. In this paper the important requirements for advanced material data management systems, future challenges and opportunities such as automated error checking, data quality characterization, identification of gaps in datasets, as well as functionalities and business models to fuel database growth and maintenance are discussed.

  4. Fusing Integration Test Management with Change Management

    E-Print Network [OSTI]

    Perry, Dewayne E.

    - 1 - Infuse: Fusing Integration Test Management with Change Management Gail E. Kaiser* Dewayne E, NJ 07974 Murray Hill, NJ 07974 Infuse is an experimental software development environment focusing the change set into the baseline. We have previously described how Infuse enforces static consistency at each

  5. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  6. Integrated Distribution Management System for Alabama Principal Investigator

    SciTech Connect (OSTI)

    Schatz, Joe

    2013-03-31T23:59:59.000Z

    Southern Company Services, under contract with the Department of Energy, along with Alabama Power, Alstom Grid (formerly AREVA T&D) and others moved the work product developed in the first phase of the Integrated Distribution Management System (IDMS) from “Proof of Concept” to true deployment through the activity described in this Final Report. This Project – Integrated Distribution Management Systems in Alabama – advanced earlier developed proof of concept activities into actual implementation and furthermore completed additional requirements to fully realize the benefits of an IDMS. These tasks include development and implementation of a Distribution System based Model that enables data access and enterprise application integration.

  7. Waste Management Quality Assurance Plan

    E-Print Network [OSTI]

    Waste Management Group

    2006-01-01T23:59:59.000Z

    Revision 6 Waste Management Quality Assurance Plan Waste6 WM QA Plan Waste Management Quality Assurance Plan LBNL/4 Management Quality Assurance

  8. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  9. Business, management and finance

    E-Print Network [OSTI]

    Sussex, University of

    Business, management and finance Essentials Taught degrees Masters in Business Administration (MBA) MSc in Banking and Finance MSc in Corporate and Financial Risk Management MSc in Financial Mathematics MSc in International Accounting and Corporate Governance MSc in International Finance MSc

  10. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1, dated 1-16-2013, cancels DOE O 415.1.

  11. Portfolio Manager Overview

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portfolio Manager 3 | TAP Webcast eere.energy.gov What is Portfolio Manager? Free, web-based tool for benchmarking existing buildings Measure and track the energy use of...

  12. Risk Management Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-01-18T23:59:59.000Z

    This Guide provides non-mandatory risk management approaches for implementing the requirements of DOE O 413.3B, Program and Project Management for the Acquisition of Capital Assets. Cancels DOE G 413.3-7.

  13. ENVIRONMENTAL MANAGEMENT Environmental Policy

    E-Print Network [OSTI]

    Haase, Markus

    ENVIRONMENTAL MANAGEMENT Environmental Policy February 2013 The University of Leeds is responsible to reflect best environmental practice, implement an environmental management system to pursue sustainability and continuous improvement and seek innovative ways of meeting environmental objectives. These include: To meet

  14. Information Technology Project Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-12-03T23:59:59.000Z

    The Order provides program and project management direction for the acquisition and management of IT projects, investments, and initiatives. Cancels DOE G 200.1-1. Admin Chg 1 approved 1-16-2013.

  15. Computerized Maintenance Management Systems

    Broader source: Energy.gov [DOE]

    Computerized maintenance management systems (CMMS) are a type of management software that perform functions in support of operations and maintenance (O&M) programs. The software automates most of the logistical functions performed by O&M staff.

  16. Management of Nuclear Materials

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-08-17T23:59:59.000Z

    To establish requirements for the lifecycle management of DOE owned and/or managed accountable nuclear materials. Cancels DOE O 410.2. Admin Chg 1 dated 4-10-2014, cancels DOE O 410.2.

  17. Personalized diabetes management

    E-Print Network [OSTI]

    O'Hair, Allison Kelly

    2013-01-01T23:59:59.000Z

    In this thesis, we present a system to make personalized lifestyle and health decisions for diabetes management, as well as for general health and diet management. In particular, we address the following components of the ...

  18. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  19. Economics of Identity and Access Management: Providing Decision Support for Investments

    E-Print Network [OSTI]

    Pym, David J.

    : there is scarcity of resources and budget to address them all. Decision- makers (e.g., CIOs, CISOs) need- makers (e.g. Chief Information Officers -- CIOs, Chief Information Security Officers -- CISOs

  20. Enabling Speech Based Access to Information Management Systems over Wireless Network

    E-Print Network [OSTI]

    Dupont, Stéphane

    . Pietquin, C. Ris and G. Wilfart1 Facult´e Polytechnique de Mons - TCTS Lab. Parc Initialis - Av. Copernic

  1. Questionmark Reporting First you need to access the Questionmark "Enterprise Manager".

    E-Print Network [OSTI]

    Oliver, Douglas L.

    to develop what you need) #12;The most common survey report template is the "Full Details" template. 7://questionmark.com/perception/help/v4/manuals/er/index.html These instructions will cover the process of running a survey report. A "Survey Report" is a report you run to view the accumulated results of one survey. #12;3. Click

  2. Academic Librarians & Open Access of Data:  Challenges & Opportunities in Research Data Management

    E-Print Network [OSTI]

    Tsang, Daniel C

    2015-01-01T23:59:59.000Z

    for some researchers Web archiving is another wayto capture at risk web data and archive it AtUCI we are beginning to consider web archiving a collection

  3. V-120: EMC Smarts Network Configuration Manager Java RMI Access Control

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartment of Energy

  4. Pricing under Constraints in Access Networks: Revenue Maximization and Congestion Management

    E-Print Network [OSTI]

    Reisslein, Martin

    such "technical" practices and promotes economics based approaches. We characterize the loss in ISP revenue from Prashanth Hande1,2, Mung Chiang1, Robert Calderbank1, Junshan Zhang3 1 Department of Electrical Engineering consumers, and we derive the revenue loss to the ISP from such restrictions. We then develop partial

  5. Utah - UAC R930-6 - Access Management | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga,planning methodologies and tools | OpenJAABotJoaoInformation

  6. NBP RFI: Data Access | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of theTechno-economic Evaluation ofCooperative-Department

  7. NBP RFI: Data Access | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of theTechno-economic Evaluation ofCooperative-DepartmentThe

  8. NBP RFI: Data Access | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO2:Introduction toManagement of theTechno-economic Evaluation

  9. Coastal Underwater Field Observer with Remote IP Access

    E-Print Network [OSTI]

    ) Power Supply (Battery Selection) Unit Charging (Solar Panel Sizing and Selection) Power Management

  10. Wildlife Management Areas (Florida)

    Broader source: Energy.gov [DOE]

    Certain sites in Florida are designated as wildlife management areas, and construction and development is heavily restricted in these areas.

  11. Benchmarking Corporate Energy Management

    E-Print Network [OSTI]

    Norland, D. L.

    BENCHMARKING CORPORATE ENERGY MANAGEMENT Dr. Douglas L. Norland Director of Research and Industrial Programs Alliance to Save Energy Washington, DC ABSTRACT There is growing interest among energy managers in finding out how their company...'s energy management procedures and perfonnance compare to that of other companies. Energy management involves everything from setting goals and targets to implementing best maintenance practices. This paper, however, discusses benchmarking energy...

  12. Access Control in Publicly Verifiable Outsourced Computation James Alderman

    E-Print Network [OSTI]

    Publicly Verifiable Outsourced Computation (PVC) allows devices with restricted re- sources to delegate. Thus there is a need to apply access control mechanisms in PVC environments. In this work, we define a new framework for Publicly Verifiable Outsourced Computation with Access Control (PVC-AC) that applies

  13. Capacity Building on Access to Energy in Africa: Final Report

    E-Print Network [OSTI]

    Capacity Building on Access to Energy in Africa: Final Report Danish Support to EUEI Facilitation from African partner organisations and individuals Title: Capacity Building on Access to Energy (Danish Ministry of Foreign Affairs) Cover: Solar home system installed at house near Chipata, Eastern

  14. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Watt, Stephen M.

    1 Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  15. Towards an Accessible Web through Semantic Web Standards

    E-Print Network [OSTI]

    Perry, Mark

    Towards an Accessible Web through Semantic Web Standards Clare M. So, Mark Perry and Stephen M Abstract-- Making information on the Web accessible to all people, including to those having special needs than actual semantic content that is rendered by alternative technologies. To make the Web more

  16. POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES,

    E-Print Network [OSTI]

    Arnold, Jonathan

    POLICY REGARDING SERVICE ANIMAL ACCESS TO UNIVERSITY OF GEORGIA FACILITIES, PROGRAMS, SERVICES AND ACTIVITIES This policy ("Policy") is to implement federal and state laws regarding access for service animals, for purposes of this Policy, "Service Animals" are collectively defined to include those that are defined

  17. access control policy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access control policy First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Resiliency Policies in Access...

  18. Regulating Wireless Access Pricing Kwanfong Leung and Jianwei Huang

    E-Print Network [OSTI]

    Huang, Jianwei

    user prices change with network's market shares and bandwidth costs. When such direct control change with the network costs and market shares. · Social optimal access pricing: We showRegulating Wireless Access Pricing Kwanfong Leung and Jianwei Huang Department of Information

  19. A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous

    E-Print Network [OSTI]

    Keinan, Alon

    A Resources Virtualization Approach Supporting Uniform Access to Heterogeneous Grid Resources1 of resources such as computing resources, storage resources, instrument resources, data resources, etc. However, because of the differences of formats, descriptions, structures, and access modes of these resources, grid

  20. access hiv-1 test: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    access hiv-1 test First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 REVIEW Open Access The macrophage in...