Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

2

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

3

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

4

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

5

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

6

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

7

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

8

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

9

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

10

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

11

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit (architectures)...

12

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

13

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

14

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

15

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

16

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

17

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

18

Factorization of a 512-bit RSA modulus  

Science Conference Proceedings (OSTI)

This paper reports on the factorization of the 512-bit number RSA-155 by the Number Field Sieve factoring method (NFS) and discusses the implications for RSA.

Stefania Cavallar; Bruce Dodson; Arjen K. Lenstra; Walter Lioen; Peter L. Montgomery; Brian Murphy; Herman Te Riele; Karen Aardal; Jeff Gilchrist; Grard Guillerm; Paul Leyland; Jol Marchand; Franois Morain; Alec Muffett; Chris Putnam; Craig Putnam; Paul Zimmermann

2000-05-01T23:59:59.000Z

19

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

20

CRT RSA algorithm protected against fault attacks  

Science Conference Proceedings (OSTI)

Embedded devices performing RSA signatures are subject to Fault Attacks, particularly when the Chinese Remainder Theorem is used. In most cases, the modular exponentiation and the Garner recombination algorithms are targeted. To thwart Fault Attacks, ... Keywords: RSA, chinese remainder theorem, fault attacks, modular exponentiation, simple power analysis, smart card

Arnaud Boscher; Robert Naciri; Emmanuel Prouff

2007-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) (gw.ps.nifs.ac.jp) RSA  

E-Print Network (OSTI)

pdf SSH SSH SSH UNIXUNIXUNIXUNIX((((OpenSSHOpenSSHOpenSSHOpenSSH)))) ssh (gw.ps.nifsTerm: New connection TCP/IP gw.ps.nifs.ac.jp %ssh (-i ) (-l ) gw.ps.nifs.ac.jp The authenticity of host 'gw.ps.nifs.ps.nifs.ac.jp,133.75.37.11' (RSA) to the list of known hosts. Enter passphrase for key '/home

Ito, Atsushi

22

The RSA Group is Pseudo-Free  

E-Print Network (OSTI)

Rivest, On the notion of pseudo-free groups. In: Theory ofImplicit function theorem over free groups. J. Algebra 290(The RSA Group is Pseudo-Free ? Daniele Micciancio Department

Micciancio, Daniele

2010-01-01T23:59:59.000Z

23

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am...

24

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

25

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

26

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

27

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote...

28

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

29

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

30

Authentication of byte sequences  

SciTech Connect

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

31

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

32

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

33

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

34

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

35

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

36

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

37

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

38

Towards practical anonymous password authentication  

Science Conference Proceedings (OSTI)

The conventional approach for anonymous password authentication incurs O(N) server computation, linear to the total number of users. In ACSAC'09, Yang et al. proposed a new approach for anonymous password authentication, breaking this lower ... Keywords: anonymity, guessing attack, password authentication

Yanjiang Yang; Jianying Zhou; Jun Wen Wong; Feng Bao

2010-12-01T23:59:59.000Z

39

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

40

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

CHALLENGE MEASUREMENTS FOR AUTHENTICATION  

Science Conference Proceedings (OSTI)

Authentication of systems with an information barrier that protects sensitive information is difficult; in particular, the information barrier can allow a hidden switch to be implemented by the system fabricator and operator. The hidden switch is the operators ability to subvert the measurement system and force it to produce a desired and false result. It is usually discussed in the context of an attribute measurement in which a faked item is presented in place of a real item regulated by an agreement, with the driving motivation being the ability to preserve a stock of valuable items. In simple terms, the hidden switch enables a shell game with assets, and the information barrier protects the switch. This presentation outlines challenge measurements that could be used to detect the implementation of a hidden switch and assist the authentication process.

Pitts, W. Karl

2009-10-07T23:59:59.000Z

42

Byzantine agreement method without authentication  

SciTech Connect

This invention relates to a method for achieving Byzantine agreement without authentication among n 100 communicating processors using event counting and thresholding rather than message exchanges and evaluations.

Reischuk, R.K.

1983-12-01T23:59:59.000Z

43

Public-Key Cryptography Standards (PKCS) #1: RSA Cryptography Specifications Version 2.1  

Science Conference Proceedings (OSTI)

This memo represents a republication of PKCS #1 v2.1 from RSA Laboratories' Public-Key Cryptography Standards (PKCS) series, and change control is retained within the PKCS process. The body of this document is taken directly from the PKCS #1 v2.1 document, ...

J. Jonsson; B. Kaliski

2003-02-01T23:59:59.000Z

44

Requirements for signaling channel authentication  

SciTech Connect

This contribution addresses requirements for ATM signaling channel authentication. Signaling channel authentication is an ATM security service that binds an ATM signaling message to its source. By creating this binding, the message recipient, and even a third party, can confidently verify that the message originated from its claimed source. This provides a useful mechanism to mitigate a number of threats. For example, a denial of service attack which attempts to tear-down an active connection by surreptitiously injecting RELEASE or DROP PARTY messages could be easily thwarted when authenticity assurances are in place for the signaling channel. Signaling channel authentication could also be used to provide the required auditing information for accurate billing which is impervious to repudiation. Finally, depending on the signaling channel authentication mechanism, end-to-end integrity of the message (or at least part of it) can be provided. None of these capabilities exist in the current specifications.

Tarman, T.D.

1995-12-11T23:59:59.000Z

45

Citrix_2FA_Authentication-September09  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor RSA Token with Citrix Workplace Environment (CWE) Revision 1.13 September, 2009 Office of IT Operations (IM-621) United States Department of Energy DOE HQ OCIO Application...

46

Mobile IP Authentication, Authorization, and Accounting Requirements  

Science Conference Proceedings (OSTI)

The Mobile IP and Authentication, Authorization, Accounting (AAA) working groups are currently looking at defining the requirements for Authentication, Authorization, and Accounting. This document contains the requirements which would have to be supported ...

S. Glass; T. Hiller; S. Jacobs; C. Perkins

2000-10-01T23:59:59.000Z

47

Authentication of FPGA bitstreams: why and how  

Science Conference Proceedings (OSTI)

Encryption of volatile FPGA bitstreams provides confidentiality to the design but does not ensure its authenticity. This paper motivates the need for adding authentication to the configuration process by providing application examples where this functionality ...

Saar Drimer

2007-03-01T23:59:59.000Z

48

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

49

A TESLA-Based Mutual Authentication . . .  

E-Print Network (OSTI)

The widespread use of wireless cellular networks has made security an ever increasing concern. GSM is the most popular wireless cellular standard, but security is an issue. The most critical weakness in the GSM protocol is the use of one-way entity authentication, i.e., only the mobile station is authenticated by the network. This creates many security problems including vulnerability against man-in-the-middle attacks. Several solutions have been proposed to establish mutual entity authentication. However, none provide a flaw-free bilateral authentication protocol. In this paper, we show that a recently proposed solution is vulnerable to a "type attack". Then, we propose a novel mutual entity authentication using the TESLA protocol. The proposed solution not only provides secure bilateral authentication, but also decreases the call setup time and the required connection bandwidth. An important feature of the proposed protocol is that it is compatible with the GSM standard.

Ali Fanian; Mehdi Berenjkoub; T. Aaron Gulliver

2009-01-01T23:59:59.000Z

50

Obfuscated authentication systems, devices, and methods  

SciTech Connect

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

51

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

52

Secure Symmetric Authentication for RFID Tags  

E-Print Network (OSTI)

cryptographically secure authentication. Starting with a short introduction into common RFID systems with passive tags, we present a motivation why secure authentication with standardized symmetric crypto algorithms for RFID tags is necessary for many applications. We demonstrate vulnerabilities of current RFID systems and explain how application of an authentication mechanism can solve them. Furthermore we explain how authentication protocols work and how they can be included in the RFID protocol standard ISO 18000. By presenting the interim results of ART, we will show that the proposed enhancement is feasible with current RIFD infrastructure and silicon technology used for RFID tags.

Manfred Aigner; Martin Feldhofer

2005-01-01T23:59:59.000Z

53

NIST Special Publication Expands Government Authentication ...  

Science Conference Proceedings (OSTI)

... The Office of Management and Budget's guidance, E-Authentication Guidance for Federal Agencies [OMB 04-04] can be found at www ...

2011-12-20T23:59:59.000Z

54

Context-based authentication and transport of cultural assets  

Science Conference Proceedings (OSTI)

We present a ubiquitous system that combines context information, security mechanisms and a transport infrastructure to provide authentication and secure transport of works of art. Authentication is provided for both auctions and exhibitions, where users ... Keywords: Authentication, Ubiquitous systems

Leonardo Mostarda; Changyu Dong; Naranker Dulay

2010-05-01T23:59:59.000Z

55

T-608: HP Virtual Server Environment Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated...

56

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook access using...

57

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

58

Back-of-device authentication on smartphones  

Science Conference Proceedings (OSTI)

This paper presents BoD Shapes, a novel authentication method for smartphones that uses the back of the device for input. We argue that this increases the resistance to shoulder surfing while remaining reasonably fast and easy-to-use. We performed ... Keywords: authentication, back of device interaction, security

Alexander De Luca; Emanuel von Zezschwitz; Ngo Dieu Huong Nguyen; Max-Emanuel Maurer; Elisa Rubegni; Marcello Paolo Scipioni; Marc Langheinrich

2013-04-01T23:59:59.000Z

59

On selecting Gabor features for biometric authentication  

Science Conference Proceedings (OSTI)

We describe a Gabor feature selection technique that allows us to develop a fast and robust Gabor-feature based biometric system. Existing Gabor based methods use a huge number of Gabor features to represent the patterns. Our experiments on different ... Keywords: Gabor features, automated identification, biometrics, ear authentication, equal error rate, feature selection, finger authentication

Loris Nanni; Alessandra Lumini

2009-04-01T23:59:59.000Z

60

Group-Based Authentication and Key Agreement  

Science Conference Proceedings (OSTI)

This paper presents an authentication and key agreement protocol to streamline communication activities for a group of mobile stations (MSs) roaming from the same home network (HN) to a serving network (SN). In such a roaming scenario, conventional schemes ... Keywords: Authentication and key agreement, Group key, Roaming, Security, Wireless network

Yu-Wen Chen; Jui-Tang Wang; Kuang-Hui Chi; Chien-Chao Tseng

2012-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A class of authentication codes with secrecy  

Science Conference Proceedings (OSTI)

We study a class of authentication codes with secrecy. We determine the maximum success probabilities of the impersonation and the substitution attacks on these codes and the level of secrecy. Therefore we give an answer to an open problem stated in ... Keywords: 14G50, 94A60, 94A62, Algebraic function fields, Authentication codes with secrecy, Linearized polynomial

Elif Kurtaran zbudak; Ferruh zbudak; Zlfkar Sayg?

2011-04-01T23:59:59.000Z

62

Plugging a Scalable Authentication Framework into Shibboleth  

Science Conference Proceedings (OSTI)

In a VO (virtual organisation) environment where services are provided and shared by dissimilar organisations from different administrative domains and are protected with dissimilar security policies and measures, there is a need for a flexible authentication ... Keywords: Grid authentication, security architecture, smart tokens.

N. Zhang; L. Yao; J. Chin; A. Nenadic; A. McNab; A. Rector; C. Goble; Q. Shi

2005-06-01T23:59:59.000Z

63

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

64

A simple threshold authenticated key exchange from short secrets  

Science Conference Proceedings (OSTI)

This paper brings the password-based authenticated key exchange (PAKE) problem closer to practice. It takes into account the presence of firewalls when clients communicate with authentication servers. An authentication server can indeed be seen as two ... Keywords: password-based authentication, threshold protocols

Michel Abdalla; Olivier Chevassut; Pierre-Alain Fouque; David Pointcheval

2005-12-01T23:59:59.000Z

65

Password based key exchange with mutual authentication  

Science Conference Proceedings (OSTI)

A reasonably efficient password based key exchange (KE) protocol with provable security without random oracle was recently proposed by Katz, et al. [17] and later by Gennaro and Lindell [13]. However, these protocols do not support mutual authentication ...

Shaoquan Jiang; Guang Gong

2004-08-01T23:59:59.000Z

66

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

67

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

68

Kerberos authentication: The security answer for unsecured networks  

Science Conference Proceedings (OSTI)

Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

Engert, D.E.

1995-06-01T23:59:59.000Z

69

Using Rose and Compass for Authentication  

Science Conference Proceedings (OSTI)

Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

White, G

2009-07-09T23:59:59.000Z

70

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

1999-01-01T23:59:59.000Z

71

System and method for authentication of goods  

SciTech Connect

An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity is disclosed. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

Kaish, N.; Fraser, J.; Durst, D.I.

1999-10-26T23:59:59.000Z

72

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

73

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

74

Amateur Anthropologists: DIY Tourism as Learning Culture and Accessing Authenticity  

E-Print Network (OSTI)

Paula. A. Tourists as Pilgrims: Commercial Fashioning of1983:20). Considering tourists as pilgrims of sacralization,is a kind of contemporary pilgrim, seeking authenticity in

Nishijima, Ryoko

2012-01-01T23:59:59.000Z

75

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

76

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Remote Authenticated Users Gain Elevated Privileges V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-535: Oracle Critical Patch Update -...

77

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network (OSTI)

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

78

A framework for password-based authenticated key exchange1  

Science Conference Proceedings (OSTI)

In this paper, we present a general framework for password-based authenticated key exchange protocols, in the common reference string model. Our protocol is actually an abstraction of the key exchange protocol of Katz et al. and is based on the recently ... Keywords: Passwords, authentication, dictionary attack, projective hash functions

Rosario Gennaro; Yehuda Lindell

2006-05-01T23:59:59.000Z

79

On Automatic Authenticity Verification of Printed Security Documents  

Science Conference Proceedings (OSTI)

This paper presents a pioneering effort to involve machine in checking document authenticity. A particular class of security documents has been considered for the present experiment. Bank cheques, several kinds of tickets like lottery tickets, air tickets, ... Keywords: authenticity verification, security document, forensic document examination, bank cheques

Utpal Garain; Biswajit Halder

2008-12-01T23:59:59.000Z

80

Robust secret key based authentication scheme using smart cards  

Science Conference Proceedings (OSTI)

User authentication is an important part of security, along with confidentiality and integrity, for systems that allow remote access over untrustworthy networks, like the Internet. Recently, Chen et al. proposed an improvement on the SAS-like password ... Keywords: authentication, cryptography, secret key, smart card

Eun-Jun Yoon; Kee-Young Yoo

2005-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

An improved anonymous authentication and key exchange scheme  

Science Conference Proceedings (OSTI)

Nowadays, anonymity property of user authentication scheme becomes important. In 2003, Park et al. proposed an authentication and key exchange scheme using smart card. However, Juang et al. pointed out that Park et al.'s scheme did not provide the user ...

Kyung-kug Kim; Myung-Hwan Kim

2012-09-01T23:59:59.000Z

82

Challenges and architectural approaches for authenticating mobile users  

Science Conference Proceedings (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

83

Mutual Authentication for Low-Power Mobile Devices  

Science Conference Proceedings (OSTI)

We propose methods for mutual authentication and key exchange. Our methods are well suited for applications with strict power consumption restrictions, such as wireless medical implants and contactless smart cards. We prove the security of our schemes ... Keywords: gap problem, low power, medical informatics, mutual authentication

Markus Jakobsson; David Pointcheval

2002-02-01T23:59:59.000Z

84

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

85

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

86

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

87

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

88

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

89

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

90

A location based security framework for authenticating mobile phones  

Science Conference Proceedings (OSTI)

Although the utilisation of location information in mobile network access systems has given rise to a variety of applications and services, it is thought that the underlying service authentication model and the related security can be further enhanced. ...

Lishoy Francis; Keith Mayes; Gerhard Hancke; Konstantinos Markantonakis

2010-11-01T23:59:59.000Z

91

Bootstrapping Timed Efficient Stream Loss-Tolerant Authentication (TESLA)  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). TESLA, the Timed Efficient Stream Loss-tolerant Authentication protocol, provides source authentication in multicast scenarios. TESLA is an efficient protocol with low communication and computation overhead that scales to large numbers of receivers and also tolerates packet loss. TESLA is based on loose time synchronization between the sender and the receivers. Source authentication is realized in TESLA by using Message Authentication Code (MAC) chaining. The use

Request Comments; H. Tschofenig; Status Of This Memo

2006-01-01T23:59:59.000Z

92

Efficient password-based authenticated key exchange without public information  

Science Conference Proceedings (OSTI)

Since the first password-based authenticated key exchange (PAKE) was proposed, it has enjoyed a considerable amount of interest from the cryptographic research community. To our best knowledge, most of proposed PAKEs based on Diffie-Hellman key exchange ...

Jun Shao; Zhenfu Cao; Licheng Wang; Rongxing Lu

2007-09-01T23:59:59.000Z

93

@Yuan Xue (yuan.xue@vanderbilt.edu) Authentication Protocol  

E-Print Network (OSTI)

. If A trusts B and B is hacked, then the attacker could gain access to A. Network address impersonation (address spoofing) Ingress filtering #12;@Yuan Xue (yuan.xue@vanderbilt.edu) Cryptographic Authentication

Cui, Yi

94

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

95

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

not checked realm values were not checked the server secret was hard-coded to a known string The result of these weaknesses is that DIGEST authentication was only as secure as...

96

Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

RSA SecurID User Guide VPN Home What is RSA SecurID? RSA SecurID two-factor authentication is based on something you know (a password or PIN) and something you have (an...

97

Analog Video Authentication and Seal Verification Equipment Development  

SciTech Connect

Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

Gregory Lancaster

2012-09-01T23:59:59.000Z

98

Ultra-wideband Location Authentication for Item Tracking  

SciTech Connect

International safeguards is increasingly utilizing unattended and remote monitoring methods to improve inspector efficiency and the timeliness of diversion detection. Item identification and tracking has been proposed as one unattended remote monitoring method, and a number of radio-frequency (RF) technologies have been proposed. When utilizing location information for verification purposes, strong assurance of the authenticity of the reported location is required, but most commercial RF systems are vulnerable to a variety of spoofing and relay attacks. ORNL has developed a distance bounding method that uses ultra-wideband technology to provide strong assurance of item location. This distance bounding approach can be coupled with strong symmetric key authentication methods to provide a fully authenticable tracking system that is resistant to both spoofing and relay attacks. This paper will discuss the overall problems associated with RF tracking including the common spoofing and relay attack scenarios, the ORNL distance bounding approach for authenticating location, and the potential applications for this technology.

Rowe, Nathan C [ORNL; Kuhn, Michael J [ORNL; Stinson, Brad J [ORNL; Holland, Stephen A [ORNL

2012-01-01T23:59:59.000Z

99

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

100

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Design and Implementation of a Zero-Knowledge Authentication Framework for Java Card  

Science Conference Proceedings (OSTI)

Zero-knowledge authentication protocols are an alternative to authentication protocols based on public key cryptography. Low processing and memory consumption make them especially suitable for implementation in smart card microprocessors, which are severely ...

Kenan Kalajdzic; Ahmed Patel; Laleh Golafshan; Mona Taghavi

2011-07-01T23:59:59.000Z

102

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

103

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

104

Secure Access Control Through Challenge and Response Authentication  

E-Print Network (OSTI)

compares various types of key technology (mechanical, magnetic, contact, RFID), and evaluates these keys for their strengths and weaknesses. Keys with challenge and response authentication overcome the limitations of the traditional static data keys. The challenge and response concept is discussed; suitable keys are presented and compared. The document concludes with an explanation of why challenge and response authentication is more secure than concepts that rely on static data. A version of this app note was published by Embedded.com on March 15, 2011.

unknown authors

2011-01-01T23:59:59.000Z

105

Authentication and protection for e-finance consumers: the dichotomy of cost versus ease of use  

Science Conference Proceedings (OSTI)

Multifactor authentication is a tool to combat identity theft and is mandated by the Federal Financial Institutions Examination Council. However, there are only a few US financial institutions that have implemented two-factor authentication. A goal for ... Keywords: biometrics, e-banking, e-finance, electronic banking, electronic finance, identity theft, internet, multifactor authentication, online ID theft, online banking, phishing, security token, web authentication

Seungjae Shin; Jerry Cunningham; Jungwoo Ryoo; Jack E. Tucci

2009-03-01T23:59:59.000Z

106

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

107

Improvement on Pretty-Simple Password Authenticated Key-Exchange Protocol for Wireless Networks  

Science Conference Proceedings (OSTI)

This paper presents an improved method inspired by the recently proposed Pretty-Simple PAKE (Password Authenticated Key-Exchange) protocol, which is already a well-known, robust and simple password authenticated key exchange scheme. In our even more ... Keywords: elliptic curve discrete logarithm, key exchange, password authentication, wireless network

Ting-Yi Chang; Chou-Chen Yang; Chia-Meng Chen

2004-04-01T23:59:59.000Z

108

Comparative study of multicast authentication schemes with application to wide-area measurement system  

Science Conference Proceedings (OSTI)

Multicasting refers to the transmission of a message to multiple receivers at the same time. To enable authentication of sporadic multicast messages, a conventional digital signature scheme is appropriate. To enable authentication of a multicast data ... Keywords: multicast authentication, multiple-time signature scheme, smart grid, wide-area measurement system

Yee Wei Law, Zheng Gong, Tie Luo, Slaven Marusic, Marimuthu Palaniswami

2013-05-01T23:59:59.000Z

109

Mobile one-time passwords: two-factor authentication using mobile phones  

Science Conference Proceedings (OSTI)

Static password authentication has security drawbacks. In two-factor authentication (2FA,) each user carries a device, called token, to generate passwords that are valid only one time. 2FA based on one-time passwords (OTPs) provides improved protection ... Keywords: nested hashing chain, one-time password, two-factor authentication

Mohamed Hamdy Eldefrawy; Muhammad Khurram Khan; Khaled Alghathbar; Tai-Hoon Kim; Hassan Elkamchouchi

2012-05-01T23:59:59.000Z

110

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

111

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

112

Security problems with a chaos-based deniable authentication scheme  

E-Print Network (OSTI)

Recently, a new scheme was proposed for deniable authentication. Its main originality lied on applying a chaos-based encryption-hash parallel algorithm and the semi-group property of the Chebyshev chaotic map. Although original and practicable, its insecurity and inefficiency are shown in this paper, thus rendering it inadequate for adoption in e-commerce.

G. Alvarez

2004-12-09T23:59:59.000Z

113

Secure RFID authentication scheme for EPC class Gen2  

Science Conference Proceedings (OSTI)

Recently, much research has been actively conducted for a new kind of network environment ubiquitous computing. This paper will define the essential technology called "ad hoc network" and the "RFID technology" required by a ubiquitous environment. Therefore, ... Keywords: RFID, authentication, security

Dae-Hee Seo; Jang-Mi Baek; Dong-sub Cho

2009-02-01T23:59:59.000Z

114

Undercover: authentication usable in front of prying eyes  

Science Conference Proceedings (OSTI)

A number of recent scams and security attacks (phishing, spyware, fake terminals, ...) hinge on a crook's ability to observe user behavior. In this paper, we describe the design, implementation, and evaluation of a novel class of user authentication ... Keywords: multisensory processes, security, usability

Hirokazu Sasamoto; Nicolas Christin; Eiji Hayashi

2008-04-01T23:59:59.000Z

115

Mobile token-based authentication on a budget  

Science Conference Proceedings (OSTI)

We propose a light-weight, cheap authentication device for unlocking a user's smartphone. The device can be carried on a key chain and automatically unlocks the smartphone whenever its owner wants to use it. Our goal is to build a device that works with ...

Hristo Bojinov; Dan Boneh

2011-03-01T23:59:59.000Z

116

Hardware device to physical structure binding and authentication  

Science Conference Proceedings (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

117

Defining the questions: a research agenda for nontraditional authentication in arms control  

Science Conference Proceedings (OSTI)

Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

118

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

119

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

120

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

122

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

123

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

124

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

125

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

126

Cryptanalysis of Al-Riyami-Paterson's Authenticated Three Party Key Agreement Protocols  

E-Print Network (OSTI)

Recently, Al-Riyami and Paterson [1] proposed four authenticated tripartite key agreement protocols which make use of Weil pairing. In this paper, we show...

Kyungah Shim

2003-01-01T23:59:59.000Z

127

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

128

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

129

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the target system. A remote authenticated user can execute SQL commands on the underlying database. A remote user can spoof connections in certain cases. Solution: The vendor has...

130

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

NLE Websites -- All DOE Office Websites (Extended Search)

IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by...

131

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network (OSTI)

Internet authentication for popular end-user transactions, such as online banking and e-commerce, continues to be dominated by passwords entered through end-user personal computers (PCs). Most users continue to prefer (typically untrusted) PCs over smaller personal devices for actual transactions, due to usability features related to keyboard and screen size. However most such transactions and their existing underlying protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user identity and sensitive account information allowing account access. We propose a simple approach to counter such attacks, which cryptographically separates a users long-term secret input (typically low-entropy password) from the client PC. The latter continues to be used for most of the interaction and computations but has access only to temporary secrets, while the users long-term secret is input through an independent personal trusted device such as a cellphone which makes it available to the PC only after encryption under the intended far-end recipients public key. Our proposal is intended to safeguard passwords from the attacks mentioned above, as well as to provide transaction security to foil session hijacking. To facilitate a comparison to our proposal, we also provide a comprehensive survey of web authentication techniques that use an additional factor of authentication such as a cellphone, PDA (personal digital assistant) or hardware token; this survey may be of independent interest. A proof sketch of MP-Auth using the Protocol Composition Logic (PCL) is also provided.

Mohammad Mannan; P. C. van Oorschot

2008-01-01T23:59:59.000Z

132

Final report and recommendations of the ESnet Authentication Pilot Project  

Science Conference Proceedings (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

133

BABAR Web job submission with Globus Authentication and AFS Access  

Science Conference Proceedings (OSTI)

We present two versions of a grid job submission system produced for the BaBar experiment. Both use globus job submission to process data spread across various sites, producing output which can be combined for analysis. The problems encountered with authorization and authentication, data location, job submission, and the input and output sandboxes are described, as are the solutions. The total system is still some way short of the aims of enterprises such as the EDG, but represent a significant step along the way.

Forti, Alessandra

2003-06-17T23:59:59.000Z

134

A framework for federated two-factor authentication enabling cost-effective secure access to distributed cyberinfrastructure  

Science Conference Proceedings (OSTI)

As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus ... Keywords: OTP, XSEDE, authentication, radius

Matthew A. Ezell; Gary L. Rogers; Gregory D. Peterson

2012-07-01T23:59:59.000Z

135

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

136

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

137

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network (OSTI)

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

138

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network (OSTI)

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Perrig, Adrian

139

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP  

E-Print Network (OSTI)

Security Analysis of Lightweight Authentication Protocol from WISTP 2013 Wang Shao-HuiP 1,2,3) P Key Laboratory for Wireless Sensor Networks, Nanjing 210003, China) P 3) P( Network and Data Security Frequency Identification (RFID) is security and privacy. Many RFID authentication protocols have been

International Association for Cryptologic Research (IACR)

140

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Transaction-based authentication and key agreement protocol for inter-domain VoIP  

Science Conference Proceedings (OSTI)

We present an authentication and key agreement protocol to secure Voice over IP call establishment between interconnection proxies of different domains. The protocol operates on a transaction basis. Each transaction is defined as the set of operations ... Keywords: Authentication, DDoS Protection, Inter-domain VoIP, Synchronisation, VoIP security

Patrick Battistello; Joaquin Garcia-Alfaro; Cyril DelTr

2012-09-01T23:59:59.000Z

142

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network (OSTI)

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

143

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

144

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

145

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

146

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

147

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

148

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

149

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

150

Holographic Labeling And Reading Machine For Authentication And Security Appications  

DOE Patents (OSTI)

A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

1999-07-06T23:59:59.000Z

151

Adaptive sampler  

DOE Patents (OSTI)

An adaptive data compression device for compressing data having variable frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, Bobby L. (Idaho Falls, ID); Aeby, Ian (Fremont, CA)

1982-01-01T23:59:59.000Z

152

Adaptive sampler  

DOE Patents (OSTI)

An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, B.L.; Aeby, I.

1980-08-26T23:59:59.000Z

153

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

154

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

155

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

156

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

157

Provably-Secure two-round password-authenticated group key exchange in the standard model  

Science Conference Proceedings (OSTI)

Password-authenticated group key exchange (PAGKE) allows group users to share a session key using a human-memorable password only. The fundamental security goal of PAGKE is security against dictionary attacks. Several solutions have been proposed ...

Jeong Ok Kwon; Ik Rae Jeong; Dong Hoon Lee

2006-10-01T23:59:59.000Z

158

Olive Oil: Chemistry and Technology, 2nd EditionChapter 7 Analysis and Authentication  

Science Conference Proceedings (OSTI)

Olive Oil: Chemistry and Technology, 2nd Edition Chapter 7 Analysis and Authentication Food Science Health Nutrition Biochemistry Processing eChapters Food Science & Technology Health - Nutrition - Biochemistry Processing Press

159

The Use of Timed Efficient Stream Loss-Tolerant Authentication (TESLA  

E-Print Network (OSTI)

This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards " (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2006). This memo describes the use of the Timed Efficient Stream Losstolerant Authentication (RFC 4082) transform within the Secure Realtime Transport Protocol (SRTP), to provide data origin authentication

M. Baugher; E. Carrara

2006-01-01T23:59:59.000Z

160

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

162

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

163

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

164

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

165

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

166

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network (OSTI)

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

167

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network (OSTI)

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

168

An efficient remote user authentication and key agreement protocol for mobile client-server environment from pairings  

Science Conference Proceedings (OSTI)

With the continue evaluation of mobile devices in terms of the capabilities and services, security concerns increase dramatically. To provide secured communication in mobile client-server environment, many user authentication protocols from pairings ... Keywords: Bilinear pairing, ID-based, Key agreement, Mobile device, Mutual authentication, Provable security

Debiao He

2012-08-01T23:59:59.000Z

169

Design and development of a mobile EPC-RFID-based self-validation system (MESS) for product authentication  

Science Conference Proceedings (OSTI)

The increase in the number of counterfeits penetrating into the open market has created the need for a product authentication approach in tracing and tracking the product anytime, anywhere. Owing to the vague concepts frequently represented in flow of ... Keywords: Anti-counterfeit system, Counterfeiting, Electronic product code (EPC), Product authentication, Radio frequency identification (RFID)

S. K. Kwok; Jacky S. L. Ting; Albert H. C. Tsang; W. B. Lee; Benny C. F. Cheung

2010-09-01T23:59:59.000Z

170

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

171

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

172

Authentication of images for 3D cameras: Reversibly embedding information using intelligent approaches  

Science Conference Proceedings (OSTI)

In this work, a reversible watermarking approach for authentication of 3D cameras based on computational intelligence is presented. Two intelligent techniques based on differential evolution (DE) and hybrid DE are employed to optimize the tradeoff between ... Keywords: 3D camera, Depth maps, Differential evolution algorithm, Integer wavelet transform, Particle swarm optimization, Reversible watermarking

Sana Ambreen Malik; Asifullah Khan; Mutawarra Hussain; Khurram Jawad; Rafiullah Chamlawi; Abdul Jalil

2012-11-01T23:59:59.000Z

173

Can we fix the security economics of federated authentication? (transcript of discussion)  

Science Conference Proceedings (OSTI)

OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this is stuff that I did while I was at Google in January and February. I'm on sabbatical this year and so I'm visiting various ...

Ross Anderson

2011-03-01T23:59:59.000Z

174

Security Analysis and Implementation of JUITImage Based Authentication System Using Kerberos Protocol  

Science Conference Proceedings (OSTI)

Secure environments protect their resources against unauthorized access by enforcing access control mechanisms. So when increasing security is an issue text based passwords are not enough to counter such problems. The need for something more secure along ... Keywords: Image Based Authentication System, AJAX, MySQL, Diffie-Hellman key Exchange, Kerberos Protocol, Keystroke Logging, Tempest Attack, Shoulder Attack, Brute-force Attack

Nitin; Durg Singh Chauhan; Vivek Kumar Sehgal; Ankit Mahanot; Pallavi Singh; Sohit Ahuja; Utkarsh Shrivastava; Manisha Rana; Vineet Punjabi; Shivam Vinay; Nakul Sharma

2008-05-01T23:59:59.000Z

175

Strong password-based authentication in TLS using the three-party group Diffie Hellman protocol  

Science Conference Proceedings (OSTI)

The internet has evolved into a very hostile ecosystem where 'phishing' attacks are common practice. This paper shows that the three-party group Diffie-Hellman key exchange can help protect against these attacks. We have developed password-based ... Keywords: TLS, cryptography, group Diffie Hellman key exchange, networks, password authentication, phishing attacks, transport layer security

Michel Abdalla; Emmanuel Bresson; Olivier Chevassut; Bodo Moller; David Pointcheval

2007-04-01T23:59:59.000Z

176

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

177

SSH: secure login connections over the internet  

Science Conference Proceedings (OSTI)

SSH provides secure login, file transfer, X11, and TCP/IP connections over an untrusted network. It uses cryptographic authentication, automatic session encryption, and integrity protection for transferred data. RSA is used for key exchange and authentication, ...

Tatu Ylnen

1996-07-01T23:59:59.000Z

178

Experimental Adaptive Bayesian Tomography  

E-Print Network (OSTI)

We report an experimental realization of an adaptive quantum state tomography protocol. Our method takes advantage of a Bayesian approach to statistical inference and is naturally tailored for adaptive strategies. For pure states we observe close to 1/N scaling of infidelity with overall number of registered events, while best non-adaptive protocols allow for $1/\\sqrt{N}$ scaling only. Experiments are performed for polarization qubits, but the approach is readily adapted to any dimension.

Konstantin Kravtsov; Stanislav Straupe; Igor Radchenko; Neil Houlsby; Sergey Kulik

2013-03-07T23:59:59.000Z

179

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

180

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

182

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

183

Adaptive Discrete Cosine Transform  

Science Conference Proceedings (OSTI)

The theory and performance of the adaptive discrete cosine transform filter is examined. The discrete cosine transform filter is a realization of an FIR filter as the cascade of an all-zero FIR filter with a bank of IIR digital resonators. Each bank ... Keywords: FIR filter, IIR digital resonators, LMS algorithm, adaptive discrete cosine transform filter, adaptive filters, all-zero FIR filter, filter coefficient, frequency, magnitude, phase, transfer function, update method

S. J. Bukowinski; L. Gerhardt; M. Fargues; G. Coutu

1995-10-01T23:59:59.000Z

184

Adaptive Video Retrieval  

E-Print Network (OSTI)

Hopfgartner,F. Villa,R. Urban,J. Jose,J.M. Proceedings of the First International Workshop on Adaptive Information Retrieval pp 28-29

Hopfgartner, F.

185

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

This study examined the Texas Renaissance Festival as perceived and experienced by (serious) visitors for whom this was a form of regular, repeated and highly meaningful participation. Specifically, the focus was to gain understanding of the notion of serious leisure as defined by Stebbins, in the context of festivals, and to understand the meanings associated with festival participation. Following a qualitative (constructivism paradigm) research frame, the data were collected through participant observation and 37 in-depth interviews for highly committed tourists to the Texas Renaissance Festival. The collected data were analyzed through Grounded Theory techniques specified by Glaser (1978). In regard to the characteristics of participation, the results indicated that their continuous participation in the Texas Renaissance Festival displays qualities of serious leisure: 1) identification; 2) long-term career; 3) unique ethos; 4) significant personal effort; 5) perseverance; and 6) durable personal benefits. As they become more seriously involved in the festival participation, they tend to be a part of a well-integrated subculture of which prominent values include personal freedom, hedonism, and anti-materialism. The experiences constructed through the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search of such authentic experiences at the festival seems to be partly driven by the perceived alienation in everyday life. When these aspects were examined from an interpretive and meaning-based approach, attending the festival in a serious manner is not just a simple matter of escaping from the reality (e.g., alienation) of everyday life, but is an active quest for an ?alternative? to their lives at home as many indicated. Thus, the serious participation in a tourism activity such as the Texas Renaissance Festival could be best understood as a dynamic process of attaining existential state of Being in response to diverse sociocultural conditions. Several significant theoretical propositions were made based on the results derived from this study. Additionally, marketing and management implications associated with staging tourism events and festivals were discussed.

Kim, Hyounggon

2004-12-01T23:59:59.000Z

186

Leak test adapter for containers  

DOE Patents (OSTI)

An adapter is provided for facilitating the charging of containers and leak testing penetration areas. The adapter comprises an adapter body and stem which are secured to the container`s penetration areas. The container is then pressurized with a tracer gas. Manipulating the adapter stem installs a penetration plug allowing the adapter to be removed and the penetration to be leak tested with a mass spectrometer. Additionally, a method is provided for using the adapter. The present invention relates generally to leak test adapters, and more particularly to leak test adapters used with containers such as radioactive material shipping containers.

Hallett, B.H.; Hartley, M.S.

1995-12-31T23:59:59.000Z

187

Optical Military Systems Adaptive  

NLE Websites -- All DOE Office Websites (Extended Search)

turbulence in ground-based telescopes or to improve the spatial mode and power of lasers. More recently, Sandia has led the innovation of using adaptive elements, such as...

188

Using a personal device to strengthen password authentication from an untrusted computer  

E-Print Network (OSTI)

Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to users financial accounts. Most existing or proposed solutions are vulnerable to session hijacking attacks. We propose a simple approach to counter these attacks, which cryptographically separates a users long-term secret input from (typically untrusted) client PCs; a client PC performs most computations but has access only to temporary secrets. The users long-term secret (typically short and low-entropy) is input through an independent personal trusted device such as a cellphone. The personal device provides a users long-term secrets to a client PC only after encrypting the secrets using a pre-installed, correct public key of a remote service (the intended recipient of the secrets). The proposed protocol (MP-Auth) realizes such an approach, and is intended to safeguard passwords from keyloggers, other malware (including rootkits), phishing attacks and pharming, as well as to provide transaction security to foil session hijacking. We report on a prototype implementation of MP-Auth, and provide a comparison of web authentication techniques that use an additional factor of authentication (e.g. a cellphone, PDA or hardware token).

Mohammad Mannan; P. C. van Oorschot

2007-01-01T23:59:59.000Z

189

Sensible Authentication  

Science Conference Proceedings (OSTI)

The problem with securing assets and their functionality is that, by definition, you don't want to protect them from everybody. It makes no sense to protect assets from their owners, or from other authorized individuals (including the trusted personnel ...

Bruce Schneier

2004-02-01T23:59:59.000Z

190

The Climate Adaptation Frontier  

Science Conference Proceedings (OSTI)

Climate adaptation has emerged as a mainstream risk management strategy for assisting in maintaining socio-ecological systems within the boundaries of a safe operating space. Yet, there are limits to the ability of systems to adapt. Here, we introduce the concept of an adaptation frontier , which is defined as a socio-ecological system s transitional adaptive operating space between safe and unsafe domains. A number of driving forces are responsible for determining the sustainability of systems on the frontier. These include path dependence, adaptation/development deficits, values conflicts and discounting of future loss and damage. The cumulative implications of these driving forces are highly uncertain. Nevertheless, the fact that a broad range of systems already persist at the edge of their frontiers suggests a high likelihood that some limits will eventually be exceeded. The resulting system transformation is likely to manifest as anticipatory modification of management objectives or loss and damage. These outcomes vary significantly with respect to their ethical implications. Successful navigation of the adaptation frontier will necessitate new paradigms of risk governance to elicit knowledge that encourages reflexive reevaluation of societal values that enable or constrain sustainability.

Preston, Benjamin L [ORNL

2013-01-01T23:59:59.000Z

191

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network (OSTI)

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst clergy and how it may differ from the emotional labor experienced in other occupations, with the premise that individuals have multiple identities that shift and change depending on the situational context. A thematic analysis of interviews conducted with twenty-seven clergy and a textual analysis of denominational/church texts was conducted to examine the following ideas: 1) how clergy negotiated tensions of authenticity and identity in their work; 2) how clergy described the spiritual and emotional dimensions of their work; 3) how denominational texts address issues of spiritual and emotional labor; and, 4) if clergy felt enabled and/or constrained by denominational standards and beliefs. The results of this study indicated that emotional and spiritual labor amongst clergy is unique for several reasons. One, the emotional labor clergy engaged in served a positive function because they see it as means of helping others. Second, clergy were aware that emotional labor was intrinsic to the job and they engaged in activities to preempt or manage the tension they felt when the job required them to mask their true feelings and display organizationally preferred feelings. Finally, clergy enjoyed the spiritual dimension of their jobs; thus they were engaged in spiritual work (authentic spirituality), not spiritual labor (inauthentic spirituality). Results also indicated that denominational texts did convey a preferred identity or ideal for how pastors should behave. Pastors indicated that the denominational expectations and guidelines for pastors both enabled and constrained them. The majority of the pastors felt the freedom to disagree civilly and the denomination/church provided venues in which pastors could communicate their dissenting views. However, in some cases, pastors felt the denominational guidelines for the "ideal pastor" were in conflict with how they saw their own role as pastor and they left the denomination. Results also revealed how pastors identities shifted and changed as the context in which they were ministering changed.

Otey, Penny Addison

2010-08-01T23:59:59.000Z

192

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network (OSTI)

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

193

Verification of Adaptive Systems  

SciTech Connect

Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance for them. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

Pullum, Laura L [ORNL; Cui, Xiaohui [New York Institute of Technology (NYIT); Vassev, Emil [Lero The Irish Software Engineering Research Centre; Hinchey, Mike [Lero The Irish Software Engineering Research Centre; Rouff, Christopher [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation

2012-01-01T23:59:59.000Z

194

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network (OSTI)

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

195

Adaptive sequential controller  

Science Conference Proceedings (OSTI)

An adaptive sequential controller for controlling a circuit breaker or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer. 15 figs.

El-Sharkawi, M.A.; Xing, J.; Butler, N.G.; Rodriguez, A.

1994-11-01T23:59:59.000Z

196

Plants remember drought, adapt  

Science Conference Proceedings (OSTI)

Research carried out at the University of Nebraska-Lincoln (UNL; USA) shows that plants subjected to a previous period of drought learn to deal with the stress owing to their memories of the experience. Plants remember drought, adapt Inform Magazine

197

Adaptive sequential controller  

DOE Patents (OSTI)

An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

1994-01-01T23:59:59.000Z

198

Adaptation and adaptability : expectant design for resilience in coastal urbanity  

E-Print Network (OSTI)

What is the nature of and possibility for urban resiliency through adaptation? Adaptation implies responsiveness to phenomena that are disruptive to a system's functioning; it is a willful evolution in response to changed ...

Ruskeep, Laura A. Delaney (Laura Ashley Delaney)

2011-01-01T23:59:59.000Z

199

Adaptive Constraints for Feature Tracking  

Science Conference Proceedings (OSTI)

In this paper extensions to an existing tracking algorithm are described. These extensions implement adaptive tracking constraints in the form of regional upper-bound displacements and an adaptive track smoothness constraint. Together, these ...

K. I. Hodges

1999-06-01T23:59:59.000Z

200

Enhancing the Authentication of Bank Cheque Signatures by Implementing Automated System Using Recurrent Neural Network  

E-Print Network (OSTI)

The associatie memory feature of the Hopfield type recurrent neural network is used for the pattern storage and pattern authentication.This paper outlines an optimization relaxation approach for signature verification based on the Hopfield neural network (HNN)which is a recurrent network.The standard sample signature of the customer is cross matched with the one supplied on the Cheque.The difference percentage is obtained by calculating the different pixels in both the images.The network topology is built so that each pixel in the difference image is a neuron in the network.Each neuron is categorized by its states,which in turn signifies that if the particular pixel is changed.The network converges to unwavering condition based on the energy function which is derived in experiments.The Hopfield's model allows each node to take on two binary state values (changed/unchanged)for each pixel.The performance of the proposed technique is evaluated by applying it in various binary and gray scale images.This paper con...

Rao, Mukta; Dhaka, Vijaypal Singh

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Adaptive control for energy conservation  

DOE Green Energy (OSTI)

The objective of this project is to investigate the use of adaptive control concepts in buildings with solar-assisted heating, ventilating, and air-conditioning (HVAC) systems to maintain occupant comfort conditions while minimizing auxiliary energy use. Accomplishing this objective requires an energy management system capable of making sound tradeoffs. Optimal control theory is used along with a system identification technique to provide an adaptable stratgy. The resulting overall approach is known as adaptive optimal control (AOC).

Farris, D.R.

1980-03-01T23:59:59.000Z

202

Adaptive capacity and its assessment  

SciTech Connect

This paper reviews the concept of adaptive capacity and various approaches to assessing it, particularly with respect to climate variability and change. I find that adaptive capacity is a relatively under-researched topic within the sustainability science and global change communities, particularly since it is uniquely positioned to improve linkages between vulnerability and resilience research. I identify opportunities for advancing the measurement and characterization of adaptive capacity by combining insights from both vulnerability and resilience frameworks, and I suggest several assessment approaches for possible future development that draw from both frameworks and focus on analyzing the governance, institutions, and management that have helped foster adaptive capacity in light of recent climatic events.

Engle, Nathan L.

2011-04-20T23:59:59.000Z

203

Profile-Based Adaption . . .  

E-Print Network (OSTI)

Cache decay is a set of leakage-reduction mechanisms that put cache lines that have not been accessed for a specific duration into a low-leakage standby mode. This duration is called the decay interval, and its optimal value varies across applications. This paper provides an extended discussion of the results previously presented in our journal paper [13]. It describes an adaptation technique that analytically finds the optimal decay interval through profiling, and shows that the most important variables required for finding the optimal decay interval can be estimated with a reasonable degree of accuracy using profiling. This work explicitly trades off the leakage power saved in putting both the live and dead lines into standby mode, against its performance and energy costs. It achieves energy savings close to what can be obtained with an omniscient choice of per-benchmark optimal decay interval.

Karthik Sankaranarayanan; Kevin Skadron

2004-01-01T23:59:59.000Z

204

Adaptive neuro fuzzy controller for adaptive compliant robotic gripper  

Science Conference Proceedings (OSTI)

The requirement for new flexible adaptive grippers is the ability to detect and recognize objects in their environments. It is known that robotic manipulators are highly nonlinear systems, and an accurate mathematical model is difficult to obtain, thus ... Keywords: ANFIS controller, Adaptive compliant gripper, Embedded sensors, Fuzzy logic, Object recognizing

Dalibor Petkovi?; Mirna Issa; Nenad D. Pavlovi?; Lena Zentner; Arko OjbaI?

2012-12-01T23:59:59.000Z

205

Adaptive navigation for autonomous robots  

Science Conference Proceedings (OSTI)

In many robotic exploration missions, robots have to learn specific policies that allow them to: (i) select high level goals (e.g., identify specific destinations), (ii) navigate (reach those destinations), (iii) and adapt to their environment (e.g., ... Keywords: Learning, evolution, Learning, neural networks, Learning, single agent, Robotics, adaptation

Matt Knudson; Kagan Tumer

2011-06-01T23:59:59.000Z

206

Tightfit: adaptive parallelization with foresight  

Science Conference Proceedings (OSTI)

Irregular applications often exhibit data-dependent parallelism: Different inputs, and sometimes also different execution phases, enable different levels of parallelism. These changes in available parallelism have motivated work on adaptive concurrency ... Keywords: STM, adaptive software parallelization, data-dependent parallelism, irregular applications, offline learning

Omer Tripp; Noam Rinetzky

2013-08-01T23:59:59.000Z

207

Adaptive kernel principal component analysis  

Science Conference Proceedings (OSTI)

An adaptive kernel principal component analysis (AKPCA) method, which has the flexibility to accurately track the kernel principal components (KPC), is presented. The contribution of this paper may be divided into two parts. First, KPC are recursively ... Keywords: Adaptive method, Kernel principal component, Kernel principal component analysis, Non-stationary data, Recursive algorithm

Mingtao Ding; Zheng Tian; Haixia Xu

2010-05-01T23:59:59.000Z

208

Adaptive Markets and the New World Order  

E-Print Network (OSTI)

In the adaptive markets hypothesis (AMH) intelligent but fallible investors learn from and adapt to changing economic environments. This implies that markets are not always efficient but are usually competitive and adaptive, ...

Lo, Andrew W.

209

African Adaptation Programme | Open Energy Information  

Open Energy Info (EERE)

Adaptation Programme Adaptation Programme Jump to: navigation, search Logo: African Adaptations Programme Name African Adaptations Programme Agency/Company /Organization United Nations Development Programme, Government of Japan Topics Adaptation, Finance, Implementation, Policies/deployment programs Website http://www.undp-adaptation.org References AAP[1] Overview "UNDP, with funding from the Government of Japan, recently launched a new programme that uses an innovative approach to climate change adaptation in Africa. Under this programme, UNDP will assist 21 African countries in implementing integrated and comprehensive adaptation actions and resilience plans. The projects will ensure that national development processes incorporate climate change risks and opportunities to secure development gains under a

210

Adaptive Materials Inc | Open Energy Information  

Open Energy Info (EERE)

Zip MI 48108 Product Adaptive Materials Inc (AMI) is a developer of portable fuel cell technology. References Adaptive Materials Inc1 LinkedIn Connections CrunchBase...

211

Mainstreaming Climate Change Adaptation into Development Planning...  

Open Energy Info (EERE)

Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Jump to: navigation, search Tool Summary Name: Mainstreaming Climate Change Adaptation...

212

A Dynamic Platform for Runtime Adaptation  

E-Print Network (OSTI)

We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

Pham, Hubert

213

Optimal adaptive control with ?LQG.  

E-Print Network (OSTI)

??This thesis introduces ?LQG, the hyper extension of the Linear Quadratic Gaussian Regulator, for solving general purpose (locally optimal) nonlinear adaptive control on multiple-input multiple-output (more)

Wendt, Luke

2013-01-01T23:59:59.000Z

214

COMMENTARY:Limits to adaptation  

SciTech Connect

An actor-centered, risk-based approach to defining limits to social adaptation provides a useful analytic framing for identifying and anticipating these limits and informing debates over society s responses to climate change.

Preston, Benjamin L [ORNL

2013-01-01T23:59:59.000Z

215

Adaptive control for energy conservation  

DOE Green Energy (OSTI)

The use of adaptive control techniques is investigated in heating, ventilating, and air cnditioning (HVAC) systems in solar heated and cooled buildings to minimize the consumption of auxiliary energy. Optimal control theory is used in conjunction with the adaptive control techniques to accomplish the minimization of auxiliary energy. The resulting technique is referred to as adaptive optimal control (AOC). This study has been made by computer simulation and is centered on the National Security and Resources Study Center (NSRSC), a large solar heated and cooled building at the Los Alamos Scientific Laboratory (LASL). Simplified models of the building and HVAC system have been developed for both the heating and cooling modes. The control strategies actually used in the NSRSC were simulated in the models and an adaptive optimal controller was developed and also simulated. Simulation runs were made with both the conventional controller and the adaptive controller and performance results of the two simulations were compared. In the first results (obtained using a partial derivative system identification method), the adaptive optimal controller model demonstrated a savings in auxiliary energy of 28.8% for the heating simulation and 18.3% for the cooling simulation when compared to the conventional controller simulation models.

Farris, D.R.

1978-01-01T23:59:59.000Z

216

WeADAPT | Open Energy Information  

Open Energy Info (EERE)

WeADAPT WeADAPT Jump to: navigation, search Name WeADAPT Agency/Company /Organization weADAPT Sector Energy, Land, Water, Climate Resource Type Training materials, Lessons learned/best practices Website http://www.weadapt.org/ References weADAPT[1] "weADAPT.org is an online 'open space' on climate adaptation issues (including the synergies between adaptation and mitigation) which allows practitioners, researchers and policy makers to access credible, high quality information and to share experiences and lessons learnt with the weADAPT community. It is designed to facilitate learning, exchange, collaboration and knowledge integration to build a professional community of practice on adaptation issues while developing policy-relevant tools and guidance for adaptation planning and decision-making.

217

AfricaAdapt | Open Energy Information  

Open Energy Info (EERE)

AfricaAdapt AfricaAdapt Jump to: navigation, search Logo: Africa Adapt Name Africa Adapt Agency/Company /Organization AfricaAdapt Resource Type Training materials, Lessons learned/best practices Website http://www.africa-adapt.net/AA UN Region Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa References AfricaAdapt[1] Abstract AfricaAdapt is an independent bilingual network (French/English) focused exclusively on Africa. The Network's aim is to facilitate the flow of climate change adaptation knowledge for sustainable livelihoods between researchers, policy makers, civil society organisations and communities who are vulnerable to climate variability and change across the continent. Africa Adapt Screenshot "AfricaAdapt is an independent bilingual network (French/English) focused

218

Adaptive Liquid Crystal Windows  

SciTech Connect

Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft 1ft prototype panels for the worlds first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicrons patented e-Tint technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of power consumption by ALCWs allows for on-board power electronics for automatic matching of transmission through windows to varying climate conditions without drawing the power from the power grid. ALCWs are capable of transmitting more sunlight in winters to assist in heating and less sunlight in summers to minimize overheating. As such, they can change the window from being a source of energy loss to a source of energy gain. In addition, the scalable AMIs roll-to-roll process, proved by making 1ft 1ftALCW prototype panels, allows for cost-effective production of large-scale window panels along with capability to change easily their color and shape. In addition to architectural glazing in houses and commercial buildings, ALCWs can be used in other applications where control of sunlight is needed, such as green houses, used by commercial produce growers and botanical gardens, cars, aircrafts, etc.

Taheri, Bahman; Bodnar, Volodymyr

2011-12-31T23:59:59.000Z

219

A security solution for IEEE 802.11's ad hoc mode: password-authentication and group Diffie Hellman key exchange  

Science Conference Proceedings (OSTI)

IEEE 802 standards ease the deployment of networking infrastructures and enable employers to access corporate networks while travelling. These standards provide two modes of communication called infrastructure and ad hoc modes. A security solution for ... Keywords: Diffie Hellman, IEEE 80211, ad hoc networks, cryptography, dictionary attacks, group key exchange, mobile networks, network security, password authentication, provable security, random oracles, wireless networks

Emmanuel Bresson; Olivier Chevassut; David Pointcheval

2007-05-01T23:59:59.000Z

220

Adaptive vibration control using synchronous demodulation with ...  

Adaptive vibration control using synchronous demodulation with machine tool controller motor commutation United States Patent

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Checking Properties of Adaptive Workflow Nets  

Science Conference Proceedings (OSTI)

In this paper we consider adaptive workflow nets, a class of nested nets that allows more comfort and expressive power for modeling adaptability and exception handling in workflow nets. We define two important behavioural properties of adaptive workflow ... Keywords: adaptive workflow, circumspectness, soundness, verification

Kees van Hee; Olivia Oanea; Alexander Serebrenik; Natalia Sidorova; Marc Voorhoeve; Irina A. Lomazova

2008-02-01T23:59:59.000Z

222

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

223

Adaptive hybrid impedance control of robot manipulators: a comparative study  

Science Conference Proceedings (OSTI)

Keywords: direct adaptive control, hybrid impedance control, passivity-based adaptive control, robotics

Lus F. Baptista; Jos M. G. S da Costa

1997-01-01T23:59:59.000Z

224

Adaptation Space: Surviving Non-Maskable Failures  

E-Print Network (OSTI)

Some failures cannot be masked by redundancies, because an unanticipated situation occurred, because fault-tolerance measures were not adequate, or because there was a security breach (which is not amenable to replication). Applications that wish to continue to offer some service despite nonmaskable failure must adapt to the loss of resources. When numerous combinations of non-maskable failure modes are considered, the set of possible adaptations becomes complex. This paper presents adaptation spaces, a formalism for navigating among combinations of adaptations. An adaptation space describes a collection of possible adaptations of a software component or system, and provides a uniform way of viewing a group of alternative software adaptations. Adaptation spaces describe the different means for monitoring the conditions that different adaptations depend on, and the particular configurations through which an adaptive application navigate. Our goal is to use adaptation spaces to provide survivable services to applications despite non-maskable failures such as malicious attacks. We present the basic concepts concerning adaptation spaces, with examples. We then present a formal model for reasoning about and selecting alternative adaptations, allowing developers of survivable application to automate their systems adaptive behavior. 1

Crispin Cowan; Lois Delcambre; Anne-francoise Le Meur; Ling Liu; David Maier; Dylan Mcnamee; Michael Miller; Calton Pu; Perry Wagle; Jonathan Walpole

1998-01-01T23:59:59.000Z

225

Adaptive wiener image restoration kernel  

DOE Patents (OSTI)

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

226

Adaptive protection algorithm and system  

Science Conference Proceedings (OSTI)

An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

Hedrick, Paul (Pittsburgh, PA); Toms, Helen L. (Irwin, PA); Miller, Roger M. (Mars, PA)

2009-04-28T23:59:59.000Z

227

Zero-knowledge device authentication: Privacy & security enhanced RFID preserving business value and consumer convenience  

E-Print Network (OSTI)

expected to enhance the operational efficiency of supply chain processes and customer service as well as adding digital functionality to products that were previously non-digital such as, e.g., washing machines automatically adapting to the clothes put into the machine. However, consumer response clearly shows significant concern and resistance related to consumer tracking and profiling as well as problems related to government tracking, criminal or terrorist abuse etc. Multiple conferences warn that RFID take-up is likely dependant on solving the privacy and security problems early. These concerns are not adequately addressed by current technology and legislation. In this paper, we present a model of the lifecycle of RFID tags used in the retail sector and identify the different actors who may interact with a tag. The lifecycle model is analysed in order to identify potential threats to the privacy of consumers and define a threat model. We suggest that the in-store problem is more related to lack of privacy solutions for the consumer himself than for the RFID. We propose a solution to the RFID privacy problem, which through zero-knowledge protocols and consumer control of keys has the potential to ensure consumer privacy needs without reducing corporate value from utilising the potential of RFID. We propose that securing RFIDs will require a physical redesign of RFIDs but that this can be done without leaving security and privacy issues to consent or regulation.

Stephan J. Engberg; Morten B. Harning; Christian Damsgaard Jensen

2004-01-01T23:59:59.000Z

228

Hardware implementation of wireless bit rate adaptation  

E-Print Network (OSTI)

This thesis presents a hardware implementation of the SoftRate bit-rate adaptation protocol. SoftRate is a new bit-rate adaptation protocol, which uses per-bit confidence hints generated by the convolutional decoder to ...

Gross, Samuel A

2010-01-01T23:59:59.000Z

229

An extensible monitoring and adaptation framework  

Science Conference Proceedings (OSTI)

Several techniques have been defined for the monitoring and adaptation of applications. However, such techniques usually work in isolation and cannot be easily integrated to tackle complex monitoring and adaptation scenarios. Furthermore, applications ...

Razvan Popescu; Athanasios Staikopoulos; Siobhn Clarke

2009-11-01T23:59:59.000Z

230

Adaptive control of Unmanned Aerial Systems  

E-Print Network (OSTI)

Adaptive control is considered to be one of the key enabling technologies for future high-performance, safety-critical systems such as air-breathing hypersonic vehicles. Adaptive flight control systems offer improved ...

Dydek, Zachary Thompson

2010-01-01T23:59:59.000Z

231

Boundedness of adaptive nets is decidable  

Science Conference Proceedings (OSTI)

Boundedness is a relevant property for adaptive systems: creation, composition and destruction of components at runtime introduce different infiniteness dimensions. In this paper we show the decidability of the boundedness for adaptive nets, a subclass ... Keywords: Adaptive nets, Boundedness, Decidability, Theory of computation

Olivia Oanea

2011-08-01T23:59:59.000Z

232

Presented by Adaptive Hybrid Mesh Refinement for  

E-Print Network (OSTI)

meters. · Orography plays an important role in determining the strength and location of the atmospheric on orographic field data Hybrid adapted geodesic mesh based on orographic field data Structured adapted spherical mesh based on orographic field data #12;7 Khamayseh_ITAPS_SC07 h-Adaptive hybrid mesh generation

233

Enhancing adaptability of distributed groupware applications  

Science Conference Proceedings (OSTI)

Distributed Groupware applications must be designed to cope with an increasingly diverse set of operational conditions. The available network bandwidth and latency, the network connectivity, the number of users, the type of devices, the system load, ... Keywords: adaptability, adaptive, adaptive layer, context awareness, groupware, mobile devices

Tebalo Tsoaeli; Judith Bishop

2005-07-01T23:59:59.000Z

234

A platform for developing adaptable multicore applications  

Science Conference Proceedings (OSTI)

Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previous application adaptation efforts, however, were ad-hoc, time-consuming, ... Keywords: application adaptation, frequency scaling, multicore, parallelization, run-time systems

Dan Fay; Li Shang; Dirk Grunwald

2009-10-01T23:59:59.000Z

235

Adaptive Techniques for Homebased Software DSMs #  

E-Print Network (OSTI)

Adaptive Techniques for Home­based Software DSMs # Lauro Whately 1 , Raquel Pinto 1 , Muralidharan and evaluates Home­based Adaptive Protocol (HAP), a software distributed shared­memory system. HAP performs two with the adaptive system. Keywords---Software Distributed Shared Memory, Home­basedLazy Release Consistency, Home­based

Bianchini, Ricardo

236

Adapted Physical Education Handbook Acknowledgements  

E-Print Network (OSTI)

It would be very difficult to individually acknowledge all the contributors to this handbook. As I visited colleges around the state, I was always welcomed with open arms by the adapted physical education faculty and staff. Their willingness to take time from their very busy schedules to show me their adapted physical education programs, to fill-out and return a six-page survey, and to attend the regional workshops was most appreciated. This handbook would not have been possible without their contributions and daily efforts to improve programs and services for students with disabilities. I would like to acknowledge Scott Hamilton, Statewide DSP&S Coordinator for the California Community Colleges, for his thoughtful support and guidance throughout this project. I would also like to express my thanks to Noel Roberts, Statewide DSP&S Analyst, for her timely administrative assistance in making the handbook possible. I would especially like to acknowledge the professionalism and dedication of the Adapted Physical Education Handbook Project Task Group. The handbook would never have achieved the same impact and magnitude without the knowledge, experience, and expertise that Kathy Bell, Mark Clements, Jon James, Chuck Keller, Mark Lipe, Mary Martin, and Lee Miller Parks brought to this

Jim Haynes

2002-01-01T23:59:59.000Z

237

Efficient side-channel testing for public key algorithms: RSA ...  

Science Conference Proceedings (OSTI)

... it may also b nts. ... us far, can qu ations in a sem nt to consider when testing might be eas ... ervals, slight d er to isolate, h is performed re a t-test (or et ...

2011-09-21T23:59:59.000Z

238

Adaptive Comfort Model: Simulations & Future Directions  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Comfort Model: Simulations & Future Directions Adaptive Comfort Model: Simulations & Future Directions Speaker(s): Richard de Dear Date: February 4, 2011 - 12:00pm Location: 90-4133 Seminar Host/Point of Contact: Philip Haves The last 20 years of thermal comfort have witnessed a shift away from the "static" approach (exemplified by the PMV/PPD model) towards the adaptive approach (exemplified by the adaptive models in ASHRAE's Standard 55 (2004, 2010) and the European Union's counterpart standard, EN15251 (2007). - the basis and derivation of the adaptive comfort model - adaptive comfort standards (ASHRAE 55 and EN15251) - new developments and directions (reporting back from the January 2011 ASHRAE Meeting of SSPC-55 in Las Vegas) - environmental variables other than dry bulb, in the adaptive model

239

Uganda-National Adaptation Programme of Action | Open Energy...  

Open Energy Info (EERE)

Adaptation Programme of Action AgencyCompany Organization United Nations Environment Programme, Global Environment Facility, Environmental Alert Topics Adaptation,...

240

Tanzania-National Adaptation Programme of Action | Open Energy...  

Open Energy Info (EERE)

Adaptation Programme of Action AgencyCompany Organization United Nations Environment Programme, Global Environment Facility Topics Adaptation, Background analysis...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Optimization Online - An adaptive accelerated proximal gradient ...  

E-Print Network (OSTI)

Apr 5, 2013 ... In case the strong convexity parameter is unknown, we also develop an adaptive scheme that can automatically estimate it on the fly, at the cost...

242

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

243

Adaptive computations on conforming quadtree meshes  

E-Print Network (OSTI)

adaptive re?nement for B-spline ?nite element, Int. J.enrichment [6,7] as well as B-splines [8]. These methods

Tabarraei, A; Sukumar, N

2005-01-01T23:59:59.000Z

244

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

245

Tailor Made: Adapting Psychotherapeutic Interventions  

E-Print Network (OSTI)

With increased diversity and globalization, there is increased emphasis on awareness of cultural influences on functioning and in fostering cultural competence. This is particularly important in the context of intervention planning and acceptability. The standard approach is through didactic coursework; however the extent to which the content of the courses is universal and includes relevance for intervention is unknown. The purpose of this content analysis was to determine whether or not cultural competence is addressed in psychotherapeutic intervention coursework. Direct intervention syllabi from APA accredited school psychology doctoral programs were analyzed. Findings suggest that cultural competence is minimally addressed in intervention courses. Similarly, the mechanisms for culturally adapting interventions are rarely addressed. Findings further suggest that when addressing cultural competence intervention courses focus on applying knowledge to the delivery of services. Understanding the content of current curricula may provide trainers with information to aid in designing their curriculum so that pre service school psychologists may matriculate with a broader basic therapy skill set.

Henry-Smith, Latanya Sherone

2013-08-01T23:59:59.000Z

246

A Power and Resolution Adaptive  

E-Print Network (OSTI)

A new power and resolution adaptive flash ADC, named PRA-ADC, is proposed. The PRA-ADC enables exponential power reduction with linear resolution reduction. Unused parallel voltage comparators are switched to standby mode. The voltage comparators consume only the leakage power during the standby mode. The PRA-ADC, capable of operating at 5-bit, 6-bit, 7-bit, and 8-bit precision, dissipates 69 mW at 5-bit and 435 mW at 8-bit. The PRA-ADC was designed and simulated with 0.18 m CMOS technology. The PRA-ADC design is applicable to RF portable communication devices, allowing tighter management of power and e#ciency.

Flash Analog-To-Digital Converter; Jincheol Yoo; Daegyu Lee; Kyusun Choi; Jongsoo Kim

2002-01-01T23:59:59.000Z

247

Downhole tool adapted for telemetry  

DOE Patents (OSTI)

A cycleable downhole tool such as a Jar, a hydraulic hammer, and a shock absorber adapted for telemetry. This invention applies to other tools where the active components of the tool are displaced when the tool is rotationally or translationally cycled. The invention consists of inductive or contact transmission rings that are connected by an extensible conductor. The extensible conductor permits the transmission of the signal before, after, and during the cycling of the tool. The signal may be continuous or intermittent during cycling. The invention also applies to downhole tools that do not cycle, but in operation are under such stress that an extensible conductor is beneficial. The extensible conductor may also consist of an extensible portion and a fixed portion. The extensible conductor also features clamps that maintain the conductor under stresses greater than that seen by the tool, and seals that are capable of protecting against downhole pressure and contamination.

Hall, David R. (Provo, UT); Fox, Joe (Provo, UT)

2010-12-14T23:59:59.000Z

248

Transcending the Adaptation/Mitigation Climate Change Science Policy Debate: Unmasking Assumptions about Adaptation and Resilience  

Science Conference Proceedings (OSTI)

The two principal policy approaches to global climate change include mitigation and adaption. In recent years, the interest in adaptation and resilience has increased significantly in part because anthropogenic climate change appears unavoidable ...

Tori L. Jennings

2011-10-01T23:59:59.000Z

249

Robust and secured image-adaptive data hiding  

Science Conference Proceedings (OSTI)

Rapid growth in the demand and consumption of digital information in past decade has led to valid concerns over issues such as content security, authenticity and digital right management. Imperceptible data hiding in digital images is an excellent example ... Keywords: AET, CDCS, Data hiding, Energy, IQMs, PSNR, Quantization, Robustness, Security, Steganography

Suresh N. Mali; Pradeep M. Patil; Rajesh M. Jalnekar

2012-03-01T23:59:59.000Z

250

Adaptive mesh generation for curved domains  

Science Conference Proceedings (OSTI)

This paper considers the technologies needed to support the creation of adaptively constructed meshes for general curved three-dimensional domains and outlines one set of solutions for providing them. A brief review of an effective way to integrate mesh ... Keywords: adaptive meshes, anisotropic meshes, curved meshes

Mark S. Shephard; Joseph E. Flaherty; Kenneth E. Jansen; Xiangrong Li; Xiaojuan Luo; Nicolas Chevaugeon; Jean-Franois Remacle; Mark W. Beall; Robert M. O'Bara

2005-02-01T23:59:59.000Z

251

Adaptive learning for event modeling and characterization  

Science Conference Proceedings (OSTI)

Adaptive learning of specific patterns or events of interest has been an area of significant research for various applications in the last two decades. In developing diagnostic evaluation and safety monitoring applications of a propulsion system, it ... Keywords: Adaptive learning, Event modeling, Fuzzy k-means clustering, Hierarchical clustering

Shuangshuang Dai; Atam P. Dhawan

2007-05-01T23:59:59.000Z

252

Adaptive workflow nets for grid computing  

Science Conference Proceedings (OSTI)

Existing grid applications commonly use workflows for the orchestration of grid services. Existing workflow models however suffer from the lack of adaptivity. In this paper we define Adaptive Grid Workflow nets (AGWF nets) appropriate for modeling grid ... Keywords: coordination, grid computing, modeling, petri nets, verification, workflows

Carmen Bratosin; Kees van Hee; Natalia Sidorova

2007-09-01T23:59:59.000Z

253

Adapting Your Home for More Accessible Living  

E-Print Network (OSTI)

It is important for people to live comfortably and independently in their homes. Homes can be adapted to aid people with various disabilities. This publication explains how to make such adaptations for people with vision loss, hearing loss, problems with touch and hand dexterity, loss of strength and range of motion, cognitive difficulties, mobility impairments, and problems with balance and coordination.

Harris, Janie

2007-04-27T23:59:59.000Z

254

DRM protected dynamic adaptive HTTP streaming  

Science Conference Proceedings (OSTI)

Dynamic adaptive HTTP streaming (DASH) is a new concept for video streaming using consecutive downloads of short video segments. 3GPP has developed the basic DASH standard which is further extended by the Open IPTV Forum (OIPF) and MPEG. In all versions ... Keywords: adaptive http streaming, content protection, digital rights management, encryption

Frank Hartung; Sinan Kesici; Daniel Catrein

2011-02-01T23:59:59.000Z

255

Optimal Adaptive Waveform Selection for Target Tracking  

E-Print Network (OSTI)

Optimal Adaptive Waveform Selection for Target Tracking Barbara La Scala Mohammad Rezaeian Bill algorithms. This paper describes an optimal adaptive waveform selection algorithm for target tracking. An adap- tive scheduling algorithm that selects the waveforms to be used in future epochs based on current

Rezaeian, Mohammad-Jafar

256

Adaptive sampling for Bayesian variable selection  

E-Print Network (OSTI)

Adaptive sampling for Bayesian variable selection DAVID J. NOTT Department of Statistics for variable selection and for dealing with model un- certainty have become increasingly popular in recent consider adaptive Markov chain Monte Carlo schemes for Bayesian variable selection in Gaussian linear

Blennerhassett, Peter

257

Adaptive Fuzzy PID Control for Boiler Deaerator  

Science Conference Proceedings (OSTI)

The boiler deaerator temperature control system is a non-linear, time-varying, delay control process. It can not achieve satisfying effect using traditional control algorithm to control deaerator water temperature, the paper proposes an adaptive fuzzy ... Keywords: Deaerator, Adaptive, Fuzzy control, PID control

Lei Jinli

2012-08-01T23:59:59.000Z

258

Assessing systems adaptability to a product family  

Science Conference Proceedings (OSTI)

In many cases, product families are established on top of a successful pilot product. While this approach provides an option to measure many concrete attributes like performance and memory footprint, adequateness and adaptability of the architecture ... Keywords: adaptability, assessment, product line architecture, software product lines

Mika Korhonen; Tommi Mikkonen

2004-07-01T23:59:59.000Z

259

Applying Adaptive Evolutionary Algorithms to Hard Problems  

E-Print Network (OSTI)

Applying Adaptive Evolutionary Algorithms to Hard Problems J.I. van Hemert1 jvhemert into two distinct parts. The main theme is adaptive evolutionary algorithms. The rst part covers. The second part mainly consists of the development of a library. Its use is aimed at evolutionary algorithms

Emmerich, Michael

260

Petascale Adaptive Computational Fluid Dynamics | Argonne Leadership  

NLE Websites -- All DOE Office Websites (Extended Search)

Petascale Adaptive Computational Fluid Dynamics Petascale Adaptive Computational Fluid Dynamics PI Name: Kenneth Jansen PI Email: jansen@rpi.edu Institution: Rensselaer Polytechnic Institute The specific aim of this request for resources is to examine scalability and robustness of our code on BG/P. We have confirmed that, during the flow solve phase, our CFD flow solver does exhibit perfect strong scaling to the full 32k cores on our local machine (CCNI-BG/L at RPI) but this will be our first access to BG/P. We are also eager to study the performance of the adaptive phase of our code. Some aspects have scaled well on BG/L (e.g., refinement has produced adaptive meshes that take a 17 million element mesh and perform local adaptivity on 16k cores to match a requested size field to produce a mesh exceeding 1 billion elements) but other aspects (e.g.,

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

262

Feedback based adaptive compensation of control system sensor uncertainties  

Science Conference Proceedings (OSTI)

In this paper, the problem of adaptively compensating sensor uncertainties is addressed in a feedback based framework. In this study, sensor characteristics are modeled as parametrizable uncertain functions and a compensator is constructed to adaptively ... Keywords: Adaptive control, Adaptive systems, Sensor and data fusion, Tracking and adaptation

Shanshan Li; Gang Tao

2009-02-01T23:59:59.000Z

263

ARM - Central Authentication Service  

NLE Websites -- All DOE Office Websites (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

264

From Authentication to Authorization  

E-Print Network (OSTI)

PKIs focus on establishing a link between an entity and a key. Hence, PKIs provide a mechanism for entity identification by providing a link between an entity and a key. However, the real requirement in many systems is authorization, i.e., is a certain entity authorized to perform a specific action. For example, imagine a program for course registration at a university. Suppose a student, John Doe, wants to register for a graduate course in Computer Science. In order for a student to register for this course, he/she should be a graduate student in Computer Science or a undergraduate student with the requisite standing, e.g. a senior with GPA above 3.5. Therefore, the registration program needs to know that John Doe has the required credentials. In the PKI setting, John Doe will present a certificate (signed by a trusted certificate authority) which binds his identity to a key. This establishes that John Doe is interacting with the registration program. The program then consults a database to verify that John Doe has the required credentials. In this scenario, the PKI approach has the following disadvantages: Authorization decisions are adhoc

Somesh Jha

2001-01-01T23:59:59.000Z

265

Pretty good packet authentication  

Science Conference Proceedings (OSTI)

Internet addresses are routinely being used to infer the identity of persons who send offending traffic - a capability they were not designed to provide. As a result, problems abound: innocent users are being accused, while the culprits can easily avoid ...

Andreas Haeberlen; Rodrigo Rodrigues; Krishna Gummadi; Peter Druschel

2008-12-01T23:59:59.000Z

266

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE))

I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C....

267

NSLS II: Authentication Required  

NLE Websites -- All DOE Office Websites (Extended Search)

Project Pages Login Access to this area of the NSLS-II website requires a valid username and password. Username: Password: Next > Last Modified: April 2, 2013 Please forward all...

268

E-Authentication  

Science Conference Proceedings (OSTI)

... a more detailed discussion of these technologies. ... to constrict or constrain the development or use ... Identity Ecosystem will be developed through a ...

2013-08-01T23:59:59.000Z

269

A Model of Adaptation in Collaborative Multi-Agent Systems  

Science Conference Proceedings (OSTI)

Adaptation is an essential requirement for autonomous agent systems functioning in uncertain dynamic environments. Adaptation allows agents to change their behavior in order to improve the overall sys tem performance. We describe a general mechanism ... Keywords: adaptation, mathematical models, robotics

Kristina Lerman

2004-09-01T23:59:59.000Z

270

Adaptive simulation of gas turbine performance  

SciTech Connect

A method is presented allowing the simulation of gas turbine performance with the possibility of adapting to engine particularities. Measurements along the gas path are used, in order to adapt a given performance model by appropriate modification of the component maps. The proposed method can provide accurate simulation for engines of the same type, differing due to manufacturing or assembly tolerances. It doesn't require accurate component maps, as they are derived during the adaptation process. It also can be used for health monitoring purposes, introducing thus a novel approach for component condition assessment. The effectiveness of the proposed method is demonstrated by application to an industrial gas turbine.

Stamatis, A.; Mathioudakis, K.; Papailiou, K.D. (Ethnikon Metsovion Polytechneion, Athens (Greece))

1990-04-01T23:59:59.000Z

271

Adaptation to Climate Variability and Change: A Guidance Manual...  

Open Energy Info (EERE)

Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary Name: Adaptation to Climate Variability and...

272

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to...

273

Climate Change Adaptation: Weighing Strategies for Heat-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Climate Change Adaptation: Weighing Strategies for Heat-Related Health Challenges Print E-mail Climate Change Adaptation: Weighing Strategies for Heat-Related Health Challenges...

274

Ethiopia-Climate Change National Adaptation Programme of Action...  

Open Energy Info (EERE)

Adaptation Programme of Action Jump to: navigation, search Name Ethiopia-Climate Change National Adaptation Programme of Action AgencyCompany Organization United Nations...

275

Rwanda-National Adaptation Programs of Action to Climate Change...  

Open Energy Info (EERE)

Rwanda-National Adaptation Programs of Action to Climate Change Jump to: navigation, search Name Rwanda-National Adaptation Programs of Action to Climate Change AgencyCompany...

276

Burundi-National Adaptation Plan of Action to Climate Change...  

Open Energy Info (EERE)

Burundi-National Adaptation Plan of Action to Climate Change Jump to: navigation, search Name Burundi-National Adaptation Plan of Action to Climate Change AgencyCompany...

277

Using Technology to Bring Climate Change Adaptation Research...  

NLE Websites -- All DOE Office Websites (Extended Search)

Using Technology to Bring Climate Change Adaptation Research to the Great Lakes Print E-mail Using Technology to Bring Climate Change Adaptation Research to the Great Lakes...

278

The Cost to Developing Countries of Adapting to Climate Change...  

Open Energy Info (EERE)

The Cost to Developing Countries of Adapting to Climate Change Jump to: navigation, search Tool Summary Name: The Cost to Developing Countries of Adapting to Climate Change Agency...

279

Information Resources: Adaptive Street Lighting Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Street Lighting Controls Adaptive Street Lighting Controls This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of San Jose, CA, and Kelly Cunningham of the California Lighting Technology Center at UC Davis discussed their experiences as early adopters of these smart street lighting systems. In Part II, presenters Laura Stuchinsky of the City of San Jose, CA, and Michael Poplawski of Pacific Northwest National Laboratory explored the MSSLC's recently released Model Specification for Adaptive Control and Remote Monitoring of LED Roadway Luminaires. Part I: Experiences and Benefits June 11, 2013 View the presentation slides Part II: Reviewing the MSSLC's Model Specification

280

Cross-layer wireless bit rate adaptation  

E-Print Network (OSTI)

This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame receptions or signal-to-noise ratio (SNR) estimates ...

Vutukuru, Mythili

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Cross-Layer Wireless Bit Rate Adaptation  

E-Print Network (OSTI)

This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame receptions or signal-to-noise ratio (SNR) estimates ...

Vutukuru, Mythili

282

EVALUATING CONSERVATION EFFECTIVENESS AND ADAPTATION IN  

E-Print Network (OSTI)

EVALUATING CONSERVATION EFFECTIVENESS AND ADAPTATION IN DYNAMIC LANDSCAPES ADENA R. RISSMAN* I INTRODUCTION Despite the widespread use of conservation easements, their conservation outcomes are relatively unknown.1 Evaluating conservation easement effectiveness requires interdisciplinary research that reaches

Rissman, Adena

283

Robust adaptive subspace extraction for DOA tracking  

Science Conference Proceedings (OSTI)

This paper addresses the problem of extracting a time-varying signal subspace from noisy signal measurements for direction-of-arrival (DOA) estimation and tracking. A robust adaptive method for extracting the signal subspace is developed based on robust ...

Dekun Yang; S. J. Flockton

1996-05-01T23:59:59.000Z

284

Adaptive file transfers for diverse environments  

Science Conference Proceedings (OSTI)

This paper presents dsync, a file transfer system that can dynamically adapt to a wide variety of environments. While many transfer systems work well in their specialized ontext, their performance comes at the cost of generality, and they perform poorly ...

Himabindu Pucha; Michael Kaminsky; David G. Andersen; Michael A. Kozuch

2008-06-01T23:59:59.000Z

285

Providing Dynamic Instructional Adaptation in Programming Learning  

Science Conference Proceedings (OSTI)

This paper describes an approach to create an Intelligent Tutoring System that provides dynamic personalization and learning activities sequencing adaptation by combining eLearning standards and Artificial Intelligent techniques. The work takes advantage ...

Francisco Jurado; Olga C. Santos; Miguel A. Redondo; Jess G. Boticario; Manuel Ortega

2008-09-01T23:59:59.000Z

286

Convert! : the adaptive reuse of churches  

E-Print Network (OSTI)

This thesis examines the phenomenon of vacated churches and analyzes the major issues underlying their adaptive reuse in order to help promulgate an awareness of the range of successful strategies and solutions that are ...

Kiley, Christopher John, 1972-

2004-01-01T23:59:59.000Z

287

Adaptive control of a generic hypersonic vehicle  

E-Print Network (OSTI)

This thesis presents a an adaptive augmented, gain-scheduled baseline LQR-PI controller applied to the Road Runner six-degree-of-freedom generic hypersonic vehicle model. Uncertainty in control effectiveness, longitudinal ...

Wiese, Daniel Philip

2013-01-01T23:59:59.000Z

288

High Performance Adaptive Distributed Scheduling Algorithm  

Science Conference Proceedings (OSTI)

Exascale computing requires complex runtime systems that need to consider affinity, load balancing and low time and message complexity for scheduling massive scale parallel computations. Simultaneous consideration of these objectives makes online distributed ... Keywords: Distributed Scheduling, Adaptive Scheduling, Performance Analysis

Ankur Narang, Abhinav Srivastava, R. K. Shyamasundar

2013-05-01T23:59:59.000Z

289

Adaptive power management in energy harvesting systems  

Science Conference Proceedings (OSTI)

Recently, there has been a substantial interest in the design of systems that receive their energy from regenerative sources such as solar cells. In contrast to approaches that attempt to minimize the power consumption we are concerned with adapting ...

Clemens Moser; Lothar Thiele; Davide Brunelli; Luca Benini

2007-04-01T23:59:59.000Z

290

Exponential convergence with adaptive Monte Carlo  

Science Conference Proceedings (OSTI)

For over a decade, it has been known that exponential convergence on discrete transport problems was possible using adaptive Monte Carlo techniques. Now, exponential convergence has been empirically demonstrated on a spatially continuous problem.

Booth, T.E.

1997-11-01T23:59:59.000Z

291

Usability engineering for the adaptive web  

Science Conference Proceedings (OSTI)

This chapter discusses a usability engineering approach for the design and the evaluation of adaptive web-based systems, focusing on practical issues. A list of methods will be presented, considering a user-centered approach. After having introduced ...

Cristina Gena; Stephan Weibelzahl

2007-01-01T23:59:59.000Z

292

Dynamic Grid Adaptation Using the MPDATA Scheme  

Science Conference Proceedings (OSTI)

A dynamic grid adaptation (DGA) scheme is developed using various combinations of the multidimensional positive definite advection transport algorithm (MPDATA) to show the applicability of DGA with the MPDATA scheme to solve advection problems. A ...

John P. Iselin; Joseph M. Prusa; William J. Gutowski

2002-04-01T23:59:59.000Z

293

Statistical Design for Adaptive Weather Observations  

Science Conference Proceedings (OSTI)

Suppose that one has the freedom to adapt the observational network by choosing the times and locations of observations. Which choices would yield the best analysis of the atmospheric state or the best subsequent forecast? Here, this problem of ...

L. Mark Berliner; Zhan-Qian Lu; Chris Snyder

1999-08-01T23:59:59.000Z

294

Model 467-1 Adapter Hardware Manual  

E-Print Network (OSTI)

-1 Adapter vi Important Notes: Make sure you follow proper ESD handling procedures (refer to EIA-625, ESD ............................................................................. 15 1.10 Interrupt And Error Handling....................................................... 16 1 Jumpers.........................................................32 3.4.6 Remote RAM Jumpers

Berns, Hans-Gerd

295

Adaptive learning of semantic locations and routes  

Science Conference Proceedings (OSTI)

Adaptation of devices and applications based on contextual information has a great potential to enhance usability and mitigate the increasing complexity of mobile devices. An important topic in context-aware computing is to learn semantic locations and ...

Keshu Zhang; Haifeng Li; Kari Torkkola; Mike Gardner

2007-09-01T23:59:59.000Z

296

Adaptive learning of semantic locations and routes  

Science Conference Proceedings (OSTI)

Adaptation of devices and applications based on contextual information has a great potential to enhance usability and mitigate the increasing complexity of mobile devices. An important topic in context-aware computing is to learn semantic locations and ...

Keshu Zhang; Haifeng Li; Kari Torkkola; Mike Gardner

2007-10-01T23:59:59.000Z

297

Adaptive Urban Dispersion Integrated Model  

DOE Green Energy (OSTI)

Numerical simulations represent a unique predictive tool for understanding the three-dimensional flow fields and associated concentration distributions from contaminant releases in complex urban settings (Britter and Hanna 2003). Utilization of the most accurate urban models, based on fully three-dimensional computational fluid dynamics (CFD) that solve the Navier-Stokes equations with incorporated turbulence models, presents many challenges. We address two in this work; first, a fast but accurate way to incorporate the complex urban terrain, buildings, and other structures to enforce proper boundary conditions in the flow solution; second, ways to achieve a level of computational efficiency that allows the models to be run in an automated fashion such that they may be used for emergency response and event reconstruction applications. We have developed a new integrated urban dispersion modeling capability based on FEM3MP (Gresho and Chan 1998, Chan and Stevens 2000), a CFD model from Lawrence Livermore National Lab. The integrated capability incorporates fast embedded boundary mesh generation for geometrically complex problems and full three-dimensional Cartesian adaptive mesh refinement (AMR). Parallel AMR and embedded boundary gridding support are provided through the SAMRAI library (Wissink et al. 2001, Hornung and Kohn 2002). Embedded boundary mesh generation has been demonstrated to be an automatic, fast, and efficient approach for problem setup. It has been used for a variety of geometrically complex applications, including urban applications (Pullen et al. 2005). The key technology we introduce in this work is the application of AMR, which allows the application of high-resolution modeling to certain important features, such as individual buildings and high-resolution terrain (including important vegetative and land-use features). It also allows the urban scale model to be readily interfaced with coarser resolution meso or regional scale models. This talk will discuss details of the approach and present results for some example calculations performed in Manhattan in support of the DHS Urban Dispersion Program (UDP) using some of the tools developed as part of this new capability.

Wissink, A; Chand, K; Kosovic, B; Chan, S; Berger, M; Chow, F K

2005-11-03T23:59:59.000Z

298

Adaptive nonparametric regression on spin fiber bundles  

Science Conference Proceedings (OSTI)

The construction of adaptive nonparametric procedures by means of wavelet thresholding techniques is now a classical topic in modern mathematical statistics. In this paper, we extend this framework to the analysis of nonparametric regression on sections ... Keywords: 42B35, 42C10, 42C40, 46E35, 62G08, 62G20, Adaptive nonparametric regression, Mixed spin needlets, Spin Besov spaces, Spin fiber bundles, Thresholding

Claudio Durastanti; Daryl Geller; Domenico Marinucci

2012-02-01T23:59:59.000Z

299

Brief An adaptive PID learning control of robot manipulators  

Science Conference Proceedings (OSTI)

An adaptive PID learning controller which consists of an adaptive PID feedback control scheme and a feedforward input learning scheme is proposed for learning of periodic robot motion. In the learning controller, the adaptive PID feedback controller ... Keywords: Adaptive PID learning, Learning rules, Robot motion control

Tae-Yong Kuc; Woong-Gie Han

2000-05-01T23:59:59.000Z

300

UNDP-Adaptation Learning Mechanism | Open Energy Information  

Open Energy Info (EERE)

Adaptation Learning Mechanism Adaptation Learning Mechanism Jump to: navigation, search Logo: UNDP-Adaptation Learning Mechanism Name UNDP-Adaptation Learning Mechanism Agency/Company /Organization United Nations Development Programme Sector Climate, Energy, Land, Water Topics Adaptation Resource Type Lessons learned/best practices, Training materials Website http://www.adaptationlearning. Program Start 2007 References Adaptation Learning Mechanism[1] Abstract Seeking to provide stakeholders with a common platform for sharing and learning, the ALM bridges knowledge gaps by bringing relevant knowledge and stakeholders together to exchange information, experiences, and expertise. Additionally, the ALM complements the wide range of adaptation knowledge networks and initiatives already underway.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

An architecture for adaptive intrusion-tolerant applications: Experiences with Auto-adaptive and Reconfigurable Systems  

Science Conference Proceedings (OSTI)

Applications that are part of a mission-critical information system need to maintain a usable level of key services through ongoing cyber-attacks. In addition to the well-publicized denial of service (DoS) attacks, these networked and distributed applications ... Keywords: Byzantine fault tolerance, adaptive defense, adaptive middleware, intrusion tolerance, redundancy, survivability architecture

Partha Pal; Paul Rubel; Michael Atighetchi; Franklin Webber; William H. Sanders; Mouna Seri; HariGovind Ramasamy; James Lyons; Tod Courtney; Adnan Agbaria; Michel Cukier; Jeanna Gossett; Idit Keidar

2006-09-01T23:59:59.000Z

302

Evaluation of a personalized digital library based on cognitive styles: Adaptivity vs. adaptability  

Science Conference Proceedings (OSTI)

Personalization can be addressed by adaptability and adaptivity, which have different advantages and disadvantages. This study investigates how digital library (DL) users react to these two techniques. More specifically, we develop a personalized DL ... Keywords: Cognitive styles, Digital libraries, Individual differences, Personalization

Enrique Frias-Martinez; Sherry Y. Chen; Xiaohui Liu

2009-02-01T23:59:59.000Z

303

Adaptation of user views to business requirements: towards adaptive views models  

Science Conference Proceedings (OSTI)

This article describes an approach to model user views in service-oriented groupware systems in order to support the adaptation of views in collaborative projects environments. The issue is to adapt the visualization to the users' business requirements ... Keywords: AEC (architecture engineering construction), CSCW, information visualization, model driven engineering, user view, user view model

Conrad Boton; Sylvain Kubicki; Gilles Halin

2010-09-01T23:59:59.000Z

304

Solid-State Lighting: Adaptive Street Lighting Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Street Lighting Adaptive Street Lighting Controls to someone by E-mail Share Solid-State Lighting: Adaptive Street Lighting Controls on Facebook Tweet about Solid-State Lighting: Adaptive Street Lighting Controls on Twitter Bookmark Solid-State Lighting: Adaptive Street Lighting Controls on Google Bookmark Solid-State Lighting: Adaptive Street Lighting Controls on Delicious Rank Solid-State Lighting: Adaptive Street Lighting Controls on Digg Find More places to share Solid-State Lighting: Adaptive Street Lighting Controls on AddThis.com... Conferences & Meetings Presentations Publications Webcasts Videos Tools Adaptive Street Lighting Controls This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components.

305

AdaptiveARC | Open Energy Information  

Open Energy Info (EERE)

AdaptiveARC AdaptiveARC Jump to: navigation, search Name AdaptiveARC Address 7683 Sitio Manana Place Carlsbad, California Zip 92009 Sector Biomass Product Waste-to-clean-energy startup is developing an arc-plasma reactor Website http://www.adaptivearc.com/ Coordinates 33.07959°, -117.22539° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":33.07959,"lon":-117.22539,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

306

Petascale, Adaptive CFD | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Petascale, Adaptive CFD Petascale, Adaptive CFD Petascale, Adaptive CFD PI Name: Kenneth Jansen PI Email: jansenke@colorado.edu Institution: U. Colorado-Boulder Allocation Program: ESP Allocation Hours at ALCF: 150 Million Year: 2010 to 2013 Research Domain: Engineering The aerodynamic simulations proposed will involve modeling of active flow control based on synthetic jet actuation that has been shown experimentally to produce large-scale flow changes (e.g., re-attachment of separated flow or virtual aerodynamic shaping of lifting surfaces) from micro-scale input (e.g., a 0.1 W piezoelectric disk resonating in a cavity alternately pushes/pulls out/in the fluid through a small slit to create small-scale vortical structures that interact with, and thereby dramatically alter, the cross flow). This is a process that has yet to be understood fundamentally.

307

Load attenuating passively adaptive wind turbine blade  

DOE Patents (OSTI)

A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

Veers, Paul S. (Albuquerque, NM); Lobitz, Donald W. (Albuquerque, NM)

2003-01-01T23:59:59.000Z

308

Fast adaptive elliptical filtering using box splines  

E-Print Network (OSTI)

We demonstrate that it is possible to filter an image with an elliptic window of varying size, elongation and orientation with a fixed computational cost per pixel. Our method involves the application of a suitable global pre-integrator followed by a pointwise-adaptive localization mesh. We present the basic theory for the 1D case using a B-spline formalism and then appropriately extend it to 2D using radially-uniform box splines. The size and ellipticity of these radially-uniform box splines is adaptively controlled. Moreover, they converge to Gaussians as the order increases. Finally, we present a fast and practical directional filtering algorithm that has the capability of adapting to the local image features.

Chaudhury, Kunal Narayan; Unser, Michael

2009-01-01T23:59:59.000Z

309

A SINGLE-PARAMETER ADAPTIVE COMB FILTER  

E-Print Network (OSTI)

The study is concerned with a single-parameter adaptive comb filter (ACF), a multi-notch filter with periodically located nulls. The filter is suggested to retrieve a waveform modeled by superposition of harmonics, in particular, periodic non-sinusoidal signal. Using trigonometric constraints between the signal fundamental frequency and over tones results in a non-linear estimation problem. In the present study, the parameter adjustment relies on the extended Kalman filter scheme. Particularly, the 2, 3 and 4 notch ACF are derived and tested under different conditions. Given a multi-tone scenario, the ACF significantly outperforms common adaptive multi-notch filter.

Single-Parameter Adaptive Comb; Naum G. Chernoguz

2001-01-01T23:59:59.000Z

310

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

311

A National Strategy for Adaptation to Climate Change | Open Energy  

Open Energy Info (EERE)

A National Strategy for Adaptation to Climate Change A National Strategy for Adaptation to Climate Change Jump to: navigation, search Tool Summary Name: A National Strategy for Adaptation to Climate Change Agency/Company /Organization: Coalition for Rainforest Nations Topics: Adaptation, Pathways analysis Resource Type: Guide/manual Website: www.rainforestcoalition.org/eng/ References: A National Strategy for Adaptation to Climate Change[1] Logo: A National Strategy for Adaptation to Climate Change Click here to view document A National Strategy for Adaptation to Climate Change References ↑ "A National Strategy for Adaptation to Climate Change" Retrieved from "http://en.openei.org/w/index.php?title=A_National_Strategy_for_Adaptation_to_Climate_Change&oldid=382940" Category: Tools

312

STAPL: standard template adaptive parallel library  

Science Conference Proceedings (OSTI)

The Standard Template Adaptive Parallel Library (stapl) is a high-productivity parallel programming framework that extends C++ and stl with unified support for shared and distributed memory parallelism. stapl provides distributed data structures (pContainers) ... Keywords: high productivity parallel programming, library, parallel data structures

Antal Buss; Harshvardhan; Ioannis Papadopoulos; Olga Pearce; Timmie Smith; Gabriel Tanase; Nathan Thomas; Xiabing Xu; Mauro Bianco; Nancy M. Amato; Lawrence Rauchwerger

2010-05-01T23:59:59.000Z

313

Modling and implementing adaptative pedagogical hyper documents  

Science Conference Proceedings (OSTI)

Today, a large number of interactive systems are developed thanks to hypermedia documents particularly in the education field. Due to the lack of experience feedback, it is always necessary to carry out reflections on the architecture of these systems ... Keywords: HCI, XML, adaptative hypermedia, e-learning

Sofiane Benadi; Patrick Prvot; Jean-Yves Ramel

2003-11-01T23:59:59.000Z

314

Efficient adaptive meshing of parametric models  

Science Conference Proceedings (OSTI)

Parametric modeling is becoming the representation of choice for most modern solid modelers. However, when generating the finite-element mesh of the model for simulation and analysis, most meshing tools ignore the parametric information and use only ... Keywords: adaptivity, mesh generation, parametric models

Alla Sheffer; Alper ngr

2001-05-01T23:59:59.000Z

315

A framework for adaptive execution in grids  

Science Conference Proceedings (OSTI)

Grids offer a dramatic increase in the number of available processing and storing resources that can be delivered to applications. However, efficient job submission and management continue being far from accessible to ordinary scientists and engineers ... Keywords: Globus, adaptive execution, grid technology, job migration

Eduardo Huedo; Ruben S. Montero; Ignacio M. Llorente

2004-06-01T23:59:59.000Z

316

Adaptive Battery Charge Scheduling with Bursty Workloads  

E-Print Network (OSTI)

1 Adaptive Battery Charge Scheduling with Bursty Workloads Dylan Lexie , Shan Lin, and Jie Wu.wu@temple.edu Abstract--Battery-powered wireless sensor devices need to be charged to provide the desired functionality after deployment. Task or even device failures can occur if the voltage of the battery is low

Wu, Jie

317

EMMA: an adaptive display for virtual therapy  

Science Conference Proceedings (OSTI)

Environments used up to now for therapeutic applications are invariable ones. Their contents can not be changed neither by the therapist nor by the patient. However, this is a technical issue that can be solved with current technology. In this paper, ... Keywords: adaptive display, virtual reality, virtual therapy

Mariano Alcaiz; Cristina Botella; Beatriz Rey; Rosa Baos; Jose A. Lozano; Nuria Lasso de la Vega; Diana Castilla; Javier Montesa; Antonio Hospitaler

2007-07-01T23:59:59.000Z

318

Compact upwind schemes on adaptive octrees  

Science Conference Proceedings (OSTI)

Compact high-order upwind schemes using reconstruction from cell-averages are derived for application with the compressible three-dimensional Navier-Stokes equations. An adaptive-octree mesh, combined with the Adams-Bashforth-Moulton family of predictor-corrector ... Keywords: Finite-volume, High-order, Navier-Stokes, Predictor-corrector

Scott M. Murman

2010-02-01T23:59:59.000Z

319

Adaptable methodology for automation application development  

Science Conference Proceedings (OSTI)

An adaptable methodology for automation application development (AMAAD) is introduced. This development methodology is based on the key concept that design automation (DA) applications are a subset of higher level knowledge-based engineering (KBE) applications, ... Keywords: CommonKADS, Design automation, Knowledge-based engineering, MOKA, Productivity enhancement

Christian van der Velden; Cees Bil; Xinghuo Xu

2012-04-01T23:59:59.000Z

320

Origin of Mutations Under Selection: The Adaptive  

E-Print Network (OSTI)

Origin of Mutations Under Selection: The Adaptive Mutation Controversy John R. Roth,1 Elisabeth 2006 by Annual Reviews. All rights reserved 0066-4227/06/1013-0477$20.00 Key Words natural selection Growth under selection causes new genotypes to predominate in a population. It is difficult to determine

California at Davis, University of

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Query weighting for ranking model adaptation  

Science Conference Proceedings (OSTI)

We propose to directly measure the importance of queries in the source domain to the target domain where no rank labels of documents are available, which is referred to as query weighting. Query weighting is a key step in ranking model adaptation. As ...

Peng Cai; Wei Gao; Aoying Zhou; Kam-Fai Wong

2011-06-01T23:59:59.000Z

322

Passive solar energy: climate-adaptive architecture  

DOE Green Energy (OSTI)

Passive solar, climate adaptive architecture uses the following concepts: conservation, sun angles, glass, and thermal mass (passive heating and cooling). Specific measures of these concepts are briefly discussed. Passive solar water heating systems discussed are breadbox and thermosyphon water heaters. (MCW)

Baccei, B.

1981-09-01T23:59:59.000Z

323

An ATM Adaptation Layer for Reliable Transfers  

Science Conference Proceedings (OSTI)

There has been much attention given to ATM Adaptation Layers (AAL) over the ten-year history of ATM standardization. Yet none of the existing standards include a retransmission protocol to ensure reliability of the transfers. In this paper we propose ...

Gunnar Karlsson

1996-09-01T23:59:59.000Z

324

Hybrid algorithms for adaptive array systems  

Science Conference Proceedings (OSTI)

In recent years, mobile communications have caused an explosive growth to the number of wireless users. This growth has triggered an enormous demand not only for capacity but also for better coverage and quality of services with priority on interference ... Keywords: adaptive arrays, beamforming, least mean squares algorithm, mobile communications, sample matrix inversion algorithm, smart antennas

D. Papadimitriou; I. O. Vardiambasis

2005-03-01T23:59:59.000Z

325

Dynamic repartitioning of adaptively refined meshes  

Science Conference Proceedings (OSTI)

One ingredient which is viewed as vital to the successful conduct of many large-scale numerical simulations is the ability to dynamically repartition the underlying adaptive finite element mesh among the processors so that the computations are balanced ... Keywords: multilevel diffusion, multilevel graph repartitioning, scratch-remap, wavefront diffusion

Kirk Schloegel; George Karypis; Vipin Kumar

1998-11-01T23:59:59.000Z

326

Adaptive context reasoning in pervasive systems  

Science Conference Proceedings (OSTI)

It is hard to believe that the internet is now in its adolescent stage. Our information age is replete with communication capable, intelligent, sensor equipped devices. Social networks, web services, and global information repositories make a wealth ... Keywords: context, context inference, context middleware adaptation, context quality, context reasoning, information quality, quality aggregation, quality propagation

Bridget Beamon; Mohan Kumar

2010-11-01T23:59:59.000Z

327

Robust adaptive beamforming via target tracking  

Science Conference Proceedings (OSTI)

The proposed robust beamformer adaptively self-corrects and tracks desired-source location errors or variations regardless of the eigenstructure of the input correlation matrix, of the array shape and nature of the noise. It only requires an order of ...

S. Gazor; S. Affes; Y. Grenier

1996-06-01T23:59:59.000Z

328

A Dynamically Adapting Weather and Dispersion Model: The Operational Multiscale Environment Model with Grid Adaptivity (OMEGA)  

Science Conference Proceedings (OSTI)

The Operational Multiscale Environment Model with Grid Adaptivity (OMEGA) and its embedded Atmospheric Dispersion Model is a new atmospheric simulation system for real-time hazard prediction, conceived out of a need to advance the state of the ...

David P. Bacon; Nashat N. Ahmad; Zafer Boybeyi; Thomas J. Dunn; Mary S. Hall; Pius C. S. Lee; R. Ananthakrishna Sarma; Mark D. Turner; Kenneth T. Waight III; Steve H. Young; John W. Zack

2000-07-01T23:59:59.000Z

329

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

330

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

331

Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information  

Open Energy Info (EERE)

Hands-on Energy Adaptation Toolkit (HEAT) Hands-on Energy Adaptation Toolkit (HEAT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Hands-on Energy Adaptation Toolkit (HEAT) Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guide/manual Website: esmap.org/esmap/node/312 Hands-on Energy Adaptation Toolkit (HEAT) Screenshot References: HEAT[1] Background "HEAT- A Hands-on Energy Adaptation Toolkit is designed to lead you through as assessment of climate vulnerabilities and adaptation options in the energy sector of your country. HEAT can help you raise awareness among key stakeholders and initiate dialogue on energy sector adaptation.

332

Idealized Adaptive Observation Strategies for Improving Numerical Weather Prediction  

Science Conference Proceedings (OSTI)

Adaptive sampling uses information about individual atmospheric situations to identify regions where additional observations are likely to improve weather forecasts of interest. The observation network could be adapted for a wide range of ...

Rebecca E. Morss; Kerry A. Emanuel; Chris Snyder

2001-01-01T23:59:59.000Z

333

Urban climate resilience : a global assessment of city adaptation plans  

E-Print Network (OSTI)

As policy makers accept climate change as an irrefutable threat, adaptation planning has emerged as a necessary action for countries, states, and municipalities. This thesis explores adaptive responses to climate change ...

Katich, Kristina Noel

2009-01-01T23:59:59.000Z

334

Clustering using adaptive self-organizing maps (ASOM) and applications  

Science Conference Proceedings (OSTI)

This paper presents an innovative, adaptive variant of Kohonen's self-organizing maps called ASOM, which is an unsupervised clustering method that adaptively decides on the best architecture for the self-organizing map. Like the traditional SOMs, ...

Yong Wang; Chengyong Yang; Kalai Mathee; Giri Narasimhan

2005-05-01T23:59:59.000Z

335

Modelling sequential text with an adaptive topic model  

Science Conference Proceedings (OSTI)

Topic models are increasingly being used for text analysis tasks, often times replacing earlier semantic techniques such as latent semantic analysis. In this paper, we develop a novel adaptive topic model with the ability to adapt topics from both the ...

Lan Du; Wray Buntine; Huidong Jin

2012-07-01T23:59:59.000Z

336

A Comparison of Adaptive Observing Guidance for Atlantic Tropical Cyclones  

Science Conference Proceedings (OSTI)

Airborne adaptive observations have been collected for more than two decades in the neighborhood of tropical cyclones, to attempt to improve short-range forecasts of cyclone track. However, only simple subjective strategies for adaptive ...

S. J. Majumdar; S. D. Aberson; C. H. Bishop; R. Buizza; M. S. Peng; C. A. Reynolds

2006-09-01T23:59:59.000Z

337

Architectures for Adaptive Low-Power Embedded Multimedia Systems.  

E-Print Network (OSTI)

??This Ph.D. thesis describes novel hardware/software architectures for adaptive low-power embedded multimedia systems. Novel techniques for run-time adaptive energy management are proposed, such that both (more)

Shafique, Muhammad

2011-01-01T23:59:59.000Z

338

ADAPT: abstraction hierarchies to better simulate teamwork under dynamics  

Science Conference Proceedings (OSTI)

In this paper we present a lightweight teamwork implementation by using abstraction hierarchies. The basis of this implementation is ADAPT, which supports Autonomous Dynamic Agent Planning for Teamwork. ADAPT's novelty ...

Meirav Hadad; Avi Rosenfeld

2011-05-01T23:59:59.000Z

339

An Adaptive Multigrid Barotropic Tropical Cyclone Track Model  

Science Conference Proceedings (OSTI)

This paper describes the application of adaptive multigrid techniques to the problem of tropical cyclone track prediction. Based on the nondivergent barotropic vorticity equation, the model uses an adaptive multigrid method to refine the mesh ...

Scott R. Fulton

2001-01-01T23:59:59.000Z

340

Lossless compression using the adaptive discrete cosine transform  

Science Conference Proceedings (OSTI)

This paper describes a technique using the adaptive discrete cosine transform for lossless waveform data compression. The technique is a variation on a two-stage lossless method that was developed by one of the authors. The earlier work employed an adaptive ... Keywords: ADPCM scheme, adaptive differential pulse code modulation-type, adaptive discrete cosine transform, data compression, encoding, integer residual sequence, lossless successive difference operation, lossless waveform data compression, storage, transmission, two-stage lossless method

L. Gerhardt; M. Fargues; G. Coutu

1995-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Microstructure Stability of Multi-Materials Systems with Adaptive ...  

Science Conference Proceedings (OSTI)

Materials Genomics Past & Future: From CALPHAD to Flight Microstructure Stability of Multi-Materials Systems with Adaptive Microstructures Modeling of...

342

Multi-AUV control and adaptive sampling  

E-Print Network (OSTI)

Abstract Multi-AUV operations have much to offer a variety of underwater applications. With sensors to measure the environment and coordination that is appropriate to critical spatial and temporal scales, the group can perform important tasks such as adaptive ocean sampling. We describe a methodology for cooperative control of multiple vehicles based on virtual bodies and artificial potentials (VBAP). This methodology allows for adaptable formation control and can be used for missions such as gradient climbing and feature tracking in an uncertain environment. We discuss our implementation on a fleet of autonomous underwater gliders and present results from sea trials in Monterey Bay in August 2003. These at-sea demonstrations were performed as part of the Autonomous Ocean Sampling Network (AOSN) II project.

Monterey Bay; Edward Fiorelli; Naomi Ehrich Leonard; Pradeep Bhatta; Derek Paley; Ralf Bachmayer

2004-01-01T23:59:59.000Z

343

Robust adaptive control of HVDC systems  

SciTech Connect

The transient performance of an HVDC power system is highly dependent on the parameters of the current/voltage regulators of the converter controls. In order to better accommodate changes in system structure or dc operating conditions, this paper introduces a new adaptive control strategy. The advantages of automatic tuning for continuous fine tuning are combined with predetermined gain scheduling in order to achieve robustness for large disturbances. Examples are provided for a digitally simulated back-to-back dc system.

Reeve, J.; Sultan, M. (Univ. of Waterloo, Ontario (Canada))

1994-07-01T23:59:59.000Z

344

Adaptive iterative multiscale finite volume method  

Science Conference Proceedings (OSTI)

The multiscale finite volume (MSFV) method is a computationally efficient numerical method for the solution of elliptic and parabolic problems with heterogeneous coefficients. It has been shown for a wide range of test cases that the MSFV results are ... Keywords: Adaptive multiscale method, Elliptic problem, Infrequently localization improvement, Iterative multiscale finite-volume method, Iterative multiscale method, Multiphase flow, Multiscale finite-volume method, Multiscale method, Porous media

Hadi Hajibeygi; Patrick Jenny

2011-02-01T23:59:59.000Z

345

User-Centered Adaptive Information Retrieval  

E-Print Network (OSTI)

Information retrieval systems are critical for overcoming information overload. A major deficiency of existing retrieval systems is that they generally lack user modeling and are not adaptive to individual users; information about the actual user and search context is largely ignored. For example, a tourist and a programmer may use the same word "java" to search for different information, but the current retrieval systems would return the same results. In the proposed

Xuehua Shen

2006-01-01T23:59:59.000Z

346

Documentation of the Irvine Integrated Corridor Freeway Ramp Metering and Arterial Adaptive Control Field Operational Test  

E-Print Network (OSTI)

Integrated Ramp Metering/Adaptive Signal Control FieldIntegrated Ramp Metering/Adaptive Signal Control FieldTest Plan," Integrated Ramp Metering/Adaptive Signal Control

McNally, M. G.; Moore, II, James E.; MacCarley, C. Arthur

2001-01-01T23:59:59.000Z

347

Waters, Seas and Wine: Science for Successful Climate Adaptation  

Science Conference Proceedings (OSTI)

is a growing demand for adaptation science as a vehicle for delivering critical knowledge to public and private organizations that are attempting to adapt to the changing climate. This expansion of adaptation science is occurring, however, in the absence of a robust understanding of how that science can or should contribute to successful adaptation. For the adaptation science enterprise to be successful, it must provide knowledge that has value to adaptation actors. Accomplishing this objective, however, often requires more than just research, and, in fact, may necessitate new cultural perspectives regarding the role of science in public policy as well as new kinds of researchers and research institutions. These issues are explored through a series of case studies from Australia and the United Kingdom that illustrate the various ways in which adaptation science engages with adaptation processes and the extent to which that science can be judged as successful. The case studies demonstrate that there are multiple pathways by which adaptation science can be successful, depending on the knowledge that is needed by a particular actor at a particular stage in the adaptation process. Nevertheless, there are significant opportunities for the more explicit alignment of the needs of decision-makers and the adaptation research that is undertaken as well as critical reflection on, and evaluation of, the return on investment from research that is pursued in the name of enabling adaptation.

Preston, Benjamin L [ORNL

2012-01-01T23:59:59.000Z

348

Multispectral and panchromatic images fusion by adaptive PCNN  

Science Conference Proceedings (OSTI)

As for low resolution of remote sensing images, a novel image fusion algorithm by adaptive PCNN was proposed. The multi-spectral image is firstly converted from RGB to l?? color space. Then, the input images are adaptively decomposed ... Keywords: adaptive parameter setting, color space conversation, image fusion, pulse-coupled neural network (PCNN)

Yong Li; Ke Wang; Da-ke Chen

2010-01-01T23:59:59.000Z

349

Autopoiesis, the immune system, and adaptive information filtering  

Science Conference Proceedings (OSTI)

Adaptive information filtering is a challenging and fascinating problem. It requires the adaptation of a representation of a user's multiple interests to various changes in them. We tackle this dynamic problem with Nootropia, a model inspired by the ... Keywords: Adaptive information filtering, Autopoiesis, Immune-inspired

Nikolaos Nanas; Anne Roeck

2009-06-01T23:59:59.000Z

350

Adaptive friction compensation for permanent magnet linear synchronous motor  

Science Conference Proceedings (OSTI)

The paper discussed an adaptive friction compensation scheme based on Coulomb friction and a parameter identifier. The model reference adaptive system based on Coulomb friction was designed to compensate the friction on-line. The designed model reference ... Keywords: friction compensation, model reference adaptive control, parameter identification, permanent magnet linear synchronous motor (PMLSM)

Wang Li-Mei; Wu Lin

2009-06-01T23:59:59.000Z

351

Asynchronous ARM processor employing an adaptive pipeline architecture  

Science Conference Proceedings (OSTI)

This paper presented an asynchronous ARM processor employing adaptive pipeline and enhanced control schemes. This adaptive pipeline employed stage-skipping and stage-combining. The stage-skipping removed the redundant stage operations, bubbles. The stage-combining ... Keywords: adaptive pipeline, asynchronous design, processor

Je-Hoon Lee; Seung-Sook Lee; Kyoung-Rok Cho

2007-03-01T23:59:59.000Z

352

Adaptare: Supporting automatic and dependable adaptation in dynamic environments  

Science Conference Proceedings (OSTI)

Distributed protocols executing in uncertain environments, like the Internet or ambient computing systems, should dynamically adapt to environment changes in order to preserve Quality of Service (QoS). In earlier work, it was shown that QoS adaptation ... Keywords: Adaptation, dependability, probabilistic analysis, quality of service

Mnica Dixit; Antnio Casimiro; Paolo Lollini; Andrea Bondavalli; Paulo Verissimo

2012-07-01T23:59:59.000Z

353

Moving target defense (MTD) in an adaptive execution environment  

Science Conference Proceedings (OSTI)

This paper describes how adaptation support facilitated by an execution environment can be used to implement moving target defenses (MTD). Reactive and proactive use of adaptation, although beneficial for cyber defense, comes with additional cost, and ... Keywords: cost, moving target defense, proactive and reactive adaptation

A. Paulos; P. Pal; R. Schantz; B. Benyo

2013-01-01T23:59:59.000Z

354

Engineering complex adaptations in highly heterogeneous distributed systems  

Science Conference Proceedings (OSTI)

Distributed systems now encounter extreme heterogeneity in the form of diverse devices, network types etc., and also need to dynamically adapt to changing environmental conditions. Self-adaptive middleware is ideally situated to address these challenges. ... Keywords: adaptation, heterogeneity, middleware, reflection

Paul Grace; Gordon S. Blair; Carlos Flores Cortes; Nelly Bencomo

2008-09-01T23:59:59.000Z

355

Enhancing data center sustainability through energy-adaptive computing  

Science Conference Proceedings (OSTI)

The sustainability concerns of Information Technology (IT) go well beyond energy-efficient computing and require techniques for minimizing environmental impact of IT infrastructure over its entire life-cycle. Traditionally, IT infrastructure is overdesigned ... Keywords: Energy efficiency, energy adaption, energy- and thermal-adaptive computing, workload adaptation

Krishna Kant; Muthukumar Murugan; David H. C. Du

2012-10-01T23:59:59.000Z

356

Reduced-rank adaptive filtering using Krylov subspace  

Science Conference Proceedings (OSTI)

A unified view of several recently introduced reduced-rank adaptive filters is presented. As all considered methods use Krylov subspace for rank reduction, the approach taken in this work is inspired from Krylov subspace methods for iterative solutions ... Keywords: Krylov subspace methods, adaptive filters, array processing, multiuser detection, reduced-rank adaptive filters

Sergue Burykh; Karim Abed-Meraim

2002-01-01T23:59:59.000Z

357

Adaptive fuzzy sliding mode control for flexible satellite  

Science Conference Proceedings (OSTI)

The adaptive fuzzy sliding mode control is applied to the attitude stabilization of flexible satellite. The detailed design procedure of the fuzzy sliding mode control system is presented. The adaptive fuzzy control is utilized to approach the equivalent ... Keywords: Adaptive fuzzy control, Attitude control, Flexible satellite, Sliding mode control

Ping Guan; Xiang-Jie Liu; Ji-Zhen Liu

2005-06-01T23:59:59.000Z

358

A Characterization of Distribution Techniques for Dynamic Adaptive Grid Hierarchies  

E-Print Network (OSTI)

A Characterization of Distribution Techniques for Dynamic Adaptive Grid Hierarchies Samip Bhavsar for distributed adaptive grid hierarchies that underlie parallel adaptive mesh-refinement (AMR) techniques is the development of a policy driven tool for automated configuration and run-time management of distributed

Parashar, Manish

359

Protein Structure Suggests Role as Molecular Adapter  

NLE Websites -- All DOE Office Websites (Extended Search)

Protein Structure Suggests Role Protein Structure Suggests Role as Molecular Adapter Protein Structure Suggests Role as Molecular Adapter Print Wednesday, 24 June 2009 00:00 To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this process, researchers at the University of California, Berkeley, recently determined the structure of the ATPase region of DnaC, a bacterial helicase loader. The structure revealed that DnaC is a close cousin of DnaA, the protein thought to be responsible for unwinding DNA. Unexpectedly, the team further found that DnaC forms a right-handed helix similar to the state adopted by ATP-bound DnaA. These findings, together with biochemical studies, implicate DnaC as a molecular adapter that uses ATP-activated DnaA as a docking site for ensuring that DnaB (the ring-shaped helicase) is correctly deposited at the onset of replication.

360

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

Science Conference Proceedings (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

362

Economic Evaluation of Climate Change Adaptation Projects: Approaches for  

Open Energy Info (EERE)

Economic Evaluation of Climate Change Adaptation Projects: Approaches for Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary Name: Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Agency/Company /Organization: Global Environment Facility Sector: Land Focus Area: Agriculture Topics: Adaptation, Policies/deployment programs Website: siteresources.worldbank.org/ENVIRONMENT/Resources/DevCC1_Adaptation.pd Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Screenshot References: Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond[1] Overview "This paper identifies key challenges and solutions for carrying out

363

Adaptive Multiresolution or Adaptive Mesh Refinement? A Case Study for 2D Euler Equations  

SciTech Connect

We present adaptive multiresolution (MR) computations of the two-dimensional compressible Euler equations for a classical Riemann problem. The results are then compared with respect to accuracy and computational efficiency, in terms of CPU time and memory requirements, with the corresponding finite volume scheme on a regular grid. For the same test-case, we also perform computations using adaptive mesh refinement (AMR) imposing similar accuracy requirements. The results thus obtained are compared in terms of computational overhead and compression of the computational grid, using in addition either local or global time stepping strategies. We preliminarily conclude that the multiresolution techniques yield improved memory compression and gain in CPU time with respect to the adaptive mesh refinement method.

Deiterding, Ralf [ORNL; Domingues, Margarete O. [Laboratorio Associado de Computacao e Matematica Aplicada (LAC), Sao Paulo; Gomes, Sonia M. [Universidade Estadual de Campinas, Sao Paulo; Roussel, Olivier [Universite d'Aix-Marseille; Schneider, Kai [Universite d'Aix-Marseille

2009-01-01T23:59:59.000Z

364

Adaptive Implicit Non-Equilibrium Radiation Diffusion  

SciTech Connect

We describe methods for accurate and efficient long term time integra- tion of non-equilibrium radiation diffusion systems: implicit time integration for effi- cient long term time integration of stiff multiphysics systems, local control theory based step size control to minimize the required global number of time steps while control- ling accuracy, dynamic 3D adaptive mesh refinement (AMR) to minimize memory and computational costs, Jacobian Free Newton-Krylov methods on AMR grids for efficient nonlinear solution, and optimal multilevel preconditioner components that provide level independent solver convergence.

Philip, Bobby [ORNL; Wang, Zhen [ORNL; Berrill, Mark A [ORNL; Rodriguez Rodriguez, Manuel [ORNL; Pernice, Michael [Idaho National Laboratory (INL)

2013-01-01T23:59:59.000Z

365

Assessment of Autonomic Control and Respiratory Sinus Arrhythmia Using Point Process Models of Human Heart Beat Dynamics  

E-Print Network (OSTI)

Tracking the autonomic control and respiratory sinus arrhythmia (RSA) from electrocardiogram and respiratory measurements is an important problem in cardiovascular control. We propose a point process adaptive filter algorithm ...

Chen, Zhe

366

Financing Climate Adaptation and Mitigation in Rural Areas of Developing  

Open Energy Info (EERE)

Financing Climate Adaptation and Mitigation in Rural Areas of Developing Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Agency/Company /Organization: U.S. Agency for International Development Topics: Adaptation, Co-benefits assessment, Finance Resource Type: Publications Website: pdf.usaid.gov/pdf_docs/PNADO826.pdf Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Screenshot References: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries[1] Summary "In order to determine how USAID assistance may help overcome barriers to financing these types of projects, this report addresses the following

367

Climate Change Adaptation and Mitigation in the Tourism Sector | Open  

Open Energy Info (EERE)

Climate Change Adaptation and Mitigation in the Tourism Sector Climate Change Adaptation and Mitigation in the Tourism Sector Jump to: navigation, search Tool Summary Name: Climate Change Adaptation and Mitigation in the Tourism Sector Agency/Company /Organization: United Nations Environment Programme Topics: Adaptation, Co-benefits assessment Resource Type: Publications Website: www.unep.fr/shared/publications/pdf/DTIx1047xPA-ClimateChange.pdf Climate Change Adaptation and Mitigation in the Tourism Sector Screenshot References: Climate Change Adaptation and Mitigation in the Tourism Sector[1] Summary "This document forms part of the " UNEP Manuals on Sustainable Tourism" and the UNWTO sustainable tourism policy guidebooks publication series, aiming to provide guidance to tourism stakeholders to integrate

368

Adaptation to Climate Variability and Change: A Guidance Manual for  

Open Energy Info (EERE)

Adaptation to Climate Variability and Change: A Guidance Manual for Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Agency/Company /Organization: United States Agency for International Development Sector: Climate, Energy, Land, Water Topics: Adaptation Resource Type: Guide/manual Website: pdf.usaid.gov/pdf_docs/PNADJ990.pdf References: Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning[1] "This Adaptation Guidance Manual is the first of several tools we are developing to assist planners and stakeholders as they cope with a changing climate. As we work with Missions to apply the methods described here, we

369

Microsoft PowerPoint - Powerpoint_Adaptive.ppt [Compatibility Mode]  

NLE Websites -- All DOE Office Websites (Extended Search)

Response Response to Low Dose Radiation Adaptive Response Adaptive Response When large radiation When large radiation exposure is preceded by a ll " i kl " d h small "tickle" dose, the effect of the large dose is effect of the large dose is sometimes diminished The first time you go to the beach in the summer you don't usually spend 8 hours in summer, you don t usually spend 8 hours in the sun. You begin by being out an hour or d dd ddi i l i h i ki two and add additional time as their skin adapts to the sunny condition and develops protective mechanisms.... Adaptive Response Adaptive Response In some cases, cells also show an "adaptive response" to radiation, although researchers p , g are still trying to understand how the protective mechanisms work. Small doses p

370

Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of  

Open Energy Info (EERE)

Impacts, Vulnerability and Adaptation: The Case of Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Agency/Company /Organization World Agroforestry Centre Sector Land Focus Area Forestry Topics Adaptation, Background analysis, Co-benefits assessment Resource Type Publications Website http://www.worldagroforestry.o Country Philippines UN Region South-Eastern Asia References Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed[1] Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Screenshot This article is a stub. You can help OpenEI by expanding it.

371

Study Shows Roles of Receptor, Thiol on Adaptive Response  

NLE Websites -- All DOE Office Websites (Extended Search)

Study Shows Roles of Receptor, Thiol on Adaptive Response Study Shows Roles of Receptor, Thiol on Adaptive Response Jeffrey Murley Jeffrey Murley, Ph.D. David Grdina, Ph.D. Low Dose program-supported scientists at The University of Chicago have gained more insight into adaptive protective responses indicating the role of oxidative stress, the role of reactive oxygen species (ROS), and the induction of SOD2 (manganese Superoxide Dismutase) activity. These changes are central to the production of adaptive protective responses. Why Study Adaptive Response? Exposing cells to low doses of ionizing radiation has been reported to elevate resistance to genomic damage when the same cells are subsequently exposed to a much higher dose of radiation. This phenomenon, called adaptive response, is characterized by an increase

372

Mainstreaming Climate Change Adaptation into Development Planning: A Guide  

Open Energy Info (EERE)

Mainstreaming Climate Change Adaptation into Development Planning: A Guide Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Agency/Company /Organization: United Nations Environment Programme (UNEP) Sector: Climate Focus Area: Economic Development Topics: Co-benefits assessment, Pathways analysis Resource Type: Guide/manual Website: www.unpei.org/component/docman/doc_download/79-pei-mainstreaming-clima Cost: Free Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Screenshot References: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners[1] Logo: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners

373

Regional Climate Change Adaptation Platform for Asia | Open Energy  

Open Energy Info (EERE)

Platform for Asia Platform for Asia Jump to: navigation, search Logo: Regional Climate Change Adaptation Platform for Asia Name Regional Climate Change Adaptation Platform for Asia Agency/Company /Organization United Nations Environment Programme, Swedish International Development Cooperation Agency, Stockholm Environment Institute, Asian Institute of Technology/UNEP Regional Resource Centre for Asia and the Pacific Topics Adaptation, Policies/deployment programs Website http://www.climateadapt.asia/ Country Cambodia, China, Laos, Myanmar, Thailand, Vietnam, Bangladesh, Bhutan, Nepal, Sri Lanka, Indonesia, Malaysia, Philippines UN Region Eastern Asia, South-Eastern Asia References Regional Climate Change Adaptation Platform for Asia[1] Overview "This initiative supports research and capacity building on climate change

374

Adaptive Real-Time Methodology for Optimizing Energy-Efficient...  

NLE Websites -- All DOE Office Websites (Extended Search)

Email Adaptive Real-Time Methodology for Optimizing Energy-Efficient Computing Dynamic voltage and frequency scaling (DVFS) is an effective way to reduce energy and power...

375

An Infeasible-Point Subgradient Method Using Adaptive ...  

E-Print Network (OSTI)

one then adaptively tightens the requirement on the accuracy. One particularly attractive ..... (?k) is summable, this does not impede convergence. For all these...

376

Economic Evaluation of Climate Change Adaptation Projects: Approaches...  

Open Energy Info (EERE)

Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary Name: Economic Evaluation of...

377

How to Integrate Climate Change Adaptation into National-Level...  

Open Energy Info (EERE)

How to Integrate Climate Change Adaptation into National-Level Policy and Planning in the Water Sector Jump to: navigation, search Tool Summary Name: How to Integrate Climate...

378

Optimization Online - Use of quadratic models with mesh adaptive ...  

E-Print Network (OSTI)

Mar 6, 2011 ... Use of quadratic models with mesh adaptive direct search for constrained black box optimization. Andrew R Conn (arconn ***at*** us.ibm.com)

379

Adaptation for Nature: Ecological Impacts of Climate Change and...  

NLE Websites -- All DOE Office Websites (Extended Search)

Models CyberGIS for Geospatial Discovery and Innovation Ecological Impacts of Climate Change Aerosol and Cloud Microphysics in CAM5 Adaptation for Nature: Ecological...

380

Geothermal: Sponsored by OSTI -- Seismic Technology Adapted to...  

Office of Scientific and Technical Information (OSTI)

Seismic Technology Adapted to Analyzing and Developing Geothermal Systems Below Surface-Exposed High-Velocity Rocks Final Report Geothermal Technologies Legacy Collection HelpFAQ...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Characterizing Uncertainty for Regional Climate Change Mitigation and Adaptation Decisions  

SciTech Connect

This white paper describes the results of new research to develop an uncertainty characterization process to help address the challenges of regional climate change mitigation and adaptation decisions.

Unwin, Stephen D.; Moss, Richard H.; Rice, Jennie S.; Scott, Michael J.

2011-09-30T23:59:59.000Z

382

Adapting Urban Transport to Climate Change- Module 5f - Sustainable...  

Open Energy Info (EERE)

Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Jump to: navigation, search Tool Summary Name: Adapting...

383

Fossil Energy-Developed Fuel Cell Technology Being Adapted by...  

NLE Websites -- All DOE Office Websites (Extended Search)

31, 2013 Fossil Energy-Developed Fuel Cell Technology Being Adapted by Navy for Advanced Unmanned Undersea Vehicles Solid Oxide Fuel Cell Technology Supported by Research Funding...

384

ADAPT Elektronik GmbH | Open Energy Information  

Open Energy Info (EERE)

GmbH Jump to: navigation, search Name ADAPT Elektronik GmbH Place Grobheubach, Germany Zip 63920 Sector Solar Product Germany-based manufacturer of electronic connector...

385

Adapting technology to keep the national infrastructure safe...  

NLE Websites -- All DOE Office Websites (Extended Search)

Adapting technology to keep the national infrastructure safe and secure Community Connections: Our link to Northern New Mexico Communities Latest Issue:September 2013 All Issues ...

386

Africa Adaptation Programme: Capacity Building Experiences-Improving...  

Open Energy Info (EERE)

Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Jump to: navigation, search Tool Summary...

387

Radio-adaptive regimen attenuates features of cellular senescence  

NLE Websites -- All DOE Office Websites (Extended Search)

Radio-Adaptive Regimen Attenuates Features of Cellular Senescence Albert Davalos Lawrence Berkeley National Laboratory Abstract Recent work from several laboratories suggest that...

388

Seismic Technology Adapted to Analyzing and Developing Geothermal...  

Open Energy Info (EERE)

Last modified on July 22, 2011. Project Title Seismic Technology Adapted to Analyzing and Developing Geothermal Systems Below Surface-Exposed High-Velocity Rocks Project Type ...

389

Applying Climate Information for Adaptation Decision-Making:...  

Open Energy Info (EERE)

Applying Climate Information for Adaptation Decision-Making: A Guidance and Resource Document Jump to: navigation, search Tool Summary Name: Applying Climate Information for...

390

Visualization of Scalar Adaptive Mesh Refinement Data  

SciTech Connect

Adaptive Mesh Refinement (AMR) is a highly effective computation method for simulations that span a large range of spatiotemporal scales, such as astrophysical simulations, which must accommodate ranges from interstellar to sub-planetary. Most mainstream visualization tools still lack support for AMR grids as a first class data type and AMR code teams use custom built applications for AMR visualization. The Department of Energy's (DOE's) Science Discovery through Advanced Computing (SciDAC) Visualization and Analytics Center for Enabling Technologies (VACET) is currently working on extending VisIt, which is an open source visualization tool that accommodates AMR as a first-class data type. These efforts will bridge the gap between general-purpose visualization applications and highly specialized AMR visual analysis applications. Here, we give an overview of the state of the art in AMR scalar data visualization research.

VACET; Weber, Gunther; Weber, Gunther H.; Beckner, Vince E.; Childs, Hank; Ligocki, Terry J.; Miller, Mark C.; Van Straalen, Brian; Bethel, E. Wes

2007-12-06T23:59:59.000Z

391

Adaptive Experimentation and Domestic Food Markets  

E-Print Network (OSTI)

This Working Paper examines the dynamics of maize production in distinct environments and localities in Brong Ahafo Region, Ghana, and the various factors that have influenced patterns of agricultural adaptation, innovation and transformation. Specifically, it analyses the influences of neoliberal policies on the institutional framework of maize seed policy, on the technical recommendations of state institutions and on farmer production systems. Drawing on detailed interviews with market traders and small-scale producers, it also contrasts the priorities of farmers with the recommendations of agricultural services and the extent to which research recommendations reflect or fail to reflect the actual developments in maize production systems. Finally, it explores the implications of policy support for the commercialisation of seeds for the wider seed system, including interactions between the formal, informal and market sectors.

Modernisation Farmer; Kojo Sebastian Amanor

2013-01-01T23:59:59.000Z

392

Visualization Tools for Adaptive Mesh Refinement Data  

SciTech Connect

Adaptive Mesh Refinement (AMR) is a highly effective method for simulations that span a large range of spatiotemporal scales, such as astrophysical simulations that must accommodate ranges from interstellar to sub-planetary. Most mainstream visualization tools still lack support for AMR as a first class data type and AMR code teams use custom built applications for AMR visualization. The Department of Energy's (DOE's) Science Discovery through Advanced Computing (SciDAC) Visualization and Analytics Center for Enabling Technologies (VACET) is currently working on extending VisIt, which is an open source visualization tool that accommodates AMR as a first-class data type. These efforts will bridge the gap between general-purpose visualization applications and highly specialized AMR visual analysis applications. Here, we give an overview of the state of the art in AMR visualization research and tools and describe how VisIt currently handles AMR data.

Weber, Gunther H.; Beckner, Vincent E.; Childs, Hank; Ligocki,Terry J.; Miller, Mark C.; Van Straalen, Brian; Bethel, E. Wes

2007-05-09T23:59:59.000Z

393

Adaptable search neighborhoods for Resource Constrained Scheduling  

E-Print Network (OSTI)

Resource Constrained Scheduling problem (RCSP) is a scheduling problem in which each activity may require more than one resource and resources may not be available in the same quantity throughout the planning period. This thesis describes a methodology for RCS that can be easily adapted to consider different regular measures of performance. The solution approach is based on the generation of strong search neighborhoods using methods recently published in the literature. Computational results are encouraging when searching these spaces using simple local search techniques and genetic algorithms. Close-to-optimal solutions are found for standard problems from the literature. A special case of RCSP, the flexible flow line (FFL) scheduling problem, is also studied. Computational results on some real industrial data produced close-to-optimal solutions. In both cases (RCS and FFL), the performance measures used to the test the procedures are makespan and mean tardiness.

Balakrishnan, Ramamoorthy

1993-01-01T23:59:59.000Z

394

Profile-based adaptation for cache decay  

E-Print Network (OSTI)

Cache decay is a leakage-reduction mechanism that puts cache lines that have not been accessed for a specific duration into a lowleakage standby mode. This duration is called the decay interval, and its optimal value varies across applications. This paper describes an adaptation technique that analytically finds the optimal decay interval through profiling, and shows that the most important variables required for finding the optimal decay interval can be estimated using profiling with a reasonable degree of accuracy. Unlike previous methods that attempt to put only dead lines into standby mode, this work explicitly trades off the leakage power saved in putting live lines into standby against its performance and energy costs. It also combines traditional DVS with cache decay using an analysis and obtains results close to what can be obtained with an omniscient choice of per-benchmark optimal decay interval. 1

Karthik Sankaranarayanan

2004-01-01T23:59:59.000Z

395

Adaptable radiation monitoring system and method  

DOE Patents (OSTI)

A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

Archer, Daniel E. (Livermore, CA); Beauchamp, Brock R. (San Ramon, CA); Mauger, G. Joseph (Livermore, CA); Nelson, Karl E. (Livermore, CA); Mercer, Michael B. (Manteca, CA); Pletcher, David C. (Sacramento, CA); Riot, Vincent J. (Berkeley, CA); Schek, James L. (Tracy, CA); Knapp, David A. (Livermore, CA)

2006-06-20T23:59:59.000Z

396

Adaptive controller with fuzzy rules emulated structure and its applications  

Science Conference Proceedings (OSTI)

In this paper, the adaptive controller inspired by the neuro-fuzzy controller is proposed. Its structure, called fuzzy rules emulated network (FREN), is derived based on the fuzzy if-then rules. This structure not only emulates the fuzzy control rules ... Keywords: Direct adaptive control, Fuzzy control, Neuro-Fuzzy learning algorithm, Neuro-fuzzy control

C. Treesatayapun; S. Uatrongjit

2005-08-01T23:59:59.000Z

397

Managing Complexity: Disease Control as a Complex Adaptive System  

Science Conference Proceedings (OSTI)

Trends in computer and communications technologies are enabling increased globalization and integration of enterprises, and corresponding increases of enterprise complexity.ᅠᅠThis article addresses management of this complexity using a complex adaptive ... Keywords: complex adaptive systems, disease control, strategic management, complexity, system models

William B. Rouse

2000-04-01T23:59:59.000Z

398

Adaptive and statistical expectations in a renewable resource market  

Science Conference Proceedings (OSTI)

Rational expectations models have increasingly been replaced by models with various forms of learning. This paper studies the global dynamics of a model of renewable resource markets due to Hommes and Rosser [Macroecon. Dyn. 5 (2001) 180] under adaptive ... Keywords: adaptive models, complex basins, fishery models, global bifurcations, statistical learning

Ilaria Foroni; Laura Gardini; J. Barkley Rosser, Jr.

2003-11-01T23:59:59.000Z

399

An Adaptive Multimoment Global Model on a Cubed Sphere  

Science Conference Proceedings (OSTI)

An adaptive global shallow-water model is proposed on cubed-sphere grid using the multimoment finite volume scheme and the BergerOliger adaptive mesh refinement (AMR) algorithm that was originally designed for a Cartesian grid. On each patch of ...

Chungang Chen; Feng Xiao; Xingliang Li

2011-02-01T23:59:59.000Z

400

Self-adaptive software: Landscape and research challenges  

Science Conference Proceedings (OSTI)

Software systems dealing with distributed applications in changing environments normally require human supervision to continue operation in all conditions. These (re-)configuring, troubleshooting, and in general maintenance tasks lead to costly and time-consuming ... Keywords: Adaptation processes, research challenges, self-adaptive software, self-properties, survey

Mazeiar Salehie; Ladan Tahvildari

2009-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Layered evaluation of interactive adaptive systems: framework and formative methods  

Science Conference Proceedings (OSTI)

The evaluation of interactive adaptive systems has long been acknowledged to be a complicated and demanding endeavour. Some promising approaches in the recent past have attempted tackling the problem of evaluating adaptivity by "decomposing" and evaluating ... Keywords: Design, Evaluation framework, Formative evaluation methods, Layered evaluation

Alexandros Paramythis; Stephan Weibelzahl; Judith Masthoff

2010-12-01T23:59:59.000Z

402

Variational Bayes Adapted GMM Based Models for Audio Clip Classification  

Science Conference Proceedings (OSTI)

The most commonly used method for parameter estimation in the Gaussian mixture models (GMMs) is maximum likelihood (ML). However, it suffers from the overfitting when the model complexity is high. Adapted GMM is an extended version of GMMs and it helps ... Keywords: Bayesian adaptation, GMM, variational learning

Ved Prakash Sahu; Harendra Kumar Mishra; C. Chandra Sekhar

2009-12-01T23:59:59.000Z

403

Unifying design and runtime software adaptation using aspect models  

Science Conference Proceedings (OSTI)

Software systems are seen more and more as evolutive systems. At the design phase, software is constantly in adaptation by the building process itself, and at runtime, it can be adapted in response to changing conditions in the executing environment ... Keywords: Aspect oriented modeling, Software product lines

Carlos Parra; Xavier Blanc; Anthony Cleve; Laurence Duchien

2011-12-01T23:59:59.000Z

404

Subband adaptive array for DS-CDMA mobile radio  

Science Conference Proceedings (OSTI)

We propose a novel scheme of subband adaptive array (SBAA) for direct-sequence code divisionmultiple access (DS-CDMA). The scheme exploits the spreading code and pilot signal as the reference signal to estimate the propagation channel. Moreover, instead ... Keywords: CDMA, RAKE, multipath fading, subband adaptive array

Xuan Nam Tran; Takanori Omata; Tetsuki Taniguchi; Yoshio Karasawa

2004-01-01T23:59:59.000Z

405

Sequence comparison and environmental adaptation of a bacterial endonuclease  

Science Conference Proceedings (OSTI)

The periplasmic/extracellular bacterial enzyme endonuclease I was chosen as a model system to identify features that might be responsible for temperature- and salt adaptation. A statistical study of amino acid sequence properties belonging to endonuclease ... Keywords: Amino acid property, Cold adaptation, Endonuclease I, Halophilic enzymes, Sequence analysis

Bjrn Altermark; Steinar Thorvaldsen; Elin Moe; Arne O. Smals; Nils P. Willassen

2007-06-01T23:59:59.000Z

406

Real-time Reyes-style adaptive surface subdivision  

Science Conference Proceedings (OSTI)

We present a GPU based implementation of Reyes-style adaptive surface subdivision, known in Reyes terminology as the Bound/Split and Dice stages. The performance of this task is important for the Reyes pipeline to map efficiently to graphics hardware, ... Keywords: GPGPU, Reyes, adaptive surface subdivision, graphics hardware

Anjul Patney; John D. Owens

2008-12-01T23:59:59.000Z

407

Breaking Barriers, Building Partnerships ADAPT Summer Intern Program  

E-Print Network (OSTI)

Program will provide summer work experience to students and adults with disabilities. This program working with an untapped workforce. ADAPT Summer Intern Program's strategic goals are to: · Expose people The ADAPT Summer Intern Program provides summer work experience to students and adults with disabilities

Peterson, Blake R.

408

Adaptive quantization using piecewise companding and scaling for Gaussian mixture  

Science Conference Proceedings (OSTI)

Quantization is fundamental to analog-to-digital converter (ADC) and signal compression. In this paper, we propose an adaptive quantizer with piecewise companding and scaling for signals of Gaussian mixture model (GMM). Our adaptive quantizer operates ... Keywords: Analog-to-digital converter (ADC), Companding, Gaussian mixture model (GMM), High dynamic range (HDR) image, Lloyd-Max quantizer, Scalar quantization, Scaling, Tone mapping

Lei Yang; Dapeng Wu

2012-10-01T23:59:59.000Z

409

Adaptive Sorted Neighborhood Methods for Efficient Record Linkage  

E-Print Network (OSTI)

Information Retrieval and Integration, pages 30­39, Washington, DC, USA, 2005. IEEE Computer Society. #12 Consolidation, pages 25­27, Washington, DC, 2003. [4] M. Bilenko, B. Kamath, and R. J. Mooney. "Adaptive and performance by adaptively changing its fixed sliding window size. Our claim is analytically and empirically

Kan, Min-Yen

410

A Novel Distributed Simulation Approach in Adaptive Distance Relaying  

Science Conference Proceedings (OSTI)

In this paper, an adaptive distance relaying strategy based on the global network simulation (GNS) concept is presented. The GNS concept is actually a distributed simulation approach (DSA) for piecewise analysis of large-scale power grids using diakoptics ... Keywords: adaptive distance relaying, coordination rules, diakoptics, distributed simulation approach (DSA), global network simulation (GNS), large change sensitivity (LCS), mutually coupled lines

V. Gohari Sadr; S.M. Kouhsari

2009-03-01T23:59:59.000Z

411

m.Site: efficient content adaptation for mobile devices  

Science Conference Proceedings (OSTI)

Building a mobile user interface can be a time consuming process for web site administrators. We present a novel approach for adapting existing websites to the mobile paradigm. In contrast to existing technologies, our approach aims to provide a trio ... Keywords: mobile content adaptation, web application proxy

Aaron Koehl; Haining Wang

2012-12-01T23:59:59.000Z

412

Adaptive design optimization of wireless sensor networks using genetic algorithms  

Science Conference Proceedings (OSTI)

We present a multi-objective optimization methodology for self-organizing, adaptive wireless sensor network design and energy management, taking into consideration application-specific requirements, communication constraints and energy-conservation characteristics. ... Keywords: Adaptive network design, Energy conservation, Genetic algorithms, Optimal design, Wireless sensor networks

Konstantinos P. Ferentinos; Theodore A. Tsiligiridis

2007-03-01T23:59:59.000Z

413

Engineering the Presentation Layer of Adaptable Web Information Systems  

E-Print Network (OSTI)

by a prototype application. 1 Introduction Engineering personalized Web Information Systems (WIS) is a complexEngineering the Presentation Layer of Adaptable Web Information Systems Zolt´an Fiala1 , Flavius,houben,pbarna}@win.tue.nl Abstract. Engineering adaptable Web Information Systems (WIS) re- quires systematic design models

Houben, Geert-Jan

414

Adaptive filtering with bandwidth constraints in the feedback path  

Science Conference Proceedings (OSTI)

This paper introduces a new, adaptive-filter-based controller that shows advantageous properties from the viewpoint of its communication requirement. The algorithm is called signed-error filtered-x LMS (SE-FxLMS). Its novelty is characterized by the ... Keywords: Adaptive filter based controller, FxLMS algorithm, Networked control systems, Signed-error algorithm, Wireless control

Gyrgy Orosz; Lszl Sujbert; Gbor Pceli

2012-01-01T23:59:59.000Z

415

Hierarchical Partitioning Techniques for Structured Adaptive Mesh Refinement Applications  

Science Conference Proceedings (OSTI)

This paper presents the design and preliminary evaluation of hierarchical partitioning and load-balancing techniques for distributed structured adaptive mesh refinement (SAMR) applications. The overall goal of these techniques is to enable the load distribution ... Keywords: distributed computing, dynamic load balancing, hierarchical partitioning algorithm, structured adaptive mesh refinement

Xiaolin Li; Manish Parashar

2004-06-01T23:59:59.000Z

416

Brief paper: A power system nonlinear adaptive decentralized controller design  

Science Conference Proceedings (OSTI)

In this paper, a novel excitation control is designed for improvement of transient stability of power systems. The control algorithm is based on the adaptive backstepping method in a recursive way without linearizing the system model. Lyapunov function ... Keywords: Adaptive control, Backstepping design, Nonlinear decentralized control, Power systems, Transient stability

Rui Yan; ZhaoYang Dong; T. K. Saha; Rajat Majumder

2010-02-01T23:59:59.000Z

417

FORMS: a formal reference model for self-adaptation  

Science Conference Proceedings (OSTI)

Self-adaptive software systems are an emerging class of systems that adjust their behavior at runtime to achieve certain functional or quality of service objectives. The construction of such systems has shown to be significantly more challenging than ... Keywords: reference model, self-adaptive systems, z specification

Danny Weyns; Sam Malek; Jesper Andersson

2010-06-01T23:59:59.000Z

418

Decentralized control of adaptive sampling in wireless sensor networks  

Science Conference Proceedings (OSTI)

The efficient allocation of the limited energy resources of a wireless sensor network in a way that maximizes the information value of the data collected is a significant research challenge. Within this context, this article concentrates on adaptive ... Keywords: Adaptive sampling algorithm, Gaussian process regression, decentralized decision mechanism, information metric

Johnsen Kho; Alex Rogers; Nicholas R. Jennings

2009-05-01T23:59:59.000Z

419

Parallel Cell Projection Rendering of Adaptive Mesh Refinement Data  

Science Conference Proceedings (OSTI)

Adaptive Mesh Refinement (AMR) is a technique used in numerical simulations to automatically refine (or de-refine) certain regions of the physical domain in a finite difference calculation. AMR data consists of nested hierarchies of data grids. As AMR ... Keywords: volume rendering, adaptive mesh refinement, load balancing, multi-grid methods, parallel rendering, visualization

Gunther H. Weber; Martin Ohler; Oliver Kreylos; John M. Shalf; E. Wes Bethel; Bernd Hamann; Gerik Scheuermann

2003-10-01T23:59:59.000Z

420

Secrets of adaptive support weight techniques for local stereo matching  

Science Conference Proceedings (OSTI)

In recent years, local stereo matching algorithms have again become very popular in the stereo community. This is mainly due to the introduction of adaptive support weight algorithms that can for the first time produce results that are on par with global ... Keywords: Adaptive support weights, Evaluation study, Local stereo matching

Asmaa Hosni; Michael Bleyer; Margrit Gelautz

2013-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Adaptive time-frequency analysis based on autoregressive modeling  

Science Conference Proceedings (OSTI)

A new adaptive method for discrete time-frequency analysis based on autoregressive (AR) modeling is introduced. The performance of AR modeling often depends upon a good selection of the model order. The predictive least squares (PLS) principle of Rissanen ... Keywords: Adaptive filters, Autoregressive modeling, Least squares methods, Model order, Time-frequency analysis

Antonio H. Costa; Stephan Hengstler

2011-04-01T23:59:59.000Z

422

Africa Adaptation Programme: Capacity Building Experiences-Improving  

Open Energy Info (EERE)

Africa Adaptation Programme: Capacity Building Experiences-Improving Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Jump to: navigation, search Tool Summary Name: Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Agency/Company /Organization: United Nations Development Programme (UNDP) Sector: Climate, Energy Topics: Adaptation, Co-benefits assessment, - Energy Access Resource Type: Dataset, Lessons learned/best practices Website: www.undp.org/environment/library.shtml Cost: Free UN Region: Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa Language: English Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Screenshot

423

Agricultural Technologies for Climate Change Mitigation and Adaptation in  

Open Energy Info (EERE)

Agricultural Technologies for Climate Change Mitigation and Adaptation in Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Jump to: navigation, search Tool Summary Name: Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Land Focus Area: Agriculture, Biomass Topics: Adaptation, Implementation, Policies/deployment programs Resource Type: Guide/manual, Publications Website: ictsd.org/downloads/2010/06/agricultural-technologies-for-climate-chan Language: English Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Screenshot

424

Asia-Pacific Regional Climate Change Adaptation Assessment | Open Energy  

Open Energy Info (EERE)

Asia-Pacific Regional Climate Change Adaptation Assessment Asia-Pacific Regional Climate Change Adaptation Assessment Jump to: navigation, search Tool Summary Name: Asia-Pacific Regional Climate Change Adaptation Assessment Agency/Company /Organization: U.S. Agency for International Development Sector: Energy Topics: Adaptation, Co-benefits assessment, Policies/deployment programs Resource Type: Publications Website: www.usaid.gov/rdma/documents/RDMA_Asia-Pacific_Climate_Change_Adaptati Country: China, Bangladesh, India, Indonesia, Laos, Marshall Islands, Federated States of Micronesia, Philippines, Thailand, Vietnam, Cambodia, Maldives, Mongolia, Nepal, Papua New Guinea, Timor-Leste, Solomon Islands, Sri Lanka, Vanuatu UN Region: Central Asia, Eastern Asia, South-Eastern Asia References: Asia-Pacific Adaptation Assessment[1]

425

India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate  

Open Energy Info (EERE)

Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Agency/Company /Organization Swiss Agency for Development and Cooperation Sector Energy, Land, Water Focus Area Agriculture Topics Co-benefits assessment, Background analysis Resource Type Lessons learned/best practices Website http://www.intercooperation.or Country India Southern Asia References India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change[1] India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Screenshot Contents 1 Introduction [1] 2 Community-based Institutions [2] 3 Pasture Land Development [3]

426

TESLA: Multicast Source Authentication Transform  

E-Print Network (OSTI)

This document is an Internet-Draft and is in full conformance with all provisions of Section 10 of RFC2026. Internet-Drafts are working documents of the Internet Engineering

Internet Draft Perrig

2000-01-01T23:59:59.000Z

427

Modeling visitors' profiles: A study to investigate adaptation aspects for museum learning technologies  

Science Conference Proceedings (OSTI)

The time restrictions that apply in museum learning increase the need for adaptive and/or adaptable technologies. However, deriving a visitor's profile is not an easy task, since most common ways (asking direct questions, recording user actions) are ... Keywords: Adaptability, adaptivity, design guidelines, education, museum, museum adaptive learning technologies

Angeliki Antoniou; George Lepouras

2010-09-01T23:59:59.000Z

428

Adaptable Multivariate Calibration Models for Spectral Applications  

SciTech Connect

Multivariate calibration techniques have been used in a wide variety of spectroscopic situations. In many of these situations spectral variation can be partitioned into meaningful classes. For example, suppose that multiple spectra are obtained from each of a number of different objects wherein the level of the analyte of interest varies within each object over time. In such situations the total spectral variation observed across all measurements has two distinct general sources of variation: intra-object and inter-object. One might want to develop a global multivariate calibration model that predicts the analyte of interest accurately both within and across objects, including new objects not involved in developing the calibration model. However, this goal might be hard to realize if the inter-object spectral variation is complex and difficult to model. If the intra-object spectral variation is consistent across objects, an effective alternative approach might be to develop a generic intra-object model that can be adapted to each object separately. This paper contains recommendations for experimental protocols and data analysis in such situations. The approach is illustrated with an example involving the noninvasive measurement of glucose using near-infrared reflectance spectroscopy. Extensions to calibration maintenance and calibration transfer are discussed.

THOMAS,EDWARD V.

1999-12-20T23:59:59.000Z

429

Intrinsic gain modulation and adaptive neural coding  

E-Print Network (OSTI)

In many cases, the computation of a neural system can be reduced to a receptive field, or a set of linear filters, and a thresholding function, or gain curve, which determines the firing probability; this is known as a linear/nonlinear model. In some forms of sensory adaptation, these linear filters and gain curve adjust very rapidly to changes in the variance of a randomly varying driving input. An apparently similar but previously unrelated issue is the observation of gain control by background noise in cortical neurons: the slope of the firing rate vs current (f-I) curve changes with the variance of background random input. Here, we show a direct correspondence between these two observations by relating variance-dependent changes in the gain of f-I curves to characteristics of the changing empirical linear/nonlinear model obtained by sampling. In the case that the underlying system is fixed, we derive relationships relating the change of the gain with respect to both mean and variance with the receptive fi...

Hong, Sungho; Fairhall, Adrienne

2008-01-01T23:59:59.000Z

430

ICIN Archetype, adaptation and the mammalian heart  

E-Print Network (OSTI)

# The Author(s) 2011. This article is published with open access at Springerlink.com Abstract Forty years ago, we started our quest for The Holy Grail of understanding ventricular rate control and rhythm in atrial fibrillation (AF). We therefore studied the morphology and function of a wide range of mammalian hearts. From mouse to whale, we found that all hearts show similar structural and functional characteristics. This suggests that the mammalian heart remained well conserved during evolution and in this aspect it differs from other organs and parts of the mammalian body. The archetype of the mammalian heart was apparently so successful that adaptation by natural selection (evolution) caused by varying habitat demands, as occurred in other organs and many other aspects of mammalian anatomy, bypassed the heart. The structure and function of the heart of placental mammals have thus been strikingly conserved throughout evolution. The changes in the mammalian heart that did take place were mostly adjustments (scaling), to compensate for variations in body size and shape. A remarkable scaling effect is, for instance, the difference in atrioventricular (AV) conduction time, which is vital for optimal cardiac function in all mammals, small and large. Scaling of AV conduction takes place in the AV node (AVN), but its substrate is unknown. This sheds new light on the vital role of the AVN in health and disease. The AVN is master and servant of the

F. L. Meijler; T. D. Meijler; F. L. Meijler; T. D. Meijler

2011-01-01T23:59:59.000Z

431

Adaptive Mesh Refinement for Characteristic Grids  

E-Print Network (OSTI)

I consider techniques for Berger-Oliger adaptive mesh refinement (AMR) when numerically solving partial differential equations with wave-like solutions, using characteristic (double-null) grids. Such AMR algorithms are naturally recursive, and the best-known past Berger-Oliger characteristic AMR algorithm, that of Pretorius & Lehner (J. Comp. Phys. 198 (2004), 10), recurses on individual "diamond" characteristic grid cells. This leads to the use of fine-grained memory management, with individual grid cells kept in 2-dimensional linked lists at each refinement level. This complicates the implementation and adds overhead in both space and time. Here I describe a Berger-Oliger characteristic AMR algorithm which instead recurses on null \\emph{slices}. This algorithm is very similar to the usual Cauchy Berger-Oliger algorithm, and uses relatively coarse-grained memory management, allowing entire null slices to be stored in contiguous arrays in memory. The algorithm is very efficient in both space and time. I describe discretizations yielding both 2nd and 4th order global accuracy. My code implementing the algorithm described here is included in the electronic supplementary materials accompanying this paper, and is freely available to other researchers under the terms of the GNU general public license.

Jonathan Thornburg

2009-08-31T23:59:59.000Z

432

Modeling Power Systems as Complex Adaptive Systems  

Science Conference Proceedings (OSTI)

Physical analogs have shown considerable promise for understanding the behavior of complex adaptive systems, including macroeconomics, biological systems, social networks, and electric power markets. Many of today's most challenging technical and policy questions can be reduced to a distributed economic control problem. Indeed, economically based control of large-scale systems is founded on the conjecture that the price-based regulation (e.g., auctions, markets) results in an optimal allocation of resources and emergent optimal system control. This report explores the state-of-the-art physical analogs for understanding the behavior of some econophysical systems and deriving stable and robust control strategies for using them. We review and discuss applications of some analytic methods based on a thermodynamic metaphor, according to which the interplay between system entropy and conservation laws gives rise to intuitive and governing global properties of complex systems that cannot be otherwise understood. We apply these methods to the question of how power markets can be expected to behave under a variety of conditions.

Chassin, David P.; Malard, Joel M.; Posse, Christian; Gangopadhyaya, Asim; Lu, Ning; Katipamula, Srinivas; Mallow, J V.

2004-12-30T23:59:59.000Z

433

Rotatable superconducting cyclotron adapted for medical use  

DOE Patents (OSTI)

A superconducting cyclotron (10) rotatable on a support structure (11) in an arc of about 180.degree. around a pivot axis (A--A) and particularly adapted for medical use is described. The rotatable support structure (13, 15) is balanced by being counterweighted (14) so as to allow rotation of the cyclotron and a beam (12), such as a subparticle (neutron) or atomic particle beam, from the cyclotron in the arc around a patient. Flexible hose (25) is moveably attached to the support structure for providing a liquified gas which is supercooled to near 0.degree. K. to an inlet means (122) to a chamber (105) around superconducting coils (101, 102). The liquid (34) level in the cyclotron is maintained approximately half full so that rotation of the support structure and cyclotron through the 180.degree. can be accomplished without spilling the liquid from the cyclotron. With the coils vertically oriented, each turn of the winding is approximately half immersed in liquid (34) and half exposed to cold gas and adequate cooling to maintain superconducting temperatures in the section of coil above the liquid level is provided by the combination of cold gas/vapor and by the conductive flow of heat along each turn of the winding from the half above the liquid to the half below.

Blosser, Henry G. (East Lansing, MI); Johnson, David A. (Williamston, MI); Riedel, Jack (East Lansing, MI); Burleigh, Richard J. (Berkeley, CA)

1985-01-01T23:59:59.000Z

434

Complex Adaptive Systems Simulation-Optimization Framework for Adaptive Urban Water Resources Management  

E-Print Network (OSTI)

Population growth, urbanization and climate change threaten urban water systems. The rise of demands caused by growing urban areas and the potential decrease of water availability caused by the increase of frequency and severity of droughts challenge the continued well-being of society. Due to increasing environmental and financial constraints, water management paradigms have shifted from supply augmentation to demand management, and water conservation initiatives may efficiently decrease water demands to more sustainable levels. To provide reliable assessment of the efficiencies of different demand management strategies, new modeling techniques are needed that can simulate decentralized decisions of consumers and their interactions with the water system. An integrated simulation-optimization framework, based on the paradigm of Complex Adaptive Systems, is developed here to model dynamic interactions and adaptations within social, built, and natural components of urban water systems. The framework goes beyond tradition engineering simulations by incorporating decentralized, heterogeneous and autonomous agents, and by simulating dynamic feedback loops among modeling components. The framework uses modeling techniques including System Dynamics, Cellular Automata, and Agent-based Modeling to simulate housing and population growth, a land use change, residential water consumption, the hydrologic cycle, reservoir operation, and a policy/decision maker. This research demonstrates the applicability of the proposed framework through a series of studies applied to a water supply system of a large metropolitan region that is located in a semi-arid region and suffers recurrently from severe droughts. A set of adaptive demand management strategies, that apply contingency restrictions, land use planning, and water conservation technologies, such as rainwater harvesting systems, are evaluated. A multi-objective Evolutionary Algorithm is coupled with the CAS simulation framework to identify optimal strategies and explore conflicting objectives within a water system. The results demonstrate the benefits of adaptive management by updating management decisions to changing conditions. This research develops a new hydrologic sustainability metric, developed to quantify the stormwater impacts of urbanization. The Hydrologic Footprint Residence captures temporal and spatial hydrologic characteristics of a flood wave passing through a stream segment and is used to assess stormwater management scenarios, including Best Management Practices and Low Impact Development.

Giacomoni, Marcio

2012-08-01T23:59:59.000Z

435

An environmental adaptation mechanism for a biped walking robot control based on elicitation of sensorimotor constraints  

Science Conference Proceedings (OSTI)

This paper proposes an environmental adaptation mechanism for a biped walking robot control on up/down slopes In order to cope with a variety of environments, the proposed locomotion control system has dual adaptation loops The first adaptation loop ...

Shunsuke Iida; Toshiyuki Kondo; Koji Ito

2006-09-01T23:59:59.000Z

436

Event:CCCCC and SPREP-Climate Change Adaptation | Open Energy...  

Open Energy Info (EERE)

Adaptation Jump to: navigation, search Calendar.png CCCCC and SPREP-Climate Change Adaptation: 1:30pm- on 20111202 CCCCC and SPREP-Climate Change Adaptation Event Details Name...

437

An adaptive radiation model for the origin of new gene functions  

E-Print Network (OSTI)

Foster, P.L. Adaptive radiation of a frameshift mutation inThe Ecology of Adaptive Radiation, (Oxford University Press,18 th , 2004) An adaptive radiation model for the origin of

Francino, M. Pilar

2004-01-01T23:59:59.000Z

438

Adaptive discrete cosine transform for feedback active noise control  

Science Conference Proceedings (OSTI)

The theory and performance of adaptive discrete cosine transform filters for feedback active noise control (ANC) is examined. The discrete cosine transform filter is a realization of an FIR filter as the cascade of an all-zero FIR filter with a bank ... Keywords: FIR filter, IIR digital resonators bank, active noise control, adaptive discrete cosine transform filters, adaptive filter, all-zero FIR filter, discrete cosine transform filter, feedback active noise control, filter-X LMS implementation, frequency, magnitude coefficient, phase coefficient, single error microphone, single loudspeaker, transfer function

G. Coutu; M. Dignan

1995-10-01T23:59:59.000Z

439

The effects of background adaptation and food availability on habitat preference of Corythoichthys flavofasciatus  

E-Print Network (OSTI)

ADAPTATION AND FOOD AVAILABILITY ON HABITAT PREFERENCE OFchoice is related to the availability of food, presence ofbackground adaptation, food availability, or a combination

Iyer, Neetha

2012-01-01T23:59:59.000Z

440

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Development based climate change adaptation and mitigation-conceptual  

Open Energy Info (EERE)

Development based climate change adaptation and mitigation-conceptual Development based climate change adaptation and mitigation-conceptual issues and lessons learned in studies in developing countries Jump to: navigation, search Tool Summary Name: Development based climate change adaptation and mitigation-conceptual issues and lessons learned in studies in developing countries Agency/Company /Organization: Lawrence Berkeley National Laboratory (LBNL) Sector: Climate, Energy, Land, Water Topics: Adaptation, Co-benefits assessment, - Energy Access, - Energy Security, - Health Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: ies.lbl.gov/iespubs/2halsaes.pdf Country: India, China, South Africa, Brazil, Bangladesh, Senegal Cost: Free Southern Asia, Eastern Asia, Southern Africa, South America, Southern Asia, Western Africa

442

Adaptive Multilevel Modeling of Land-Atmosphere Interactions  

Science Conference Proceedings (OSTI)

Adaptive multilevel methods allow full coupling of atmospheric and land surface hydrological models by preserving consistency between the large-scale (atmospheric) and the regional (land) components. The methodology was investigated for three ...

Ana Paula Barros

1995-09-01T23:59:59.000Z

443

An adaptive keyboard with personalized language-based features  

Science Conference Proceedings (OSTI)

Our research is about an adaptive keyboard, which autonomously adjusts its predictive features and key displays to current user input. We used personalized word prediction to improve the performance of such a system. Prediction using common English dictionary ...

Siska Fitrianie; Leon J. M. Rothkrantz

2007-09-01T23:59:59.000Z

444

Direct-form adaptive equalization for underwater acoustic communication  

E-Print Network (OSTI)

Adaptive equalization is an important aspect of communication systems in various environments. It is particularly important in underwater acoustic communication systems, as the channel has a long delay spread and is subject ...

Yellepeddi, Atulya

2012-01-01T23:59:59.000Z

445

Adaptive management of migratory birds under sea level rise  

Science Conference Proceedings (OSTI)

The best practice method for managing ecological systems under uncertainty is adaptive management (AM), an iterative process of reducing uncertainty while simultaneously optimizing a management objective. Existing solution methods used for AM problems ...

Samuel Nicol, Olivier Buffet, Takuya Iwamura, Iadine Chads

2013-08-01T23:59:59.000Z

446

Suppression of Tumorigenesis by Adaptive Response in Mice  

NLE Websites -- All DOE Office Websites (Extended Search)

of the adaptive response in mind, we have investigated the effects of low-dose-rate irradiation on the process of tumorigenesis at a whole body level in mice. Thymic lymphomas...

447

Adaptive load control of microgrids with non-dispatchable generation  

E-Print Network (OSTI)

Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

Brokish, Kevin Martin

2009-01-01T23:59:59.000Z

448

Minimally supervised domain-adaptive parse reranking for relation extraction  

Science Conference Proceedings (OSTI)

The paper demonstrates how the generic parser of a minimally supervised information extraction framework can be adapted to a given task and domain for relation extraction (RE). For the experiments a generic deep-linguistic parser was employed that works ...

Feiyu Xu; Hong Li; Yi Zhang; Hans Uszkoreit; Sebastian Krause

2011-10-01T23:59:59.000Z

449

Mean and covariance matrix adaptive estimation for a weakly ...  

E-Print Network (OSTI)

Summary: We introduce an adaptive algorithm to estimate the uncertain ... a trade -off between the mean cost E[?rN+1x] = ??N+1x and its standard deviation.

450

Strengthening Adaptation and Resilience to Climate Change in...  

Open Energy Info (EERE)

and Resilience to Climate Change in Kenya (StARCK) Jump to: navigation, search Name Strengthening Adaptation and Resilience to Climate Change in Kenya (StARCK) AgencyCompany...

451

A real-time adaptive control of autonomic computing environments  

Science Conference Proceedings (OSTI)

Autonomic computing has received a great deal of attention from the research community in recent years. Many techniques have been proposed to monitor, analyze, and change the system under observation, but less attention has been paid to adapting the ...

Bogdan Solomon; Dan Ionescu; Marin Litoiu; Mircea Mihaescu

2007-10-01T23:59:59.000Z

452

Adaptive MapReduce using situation-aware mappers  

Science Conference Proceedings (OSTI)

We propose new adaptive runtime techniques for MapReduce that improve performance and simplify job tuning. We implement these techniques by breaking a key assumption of MapReduce that mappers run in isolation. Instead, our mappers communicate through ...

Rares Vernica; Andrey Balmin; Kevin S. Beyer; Vuk Ercegovac

2012-03-01T23:59:59.000Z

453

Decentralized nonlinear adaptive control of an HVAC system  

Science Conference Proceedings (OSTI)

This paper presents a new decentralized nonlinear adaptive controller (DNAC) for a heating, ventilating, and air conditioning (HVAC) system capable of maintaining comfortable conditions under varying thermal loads. In this scheme, an HVAC system is considered ...

Zhang Huaguang; Lilong Cai

2002-11-01T23:59:59.000Z

454

Adaptive Control and Fault Detection of HVAC Equipment in Commercial...  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Control and Fault Detection of HVAC Equipment in Commercial Buildings Speaker(s): John Seem Date: February 27, 2002 - 12:00pm Location: Bldg. 90 Seminar HostPoint of...

455

A Fast Dynamic Grid Adaption Scheme for Meteorological Flows  

Science Conference Proceedings (OSTI)

The continuous dynamic grid adaption (CDGA) technique is applied to a compressible, three-dimensional model of a rising thermal. The computational cost, per grid point per time step, of using CDGA instead of a fixed, uniform Cartesian grid is ...

Brian H. Fiedler; R. Jeffrey Trapp

1993-10-01T23:59:59.000Z

456

Tracer Advection Using Dynamic Grid Adaptation and MM5  

Science Conference Proceedings (OSTI)

A dynamic grid adaptation (DGA) technique is used to numerically simulate tracer transport at meso- and regional scales. A gridpoint redistribution scheme is designed to maximize heuristic characteristics of a good grid. The advective solver ...

John P. Iselin; William J. Gutowski; Joseph M. Prusa

2005-01-01T23:59:59.000Z

457

Adaptive congestion control of high speed ATM networks  

Science Conference Proceedings (OSTI)

Proportional control methods of controlling congestion in high speed ATM networks fail to achieve the desired performance due to the action delays, nonlinearities, and uncertainties in control loop. In this paper an adaptive minimum variance controller ...

Morteza Mosavi; Mahdi Jalili-Kharaajoo

2005-03-01T23:59:59.000Z

458

Interpretation of Adaptive Observing Guidance for Atlantic Tropical Cyclones  

Science Conference Proceedings (OSTI)

Adaptive observing guidance products for Atlantic tropical cyclones are compared using composite techniques that allow one to quantitatively examine differences in the spatial structures of the guidance maps and relate these differences to the ...

C. A. Reynolds; M. S. Peng; S. J. Majumdar; S. D. Aberson; C. H. Bishop; R. Buizza

2007-12-01T23:59:59.000Z

459

Physical Mechanisms Underlying Selected Adaptive Sampling Techniques For Tropical Cyclones  

Science Conference Proceedings (OSTI)

In order to efficiently and effectively prioritize resources, adaptive observations can be targeted - using some objective criteria to estimate the potential impact an initial condition perturbation (or analysis increment) in a specific region ...

Brett T. Hoover; Chris S. Velden; Sharanya J. Majumdar

460

Adaptive surface meshes coarsening with guaranteed quality and topology  

Science Conference Proceedings (OSTI)

In this paper, we present a novel surface meshes coarsening algorithm for generating hierarchical skin surface meshes with decreasing size and guaranteed quality. Each coarse surface mesh is adaptive to the surface curvature and maintains the topology ...

Xinwei Shi; Patrice Koehl

2009-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Improving Policy for Stormwater Management: Implications for Climate Change Adaptation  

Science Conference Proceedings (OSTI)

Lack of local information on climate change impacts is increasingly recognized as an important barrier to progress in adaptation. However, simply providing decision makers with higher-resolution climate information will not ensure successful ...

Lee Tryhorn

2010-04-01T23:59:59.000Z

462

An enhanced archive facilitating climate impacts and adaptation analysis  

Science Conference Proceedings (OSTI)

Capsule: We describe an expanded archive of downscaled model-based projections of future changes in regional climate, with a user-friendly web interface, to facilitate analysis of climate change impacts and adaptation.

Maurer; E.P.Brekke; L.Pruitt; T.Thrasher; B.Long; J.Duffy; P.Dettinger; M.Cayan; D.Arnold; J.

463

Path planning of Autonomous Underwater Vehicles for adaptive sampling  

E-Print Network (OSTI)

This thesis develops new methods for path planning of Autonomous Underwater Vehicles for adaptive sampling. The problem is approached in an optimization framework and two methods are developed to solve it based on Mixed ...

Yilmaz, Namik Kemal, 1975-

2006-01-01T23:59:59.000Z

464

Aspect-Oriented Configuration and Adaptation of Component Communication  

Science Conference Proceedings (OSTI)

In order to compose components, we have to adapt them. Therefore, we pursue a transformational approach focusing on the communication view. We show how to separate the definition of communication from the definition of other system aspects, how to extract ...

Dirk Heuzeroth; Welf Lwe; Andreas Ludwig; Uwe Amann

2001-09-01T23:59:59.000Z

465

The role of research scientists in adaptive management programs  

E-Print Network (OSTI)

This thesis investigates the effectiveness of the Glen Canyon Adaptive Management Program (GCDAMP) in improving and increasing the contributions of scientists to natural resource management decision-making. Natural resource ...

Lenard, Steven R. (Steven Robert), 1976-

2004-01-01T23:59:59.000Z

466

Finishing touches : adaptive graphic design that leverages human creativity  

E-Print Network (OSTI)

This thesis proposes the investigation of a distributed architecture to facilitate automatic adaptation of graphical representation in digital documents to constraints imposed by the presentation device. The goal of the ...

Norton, William Kelly

2006-01-01T23:59:59.000Z

467

Adaptable Sensor Packaging for High Temperature Fossil Fuel Energy System  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptable Sensor Packaging for High Adaptable Sensor Packaging for High Temperature Fossil Fuel Energy Systems Background The Advanced Research Sensors and Controls Program is leading the effort to develop sensing and control technologies and methods to achieve automated and optimized intelligent power systems. The program is led by the U.S. Department of Energy (DOE) Office of Fossil Energy National Energy Technology Laboratory (NETL) and is implemented through research and development agreements with other

468

Rapid Speaker Adaptation for Neural Network Speech Recognizers  

E-Print Network (OSTI)

: : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : x 1 Introduction : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.1 Thesis Outline : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2 Speech Recognition with Neural Networks : : : : : : : : : : : : : : : : : : 4 2.1 The Speech Recognition Problem : : : : : : : : : : : : : : : : : : : : : : : : 4 2.2 Hybrid Systems : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 7 2.2.1 Architecture : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 8 2.2.2 Evaluation and Training : : : : : : : : : : : : : : : : : : : : : : : : : 8 3 Review of Adaptation Literature : : : : : : : : : : : : : : : : : : : : : : : : 13 3.1 Speaker Adaptation/Normalization : : : : : : : : : : : : : : : : : : : : : : : 13 3.1.1 Speaker Categorization Approaches : : : : : : : : : : : : : : : : : : : 16 3.1.2 Data/Feature Transformation Approaches : : : : : : : : : ...

Daniel Clark Burnett; Mark Fanty; Hynek Hermansky; Jordan Cohen

1997-01-01T23:59:59.000Z

469

A Critical Examination of the Adaptive Response for Cytogenetic Damagein Human Cells, and Insights into the Adaptive Response Mechanism  

NLE Websites -- All DOE Office Websites (Extended Search)

Critical Examination of the Adaptive Response for Cytogenetic Damage Critical Examination of the Adaptive Response for Cytogenetic Damage in Human Cells, and Insights into the Adaptive Response Mechanism Björn E. Rydberg, Torsten Groesser, Antoine Snijders, Kelly Trego, Ju Han, Do Yup Lee, Bahram Parvin, Trent Northen, Andrew J. Wyrobek, and Priscilla K. Cooper Berkeley Lab SFA P.I.: Gary Karpen Life Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 Goal: Task 1 of the Berkeley Lab SFA is designed to identify adaptive response (AR) mechanisms that may affect risk of developing radiation-induced cancer and to assess the linearity with dose of processes that influence mammary gland carcinogenesis. We use both in vitro and in vivo experimental systems in a parallelogram strategy. Our human cell culture

470

RSA BSAFE Crypto-C Micro Edition 3.0.0.20 Security Policy  

Science Conference Proceedings (OSTI)

... EC Diffie-Hellman primitives must use curve domain parameters ... library for their platform, which loads the Crypto ... the module is first loaded, must be ...

2013-06-24T23:59:59.000Z

471

Instructions for Using Two-Factor RSA Tokens with Citrix Workplace...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Login Procedure: Enter https:workplace.doe.gov in the address field of your Internet browser. The Citrix Workplace window appears. Enter your user name in the User name...

472

Reducing energy consumption on RSA mines through optimised compressor control / Walter Booysen.  

E-Print Network (OSTI)

??South Africa experienced a severe shortfall in electricity supply during 2008. Eskom, the national electricity supplier, implemented several strategies to alleviate the situation. The Power (more)

Booysen, Walter

2010-01-01T23:59:59.000Z

473

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

474

Adaptive Transmission Policies for Energy Harvesting Wireless Nodes in Fading Channels  

E-Print Network (OSTI)

Adaptive Transmission Policies for Energy Harvesting Wireless Nodes in Fading Channels Omur Ozel1 a fading wireless channel. We design adaptive transmission policies that adapt to the random energy policies that adapt to the random energy arrivals as well as random fluctuations in the channel gain

Ulukus, Sennur

475

A parallel solution - adaptive method for three-dimensional turbulent non-premixed combusting flows  

Science Conference Proceedings (OSTI)

A parallel adaptive mesh refinement (AMR) algorithm is proposed and applied to the prediction of steady turbulent non-premixed compressible combusting flows in three space dimensions. The parallel solution-adaptive algorithm solves the system of partial-differential ... Keywords: Adaptive mesh refinement, Parallel solution-adaptive algorithm, Turbulent combustion, Turbulent diffusion flames, Turbulent non-premixed flames

Xinfeng Gao; Clinton P. T. Groth

2010-05-01T23:59:59.000Z

476

Adaptive Optimization and Systematic Probing of Infrastructure System Maintenance Policies under Model Uncertainty  

E-Print Network (OSTI)

Maintenance; Optimization; Probabilistic models; Adaptive systems; Uncertainty principles . Introduction Infrastructure management systems

Madanat, S M; Park, Sejung; Kuhn, K D

2006-01-01T23:59:59.000Z

477

Adaptations in Electronic Structure Calculations in Heterogeneous Environments  

SciTech Connect

Modern quantum chemistry deals with electronic structure calculations of unprecedented complexity and accuracy. They demand full power of high-performance computing and must be in tune with the given architecture for superior e#14;ciency. To make such applications resourceaware, it is desirable to enable their static and dynamic adaptations using some external software (middleware), which may monitor both system availability and application needs, rather than mix science with system-related calls inside the application. The present work investigates scienti#12;c application interlinking with middleware based on the example of the computational chemistry package GAMESS and middleware NICAN. The existing synchronous model is limited by the possible delays due to the middleware processing time under the sustainable runtime system conditions. Proposed asynchronous and hybrid models aim at overcoming this limitation. When linked with NICAN, the fragment molecular orbital (FMO) method is capable of adapting statically and dynamically its fragment scheduling policy based on the computing platform conditions. Signi#12;cant execution time and throughput gains have been obtained due to such static adaptations when the compute nodes have very di#11;erent core counts. Dynamic adaptations are based on the main memory availability at run time. NICAN prompts FMO to postpone scheduling certain fragments, if there is not enough memory for their immediate execution. Hence, FMO may be able to complete the calculations whereas without such adaptations it aborts.

Talamudupula, Sai

2011-11-29T23:59:59.000Z

478

Energy conservation by adaptive control for a solar heated building  

DOE Green Energy (OSTI)

Identification and optimal control techniques are combined to form an adaptive optimal control strategy which is used to minimize the auxiliary energy consumption for a solar heated building. The adaptive optimal control strategy is described and application of the adaptive optimal controller to the heating, ventilating, and air conditioning (HVAC) system in an appropriate building is modeled. The building used is the newly completed National Security and Resources Study Center (NSRSC) at the Los Alamos Scientific Laboratory (LASL). The NSRSC uses an 8000 sq. ft. solar collector to provide energy for heating and cooling the building. A cost functional to define optimal performance of the HVAC system and an identification process to produce a linearized building model are combined to yield an adaptive linear regulator solution. Although solar energy is used for both heating and cooling the NSRSC, only the results from the heating simulation are available for presentation here. Energy savings predicted by the model when compared to a conventional control system are described and an alternate system configuration is briefly discussed. Plans for actual implementation of the adaptive optimal controller are discussed.

Farris, D.R.; Melsa, J.L.; Murray, H.S.; McDonald, T.E.; Springer, T.E.

1977-01-01T23:59:59.000Z

479

Molecular Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation Colette A. Sacksteder § , DJ Black ‡ , Heather Smallwood § , David G. Camp II † , and Thomas C. Squier § § Cell Biology and Biochemistry; † Biological Sciences Division Pacific Northwest National Laboratory, Richland WA 99352 ‡ School of Biological Sciences, University of Missouri, Kansas City MO 64110 The goal of this research is to identify the molecular mechanisms by which cells adapt to low dose radiation exposure. Previously we have shown a radiation dependent increase of Calmodulin (CaM) in RAW 264.7 macrophages (RAW). Therefore we hypothesize that CaM and associated signaling complexes are sensors of low-dose radiation, resulting in alterations in energy metabolism and gene expression. The ultimate experimental goal

480

Adapting Urban Transport to Climate Change- Module 5f - Sustainable  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Agency/Company /Organization: gtz- Transport Policy Advisory Services, Federal Ministry for Economic Cooperation and Development Focus Area: Governance - Planning - Decision-Making Structure Topics: Analysis Tools Resource Type: Reports, Journal Articles, & Tools Website: www.giz.de/Themen/en/dokumente/gtz2010-en-adapting-urban-transport-to- This sourcebook addresses the key areas of a sustainable transport policy

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Biological Basis for Radiation Adaptive Responses that Protect Against  

NLE Websites -- All DOE Office Websites (Extended Search)

Basis for Radiation Adaptive Responses that Protect Against Basis for Radiation Adaptive Responses that Protect Against Bronchial Epithelial Cell Transformation Wenshu Chen Lovelace Respiratory Research Institute Abstract The major hypothesis in this project is that low-dose, low linear-energy-transfer (LET) radiation stimulates an adaptive response that protects cells from neoplastic transformation involving modulation of paracrine factors (e.g., cytokines), cell survival/death signaling pathways, and reprogramming of the epigenome. To test this hypothesis, a validated, sensitive in vitro transformation model and a media transfer method were used to study the mechanisms of low-LET gamma radiation activated natural protection (ANP) against chemical carcinogen-induced bronchial cell transformation. Immortalized human bronchial epithelial cell

482

Information Theoretic Adaptive Tracking of Epidemics in Complex Networks  

E-Print Network (OSTI)

Adaptively monitoring the states of nodes in a large complex network is of interest in domains such as national security, public health, and energy grid management. Here, we present an information theoretic adaptive tracking and sampling framework that recursively selects measurements using the feedback from performing inference on a dynamic Bayesian Network. We also present conditions for the existence of a network specific, observation dependent, phase transition in the updated posterior of hidden node states resulting from actively monitoring the network. Since traditional epidemic thresholds are derived using observation independent Markov chains, the threshold of the posterior should more accurately model the true phase transition of a network. The adaptive tracking framework and epidemic threshold should provide insight into modeling the dynamic response of the updated posterior to active intervention and control policies while monitoring modern complex networks.

Harrington, Patrick L

2013-01-01T23:59:59.000Z

483

Kinetic Solvers with Adaptive Mesh in Phase Space  

E-Print Network (OSTI)

An Adaptive Mesh in Phase Space (AMPS) methodology has been developed for solving multi-dimensional kinetic equations by the discrete velocity method. A Cartesian mesh for both configuration (r) and velocity (v) spaces is produced using a tree of trees data structure. The mesh in r-space is automatically generated around embedded boundaries and dynamically adapted to local solution properties. The mesh in v-space is created on-the-fly for each cell in r-space. Mappings between neighboring v-space trees implemented for the advection operator in configuration space. We have developed new algorithms for solving the full Boltzmann and linear Boltzmann equations with AMPS. Several recent innovations were used to calculate the full Boltzmann collision integral with dynamically adaptive mesh in velocity space: importance sampling, multi-point projection method, and the variance reduction method. We have developed an efficient algorithm for calculating the linear Boltzmann collision integral for elastic and inelastic...

Arslanbekov, Robert R; Frolova, Anna A

2013-01-01T23:59:59.000Z

484

Amplitude variations on the Extreme Adaptive Optics testbed  

Science Conference Proceedings (OSTI)

High-contrast adaptive optics systems, such as those needed to image extrasolar planets, are known to require excellent wavefront control and diffraction suppression. At the Laboratory for Adaptive Optics on the Extreme Adaptive Optics testbed, we have already demonstrated wavefront control of better than 1 nm rms within controllable spatial frequencies. Corresponding contrast measurements, however, are limited by amplitude variations, including those introduced by the micro-electrical-mechanical-systems (MEMS) deformable mirror. Results from experimental measurements and wave optic simulations of amplitude variations on the ExAO testbed are presented. We find systematic intensity variations of about 2% rms, and intensity variations with the MEMS to be 6%. Some errors are introduced by phase and amplitude mixing because the MEMS is not conjugate to the pupil, but independent measurements of MEMS reflectivity suggest that some error is introduced by small non-uniformities in the reflectivity.

Evans, J; Thomas, S; Dillon, D; Gavel, D; Phillion, D; Macintosh, B

2007-08-14T23:59:59.000Z

485

Multi-AUV control and adaptive sampling in Monterey Bay  

E-Print Network (OSTI)

AbstractOperations with multiple autonomous underwater vehicles (AUVs) have a variety of underwater applications. For example, a coordinated group of vehicles with environmental sensors can perform adaptive ocean sampling at the appropriate spatial and temporal scales. We describe a methodology for cooperative control of multiple vehicles based on virtual bodies and artificial potentials (VBAP). This methodology allows for adaptable formation control and can be used for missions such as gradient climbing and feature tracking in an uncertain environment. We discuss our implementation on a fleet of autonomous underwater gliders and present results from sea trials in Monterey Bay in August, 2003. These at-sea demonstrations were performed as part of the Autonomous Ocean Sampling Network (AOSN) II project. Index TermsAdaptive sampling, autonomous underwater vehicles (AUVs), cooperative control, formations, gradient climbing, underwater gliders. I.

Edward Fiorelli; Naomi Ehrich Leonard; Senior Member; Pradeep Bhatta; Derek A. Paley; Student Member; Ralf Bachmayer; David M. Fratantoni

2004-01-01T23:59:59.000Z

486

TalkMine and the Adaptive Recommendation Project  

E-Print Network (OSTI)

TalkMine is an adaptive recommendation system which is both content-based and collaborative, and further allows the crossover of information among multiple databases searched by users. In this way, different databases learn new and adapt existing keywords to the categories recognized by its communities of users. TalkMine is based on several theories of uncertainty, as well as on biologically inspired adaptionist ideas. This system is currently being implemented for the research library of the Los Alamos National Laboratory under the Adaptive Recommendation Project. In the present work we discuss the shortcomings of current recommendation systems for distributed information systems and propose how TalkMine can greatly improve these shortcomings. Keywords: Recommendation systems, information retrieval, knowledge management, fuzzy sets, evidence sets, distributed information systems, evolutionary systems, human-machine interaction, artificial intelligence. 1. DISTRIBUTED INFORMATION SYS...

Luis Mateus Rocha

1999-01-01T23:59:59.000Z

487

Hierarchy-Direction Selective Approach for Locally Adaptive Sparse Grids  

SciTech Connect

We consider the problem of multidimensional adaptive hierarchical interpolation. We use sparse grids points and functions that are induced from a one dimensional hierarchical rule via tensor products. The classical locally adaptive sparse grid algorithm uses an isotropic refinement from the coarser to the denser levels of the hierarchy. However, the multidimensional hierarchy provides a more complex structure that allows for various anisotropic and hierarchy selective refinement techniques. We consider the more advanced refinement techniques and apply them to a number of simple test functions chosen to demonstrate the various advantages and disadvantages of each method. While there is no refinement scheme that is optimal for all functions, the fully adaptive family-direction-selective technique is usually more stable and requires fewer samples.

Stoyanov, Miroslav K [ORNL] [ORNL

2013-09-01T23:59:59.000Z

488

Block-structured adaptive mesh refinement - theory, implementation and application  

SciTech Connect

Structured adaptive mesh refinement (SAMR) techniques can enable cutting-edge simulations of problems governed by conservation laws. Focusing on the strictly hyperbolic case, these notes explain all algorithmic and mathematical details of a technically relevant implementation tailored for distributed memory computers. An overview of the background of commonly used finite volume discretizations for gas dynamics is included and typical benchmarks to quantify accuracy and performance of the dynamically adaptive code are discussed. Large-scale simulations of shock-induced realistic combustion in non-Cartesian geometry and shock-driven fluid-structure interaction with fully coupled dynamic boundary motion demonstrate the applicability of the discussed techniques for complex scenarios.

Deiterding, Ralf [ORNL

2011-01-01T23:59:59.000Z

489

The AdaptiV Approach to Verification of Adaptive Systems  

SciTech Connect

Adaptive systems are critical for future space and other unmanned and intelligent systems. Verification of these systems is also critical for their use in systems with potential harm to human life or with large financial investments. Due to their nondeterministic nature and extremely large state space, current methods for verification of software systems are not adequate to provide a high level of assurance. The combination of stabilization science, high performance computing simulations, compositional verification and traditional verification techniques, plus operational monitors, provides a complete approach to verification and deployment of adaptive systems that has not been used before. This paper gives an overview of this approach.

Rouff, Christopher [Lockheed Martin Corporation; Buskens, Richard [Lockheed Martin Corporation; Pullum, Laura L [ORNL; Cui, Xiaohui [ORNL; Hinchey, Mike [Lero The Irish Software Engineering Research Centre

2012-01-01T23:59:59.000Z

490

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

491

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

492

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

493

A new approach applied to adaptive centralized load shedding scheme  

Science Conference Proceedings (OSTI)

One of major contingencies of an electric power system is due to imbalance between loads and generated power. This leads to instability in the power system and hence to a blackout. A load shedding scheme may be used to avoid such problem by reducing ... Keywords: adaptive load shedding scheme, critical power, power system, threshold power

Hamid Bentarzi; Abderrahmane Ouadi; Nadir Ghout; Farid Maamri; Nikos E. Mastorakis

2009-12-01T23:59:59.000Z

494

Strategic bidding methodology for electricity markets using adaptive learning  

Science Conference Proceedings (OSTI)

The very particular characteristics of electricity markets, require deep studies of the interactions between the involved players. MASCEM is a market simulator developed to allow studying electricity market negotiations. This paper presents a new proposal ... Keywords: adaptive learning, electricity markets, forecasting methods, intelligent agents, multiagent systems

Tiago Pinto; Zita Vale; Ftima Rodrigues; Hugo Morais; Isabel Praa

2011-06-01T23:59:59.000Z

495

On-line Task Granularity Adaptation for Dynamic Grid Applications  

E-Print Network (OSTI)

On-line Task Granularity Adaptation for Dynamic Grid Applications Nithiapidary Muthuvelu1, Ian Chai by adjusting the task granularity at the grid scheduler. We propose an on-line scheduling algorithm which@csse.unimelb.edu.au Abstract. Deploying lightweight tasks on grid resources would let the commu- nication overhead dominate

Buyya, Rajkumar

496

Adaptive Medical Information Delivery Combining User, Task and Situation Models  

E-Print Network (OSTI)

Adaptive Medical Information Delivery Combining User, Task and Situation Models Luis Francisco, USA +1409 845 4924 {lOfO954,shipman} @cs.tamu.edu ABSTRACT Medical information delivery for users for communication with Earth. The Mars Medical Assistant (MMA) uses a combination of user, situation, and task

Francisco-Revilla, Luis

497

River flow estimation using adaptive neuro fuzzy inference system  

Science Conference Proceedings (OSTI)

Accurate estimation of River flow changes is a quite important problem for a wise and sustainable use. Such a problem is crucial to the works and decisions related to the water resources and management. In this study, an adaptive network-based fuzzy ... Keywords: ANFIS, ANN, Fuzzy logic, Great Menderes River, River flow estimation

Mahmut Firat; Mahmud Gngr

2007-07-01T23:59:59.000Z

498

Adaptive Web Caching Lixia Zhang, Sally Floyd, and Van Jacobson  

E-Print Network (OSTI)

of well publicized examples. Recent studies by MargoSeltzer of Harvard University also con rms that ash experience teach us that caching is the only way to handle the exponential growth of user demands. Seltzer. In the rest of this section, we rst outline an ideal adaptive caching system. We next describe a multicast

Floyd, Sally

499

Supporting Energy-driven Adaptations in Distributed Environments  

E-Print Network (OSTI)

Supporting Energy-driven Adaptations in Distributed Environments Adel Noureddine, Romain Rouvoy of energy techniques and in different contexts. The distributed nature of our approach fits in a ubiquitous Middleware, Energy awareness, Distributed Environments 1. INTRODUCTION With the increase in the usage

Paris-Sud XI, Université de

500

The AROUND project: Adapting robotic disaster response to developing countries  

E-Print Network (OSTI)

The AROUND project: Adapting robotic disaster response to developing countries Alain Boucher1 constraints of developing countries. Keywords: Disaster response, Multi-Robot Systems, Cheap robotics, Spatial, in terms of frequency and devastating power, of natural disasters (par- ticularly in developing countries

Paris-Sud XI, Université de