Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

2

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

3

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

4

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy Savers [EERE]

Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

5

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

6

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...  

Energy Savers [EERE]

5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

7

T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID  

Broader source: Energy.gov [DOE]

RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

8

T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

9

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

10

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

11

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

12

Another Generalization of Wiener's Attack on RSA  

E-Print Network [OSTI]

Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

Nitaj, Abderrahmane

13

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

14

A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption  

E-Print Network [OSTI]

Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

Pateriya, R K; Shrivastava, S C; Patel, Jaideep

2009-01-01T23:59:59.000Z

15

Identity-Based Mediated RSA , Xuhua Ding2  

E-Print Network [OSTI]

certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

Ding, Xuhua

16

A new attack on RSA and CRT-RSA Abderrahmane Nitaj  

E-Print Network [OSTI]

A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

Nitaj, Abderrahmane

17

An Attack on RSA Using LSBs of Multiples of the Prime Factors  

E-Print Network [OSTI]

An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

Nitaj, Abderrahmane

18

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Broader source: Energy.gov (indexed) [DOE]

Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

19

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...  

Energy Savers [EERE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

20

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy Savers [EERE]

129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

22

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...  

Broader source: Energy.gov (indexed) [DOE]

Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

23

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

24

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

25

U-027: RSA Key Manager Appliance Session Logout Bug Fails to...  

Broader source: Energy.gov (indexed) [DOE]

the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

26

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

27

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

28

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

29

A Faster Hardware Implementation of RSA Ajay C Shantilal  

E-Print Network [OSTI]

1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

30

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

31

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple

32

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

33

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a command

34

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

35

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discoveredSUSE

36

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

37

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

38

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

39

Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2  

E-Print Network [OSTI]

, change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

Reluga, Tim

40

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?  

E-Print Network [OSTI]

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

A New Attack on RSA with Two or Three Decryption Exponents  

E-Print Network [OSTI]

A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

Nitaj, Abderrahmane

42

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes  

E-Print Network [OSTI]

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

Odlyzko, Andrew M.

43

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma  

E-Print Network [OSTI]

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma , Ondej Pokorn1 and Toms Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

44

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

45

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

46

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

47

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...  

Office of Environmental Management (EM)

1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

48

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra  

E-Print Network [OSTI]

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

Paris-Sud XI, Université de

49

Security analysis of RSA cryptosystem algorithm and its properties  

SciTech Connect (OSTI)

The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

2014-10-06T23:59:59.000Z

50

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack  

E-Print Network [OSTI]

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

Chen, Sheng-Wei

51

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

52

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

53

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

54

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

55

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

56

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

57

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

58

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

59

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

60

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

62

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

63

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

64

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

65

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

66

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

67

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

68

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

69

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

70

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

71

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

72

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

73

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

74

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

75

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

76

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

77

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

78

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 1632 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

79

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

80

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how ones cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

82

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

83

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

84

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

85

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

86

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

87

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

88

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

89

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

90

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

91

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

92

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

93

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500  

Broader source: Energy.gov [DOE]

The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

94

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

95

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

96

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

97

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

98

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

99

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

100

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their nontamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

102

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

103

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

104

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

105

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

106

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

107

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

108

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

109

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

110

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

111

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

112

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

113

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

114

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

115

Adaptation Plan  

E-Print Network [OSTI]

Environment ? Natural Environment ? People FIVE STRATEGIES Copyright 2011, City of Chicago ADAPTATION ESL-KT-11-11-16 9 CCAP Adaptation Evolution 2007 2008 2009 2010 ? Understood the climate science: Assess climate impacts ? Assessed economic... E xi st in g Tr un k Existing on Rogers Rogers Ave CIP Stormwater management: Chicago?s comprehensive sewer model Climate impacts Example actions to prepare the built environment Copyright 2011, City of Chicago ESL-KT-11-11-16 13 CCAP...

Durnbaugh, A.

2011-01-01T23:59:59.000Z

116

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

117

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

118

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

119

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

120

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

122

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

123

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

124

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

125

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

126

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

127

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

128

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

129

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

130

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

131

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

132

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

133

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

134

Adaptive sampler  

DOE Patents [OSTI]

An adaptive data compression device for compressing data having variable frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, Bobby L. (Idaho Falls, ID); Aeby, Ian (Fremont, CA)

1982-01-01T23:59:59.000Z

135

Adaptive sampler  

DOE Patents [OSTI]

An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, B.L.; Aeby, I.

1980-08-26T23:59:59.000Z

136

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

137

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

138

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

139

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

140

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

142

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

143

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

144

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Zurich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

145

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

146

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

147

Generalized Adaptive A* Xiaoxun Sun  

E-Print Network [OSTI]

Generalized Adaptive A* Xiaoxun Sun USC Computer Science Los Angeles, California xiaoxuns spaces changes. Adaptive A* [7] is a Cite as: Generalized Adaptive A*, Xiaoxun Sun, Sven Koenig

Yeoh, William

148

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

149

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Universit de

150

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

151

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

152

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

153

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two IDbased password authen tication schemes for logging onto a remote network server using smart

154

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

155

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

156

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

157

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

158

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

159

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

160

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

162

BIODIVERSITY Incorporating sociocultural adaptive  

E-Print Network [OSTI]

BIODIVERSITY VIEWPOINT Incorporating sociocultural adaptive capacity in conservation hotspot of biodiversity threats. Conservation biogeography (Whittaker et al., 2005) has emerged as a critical area biodiversity (Mawdsley et al., 2009). Adjusting conservation strategies to maintain diversity in recognition

163

Dynamic Adaptation using Xen  

SciTech Connect (OSTI)

The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modification to the core hypervisor, which impairs research into dynamic adaptation for system-level virtualization. This paper discusses recent investigations into the feasibility of extending Xen to support runtime adaptation for core hypervisor service, e.g., scheduler.

Naughton, III, Thomas J [ORNL; Vallee, Geoffroy R [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

164

Discriminative Adaptive Training and Bayesian Inference for  

E-Print Network [OSTI]

adaptation is a standard part of many speech recognition systems. This process requires some adaptation data

de Gispert, Adrià

165

ADAPTIVE RADIATION ROSEMARY G. GILLESPIE  

E-Print Network [OSTI]

1 A ADAPTIVE RADIATION ROSEMARY G. GILLESPIE University of California, Berkeley Adaptive radiation- tions and convergence of species groups on different land masses. Since then, adaptive radiation has diversity within a rapidly multiplying lineage." There are radiations that are not adaptive

Gillespie, Rosemary

166

Adaptive Medical Information Delivery Combining User, Task and Situation Models  

E-Print Network [OSTI]

., in their model for adaptive hypermedia AHAM [2], distinguish contentadaptation from link adaptation

167

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

168

Adaptation and adaptability : expectant design for resilience in coastal urbanity  

E-Print Network [OSTI]

What is the nature of and possibility for urban resiliency through adaptation? Adaptation implies responsiveness to phenomena that are disruptive to a system's functioning; it is a willful evolution in response to changed ...

Ruskeep, Laura A. Delaney (Laura Ashley Delaney)

2011-01-01T23:59:59.000Z

169

Adaptive sequential controller  

DOE Patents [OSTI]

An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

1994-01-01T23:59:59.000Z

170

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS  

E-Print Network [OSTI]

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU \\Lambda Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

171

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS  

E-Print Network [OSTI]

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

172

Spectral-element adaptive refinement  

E-Print Network [OSTI]

Spectral-element adaptive refinement magnetohydrodynamic simulations of the island coalescence;Abstract A recently developed spectral-element adaptive refinement incompressible magnetohydrodynamic (MHD statically refined and dynamically refined grids. The island coalescence instability is a fundamental MHD

Ng, Chung-Sang

173

Adaptation of Microvasculature to Pulsatility  

E-Print Network [OSTI]

adaptation has not yet been fully characterized. In fact, standard mathematical models using the common assumption that vessels solely adapt to steady flow do not reproduce normal vascular structure. Therefore, we developed a simple, mathematical model of a...

Bimal, Tia

2013-09-24T23:59:59.000Z

174

Climate Change, Adaptation, and Development  

E-Print Network [OSTI]

Climate Change, Adaptation, and Development Daniel H. Cole*THE COSTS OF CLIMATE CHANGE . ADAPTATIONCONVENTION ON CLIMATE CHANGE . IV. A.

Cole, Daniel H.

2008-01-01T23:59:59.000Z

175

Adaptive control for accelerators  

DOE Patents [OSTI]

An adaptive feedforward control loop is provided to stabilize accelerator beam loading of the radio frequency field in an accelerator cavity during successive pulses of the beam into the cavity. A digital signal processor enables an adaptive algorithm to generate a feedforward error correcting signal functionally determined by the feedback error obtained by a beam pulse loading the cavity after the previous correcting signal was applied to the cavity. Each cavity feedforward correcting signal is successively stored in the digital processor and modified by the feedback error resulting from its application to generate the next feedforward error correcting signal. A feedforward error correcting signal is generated by the digital processor in advance of the beam pulse to enable a composite correcting signal and the beam pulse to arrive concurrently at the cavity.

Eaton, Lawrie E. (Los Alamos, NM); Jachim, Stephen P. (Los Alamos, NM); Natter, Eckard F. (Santa Fe, NM)

1991-01-01T23:59:59.000Z

176

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

177

Adapting to Survive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)ProductssondeadjustsondeadjustAbout the Building TechnologiesS1!4T op Document: NAActivitiesAdapting to

178

Maintainable and Reusable Scientific Software Adaptation Democratizing Scientific Software Adaptation  

E-Print Network [OSTI]

Adaptation Pilsung Kang, Eli Tilevich, Srinidhi Varadarajan, and Naren Ramakrishnan Center for High, and available resources to en- sure its efficiency and reliability. Although adaptation pat- terns can be found, Maintenance, and Enhancement; D.2.13 [Reusable Soft- ware]: [Reusable libraries]; D.3.3 [Language Constructs

Ryder, Barbara G.

179

BRIDGING NAVIGATION, SEARCH AND ADAPTATION. Adaptive Hypermedia Models Evolution  

E-Print Network [OSTI]

Corpus, Dexter Model, AHAM, GAF. Abstract: Adaptive Hypermedia Systems (AHS) have long been concentrating The most referenced (but certainly not only) Adaptive Hypermedia (AH) model dates back to 1999. Since AHAM/Hypermedia modelling from Dexter Model through AHAM to the proposed GAF model, out- line advantages of each framework

De Bra, Paul

180

161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at  

E-Print Network [OSTI]

hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

Boyer, Edmond

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Organizational Adaptation Kathleen M. Carley  

E-Print Network [OSTI]

-humans. For example, they suggest that organizational learning resides not just in the minds of the personnel withinOrganizational Adaptation Kathleen M. Carley Dept. of Social and Decision Sciences Carnegie Mellon: Kathleen M. Carley, 1998, "Organizational Adaptation." Annals of Operations Research. 75: 25-47. #12

Sadeh, Norman M.

182

Adaptation, Learning, and Optimization over  

E-Print Network [OSTI]

Adaptation, Learning, and Optimization over Networks Ali H. Sayed University of California at Los 2014 A. H. Sayed DOI: 10.1561/2200000051 Adaptation, Learning, and Optimization over Networks Ali H . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.6 Notation and Symbols . . . . . . . . . . . . . . . . . . . . 8 2 Optimization by Single Agents

California at Los Angeles, University of

183

Adaptive Optics in Star Formation  

E-Print Network [OSTI]

Over the past ten years, the concept of adaptive optics has evolved from early experimental stages to a standard observing tool now available at almost all major optical and near-infrared telescope facilities. Adaptive optics will also be essential in exploiting the full potential of the large optical/infrared interferometers currently under construction. Both observations with high-angular resolution and at high contrast, and with a high point source sensitivity are facilitated by adaptive optics. Among the areas which benefit most from the use of adaptive optics are studies of the circumstellar environment (envelopes, disks, outflows), substellar companions and multiple systems, and dense young stellar populations. This contribution highlights some of the recent advances in star formation studies facilitated by adaptive optics, and gives a brief tutorial on optimized observing and data reduction strategies.

Wolfgang Brandner

2003-09-29T23:59:59.000Z

184

Adaptive excitation control in power systems  

E-Print Network [OSTI]

This thesis presents an adaptive excitation controller of power systems. The control law is derived by using model reference adaptive control (MRAC) or adaptive pole placement control (APPC) and an equilibrium tracking mechanism is implemented...

Chiu, Pei-Chen

2006-08-16T23:59:59.000Z

185

Autonomous adaptive acoustic relay positioning  

E-Print Network [OSTI]

We consider the problem of maximizing underwater acoustic data transmission by adaptively positioning an autonomous mobile relay so as to learn and exploit spatial variations in channel performance. The acoustic channel ...

Cheung, Mei Yi, S.M. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

186

COMMENTARY:Limits to adaptation  

SciTech Connect (OSTI)

An actor-centered, risk-based approach to defining limits to social adaptation provides a useful analytic framing for identifying and anticipating these limits and informing debates over society s responses to climate change.

Preston, Benjamin L [ORNL

2013-01-01T23:59:59.000Z

187

Adaptive multiconfigurational wave functions  

SciTech Connect (OSTI)

A method is suggested to build simple multiconfigurational wave functions specified uniquely by an energy cutoff ?. These are constructed from a model space containing determinants with energy relative to that of the most stable determinant no greater than ?. The resulting ?-CI wave function is adaptive, being able to represent both single-reference and multireference electronic states. We also consider a more compact wave function parameterization (?+SD-CI), which is based on a small ?-CI reference and adds a selection of all the singly and doubly excited determinants generated from it. We report two heuristic algorithms to build ?-CI wave functions. The first is based on an approximate prescreening of the full configuration interaction space, while the second performs a breadth-first search coupled with pruning. The ?-CI and ?+SD-CI approaches are used to compute the dissociation curve of N{sub 2} and the potential energy curves for the first three singlet states of C{sub 2}. Special attention is paid to the issue of energy discontinuities caused by changes in the size of the ?-CI wave function along the potential energy curve. This problem is shown to be solvable by smoothing the matrix elements of the Hamiltonian. Our last example, involving the Cu{sub 2}O{sub 2}{sup 2+} core, illustrates an alternative use of the ?-CI method: as a tool to both estimate the multireference character of a wave function and to create a compact model space to be used in subsequent high-level multireference coupled cluster computations.

Evangelista, Francesco A., E-mail: francesco.evangelista@emory.edu [Department of Chemistry and Cherry L. Emerson Center for Scientific Computation, Emory University, Atlanta, Georgia 30322 (United States)

2014-03-28T23:59:59.000Z

188

Matrix adaptation in discriminative vector quantization  

E-Print Network [OSTI]

. Gabriel Zachmann (Computer Graphics) #12;Matrix adaptation in discriminative vector quantization Petra

Zachmann, Gabriel

189

Regional Water Management: Adapting to Uncertain Water  

E-Print Network [OSTI]

Regional Water Management: Adapting to Uncertain Water Supply and Demand Jim Schneider, Ph · How Nebraska manages water · Dealing with uncertain water supplies: adaptive management #12;Regional-wide, systematic approach · Flexible--Adaptive Management Adaptive Manageme nt #12;Integrated Water Management

Nebraska-Lincoln, University of

190

Adaptive Liquid Crystal Windows  

SciTech Connect (OSTI)

Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft 1ft prototype panels for the worlds first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicrons patented e-Tint technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of power consumption by ALCWs allows for on-board power electronics for automatic matching of transmission through windows to varying climate conditions without drawing the power from the power grid. ALCWs are capable of transmitting more sunlight in winters to assist in heating and less sunlight in summers to minimize overheating. As such, they can change the window from being a source of energy loss to a source of energy gain. In addition, the scalable AMIs roll-to-roll process, proved by making 1ft 1ftALCW prototype panels, allows for cost-effective production of large-scale window panels along with capability to change easily their color and shape. In addition to architectural glazing in houses and commercial buildings, ALCWs can be used in other applications where control of sunlight is needed, such as green houses, used by commercial produce growers and botanical gardens, cars, aircrafts, etc.

Taheri, Bahman; Bodnar, Volodymyr

2011-12-31T23:59:59.000Z

191

Adaptive Sampling in Hierarchical Simulation  

SciTech Connect (OSTI)

We propose an adaptive sampling methodology for hierarchical multi-scale simulation. The method utilizes a moving kriging interpolation to significantly reduce the number of evaluations of finer-scale response functions to provide essential constitutive information to a coarser-scale simulation model. The underlying interpolation scheme is unstructured and adaptive to handle the transient nature of a simulation. To handle the dynamic construction and searching of a potentially large set of finer-scale response data, we employ a dynamic metric tree database. We study the performance of our adaptive sampling methodology for a two-level multi-scale model involving a coarse-scale finite element simulation and a finer-scale crystal plasticity based constitutive law.

Knap, J; Barton, N R; Hornung, R D; Arsenlis, A; Becker, R; Jefferson, D R

2007-07-09T23:59:59.000Z

192

Adaptive Optics for Large Telescopes  

SciTech Connect (OSTI)

The use of adaptive optics was originally conceived by astronomers seeking to correct the blurring of images made with large telescopes due to the effects of atmospheric turbulence. The basic idea is to use a device, a wave front corrector, to adjust the phase of light passing through an optical system, based on some measurement of the spatial variation of the phase transverse to the light propagation direction, using a wave front sensor. Although the original concept was intended for application to astronomical imaging, the technique can be more generally applied. For instance, adaptive optics systems have been used for several decades to correct for aberrations in high-power laser systems. At Lawrence Livermore National Laboratory (LLNL), the world's largest laser system, the National Ignition Facility, uses adaptive optics to correct for aberrations in each of the 192 beams, all of which must be precisely focused on a millimeter scale target in order to perform nuclear physics experiments.

Olivier, S

2008-06-27T23:59:59.000Z

193

Training Adaptive Decision-Making.  

SciTech Connect (OSTI)

Adaptive Thinking has been defined here as the capacity to recognize when a course of action that may have previously been effective is no longer effective and there is need to adjust strategy. Research was undertaken with human test subjects to identify the factors that contribute to adaptive thinking. It was discovered that those most effective in settings that call for adaptive thinking tend to possess a superior capacity to quickly and effectively generate possible courses of action, as measured using the Category Generation test. Software developed for this research has been applied to develop capabilities enabling analysts to identify crucial factors that are predictive of outcomes in fore-on-force simulation exercises.

Abbott, Robert G.; Forsythe, James C.

2014-10-01T23:59:59.000Z

194

authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5  

E-Print Network [OSTI]

brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee or fair trade tea to your meal for $1.5 BUILD YOUR OWN BREAKFAST 7 served with toast (rye or harvest grain · house cured back bacon · house smoked tofu · grilled tomatoes and onions · wilted greens · breakfast

Martin, Jeff

195

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

196

Adaptive constructive processes 1 Running head: Adaptive constructive processes  

E-Print Network [OSTI]

to a current environmental demand when automatic, learned responses are not elicited. Bartlett argued further of Psychology Harvard University Cambridge, Massachusetts 02138 phone: (617) 495-3856 fax: (617) 496-3122 e to be operating in any well-adapted organic response (1932, p. 201)". He further emphasized the importance of "the

Schacter, Daniel

197

Maintainable and Reusable Scientific Software Adaptation Democratizing Scientific Software Adaptation  

E-Print Network [OSTI]

.kang@samsung.com Eli Tilevich, Srinidhi Varadarajan, and Naren Ramakrishnan Center for High-End Computing Systems Dept resources to ensure its efficiency and reliability. Although adaptation patterns can be found in a sizable-oriented Pro- gramming; D.2.7 [Software Engineering]: Distribution, Maintenance, and Enhancement; D.2

Ramakrishnan, Naren

198

Adaptive wiener image restoration kernel  

DOE Patents [OSTI]

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

199

BC Agriculture Climate Change Adaptation  

E-Print Network [OSTI]

BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

Pedersen, Tom

200

BC Agriculture Climate Change Adaptation  

E-Print Network [OSTI]

BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report executive summary #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

Pedersen, Tom

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Adaptive protection algorithm and system  

DOE Patents [OSTI]

An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

2009-04-28T23:59:59.000Z

202

7, 72357275, 2007 Adaptive radiative  

E-Print Network [OSTI]

Discussions Two adaptive radiative transfer schemes for numerical weather prediction models V. Venema 1 , A numerical weather prediction (NWP) and climate models. The atmosphere and the land surface are complex-stream approximation. In most weather prediction models these parameterisation schemes are therefore called infre

Boyer, Edmond

203

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)  

E-Print Network [OSTI]

Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

Mondal, Uttam Kr

2012-01-01T23:59:59.000Z

204

adaptive control algorithm: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

24 25 Next Page Last Page Topic Index 1 ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS Mathematics Websites Summary: ON AN ADAPTIVE CONTROL ALGORITHM FOR...

205

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

206

Climate Change Adaptation Planning | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Change Adaptation Planning Climate Change Adaptation Planning October 7, 2014 6:00AM CDT to October 9, 2014 3:00PM CDT Norman, Oklahoma This course provides an introduction to...

207

IIR algorithms for adaptive line enhancement  

SciTech Connect (OSTI)

We introduce a simple IIR structure for the adaptive line enhancer. Two algorithms based on gradient-search techniques are presented for adapting the structure. Results from experiments which utilized real data as well as computer simulations are provided.

David, R.A.; Stearns, S.D.; Elliott, G.R.; Etter, D.M.

1983-01-01T23:59:59.000Z

208

Mechanics and Applications of Pressure Adaptive Honeycomb  

E-Print Network [OSTI]

A pressure-adaptive wing structure is presented that relies on the pressure-altitude relation to adapt the wing shape to the various flight conditions (e.g. landing and cruise). This structure employs conventional, certified ...

Vos, Roelof

2009-07-31T23:59:59.000Z

209

Adaptive security systems -- Combining expert systems with adaptive technologies  

SciTech Connect (OSTI)

The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

Argo, P.; Loveland, R.; Anderson, K. [and others

1997-09-01T23:59:59.000Z

210

Adaptation in constant utility nonstationary environments  

E-Print Network [OSTI]

Adaptation in constant utility nonstationary environments Michael L. Littman & David H. Ackley Abstract Environments that vary over time present a fundamental problem to adaptive systems. Although adaptive opportunities. We consider a broad class of nonstationary environments, those which combine

Littman, Michael L.

211

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs David A. Venditti and David L Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate estimation and Hessian-based anisotropic grid adaptation. Airfoil test cases are presented to demonstrate

Peraire, Jaime

212

Article original Adaptation digestive du lapin  

E-Print Network [OSTI]

Article original Adaptation digestive du lapin la teneur en constituants paritaux du rgime ne diffre pas d'un rgime l'autre, du fait d'une rgulation de l'nergie digestible ingre. L le rgime B. lapin / digestion / fibre / adaptation / transit Summary Digestive adaptation

Boyer, Edmond

213

E-Print Network 3.0 - adaptive systems Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

adaptive systems Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: 1 From Adaptive Hypermedia to the Adaptive Web Systems Peter...

214

adapter protein tsad: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

215

adaptive antitumor immunity: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

216

adaptation azole drug: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

217

Center for Adaptive Optics* Santa Cruz,CA  

E-Print Network [OSTI]

Center for Adaptive Optics* Santa Cruz,CA The Center for Adaptive Optics (CfAO) will concentrate on astronomical and vision science applications of adaptive optics and will reach out to other adaptive optics communities to share technologies. It will develop new instruments optimized for adaptive optics. Adaptive

Grether, Gregory

218

Issues in adaptive mesh refinement  

SciTech Connect (OSTI)

In this paper, we present an approach for a patch-based adaptive mesh refinement (AMR) for multi-physics simulations. The approach consists of clustering, symmetry preserving, mesh continuity, flux correction, communications, and management of patches. Among the special features of this patch-based AMR are symmetry preserving, efficiency of refinement, special implementation offlux correction, and patch management in parallel computing environments. Here, higher efficiency of refinement means less unnecessarily refined cells for a given set of cells to be refined. To demonstrate the capability of the AMR framework, hydrodynamics simulations with many levels of refinement are shown in both two- and three-dimensions.

Dai, William Wenlong [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

219

Machine Learning for Adaptive Computer Game Opponents .  

E-Print Network [OSTI]

??This thesis investigates the use of machine learning techniques in computer games to create a computer player that adapts to its opponent's game-play. This includes (more)

Miles, Jonathan David

2009-01-01T23:59:59.000Z

220

AN ADAPTIVE FINITE ELEMENT METHOD FOR THE ...  

E-Print Network [OSTI]

adaptive strategy is established for the diffraction grating problem, such that ...... applications in optical filters and guided mode resonance devices. the...

2014-05-20T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Adaptive Barrier Strategies for Nonlinear Interior Methods  

E-Print Network [OSTI]

Feb 25, 2005 ... that adaptive choices, such as Mehrotra's probing procedure, outperform ... focus on the effects of merit functions or filters, and on regularization...

2005-02-25T23:59:59.000Z

222

Training for Climate Adaptation in Conservation  

Broader source: Energy.gov [DOE]

The Wildlife Conservation Society and the Northern Institute of Applied Climate Science are hosting this two-day training for climate adaptation.

223

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

224

Mainstreaming Climate Change Adaptation into Development Planning...  

Open Energy Info (EERE)

Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Agency...

225

Adapting California's water management to climate change  

E-Print Network [OSTI]

storage, water transfers, conservation, recycling, and desalination to meet changing demands. These same settlers had fewer intellectual, organizational, and economic resources to adapt than present

Pasternack, Gregory B.

226

Crosscutting Subsurface Initiative: Adaptive Control of Subsurface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

in the ability to access, characterize, predict, and adaptively manipulate fracture and flow processes over scales from nanometers to kilometers. This town hall...

227

Downhole tool adapted for telemetry  

DOE Patents [OSTI]

A cycleable downhole tool such as a Jar, a hydraulic hammer, and a shock absorber adapted for telemetry. This invention applies to other tools where the active components of the tool are displaced when the tool is rotationally or translationally cycled. The invention consists of inductive or contact transmission rings that are connected by an extensible conductor. The extensible conductor permits the transmission of the signal before, after, and during the cycling of the tool. The signal may be continuous or intermittent during cycling. The invention also applies to downhole tools that do not cycle, but in operation are under such stress that an extensible conductor is beneficial. The extensible conductor may also consist of an extensible portion and a fixed portion. The extensible conductor also features clamps that maintain the conductor under stresses greater than that seen by the tool, and seals that are capable of protecting against downhole pressure and contamination.

Hall, David R. (Provo, UT); Fox, Joe (Provo, UT)

2010-12-14T23:59:59.000Z

228

A fuzzy-tuned adaptive Kalman filter  

E-Print Network [OSTI]

In this paper, fuzzy processing is applied to the adaptive Kalman filter. The filter gain coefficients are adapted over a 50 dB range of unknown signal/noise dynamics, using fuzzy membership functions. Specific simulation results are shown for a...

Painter, John H.; Young Hwan Lho

1993-12-01T23:59:59.000Z

229

Outreach and Adaptive Strategies for Climate Change  

E-Print Network [OSTI]

Outreach and Adaptive Strategies for Climate Change: The Role of NOAA Sea Grant Extension years and generations about how to adapt to a changing climate. Effective preparation for possible effects of climate change includes engagement of resource managers, planners, public works officials

230

Adaptive Composite Map Projections Bernhard Jenny  

E-Print Network [OSTI]

Adaptive Composite Map Projections Bernhard Jenny Abstract--All major web mapping services use.The proposed composite map projection combines several projections that are recommended in cartographic.The composite projection adapts the maps geometry to scale, to the maps height-to-width ratio

Jenny, Bernhard

231

Enabling Informed Adaptation of Reformed Instructional Materials  

E-Print Network [OSTI]

Enabling Informed Adaptation of Reformed Instructional Materials Rachel E. Scherr and Andrew Elby 20742 USA Abstract. Instructors inevitably need to adapt even the best reform materials to suit instructors, and video clips of students working on the materials. Our materials thus facilitate their own

Elby, Andy

232

Adaptive Filtering of Multilingual Document Streams  

E-Print Network [OSTI]

the volume of new documents that must be examined by the user to manageable levels. This paper presents three techniques for extending adaptive monolingual text ltering techniques to manage multilingual document streamsAdaptive Filtering of Multilingual Document Streams Douglas W. Oard College of Library

Oard, Doug

233

WORKLOAD ADAPTATION IN AUTONOMIC DATABASE MANAGEMENT SYSTEMS  

E-Print Network [OSTI]

in Autonomic DBMSs", Proceedings of the 2nd International Workshop on Self-Managing Database Systems (SMDB 2007 to meet its Service Level Objectives (SLOs). It is a challenge to adapt multiple workloads with complex scheduler that performs workload adaptation in a DBMS, as the test bed to prove the effectiveness

234

Proceedings of the International Workshop on Adaptation,  

E-Print Network [OSTI]

Proceedings of the 1st International Workshop on Adaptation, Personalization and REcommendation. Carrero3 1 Universidad Autónoma de Madrid, Spain {ivan.cantador, david.vallet}@uam.es 2 Yahoo! Research.carrero}@uem.es #12;#12;Preface The 1st International Workshop on Adaptation, Personalization and REcommendation

Cantador, Iván

235

Adaptive Web Sites: Automatically Synthesizing Web Pages  

E-Print Network [OSTI]

Adaptive Web Sites: Automatically Synthesizing Web Pages Mike Perkowitz Oren Etzioni Department interfaces Abstract The creation of a complex web site is a thorny problem in user interface design. In IJCAI '97, we challenged the AI community to address this problem by creating adaptive web sites: sites

Etzioni, Oren

236

ORIGINAL ARTICLE Mitigation needs adaptation: Tropical forestry  

E-Print Network [OSTI]

ORIGINAL ARTICLE Mitigation needs adaptation: Tropical forestry and climate change Manuel R adapt to this change. This paper discusses how tropical forestry practices can contribute to maintaining Forestry Research, P.O. Box 6596 JKPWB, Jakarta 10065, Indonesia e-mail: m.guariguata@cgiar.org J. P

Paris-Sud XI, Université de

237

General Adaptive Replacement Policies Yannis Smaragdakis  

E-Print Network [OSTI]

General Adaptive Replacement Policies Yannis Smaragdakis College of Computing Georgia Institute of Technology yannis@cc.gatech.edu ABSTRACT We propose a general scheme for creating adaptive replace- ment any two existing replacement policies so that the resulting policy provably can never perform worse

Smaragdakis, Yannis

238

Adaptive Port Reduction in Static Condensation  

E-Print Network [OSTI]

Adaptive Port Reduction in Static Condensation JL Eftang DBP Huynh DJ Knezevic EM Rønquist a framework for adaptive reduction of the degrees of freedom associated with ports in static condensation (SC reduction for the interior of a component with model order reduction on the ports in order to rapidly

Rønquist, Einar M.

239

E-Print Network 3.0 - adaptive information processing Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

user (adaptable... .1 Adaptation and Adaptivity Even if ... Source: Oppermann, Reinhard - Fraunhofer-Institute for Applied Information Technology & Fachbereich Informatik,...

240

E-Print Network 3.0 - adaptive systems theory Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems theory Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: 1 From Adaptive Hypermedia to the Adaptive Web Systems Peter...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Probing young massive clusters with laser guide star adaptive optics  

E-Print Network [OSTI]

laser guide star adaptive optics Nate McCrady Received: 10laser guide star adaptive optics (LGS/AO) on the 10 m Keckof 4 Mpc. Our adaptive optics work is motivated by three

McCrady, Nate

2009-01-01T23:59:59.000Z

242

Pacific Adaptation Strategy Assistance Program Dynamical Seasonal Forecasting  

E-Print Network [OSTI]

Pacific Adaptation Strategy Assistance Program Dynamical Seasonal Forecasting Seasonal Prediction · POAMA · Issues for future Outline #12;Pacific Adaptation Strategy Assistance Program Major source Adaptation Strategy Assistance Program El Nino Mean State · Easterlies westward surface current upwelling

Lim, Eun-pa

243

National Adaptation Forum Webinar Series: Out of Town, Not Out...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Adaptation Forum Webinar Series: Out of Town, Not Out of Trouble: Small Agriculture and Indigenous Communities National Adaptation Forum Webinar Series: Out of Town, Not Out of...

244

Farming in a Changing Climate: Agricultural Adaptation in Canada  

E-Print Network [OSTI]

Agricultural Adaptation in Canada Ellen Wall, Barry Smit,Agricultural Adaptation in Canada. Vancouver, BC: Universitythe agri-food sector in Canada, the insights provided are so

Jain, Varinder

2010-01-01T23:59:59.000Z

245

adaptive signal processing: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

246

adaptive predictive control: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

applied to analyze the transient Antsaklis, Panos 44 ADAPTIVE ROBUST TRACKING CONTROL OF PRESSURE Engineering Websites Summary: 1---- 1 ADAPTIVE ROBUST TRACKING CONTROL OF...

247

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

248

Software Adaptation Patterns for Service-Oriented Architectures .  

E-Print Network [OSTI]

??This thesis describes the concept of software adaptation patterns and how they can be used in software adaptation of service-oriented architectures. The patterns are described (more)

Hashimoto, Koji

2010-01-01T23:59:59.000Z

249

adaptive interactive technologies: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Shock-induced combustion Fluid-structure interaction Implementation Parallel Adaptive Cartesian Upwind Mathematics Websites Summary: Finite volume methods Adaptive mesh refinement...

250

Development of an adaptive fuzzy logic controller for HVAC system.  

E-Print Network [OSTI]

??An adaptive approach to control a cooling coil chilled water valve operation, called adaptive fuzzy logic control (AFLC), is developed and validated in this study. (more)

Navale, Rahul Laxman

2006-01-01T23:59:59.000Z

251

adaptive particle swarm: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 An Adaptive Learning Particle Swarm Optimizer for Function Optimization Computer Technologies and Information Sciences Websites Summary: An Adaptive...

252

adaptive intrusion detection: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

253

Adaptive Mesh Refinement and Relativistic MHD  

E-Print Network [OSTI]

We solve the general relativistic magnetohydrodynamics equations using distributed parallel adaptive mesh refinement. We discuss strong scaling tests of the code, and present evolutions of Michel accretion and a TOV star.

David Neilsen; Eric W. Hirschmann; Matthew Anderson; Steven L. Liebling

2007-02-06T23:59:59.000Z

254

Adaptive control of a generic hypersonic vehicle  

E-Print Network [OSTI]

This thesis presents a an adaptive augmented, gain-scheduled baseline LQR-PI controller applied to the Road Runner six-degree-of-freedom generic hypersonic vehicle model. Uncertainty in control effectiveness, longitudinal ...

Wiese, Daniel Philip

2013-01-01T23:59:59.000Z

255

Adaptive Reliability Analysis of Excavation Problems  

E-Print Network [OSTI]

. This analysis couples the adaptive design capabilities of the observational method with updated reliability indices, to be used in risk-based design decisions. A probabilistic framework is developed to predict three-dimensional deformation profiles due...

Park, Jun Kyung

2012-10-19T23:59:59.000Z

256

Scalable Adaptive Multilevel Solvers for Multiphysics Problems  

SciTech Connect (OSTI)

In this project, we investigated adaptive, parallel, and multilevel methods for numerical modeling of various real-world applications, including Magnetohydrodynamics (MHD), complex fluids, Electromagnetism, Navier-Stokes equations, and reservoir simulation. First, we have designed improved mathematical models and numerical discretizaitons for viscoelastic fluids and MHD. Second, we have derived new a posteriori error estimators and extended the applicability of adaptivity to various problems. Third, we have developed multilevel solvers for solving scalar partial differential equations (PDEs) as well as coupled systems of PDEs, especially on unstructured grids. Moreover, we have integrated the study between adaptive method and multilevel methods, and made significant efforts and advances in adaptive multilevel methods of the multi-physics problems.

Xu, Jinchao

2014-12-01T23:59:59.000Z

257

Optimization Online - Multistage Adaptive Robust Optimization for ...  

E-Print Network [OSTI]

Sep 5, 2014 ... ... with the increasing penetration of wind and solar power generation has ... Keywords: Electric energy systems, multistage robust optimization, ... Multistage Adaptive Robust Optimization for the Unit Commitment Problem.

Alvaro Lorca

2014-09-05T23:59:59.000Z

258

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network [OSTI]

Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

259

Marginalized Monitoring: Adaptively Managing Urban Stormwater  

E-Print Network [OSTI]

environmental assessment, 28 Superfund decisionmaking, 29 Endangered Species Act decisionmaking, 30 and water management.Environmental Impacts Under Florida Water Law: From Water Wars Towards Adaptive Management ,water infrastructure problems. And yet, the environmental management

Scanlan, Melissa K; Tai, Stephanie

2013-01-01T23:59:59.000Z

260

Fast Adaptive Silhouette Area based Template Matching  

E-Print Network [OSTI]

Fast Adaptive Silhouette Area based Template Matching Daniel Mohr and Gabriel Zachmann If (Technical Informatics and Computer Systems) Prof. Dr. Gabriel Zachmann (Computer Graphics) Prof. Dr Template Matching Daniel Mohr and Gabriel Zachmann Clausthal University of Technology, Department

Zachmann, Gabriel

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A Logical Characterization of Adaptive Educational Hypermedia  

E-Print Network [OSTI]

reference models for adaptive hypermedia, e.g. the AHAM Reference Model [4], or the Munich Reference Model [20]. Both, the AHAM and Munich Reference Model, extend the Dexter Hypertext Model [16], and pro- vide

Henze, Nicola

262

Adaptive Importance Sampling via Stochastic Convex Programming  

E-Print Network [OSTI]

Adaptive Importance Sampling via Stochastic Convex Programming Ernest K. Ryu1 and Stephen P. Boyd1 Abstract We show that the variance of the Monte Carlo estimator that is importance sam- pled from

263

Developmental Plasticity Links Local Adaptation and Evolutionary  

E-Print Network [OSTI]

Developmental Plasticity Links Local Adaptation and Evolutionary Diversification in Foraging, University of Arizona, Tucson, Arizona Developmental plasticity is thought to reconcile the constraining role morphology into adulthood, providing an opportunity to directly examine the links between plasticity of bone

Badyaev, Alex

264

Adaptive control for optimizing microalgae production  

E-Print Network [OSTI]

Adaptive control for optimizing microalgae production Francis Mairet Rafael Mu for light-limited microalgae culture. This controller regulates the light absorption factor, defined productivity under day-night cycles. Keywords: Nonlinear controller, Microalgae, Optimization, Biomass

Paris-Sud XI, Universit de

265

Exponential convergence with adaptive Monte Carlo  

SciTech Connect (OSTI)

For over a decade, it has been known that exponential convergence on discrete transport problems was possible using adaptive Monte Carlo techniques. Now, exponential convergence has been empirically demonstrated on a spatially continuous problem.

Booth, T.E.

1997-11-01T23:59:59.000Z

266

Challenges of Adapting to a Changing Climate  

E-Print Network [OSTI]

of Global Climate Change on Agriculture: An Interpretiveon U.S. Agriculture, in THE IMPACT OF CLIMATE CHANGE ON THEclimate change and the potential roles for adaptation are more severe for ecosystems than they are for managed systems like agriculture.

Hurd, Brian H.

2008-01-01T23:59:59.000Z

267

Robust adaptive control of switched systems  

E-Print Network [OSTI]

In this thesis, robust adaptive controllers are developed for classes of switched nonlinear systems. Switched systems are those governed by differential equations, which undergo vector field switching due to sudden changes ...

El-Rifai, Khalid, 1979-

2007-01-01T23:59:59.000Z

268

Convert! : the adaptive reuse of churches  

E-Print Network [OSTI]

This thesis examines the phenomenon of vacated churches and analyzes the major issues underlying their adaptive reuse in order to help promulgate an awareness of the range of successful strategies and solutions that are ...

Kiley, Christopher John, 1972-

2004-01-01T23:59:59.000Z

269

Climate Change: High Water Impacts and Adaptation  

E-Print Network [OSTI]

Climate Change: High Water Impacts and Adaptation David S. Liebl and Kenneth W. Potter Co of global climate change­ WICCI Stormwater Working Group #12;Projected Climate Change 200-2100 What Global

Sheridan, Jennifer

270

Skeletal adaptation to reduced mechanical loading  

E-Print Network [OSTI]

Bone adapts its mass and architecture in response to its mechanical environment. Yet control of this process by mechanical cues is poorly understood, particularly for unloading. Defining the fundamental mechanoregulation ...

Eliman, Rachel

2014-01-01T23:59:59.000Z

271

Adaptive sampling in autonomous marine sensor networks  

E-Print Network [OSTI]

In this thesis, an innovative architecture for real-time adaptive and cooperative control of autonomous sensor platforms in a marine sensor network is described in the context of the autonomous oceanographic network scenario. ...

Eickstedt, Donald Patrick

2006-01-01T23:59:59.000Z

272

Adaptive gain improves reactor control  

SciTech Connect (OSTI)

An interesting application of the modern control theory technique called adaptive control is presently in use on a process located at a plant in the Standard Oil Co. (Ind.) system. The results of this application are: first, the transformation of an uncontrollable process to a controllable one; and, second, a significant economic savings to the corporation. It also shows that a detailed analysis of the mechanical, chemical and control systems can provide both the basis for revising an existing control system and some of the reasons why that system is inadequate. The contrast between classical and modern control theories is seen in four major areas. In classical systems, the controller manipulates the error to calculate its output. The error is subjected to a limited number of analog computing functions such as multiplication by a constant and integration. Each controller has one specific strategy--to hold the measured variable at the setpoint. And each controller controls only one variable, independent of all others. In a modern system, the controller can manipulate many different variables in addition to the error to compute its output. Its computing power is unlimited in a practical sense. It can do all classical computations plus many others, including a table look-up. The controller can independently change its strategy as a function of time or the condition of the process. It can also control many variables at one time to accomplish a complex objective. The implementation of a modern control theory project requires a good understanding of the dynamic, as well as the steady-state character of the process. As you can see we are limited only by our understanding of the process, our imagination, and the economics of the situation.

Whatley, M.J.; Pott, D.C.

1984-05-01T23:59:59.000Z

273

Fully Adaptive AMG Scott MacLachlan  

E-Print Network [OSTI]

" Ah "-1 ik ff Energy measure: Let G (i) j = (Ah )-1 ij , Sij = G(i) - G (i) j e(j) Ah G(i) Ah Fully, Sij? Apply (localized) relaxation to Ah G(i) = e(i) Fully Adaptive AMG ­ p.11 #12;Approximating Sij to Ah G(i) = e(i) Weighted Jacobi, 1 step: Fully Adaptive AMG ­ p.11 #12;Approximating Sij Can

MacLachlan, Scott

274

The Durham ELT adaptive optics simulation platform  

E-Print Network [OSTI]

Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

2006-11-09T23:59:59.000Z

275

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR  

E-Print Network [OSTI]

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR Aleksandar Tasi, Wouter A. Serdijn and John R, an adaptive 2G/3G voltage-controlled oscillator (VCO) is described in this paper. For the DCS1800 operation with this reasoning, an adaptive 2G/3G voltage- controlled oscillator, meant for a dual-standard adaptive front

Serdijn, Wouter A.

276

IEEE INFOCOM 2001 1 Pricing Network Resources for Adaptive  

E-Print Network [OSTI]

, and provides a natural and equitable incentive for applications to adapt their service contract according

Wang, Xin

277

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

278

Exploratory Group Problem: RSA Encryption November 5, 2008  

E-Print Network [OSTI]

result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

Stange, Katherine E.

279

User Guide Remote Access to VDI/Workplace Using RSA  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access to VDI/Workplace Using PIV

280

Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal Morphology and Life History  

E-Print Network [OSTI]

Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal wide-ranging. All key REVIEW references should be cited. A summary is required. Adaptive plasticity and plasticity as an adaptation: a selective review of plasticity in animal morphology and life history Karl

Gotthard, Karl

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Adaptive method with intercessory feedback control for an intelligent agent  

DOE Patents [OSTI]

An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

Goldsmith, Steven Y.

2004-06-22T23:59:59.000Z

282

EcoAdapt Working Paper Series N1 Adaptation to climate change for local development  

E-Print Network [OSTI]

1 EcoAdapt Working Paper Series N°1 Adaptation to climate change for local development Análisis in terms of employment, water situation and land use, at a quantitative and qualitative level, in three and summer pastures, due to the geographic and climatic conditions. hal-01059368,version1-30Aug2014 #12

Boyer, Edmond

283

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformationbudapest Comments? We would love to heartotdngovInstrumentswrf-chemHistory Organization

284

CERTIFICATE OF AUTHENTICITY  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess toSustainableClimateSealingColdEnergyClimateC C

285

Load attenuating passively adaptive wind turbine blade  

DOE Patents [OSTI]

A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

Veers, Paul S. (Albuquerque, NM); Lobitz, Donald W. (Albuquerque, NM)

2003-01-01T23:59:59.000Z

286

Load attenuating passively adaptive wind turbine blade  

DOE Patents [OSTI]

A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

Veers, Paul S.; Lobitz, Donald W.

2003-01-07T23:59:59.000Z

287

Contract Signature Using Quantum Information  

E-Print Network [OSTI]

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

288

The Building Adaptive Re-Use  

E-Print Network [OSTI]

81 The Building 7.0 #12;82 Adaptive Re-Use 7.1 7.1.1 Retaining the Ruskin Building's Facades building fabric. The need for a fully accessible and environmentally sustainable building led the team to a solution that requires the full reconstruction of the Ruskin Building, save its primary facades

Flynn, E. Victor

289

Relativistic MHD with Adaptive Mesh Refinement  

E-Print Network [OSTI]

This paper presents a new computer code to solve the general relativistic magnetohydrodynamics (GRMHD) equations using distributed parallel adaptive mesh refinement (AMR). The fluid equations are solved using a finite difference Convex ENO method (CENO) in 3+1 dimensions, and the AMR is Berger-Oliger. Hyperbolic divergence cleaning is used to control the $\

Matthew Anderson; Eric Hirschmann; Steven L. Liebling; David Neilsen

2006-10-11T23:59:59.000Z

290

Adaptive Scheduling Algorithms for Planet Searches  

E-Print Network [OSTI]

High-precision radial velocity planet searches have surveyed over ~2000 nearby stars and detected over ~200 planets. While these same stars likely harbor many additional planets, they will become increasingly challenging to detect, as they tend to have relatively small masses and/or relatively long orbital periods. Therefore, observers are increasing the precision of their observations, continuing to monitor stars over decade timescales, and also preparing to survey thousands more stars. Given the considerable amounts of telescope time required for such observing programs, it is important use the available resources as efficiently as possible. Previous studies have found that a wide range of predetermined scheduling algorithms result in planet searches with similar sensitivities. We have developed adaptive scheduling algorithms which have a solid basis in Bayesian inference and information theory and also are computationally feasible for modern planet searches. We have performed Monte Carlo simulations of plausible planet searches to test the power of adaptive scheduling algorithms. Our simulations demonstrate that planet searches performed with adaptive scheduling algorithms can simultaneously detect more planets, detect less massive planets, and measure orbital parameters more accurately than comparable surveys using a non-adaptive scheduling algorithm. We expect that these techniques will be particularly valuable for the N2K radial velocity planet search for short-period planets as well as future astrometric planet searches with the Space Interferometry Mission which aim to detect terrestrial mass planets.

Eric B. Ford

2007-12-17T23:59:59.000Z

291

Reservation Price Estimation by Adaptive Conjoint Analysis  

E-Print Network [OSTI]

Reservation Price Estimation by Adaptive Conjoint Analysis Christoph Breidert1 , Michael Hahsler1 applied the eco- nomic definition of reservation price in combination with a conjoint study on product pricing. In this paper we present a novel approach to estimate the economic reser- vation price using

Schmidt-Thieme, Lars

292

CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT  

E-Print Network [OSTI]

CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT IN THE SAN FRANCISCO BAY AREA A White Paper from the California Energy Commission's California Climate Change Center JULY 2012 CEC Climate change will affect both sea level and the temporal and spatial distribution of runoff

293

Adaptive Personalisation for Researcher-Independent  

E-Print Network [OSTI]

Adaptive Personalisation for Researcher-Independent Brain-Body Interface Usage Abstract In this case study, we report what we believe to be the first prolonged in-situ use of a brain-body interface for rehabilitation of individuals with severe neurological impairment due to traumatic brain injury

Boetticher, Gary D.

294

Adaptive, full-spectrum solar energy system  

DOE Patents [OSTI]

An adaptive full spectrum solar energy system having at least one hybrid solar concentrator, at least one hybrid luminaire, at least one hybrid photobioreactor, and a light distribution system operably connected to each hybrid solar concentrator, each hybrid luminaire, and each hybrid photobioreactor. A lighting control system operates each component.

Muhs, Jeffrey D.; Earl, Dennis D.

2003-08-05T23:59:59.000Z

295

Adaptive Training for Large Vocabulary Continuous  

E-Print Network [OSTI]

Adaptive Training for Large Vocabulary Continuous Speech Recognition Kai Yu Hughes Hall College for the degree of Doctor of Philosophy #12;ii Summary In recent years, there has been a trend towards training is to train hidden Markov models (HMMs) on the whole data set as if all data comes from a single acoustic

Hain, Thomas

296

Semantic Web Technologies for the Adaptive Web  

E-Print Network [OSTI]

23 Semantic Web Technologies for the Adaptive Web Peter Dolog1 and Wolfgang Nejdl2 1 Department.de Abstract. Ontologies and reasoning are the key terms brought into focus by the semantic web community. Formal representation of ontologies in a common data model on the web can be taken as a foundation

Nejdl, Wolfgang

297

An Infrastructure for Adaptive Dynamic Optimization  

E-Print Network [OSTI]

An Infrastructure for Adaptive Dynamic Optimization Derek Bruening, Timothy Garnett, and Saman,timothyg,saman}@lcs.mit.edu Abstract Dynamic optimization is emerging as a promising ap- proach to overcome many of the obstacles static optimizations, there are very few for developing dynamic optimizations. We present a framework

Amarasinghe, Saman

298

Grid adaptation for multiscale plasma simulations  

E-Print Network [OSTI]

Grid adaptation for multiscale plasma simulations Gian Luca Delzanno Los Alamos National Laboratory In collaboration with L. Chacon and J.M. Finn #12;delzanno@lanl.gov Outline Introduction and motivation Grid tests New directions Conclusions #12;delzanno@lanl.gov Outline Introduction and motivation Grid

Ito, Atsushi

299

ADAPTIVE ROBUST TRACKING CONTROL OF PRESSURE  

E-Print Network [OSTI]

accuracy of pressure trajectory in the chamber when the pneumatic cylinder is moving. Off-line fitting, it is necessary to utilize the adaptive model compensation for improving the tracking accuracy of pressure and attenuation in pneumatic lines, valve dynamics, flow nonlinearities through the valve orifice, piston friction

Yao, Bin

300

Provably Efficient Two-Level Adaptive Scheduling  

E-Print Network [OSTI]

processor reallocation, our schedulers provide control over the scheduling overhead and ensure effectiveProvably Efficient Two-Level Adaptive Scheduling Yuxiong He1 , Wen-Jing Hsu1 , and Charles E. Multiprocessor scheduling in a shared multiprogramming en- vironment can be structured in two levels, where

Feitelson, Dror

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Climate Change Basics: Science, Adaptation, & Mitigation  

E-Print Network [OSTI]

Science Global atmospheric concentrations of carbon dioxide, methane and nitrous oxide have increased from ice cores spanning many thousands of years. The global increases in carbon dioxide concentrationClimate Change Basics: Science, Adaptation, & Mitigation with a Family Forest Perspective Baylor

Fox-Kemper, Baylor

302

An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control Adaptive control strategies...

303

E-Print Network 3.0 - adaptive management department Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: adaptive management department Page: << < 1 2 3 4 5 > >> 1 Regional Water Management: Adapting to Uncertain Water Summary: Regional Water Management: Adapting to...

304

E-Print Network 3.0 - adaptive methods final Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mechanisms. Finally the actors in the process of adaptation will be discussed like the user (adaptable... adaptation methods and tools that are under the control of the user...

305

E-Print Network 3.0 - adaptive specialization conditional Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

conditional Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: Adaptive presentation techniques Conditional text filtering - ITEM...

306

E-Print Network 3.0 - adaptive direct search Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

direct search Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: Evaluation of Adaptive Link Sorting HYPERFLEX: IR System -...

307

E-Print Network 3.0 - adaptive fe-be coupling Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Modeling and Simulation of the CORBA Portable Object Adapter Summary: the Coupled Model ports: X<adapter, activate, findpoa()>. "adapter", "activate" are parameter ports while......

308

E-Print Network 3.0 - adaptive seamless design Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(VTP) to adapt video... need to be resolved: 1) seamless mobility across het- erogeneous networks, 2) application adaptation... incorporate both seamless handoff and adaptive ......

309

Adaptation, Speciation, and Convergence: A Hierarchical Analysis of Adaptive Radiation in Caribbean Anolis Lizards  

E-Print Network [OSTI]

Caribbean Anolis lizards are a classic case of adaptive radiation, repeated four times across islands of the Greater Antilles. On each island, very similar patterns of evolutionary divergence have occurred, resulting in the evolution of the same set...

Losos, Jonathan B.; Glor, Richard E.; Kolbe, Jason J.; Nicholson, Kirsten

2006-05-01T23:59:59.000Z

310

Geometric Structure of the Adaptive Controller of the Human Arm  

E-Print Network [OSTI]

The objects with which the hand interacts with may significantly change the dynamics of the arm. How does the brain adapt control of arm movements to this new dynamic? We show that adaptation is via composition of a ...

Shadmehr, Reza

1993-07-01T23:59:59.000Z

311

Adaptive Treatment Strategies Getting SMART About Developing Individualized  

E-Print Network [OSTI]

Other names are dynamic treatment regimes, treatment algorithms, stepped care models, expert systems: prevent relapse to alcohol abuse · Critical treatment decisions: which treatment to provide first?; which1 Adaptive Treatment Strategies Getting SMART About Developing Individualized Sequences of Adaptive

Murphy, Susan A.

312

Artificial gravity : neurovestibular adaptation to incremental exposure to centrifugation  

E-Print Network [OSTI]

(cont.) not build up adaptation, all subjects in the experimental group who completed the protocol showed signs of adaptation to the stimulus. Only one subject did not complete the five sessions, setting the drop-out rate ...

Bruni, Sylvain, 1981-

2004-01-01T23:59:59.000Z

313

Adaptive Power Control for Single and Multiuser Opportunistic Systems  

E-Print Network [OSTI]

In this dissertation, adaptive power control for single and multiuser opportunistic systems is investigated. First, a new adaptive power-controlled diversity combining scheme for single user systems is proposed, upon which is extended...

Nam, Sung Sik

2010-07-14T23:59:59.000Z

314

Funding for adaptation to climate change : the case of Surat  

E-Print Network [OSTI]

The need for cities to adapt to climate change is widely acknowledged, yet the question of adaptation finance remains uncertain. Unable to access global climate funds, cities must seek out alternative sources to support ...

Patel, Toral

2014-01-01T23:59:59.000Z

315

Climate Change Adaptation: A Collective Action Perspective on Federalism Considerations  

E-Print Network [OSTI]

adaptation to minimize the adverse effects of climate change. Climate change adaptation is designed to increase the resilience of natural and human ecosystems to the threats posed by a changing environment. Although an extensive literature concerning...

Glicksman, Robert L.; Levy, Richard E.

2010-01-01T23:59:59.000Z

316

Urban climate resilience : a global assessment of city adaptation plans  

E-Print Network [OSTI]

As policy makers accept climate change as an irrefutable threat, adaptation planning has emerged as a necessary action for countries, states, and municipalities. This thesis explores adaptive responses to climate change ...

Katich, Kristina Noel

2009-01-01T23:59:59.000Z

317

Accelerated Adaptive Markov Chain for Partition Function Computation  

E-Print Network [OSTI]

Accelerated Adaptive Markov Chain for Partition Function Computation Stefano Ermon, Carla P. Gomes Ithaca NY 14853, U.S.A. Abstract We propose a novel Adaptive Markov Chain Monte Carlo algorithm

Keinan, Alon

318

The Binding of Learning to Action in Motor Adaptation  

E-Print Network [OSTI]

In motor tasks, errors between planned and actual movements generally result in adaptive changes which reduce the occurrence of similar errors in the future. It has commonly been assumed that the motor adaptation arising ...

Gonzalez Castro, Luis Nicolas

319

Learning from Monitoring & Evaluation a blueprint for an adaptive organisation  

E-Print Network [OSTI]

Learning from Monitoring & Evaluation a blueprint for an adaptive organisation Learning from Monitoring & Evaluation a blueprint for an adaptive organisation Jake Morris and Anna Lawrence Social & Economic Research Group, Forest Research Aim and structure Learning is an essential characteristic

320

Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs 2012...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

BIA Request for Proposals for Climate Adaptation Grants for Tribes  

Broader source: Energy.gov [DOE]

Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

322

Communication adapter for use with a drilling component  

DOE Patents [OSTI]

A communication adapter is disclosed that provides for removable attachment to a drilling component when the drilling component is not actively drilling and for communication with an integrated transmission system in the drilling component. The communication adapter comprises a data transmission coupler that facilitates communication between the drilling component and the adapter, a mechanical coupler that facilitates removable attachment of the adapter to the drilling component, and a data interface.

Hall, David R. (Provo, UT); Pixton, David S. (Lehi, UT); Hall; Jr.; H. Tracy (Provo, UT); Bradford, Kline (Orem, UT); Rawle, Michael (Springville, UT)

2007-04-03T23:59:59.000Z

323

Genomic islands predict functional adaptation in marine actinobacteria  

E-Print Network [OSTI]

Ecological adaptations among bacterial populations have been linked to genomic islands, strain-specific regions of DNA that house

Penn, Kevin

2010-01-01T23:59:59.000Z

324

Some Computational Problems Arising in Adaptive Optics Imaging Systems  

E-Print Network [OSTI]

Some Computational Problems Arising in Adaptive Optics Imaging Systems Robert J. Plemmons \\Lambda numerical linear algebra tech­ niques in adaptive optics imaging control computations. Real­time adaptive optics is a means for enhancing the resolution of ground based, optical telescopes beyond the limits

Plemmons, Robert J.

325

Adaptive beam profile control using a simulated annealing algorithm  

E-Print Network [OSTI]

adaptive optics system," Opt. Commun. 176, 339-345 (2000). 3. R. B. Shake and B. C. Platt, "Production. Murnane, H. C. Kapteyn, S. Backus, G. Vdovin "Adaptive pulse compensation for transform-limited 15-fs high-energy transverse mode control and optimisation of an all-solid-state laser using an intracavity adaptive

326

Extending Mobile Computer Battery Life through Energy-Aware Adaptation  

E-Print Network [OSTI]

Extending Mobile Computer Battery Life through Energy-Aware Adaptation Jason Flinn CMU-CS-01 entity. #12;Keywords: Energy-aware adaptation, application-aware adaptation, power manage- ment, mobile and applications, must also contribute to energy conservation. This dissertation puts forth the claim that energy-aware

327

Extending Mobile Computer Battery Life through EnergyAware Adaptation  

E-Print Network [OSTI]

Extending Mobile Computer Battery Life through EnergyAware Adaptation Jason Flinn CMUCS01 entity. #12; Keywords: Energyaware adaptation, applicationaware adaptation, power manage ment, mobile and applications, must also contribute to energy conservation. This dissertation puts forth the claim that energyaware

Flinn, Jason

328

Automated Web Page Synthesis in Adaptive Web Systems  

E-Print Network [OSTI]

Automated Web Page Synthesis in Adaptive Web Systems Hossein Sadat and Ali Ghorbani Intelligent, Canada {t15h7,ghorbani}@unb.ca Abstract. An adaptive Web system adapts the Web pages to its users, based of the system. In this paper, we formalize dynamic generation of Web pages and refer to it as Web page synthesis

Ghorbani, Ali

329

Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators  

E-Print Network [OSTI]

Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators Alison G) A central role for phenotypic plasticity in adaptive evolution is often posited yet lacks empirical support of preexisting developmental pathways, producing rapid adaptive change. We examined the role of plasticity

Pfrender, Michael

330

Grid adaptation for multiscale plasma simulations Gian Luca Delzanno  

E-Print Network [OSTI]

Grid adaptation for multiscale plasma simulations Gian Luca Delzanno Los Alamos National Laboratory tools need to be developed to bridge the gap between these disparate scales. Grid adaptation is one of such tools, useful to address multiple length scales, and we present a new powerful grid adaptation method

Ito, Atsushi

331

MEDIA RESOURCES ADAPTATION FOR LIMITED DEVICES TAYEB LEMLOUMA1  

E-Print Network [OSTI]

MEDIA RESOURCES ADAPTATION FOR LIMITED DEVICES TAYEB LEMLOUMA1 ; NABIL LAYADA1 1 WAM Project, INRIA.Lemlouma@inrialpes.fr; Nabil.Layaida@inrialpes.fr In this paper, we define a framework for media resources manipulation in an adaptive content delivery system. We discuss the media resources manipulation in an adaptation

Paris-Sud XI, Universit de

332

What Should Adaptivity Mean to Interactive Software Programmers?  

E-Print Network [OSTI]

and adaptation are combined in a simple and innovative manner. Author Keywords Adaptive software, plasticity.2.11.Software engineering: Software Architectures INTRODUCTION Software adaptivity is a long time- stood as the self-modification of a system under context vari- ations, arose as a significant issue

Paris-Sud XI, Université de

333

Creating an adaptable workforce: important implications for CIOs  

E-Print Network [OSTI]

talent Planning for leadership succession Fostering workforce adaptability Unquestionably, to winMarch 2008 Creating an adaptable workforce: important implications for CIOs #12;Creating an adaptable workforce: important implications for CIOs Page 2 Contents 2 Introduction 3 The IBM Global Human

334

Market-based mechanisms for climate change adaptation  

E-Print Network [OSTI]

of Climate Change and Energy Efficiency) and the National Climate Change Adaptation Research FacilityMarket-based mechanisms for climate change adaptation Final Report John McAneney, Ryan Crompton FOR CLIMATE CHANGE ADAPTATION Assessing the potential for and limits to insurance and market-based mechanisms

Colorado at Boulder, University of

335

Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, GeertJan Houben  

E-Print Network [OSTI]

model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

De Bra, Paul

336

Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, Geert-Jan Houben  

E-Print Network [OSTI]

model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

Houben, Geert-Jan

337

Adaptive phase measurements for narrowband squeezed beams  

E-Print Network [OSTI]

We have previously [Phys. Rev. A 65, 043803 (2002)] analyzed adaptive measurements for estimating the continuously varying phase of a coherent beam, and a broadband squeezed beam. A real squeezed beam must have finite photon flux N and hence can be significantly squeezed only over a limited frequency range. In this paper we analyze adaptive phase measurements of this type for a realistic model of a squeezed beam. We show that, provided it is possible to suitably choose the parameters of the beam, a mean-square phase uncertainty scaling as (N/kappa)^{-5/8} is possible, where kappa is the linewidth of the beam resulting from the fluctuating phase. This is an improvement over the (N/kappa)^{-1/2} scaling found previously for coherent beams. In the experimentally realistic case where there is a limit on the maximum squeezing possible, the variance will be reduced below that for coherent beams, though the scaling is unchanged.

Dominic W. Berry; Howard M. Wiseman

2006-03-22T23:59:59.000Z

338

Assessment of Autonomic Control and Respiratory Sinus Arrhythmia Using Point Process Models of Human Heart Beat Dynamics  

E-Print Network [OSTI]

Tracking the autonomic control and respiratory sinus arrhythmia (RSA) from electrocardiogram and respiratory measurements is an important problem in cardiovascular control. We propose a point process adaptive filter algorithm ...

Chen, Zhe

339

Robust adaptive control of HVDC systems  

SciTech Connect (OSTI)

The transient performance of an HVDC power system is highly dependent on the parameters of the current/voltage regulators of the converter controls. In order to better accommodate changes in system structure or dc operating conditions, this paper introduces a new adaptive control strategy. The advantages of automatic tuning for continuous fine tuning are combined with predetermined gain scheduling in order to achieve robustness for large disturbances. Examples are provided for a digitally simulated back-to-back dc system.

Reeve, J.; Sultan, M. (Univ. of Waterloo, Ontario (Canada))

1994-07-01T23:59:59.000Z

340

RUMINAL ADAPTATION TO INCREASING LEVELS OF CONCENTRATES  

E-Print Network [OSTI]

.0 % citrus pulp, 1.0 % lard, 7.0 % sugarbeet pulp, 3.3 % oat husk meal, 2.0 % coconut expeller and 2-chromatography. The rate of lactate fermentation was measured by incubation of 10 ml rumen fluid (taken at 14.00 h) with 1. If adaptation occurs one should expect an increase of lactate and a higher rate of L- lactate fermentation

Paris-Sud XI, Universit de

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

E-Print Network 3.0 - adaptive simulated annealing Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Report Summary: mimicking each specific behavior. 12; Keywords: simulated annealing, organizational learning, adaptation... on structure and adaptability, under the...

342

Adaptive powertrain control for plugin hybrid electric vehicles  

DOE Patents [OSTI]

A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

Kedar-Dongarkar, Gurunath; Weslati, Feisel

2013-10-15T23:59:59.000Z

343

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

344

AdaptiveARC | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop,SaveWhiskeyEnergyAd-Venta Jump to:Colorado:01.AdamsvilleAdaptiveARC

345

WeADAPT | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectric Coop,Save EnergyGlouster,Winside,Warren CountyUtility JumpWeADAPT Jump

346

Adaptive schemes for incomplete quantum process tomography  

SciTech Connect (OSTI)

We propose an iterative algorithm for incomplete quantum process tomography with the help of quantum state estimation. The algorithm, which is based on the combined principles of maximum likelihood and maximum entropy, yields a unique estimator for an unknown quantum process when one has less than a complete set of linearly independent measurement data to specify the quantum process uniquely. We apply this iterative algorithm adaptively in various situations and so optimize the amount of resources required to estimate a quantum process with incomplete data.

Teo, Yong Siah [Centre for Quantum Technologies, National University of Singapore, Singapore 117543 (Singapore); NUS Graduate School for Integrative Sciences and Engineering, Singapore 117597 (Singapore); Englert, Berthold-Georg [Centre for Quantum Technologies, National University of Singapore, Singapore 117543 (Singapore); Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Rehacek, Jaroslav; Hradil, Zdenek [Department of Optics, Palacky University, 17. listopadu 12, CZ-77146 Olomouc (Czech Republic)

2011-12-15T23:59:59.000Z

347

Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, GeertJan Houben, Paul De Bra  

E-Print Network [OSTI]

applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

De Bra, Paul

348

Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, Geert-Jan Houben, Paul De Bra  

E-Print Network [OSTI]

applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

Houben, Geert-Jan

349

Restricted Complexity Framework for Nonlinear Adaptive Control in Complex Systems  

SciTech Connect (OSTI)

Control law adaptation that includes implicit or explicit adaptive state estimation, can be a fundamental underpinning for the success of intelligent control in complex systems, particularly during subsystem failures, where vital system states and parameters can be impractical or impossible to measure directly. A practical algorithm is proposed for adaptive state filtering and control in nonlinear dynamic systems when the state equations are unknown or are too complex to model analytically. The state equations and inverse plant model are approximated by using neural networks. A framework for a neural network based nonlinear dynamic inversion control law is proposed, as an extrapolation of prior developed restricted complexity methodology used to formulate the adaptive state filter. Examples of adaptive filter performance are presented for an SSME simulation with high pressure turbine failure to support extrapolations to adaptive control problems.

Williams, Rube B. [Los Alamos National Laboratory, P.O. Box 1663, MS K575, Los Alamos, NM 87545 (United States)

2004-02-04T23:59:59.000Z

350

Adaptive Non-Boltzmann Monte Carlo  

SciTech Connect (OSTI)

This manuscript generalizes the use of transition probabilities (TPs) between states, which are efficient relative to histogram procedures in deriving system properties. The empirical TPs of the simulation depend on the importance weights and are temperature-specific, so they are not conducive to accumulating statistics as weights change or to extrapolating in temperature. To address these issues, the authors provide a method for inferring Boltzmann-weighted TPs for one temperature from simulations run at other temperatures and/or at different adaptively varying importance weights. They refer to these as canonical transition probabilities (CTPs). System properties are estimated from CTPs. Statistics on CTPs are gathered by inserting a low-cost easily-implemented bookkeeping step into the Metropolis algorithm for non-Boltzmann sampling. The CTP method is inherently adaptive, can take advantage of partitioning of the state space into small regions using either serial or (embarrassingly) parallel architectures, and reduces variance by avoiding histogramming. They also demonstrate how system properties may be extrapolated in temperature from CTPs without the extra memory required by using energy as a microstate label. Nor does it require the solution of non-linear equations used in histogram methods.

Fitzgerald, M.; Picard, R.R.; Silver, R.N.

1998-06-01T23:59:59.000Z

351

adaptations impaired oxidative: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

learning of phonetic consistency and generalized neural adaptation deficits in dyslexia MIT - DSpace Summary: Developmental dyslexia is a neurological condition that...

352

Applying Climate Information for Adaptation Decision-Making:...  

Open Energy Info (EERE)

Applying Climate Information for Adaptation Decision-Making: A Guidance and Resource Document Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Applying Climate...

353

adaptive phase tracking: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

de 107 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 7, OCTOBER 1999 1025 Adaptive Motion Tracking Block Matching Algorithms for Video Coding...

354

USE OF QUADRATIC MODELS WITH MESH ADAPTIVE DIRECT ...  

E-Print Network [OSTI]

Mar 6, 2011 ... differences remain: the mesh adaptive direct search (MADS [6, ... implicit filtering method described in [19] may also be viewed as a hybrid...

Le Digabel

2011-03-06T23:59:59.000Z

355

Development based climate change adaptation and mitigation-conceptual...  

Open Energy Info (EERE)

countries AgencyCompany Organization: Lawrence Berkeley National Laboratory (LBNL) Sector: Climate, Energy, Land, Water Topics: Adaptation, Co-benefits assessment, -...

356

adaptive learning environments: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

In Saarbrucken we are developing the web-based, user-adaptive, interactive learning environment Active 69 Medium-based design: Extending a medium to create and exploratory...

357

Modeling and adaptive control of indoor unmanned aerial vehicles  

E-Print Network [OSTI]

The operation of unmanned aerial vehicles (UAVs) in constrained indoor environments presents many unique challenges in control and planning. This thesis investigates modeling, adaptive control and trajectory optimization ...

Michini, Bernard (Bernard J.)

2009-01-01T23:59:59.000Z

358

Optimization Online - An Adaptive Partition-based Approach for ...  

E-Print Network [OSTI]

Dec 2, 2014 ... Our computational results show that the proposed adaptive partition-based approach converges very fast to a small partition for our test...

Yongjia Song

2014-12-02T23:59:59.000Z

359

adaptive signal model: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Michael Richard 1990-11-13 2 UNCORRECTED 2 Stochastic adaptive control model for traffic signal systems Environmental Sciences and Ecology Websites Summary: process. The model...

360

adaptive social immunity: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to climate risk in the coffee sector of Chiapas, Mexico Environmental Sciences and Ecology Websites Summary: Social identity, perception and motivation in adaptation to...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

adaptive control scheme: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems concepts. Based Alpcan, Tansu 5 Adaptive predictive lighting controllers for daylight artificial light integrated schemes. Open Access Theses and Dissertations Summary:...

362

Adaptation to Climate Variability and Change: A Guidance Manual...  

Open Energy Info (EERE)

to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and...

363

Adapting Urban Transport to Climate Change- Module 5f - Sustainable...  

Open Energy Info (EERE)

Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Jump to: navigation, search Tool Summary LAUNCH...

364

Economic Evaluation of Climate Change Adaptation Projects: Approaches...  

Open Energy Info (EERE)

of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Economic Evaluation of Climate...

365

How to Integrate Climate Change Adaptation into National-Level...  

Open Energy Info (EERE)

Integrate Climate Change Adaptation into National-Level Policy and Planning in the Water Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: How to Integrate Climate...

366

Agricultural Technologies for Climate Change Mitigation and Adaptation...  

Open Energy Info (EERE)

Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for...

367

adaptive antenna system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

widely used in civil engineering to evaluate building's structural re-sistance to seismic events... Munoz, Freddy 2009-01-01 164 User Models for Adaptive Hypermedia and...

368

adaptive nonparametric instrumental: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

both selects Faraway, Julian 27 Spanish Version of the Sport Satisfaction Instrument (SSI) Adapted to Physical Education CiteSeer Summary: The objective of this research was to...

369

adaptive management tool: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

management as an alternative to traditional natural resource planning and management models. Adaptive management may provide BLM managers ... Brandenburg, Peter (Peter J.)...

370

Central African Republic-National Adaptation Plan Global Support...  

Open Energy Info (EERE)

manual, Publications, Workshop Website http:undp-alm.orgprojectsn Program Start 2013 Country Central African Republic Middle Africa References National Adaptation Plan...

371

adaptive neural coding: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

examples and in an application to image compression. 1 Introduction The self Zachmann, Gabriel 42 Adaptive Control Using Combined Online and Background Learning Neural...

372

adapted neural population: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

examples and in an application to image compression. 1 Introduction The self Zachmann, Gabriel 24 Adaptive Control Using Combined Online and Background Learning Neural...

373

adaptive antioxidant methionine: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Departments of *Ecology for review July 26, 2005) Adaptive radiation is defined as the evolution of ecological and phenotypic diversity within a rapidly multiplying lineage....

374

adapting balanced scorecard: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Brusilovsky School of Information and the same links to all - Stores - Museums - Courses - News sites Adaptive Web-based systems and sites Brusilovsky, Peter 237...

375

Adaptation of Lactococcus lactis to its environment : a genomics approach.  

E-Print Network [OSTI]

??This thesis describes a number of strategies of Lactococcus lactis to adapt to its ever-changing environment. Although the complete genome sequence of L. lactis subspecies (more)

Zomer, Albertus Lambert

2007-01-01T23:59:59.000Z

376

adapted mucoid strains: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

proposed by Francfort and Marigo in 19 Cremers, Daniel 2 Adaptation CiteSeer Summary: Climate change is expected to bring potentially significant changes to Washington States...

377

affects adaptive allocation: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of water allocation institutions on societys adaptability to prospective climate change. Such institutions include basic systems of water law, specific statutes, systems of...

378

adaptive control strategies: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

using any finite number of channel evaluations. Aram W. Harrow; Avinatan Hassidim; Debbie W. Leung; John Watrous 2009-09-01 12 CONTRIBUTED Adaptive Stochastic Control Energy...

379

adaptive aerospace tools: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in the face of unknown, changing, or poorly defined operating environments. In order for adaptive control systems to be used in safety-critical aerospace applications,...

380

adaptive finite element: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

properties and performance of the adaptive finite element approach to the design of nano-photonic components. Central issues are the construction of vectorial finite elements...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

adaptive finite elements: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

properties and performance of the adaptive finite element approach to the design of nano-photonic components. Central issues are the construction of vectorial finite elements...

382

adapter protein sly1: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to their own needs. This is achieved by enabling users... Heeren, Bastiaan 2010-01-01 157 Baltic Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary:...

383

Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel...  

Broader source: Energy.gov (indexed) [DOE]

* Motivation and background * Adaptive Injection Strategy (AIS) * Simulation and optimization - Two-Stage Combustion (TSC -- HCCI + Diffusion combustion) optimization using AIS...

384

adaptive genetic algorithm: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a xed crossover Emmerich, Michael 2 Self-Adaptive Genetic Algorithm for Constrained Optimization. Open Access Theses and Dissertations Summary: ??This study proposes a...

385

Financing Climate Adaptation and Mitigation in Rural Areas of...  

Open Energy Info (EERE)

Rural Areas of Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries...

386

Quantitative Adaptation Analytics for Assessing Dynamic Systems of Systems.  

SciTech Connect (OSTI)

Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

Gauthier, John H.; Miner, Nadine E.; Wilson, Michael L.; Le, Hai D.; Kao, Gio K; Melander, Darryl J.; Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Robert Charles,

2015-01-01T23:59:59.000Z

387

astec code adaptability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Marom 1997-07-14 2 Adaptive decoding for dense and sparse evaluationinterpolation codes Computer Technologies and Information Sciences Websites Summary: with errors Decoding...

388

Characterizing Uncertainty for Regional Climate Change Mitigation and Adaptation Decisions  

SciTech Connect (OSTI)

This white paper describes the results of new research to develop an uncertainty characterization process to help address the challenges of regional climate change mitigation and adaptation decisions.

Unwin, Stephen D.; Moss, Richard H.; Rice, Jennie S.; Scott, Michael J.

2011-09-30T23:59:59.000Z

389

adaptive chemistry dac: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Tool Needs for Faster Mainstream Acceptance of 3D Lim, Sung Kyu 5 Ethical Conduct in Science and Engineering Adapted from Chemistry-Biology Interface Program Ethics Materials...

390

Africa Adaptation Programme: Capacity Building Experiences-Improving...  

Open Energy Info (EERE)

of historical climate data, climate projections and climate vulnerability and risk studies for building climate resilient communities. The Africa Adaptation Programme,...

391

Adaptive model training system and method  

DOE Patents [OSTI]

An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

Bickford, Randall L; Palnitkar, Rahul M

2014-11-18T23:59:59.000Z

392

Adaptive model training system and method  

DOE Patents [OSTI]

An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

Bickford, Randall L; Palnitkar, Rahul M; Lee, Vo

2014-04-15T23:59:59.000Z

393

Adaptable radiation monitoring system and method  

DOE Patents [OSTI]

A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

Archer, Daniel E. (Livermore, CA); Beauchamp, Brock R. (San Ramon, CA); Mauger, G. Joseph (Livermore, CA); Nelson, Karl E. (Livermore, CA); Mercer, Michael B. (Manteca, CA); Pletcher, David C. (Sacramento, CA); Riot, Vincent J. (Berkeley, CA); Schek, James L. (Tracy, CA); Knapp, David A. (Livermore, CA)

2006-06-20T23:59:59.000Z

394

Phase sensor for solar adaptive-optics  

E-Print Network [OSTI]

Wavefront sensing in solar adaptive-optics is currently done with correlating Shack-Hartmann sensors, although the spatial- and temporal-resolutions of the phase measurements are then limited by the extremely fast computing required to correlate the sensor signals at the frequencies of daytime atmospheric-fluctuations. To avoid this limitation, a new wavefront-sensing technique is presented, that makes use of the solar brightness and is applicable to extended sources. The wavefront is sent through a modified Mach-Zehnder interferometer. A small, central part of the wavefront is used as reference and is made to interfere with the rest of the wavefront. The contrast of two simultaneously measured interference-patterns provides a direct estimate of the wavefront phase, no additional computation being required. The proposed optical layout shows precise initial alignment to be the critical point in implementing the new wavefront-sensing scheme.

Kellerer, Aglae

2011-01-01T23:59:59.000Z

395

An adaptive attack on Wiesner's quantum money  

E-Print Network [OSTI]

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

396

Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work-in-Progress/Application Paper track.  

E-Print Network [OSTI]

Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work an adaptation controller for SSL (Secure Socket Layer), called Adaptive SSL. 1 Introduction Applications adaptation of the Secure Socket Layer (SSL) protocol [3]. Adaptive SSL (ASSL) aims to provide appropriate se

Newcastle upon Tyne, University of

397

Saving Energy with Architectural and Frequency Adaptations for Multimedia Applications  

E-Print Network [OSTI]

Saving Energy with Architectural and Frequency Adaptations for Multimedia Applications will benefit DVS. Our adaptation control algorithm is effective in saving energy and exploits most. The existence of this idle time, called slack, implies that the processor can be slowed to save energy

Adve, Sarita

398

On Adaptive Mesh Refinement for Atmospheric Pollution Models  

E-Print Network [OSTI]

On Adaptive Mesh Refinement for Atmospheric Pollution Models Emil M. Constantinescu and Adrian res- olution system for modeling regional air pollution based on the chemical transport model STEM. Keywords: Air Pollution Modeling, Adaptive Mesh Refinement. 1 Introduction Inadequate grid resolution can

Sandu, Adrian

399

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network [OSTI]

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

400

Efficiently Decodable Non-adaptive Group Testing Piotr Indyk  

E-Print Network [OSTI]

. The answer to the test tells whether xi = 0 for all i S or not. The objective is to design as few tests]. In this case, items are blood samples, which are positive if they are infected, and a test is a pool of samples: the outcome of one test cannot be used to adaptively design another test. Non- adaptive group testing (NAGT

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NEWS AND COMMENTARY Adaptive genomic changes in Antarctic fish...............................................................  

E-Print Network [OSTI]

-zero temperatures of the Southern Ocean requires special adaptation to extreme cold, and the notothenioid fish radiation--which dominates the biomass and species diversity of Antarctic fish--has provided textbook., 2004). This result suggests that, not surprisingly, evolu- tionary adaptation to the Southern Ocean has

Renn, Susan C.P.

402

Overcoming Dataset Bias: An Unsupervised Domain Adaptation Approach  

E-Print Network [OSTI]

Overcoming Dataset Bias: An Unsupervised Domain Adaptation Approach Boqing Gong Dept. of Computer that recognition datasets are biased. Paying no heed to those biases, learning algorithms often result in classifiers with poor cross- dataset generalization. We are developing domain adaptation techniques to over

Grauman, Kristen

403

REVIEWS AND SYNTHESES Local adaptation in host use among marine  

E-Print Network [OSTI]

, local adaptation, selection. Ecology Letters (2005) 8: 448­459 I N T R O DU C T I O N Population, abundance and ecological roles of organisms (Fox & Morrow 1981; Mopper & Strauss 1998), helps to maintain, there is a lingering perception that populations in the sea rarely locally adapt, and are more likely to evolve

Sotka, Erik

404

Analysis of An Adaptive Sampler Based on Weber's Law  

E-Print Network [OSTI]

1 Analysis of An Adaptive Sampler Based on Weber's Law Onkar Dabeer Subhasis Chaudhuri Onkar Dabeer;2 Abstract Weber's law suggests a logarithmic relationship between perceptual stimuli and human perception. The Weber sampler is an adaptive, non-uniform sampling mechanism that exploits Weber's law to sample

Dabeer, Onkar

405

Persona: a Framework to provide Adaptive Presentation for Web Documents  

E-Print Network [OSTI]

, yutaka, yama}@yy.cs.keio.ac.jp Abstract The current issue in the web document management is that every on the fly. Keywords Adaptive presentation, Web documents, Document management, Personalization 11 Persona: a Framework to provide Adaptive Presentation for Web Documents Junichi Suzuki, Gaku

Suzuki, Jun

406

Adaptive Optics in Astronomy Jay J. McCarthy  

E-Print Network [OSTI]

Adaptive Optics in Astronomy Jay J. McCarthy NW Computational Intelligence Laboratory Portland State University Abstract ­ The field of adaptive optics (AO) has developed as a means to correct for the phase disturbances of an optical signal by understanding the medium through which it passes. This paper

La Rosa, Andres H.

407

Sufficient Conditions for Well-behaved Adaptive Hypermedia Systems  

E-Print Network [OSTI]

for the architecture of adaptive hypermedia applications: the Adaptive Hypermedia Application Model (AHAM) [DHW99]. AHAM describes AHS at an abstract level, using an architecture consisting of three parts: a domain (AE) are discussed in earlier paper [WDD01]. We defined a rule language for AHS, AHAM-CA and proposed

De Bra, Paul

408

Adaptive Organizations and Emergent Forms Kathleen M. Carley  

E-Print Network [OSTI]

individual learning (micro-behavior) and organizational learning and adaptation (macro of organizations using intelligent artificial agents. Using ORGAHEAD, a multi-agent model of organizational behavior, a series of virtual experiments were run to examine issues of organizational adaptation. Results

Sadeh, Norman M.

409

Adaptive Organizations and Emergent Forms Kathleen M. Carley  

E-Print Network [OSTI]

learning (micro-behavior) and organizational learning and adaptation (macro-behavior) is the subject of organizations using intelligent artificial agents. Using ORGAHEAD, a multi-agent model of organizational behavior, a series of virtual experiments were run to examine issues of organizational adaptation. Results

Sadeh, Norman M.

410

9 Towards Adaptive Management of Native Vegetation in Regional Landscapes  

E-Print Network [OSTI]

management remains widely cited as the most logical and elegant frame- work for continuous improvement9 Towards Adaptive Management of Native Vegetation in Regional Landscapes David H Duncan1 of the `adaptive management' paradigm to natural resource man- agement, using regional management of native

Burgman, Mark

411

Particle Systems for Adaptive, Isotropic Meshing of CAD Models  

E-Print Network [OSTI]

Particle Systems for Adaptive, Isotropic Meshing of CAD Models Jonathan R. Bronson, Joshua A adaptive triangular surface and tetrahedral volume meshes from CAD models. Input shapes are treated. These particles reach a good distribution by minimizing an energy computed in 3D world space, with movements

Utah, University of

412

Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias  

E-Print Network [OSTI]

Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias Hong-Sheng Zhou April 12, 2007 Abstract We study the design of practical blind signatures in the universal composability (UC) setting against adaptive adversaries. We introduce a new property for blind signature schemes

413

Adaptive Blind Signal Processing--Neural Network Approaches  

E-Print Network [OSTI]

Adaptive Blind Signal Processing--Neural Network Approaches SHUN-ICHI AMARI, FELLOW, IEEE are presented for the problem of adaptive blind signal processing, especially instantaneous blind separation and multichannel blind deconvolution/equalization of independent source signals. We dis- cuss recent developments

Vialatte, Franois

414

Adaptive Management Strategies May be Answer to Water Disputes  

E-Print Network [OSTI]

Adaptive Management Strategies May be Answer to Water Disputes LINCOLN, Neb. -- Adaptive management leader in water- management and water-quality research. It has the largest underground aquifer in 1971 spurred new water management districts. Later developments have sought to undo environmental

Nebraska-Lincoln, University of

415

Are three-dimensional spider webs defensive adaptations?  

E-Print Network [OSTI]

LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

Blackledge, Todd

416

The Genetic Architecture of Adaptations to High Altitude in Ethiopia  

E-Print Network [OSTI]

The Genetic Architecture of Adaptations to High Altitude in Ethiopia Gorka Alkorta-Aranburu1, Ethiopia, 4 Howard Hughes Medical Institute, Chevy Chase, Maryland, United States of America Abstract JK, et al. (2012) The Genetic Architecture of Adaptations to High Altitude in Ethiopia. PLoS Genet 8

Dean, Matthew D.

417

Adapting Optimization Techniques to Description Logics with Concrete Domains  

E-Print Network [OSTI]

Adapting Optimization Techniques to Description Logics with Concrete Domains Anni-Yasmin Turhan backtracking and model merging can be adapted to description logics with concrete domains. We propose al) a new requirement for concrete domains in order to enable dependency directed backtracking for all clash

Haarslev, Volker

418

Adapting Optimization Techniques to Description Logics with Concrete Domains  

E-Print Network [OSTI]

Adapting Optimization Techniques to Description Logics with Concrete Domains Anni­Yasmin Turhan backtracking and model merging can be adapted to description logics with concrete domains. We propose al) a new requirement for concrete domains in order to enable dependency directed backtracking for all clash

Haarslev, Volker

419

Parametric Adaptive Spectrum Sensing Framework for Dynamic Spectrum Access Networks  

E-Print Network [OSTI]

- ture for dynamic spectrum sensing. In our approach, the radio learns the statistics of the channel Spectrum Sensing Architecture The proposed PASS architecture enables the radio to adapt its spectrumParametric Adaptive Spectrum Sensing Framework for Dynamic Spectrum Access Networks Dinesh Datla

Kansas, University of

420

Adaptive Rate Stream Processing for Smart Grid Applications on Clouds  

E-Print Network [OSTI]

Adaptive Rate Stream Processing for Smart Grid Applications on Clouds Yogesh Simmhan University within a smart (power) grid are providing utilities and power systems researchers with unprecedentedEngineering applications in the smart grid domain. One unique aspect of our work is the use of adaptive rate control

Prasanna, Viktor K.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Adaptive Methods for Modelling Transport Processes in Fractured Subsurface Systems  

E-Print Network [OSTI]

­ discrete Galerkin method applying finite differences for the discretization in time and the StreamlineAdaptive Methods for Modelling Transport Processes in Fractured Subsurface Systems 3rd­adaptive methods for modelling transport processes in fractured rock. As a simplification, ideal tracers

Cirpka, Olaf Arie

422

Two mechanisms for transducer adaptation in vertebrate hair cells  

E-Print Network [OSTI]

Colloquium Two mechanisms for transducer adaptation in vertebrate hair cells Jeffrey R. Holt and Massachusetts General Hospital, Wellman 414, Boston, MA 02114 Deflection of the hair bundle atop a sensory hair deflections, hair cells adapt. Two fundamentally distinct models have been proposed to explain transducer

Corey, David P.

423

Direct aperture optimization for online adaptive radiation therapy  

SciTech Connect (OSTI)

This paper is the first investigation of using direct aperture optimization (DAO) for online adaptive radiation therapy (ART). A geometrical model representing the anatomy of a typical prostate case was created. To simulate interfractional deformations, four different anatomical deformations were created by systematically deforming the original anatomy by various amounts (0.25, 0.50, 0.75, and 1.00 cm). We describe a series of techniques where the original treatment plan was adapted in order to correct for the deterioration of dose distribution quality caused by the anatomical deformations. We found that the average time needed to adapt the original plan to arrive at a clinically acceptable plan is roughly half of the time needed for a complete plan regeneration, for all four anatomical deformations. Furthermore, through modification of the DAO algorithm the optimization search space was reduced and the plan adaptation was significantly accelerated. For the first anatomical deformation (0.25 cm), the plan adaptation was six times more efficient than the complete plan regeneration. For the 0.50 and 0.75 cm deformations, the optimization efficiency was increased by a factor of roughly 3 compared to the complete plan regeneration. However, for the anatomical deformation of 1.00 cm, the reduction of the optimization search space during plan adaptation did not result in any efficiency improvement over the original (nonmodified) plan adaptation. The anatomical deformation of 1.00 cm demonstrates the limit of this approach. We propose an innovative approach to online ART in which the plan adaptation and radiation delivery are merged together and performed concurrently--adaptive radiation delivery (ARD). A fundamental advantage of ARD is the fact that radiation delivery can start almost immediately after image acquisition and evaluation. Most of the original plan adaptation is done during the radiation delivery, so the time spent adapting the original plan does not increase the overall time the patient has to spend on the treatment couch. As a consequence, the effective time allotted for plan adaptation is drastically reduced. For the 0.25, 0.5, and 0.75 cm anatomical deformations, the treatment time was increased by only 2, 4, and 6 s, respectively, as compared to no plan adaptation. For the anatomical deformation of 1.0 cm the time increase was substantially larger. The anatomical deformation of 1.0 cm represents an extreme case, which is rarely observed for the prostate, and again demonstrates the limit of this approach. ARD shows great potential for an online adaptive method with minimal extension of treatment time.

Mestrovic, Ante; Milette, Marie-Pierre; Nichol, Alan; Clark, Brenda G.; Otto, Karl [Physics and Astronomy, University of British Columbia, Vancouver, British Columbia, Canada and Medical Physics, BC Cancer Agency-Vancouver Centre, Vancouver, British Columbia (Canada); Physics and Astronomy, University of British Columbia, Vancouver, British Columbia (Canada) and Medical Physics, BC Cancer Agency-Centre for the Southern Interior, Kelowna, British Columbia (Canada); Department of Radiation Oncology, BC Cancer Agency-Vancouver Centre, Vancouver, British Columbia (Canada); Medical Physics, Ottawa Hospital Regional Cancer Centre, Ottawa, Ontario (Canada); Medical Physics, BC Cancer Agency-Vancouver Centre, Vancouver, British Columbia (Canada)

2007-05-15T23:59:59.000Z

425

Page 1 | B.A. in Special Education Adapted Curriculum | Academic Plan of Study Updated May 2014 B.A. in Special Education (Adapted Curriculum)  

E-Print Network [OSTI]

Page 1 | B.A. in Special Education ­ Adapted Curriculum | Academic Plan of Study Updated May 2014 B ­ Adapted Curriculum | Academic Plan of Study Updated May 2014 Special Education - Adapted Curriculum Areas.A. in Special Education (Adapted Curriculum) Academic Plan of Study College of Education Department of Special

Raja, Anita

426

Characterization Of High-Stroke High-Aspect Ratio Micro Electro Mechanical Systems Deformable Mirrors For Adaptive Optics  

E-Print Network [OSTI]

Mirrors For Adaptive Optics, PhD Thesis, University ofFabrication Adaptive optics applications in astronomy Max, Center for Adaptive Optics, University of California,

Bouchti, Mohamed Amine

2013-01-01T23:59:59.000Z

427

Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study  

E-Print Network [OSTI]

into larger adaptive sys- tems, however, presents challenges that arise from potential incompatibilities among, for identifying potential incompatibilities between com- posed adaptation policies and (ii) illustrates a general computing initiative [13], sug- gest increased need for self-managing, self-calibrating, self- healing

Liu, Xue

428

Closed-loop Reference Model adaptive control : with application to very flexible aircraft  

E-Print Network [OSTI]

One of the main features of adaptive systems is an oscillatory convergence that exacerbates with the speed of adaptation. Over the past two decades several attempts have been made to provide adaptive solutions with guaranteed ...

Gibson, Travis Eli

2014-01-01T23:59:59.000Z

429

Adaptive map alignment in the superior colliculus of the barn owl: a neuromorphic implementation  

E-Print Network [OSTI]

Adaptation is one of the basic phenomena of biology, while adaptability is an important feature for neural network. Young barn owl can well adapt its visual and auditory integration to the environmental change, such as ...

Huo, Juan

2010-01-01T23:59:59.000Z

430

Prediction and Adaptation in an Evolving Chaotic Environment  

E-Print Network [OSTI]

We describe the results of analytic calculations and computer simulations of adaptive predictors (predictive agents) responding to an evolving chaotic environment and to one another. Our simulations are designed to quantify adaptation and to explore co-adaptation for a simple calculable model of a complex adaptive system. We first consider the ability of a single agent, exposed to a chaotic environment, to model, control, and predict the future states of that environment. We then introduce a second agent which, in attempting to model and control both the chaotic environment and the first agent, modifies the extent to which that agent can identify patterns and exercise control. We find that (i) optimal adaptive predictors have an optimal memory and an optimal complexity, which are small for a rapidly changing map dynamics and (ii) that the predictive power can be increased by imposing chaos or random noise onto the map dynamics. The competition between the two predictive agents can lead either to chaos, or to metastable emergent behavior, best described as a leader-follower relationship. Our results suggest a correlation between optimal adaptation, optimal complexity, and emergent behavior, and provide preliminary support for the concept of optimal co-adaptation near the edge of chaos.

Alfred Hbler; David Pines

1993-06-28T23:59:59.000Z

431

Online Adaptive Replanning Method for Prostate Radiotherapy  

SciTech Connect (OSTI)

Purpose: To report the application of an adaptive replanning technique for prostate cancer radiotherapy (RT), consisting of two steps: (1) segment aperture morphing (SAM), and (2) segment weight optimization (SWO), to account for interfraction variations. Methods and Materials: The new 'SAM+SWO' scheme was retroactively applied to the daily CT images acquired for 10 prostate cancer patients on a linear accelerator and CT-on-Rails combination during the course of RT. Doses generated by the SAM+SWO scheme based on the daily CT images were compared with doses generated after patient repositioning using the current planning target volume (PTV) margin (5 mm, 3 mm toward rectum) and a reduced margin (2 mm), along with full reoptimization scans based on the daily CT images to evaluate dosimetry benefits. Results: For all cases studied, the online replanning method provided significantly better target coverage when compared with repositioning with reduced PTV (13% increase in minimum prostate dose) and improved organ sparing when compared with repositioning with regular PTV (13% decrease in the generalized equivalent uniform dose of rectum). The time required to complete the online replanning process was 6 {+-} 2 minutes. Conclusion: The proposed online replanning method can be used to account for interfraction variations for prostate RT with a practically acceptable time frame (5-10 min) and with significant dosimetric benefits. On the basis of this study, the developed online replanning scheme is being implemented in the clinic for prostate RT.

Ahunbay, Ergun E., E-mail: eahunbay@mcw.ed [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States); Peng Cheng; Holmes, Shannon; Godley, Andrew; Lawton, Colleen; Li, X. Allen [Department of Radiation Oncology, Medical College of Wisconsin, Milwaukee, WI (United States)

2010-08-01T23:59:59.000Z

432

Adaptive approximation of higher order posterior statistics  

SciTech Connect (OSTI)

Filtering is an approach for incorporating observed data into time-evolving systems. Instead of a family of Dirac delta masses that is widely used in Monte Carlo methods, we here use the Wiener chaos expansion for the parametrization of the conditioned probability distribution to solve the nonlinear filtering problem. The Wiener chaos expansion is not the best method for uncertainty propagation without observations. Nevertheless, the projection of the system variables in a fixed polynomial basis spanning the probability space might be a competitive representation in the presence of relatively frequent observations because the Wiener chaos approach not only leads to an accurate and efficient prediction for short time uncertainty quantification, but it also allows to apply several data assimilation methods that can be used to yield a better approximate filtering solution. The aim of the present paper is to investigate this hypothesis. We answer in the affirmative for the (stochastic) Lorenz-63 system based on numerical simulations in which the uncertainty quantification method and the data assimilation method are adaptively selected by whether the dynamics is driven by Brownian motion and the near-Gaussianity of the measure to be updated, respectively.

Lee, Wonjung, E-mail: leew@maths.ox.ac.uk

2014-02-01T23:59:59.000Z

433

GRChombo : Numerical Relativity with Adaptive Mesh Refinement  

E-Print Network [OSTI]

Numerical relativity has undergone a revolution in the past decade. With a well-understood mathematical formalism, and full control over the gauge modes, it is now entering an era in which the science can be properly explored. In this work, we introduce GRChombo, a new numerical relativity code written to take full advantage of modern parallel computing techniques. GRChombo's features include full adaptive mesh refinement with block structured Berger-Rigoutsos grid generation which supports non-trivial "many-boxes-in-many-boxes" meshing hierarchies, and massive parallelism through the Message Passing Interface (MPI). GRChombo evolves the Einstein equation with the standard BSSN formalism, with an option to turn on CCZ4 constraint damping if required. We show that GRChombo passes all the standard "Apples-to-Apples" code comparison tests. We also show that it can stably and accurately evolve vacuum black hole spacetimes such as binary black hole mergers, and non-vacuum spacetimes such as scalar collapses into black holes. As an illustration of its AMR capability, we demonstrate the evolution of triple black hole merger, which can be set up trivially in GRChombo.

Katy Clough; Pau Figueras; Hal Finkel; Markus Kunesch; Eugene A. Lim; Saran Tunyasuvunakool

2015-03-11T23:59:59.000Z

434

GRChombo : Numerical Relativity with Adaptive Mesh Refinement  

E-Print Network [OSTI]

Numerical relativity has undergone a revolution in the past decade. With a well-understood mathematical formalism, and full control over the gauge modes, it is now entering an era in which the science can be properly explored. In this work, we introduce GRChombo, a new numerical relativity code written to take full advantage of modern parallel computing techniques. GRChombo's features include full adaptive mesh refinement with block structured Berger-Rigoutsos grid generation which supports non-trivial "many-boxes-in-many-boxes" meshing hierarchies, and massive parallelism through the Message Passing Interface (MPI). GRChombo evolves the Einstein equation with the standard BSSN formalism, with an option to turn on CCZ4 constraint damping if required. We show that GRChombo passes all the standard "Apples-to-Apples" code comparison tests. We also show that it can stably and accurately evolve vacuum black hole spacetimes such as binary black hole mergers, and non-vacuum spacetimes such as scalar collapses into b...

Clough, Katy; Finkel, Hal; Kunesch, Markus; Lim, Eugene A; Tunyasuvunakool, Saran

2015-01-01T23:59:59.000Z

435

E-Print Network 3.0 - adaptive fast multipole Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A fast adaptive multipole algorithm for particle simulations. SIAM J. Sci. Stat... Kenney. An adaptation of the fast multipole method for evaluating layer potentials in two...

436

E-Print Network 3.0 - adaptation reliability evaluation Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

reliability evaluation Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptation reliability evaluation Page: << < 1 2 3 4 5 > >> 1 Adaptive...

437

E-Print Network 3.0 - adaptive sampling strategy Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ray tracing, Whitted Whi80 proposed an adaptive sampling strategy which first... (Eds.) Adaptive Sampling for Geometry-aware Reconstruction Filters Pablo Bauszat1 and Martin...

438

E-Print Network 3.0 - adaptation du modele Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Adaptive algorithms for phase field models of some interface problems Department of Mathematics, Pennsylvania State University, University Park, PA 16802, USA. Summary: Adaptive...

439

E-Print Network 3.0 - academic adaptation styles Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Whatever the process or level of adaptation implemented by a learning system... of Cognitive Style Relative to Other Individual Variables Adapting the environment to suit...

440

E-Print Network 3.0 - adaptive management plan Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: adaptive management plan Page: << < 1 2 3 4 5 > >> 1 Regional Water Management: Adapting to Uncertain Water Summary: & Implement Management Options Monitor &...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Improved evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt, and Bruce A. Robinson  

E-Print Network [OSTI]

Improved evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt* and Bruce A. Robinson

Vrugt, Jasper A.

442

E-Print Network 3.0 - automatic spatially-adaptive balancing...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

balancing Page: << < 1 2 3 4 5 > >> 1 Automatic Spatially-Adaptive Balancing of Energy Terms for Image Segmentation Summary: Automatic Spatially-Adaptive Balancing of Energy Terms...

443

E-Print Network 3.0 - adaptive signal detection Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

An Adaptive Filtering Approach to the Processing of Single Sweep Event Related Potentials Data Summary: on time-sequenced version of the typical adaptive signal enhancers. Two...

444

E-Print Network 3.0 - adaptive optics scanning Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Powered by Explorit Topic List Advanced Search Sample search results for: adaptive optics scanning Page: << < 1 2 3 4 5 > >> 1 Biomedical Imaging with the Adaptive Scanning...

445

Advancing Adaptive Optics Technology: Laboratory Turbulence Simulation and Optimization of Laser Guide Stars  

E-Print Network [OSTI]

of cone photoreceptors with adaptive optics spectral-domaincoherence tomography, Optics Express, Vol. 14, Issue 10,of Multi-Object Adaptive Optics on a Simulated 10-Meter

Rampy, Rachel

2013-01-01T23:59:59.000Z

446

E-Print Network 3.0 - adaptive bio-inspired wireless Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Systems Summary: -224460 Traffic Adaptivity in Wireless Sensor Networks (TRAWSN) Energy efficiency is a major concern in the design... - cations were required to adapt the...

447

E-Print Network 3.0 - adaptive path planning Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

THE TRANS-PACIFIC CROSSING: LONG RANGE ADAPTIVE PATH PLANNING FOR UAVS THROUGH VARIABLE WIND FIELDS... , and thus any path planning process must be adaptable to these changes....

448

E-Print Network 3.0 - adaptive planning target Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MT-Adaptive A*, Planning with the Freespace Assump- tion, Target, Unknown Terrain, Video Games 1... . To this end, we extend Adaptive A*, an incremental heuristic search method,...

449

E-Print Network 3.0 - adaptive spect imaging Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

scanner In order to obtain optimal image quality with respect to a particular task, adaptive imaging Summary: adaptive SPECT imaging in a pre-clinical context. For the...

450

E-Print Network 3.0 - animal adaptive spect Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

scanner In order to obtain optimal image quality with respect to a particular task, adaptive imaging Summary: .H. Barrett, Adaptive small-animal SPECTCT, IEEE 2008...

451

E-Print Network 3.0 - adaptation technologies related Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

related Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: details - Comparisons Low level technology - Text programming...

452

E-Print Network 3.0 - adaptive short forms Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

at San Diego Collection: Biology and Medicine 13 Appeared in: International Journal of Human-Computer Studies (1994) 40, 544 -472 Adaptively supported Adaptability Summary: in...

453

E-Print Network 3.0 - adaptive control based Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

-4. These methods include intelligent control, neural control, adaptive fuzzy control, memory-based control... , knowledge- based control, adaptive nonlinear control, and...

454

E-Print Network 3.0 - adaptive channel estimation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the inter-channel... method, our adaptive method achieves a smaller variance for each eigen channel, and the shorter adaptive... period achieves higher ... Source: Kuo, C.-C....

455

Multigrid elliptic equation solver with adaptive mesh refinement  

E-Print Network [OSTI]

In this paper we describe in detail the computational algorithm used by our parallel multigrid elliptic equation solver with adaptive mesh refinement. Our code uses truncation error estimates to adaptively refine the grid as part of the solution process. The presentation includes a discussion of the orders of accuracy that we use for prolongation and restriction operators to ensure second order accurate results and to minimize computational work. Code tests are presented that confirm the overall second order accuracy and demonstrate the savings in computational resources provided by adaptive mesh refinement.

J. David Brown; Lisa L. Lowe

2005-03-22T23:59:59.000Z

456

Adaptive filters for detection of gravitational waves from coalescing binaries  

SciTech Connect (OSTI)

In this work we propose use of infinite impulse response adaptive line enhancer (IIR ALE) filters for detection of gravitational waves from coalescing binaries. We extend our previous work and define an adaptive matched filter structure. Filter performance is analyzed in terms of the tracking capability and determination of filter parameters. Furthermore, following the Neyman-Pearson strategy, receiver operating characteristics are derived, with closedform expressions for detection threshold, false alarm, and detection probability. Extensive tests demonstrate the effectiveness of adaptive filters both in terms of small computational cost and robustness.

Eleuteri, Antonio; Milano, Leopoldo; De Rosa, Rosario; Garufi, Fabio; Acernese, Fausto; Barone, Fabrizio; Giordano, Lara; Pardi, Silvio [Dip. di Scienze Fisiche, Universita di Napoli 'Federico II', via Cintia, I-80126 Naples (Italy) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy); Dip. di Scienze Farmaceutiche, Universita di Salerno, via Ponte Don Melillo, 84084 Fisciano (Saudi Arabia) (IT) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy); Dip. di Matematica ed Applicazioni, Universita di Napoli 'Federico II', via Cintia, I-80126 Naples (Italy) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy)

2006-06-15T23:59:59.000Z

457

TESTING THE APODIZED PUPIL LYOT CORONAGRAPH ON THE LABORATORY FOR ADAPTIVE OPTICS EXTREME ADAPTIVE OPTICS TESTBED  

SciTech Connect (OSTI)

We present testbed results of the Apodized Pupil Lyot Coronagraph (APLC) at the Laboratory for Adaptive Optics (LAO). These results are part of the validation and tests of the coronagraph and of the Extreme Adaptive Optics (ExAO) for the Gemini Planet Imager (GPI). The apodizer component is manufactured with a halftone technique using black chrome microdots on glass. Testing this APLC (like any other coronagraph) requires extremely good wavefront correction, which is obtained to the 1 nm rms level using the microelectricalmechanical systems (MEMS) technology, on the ExAO visible testbed of the LAO at the University of Santa Cruz. We used an APLC coronagraph without central obstruction, both with a reference super-polished flat mirror and with the MEMS to obtain one of the first images of a dark zone in a coronagraphic image with classical adaptive optics using a MEMS deformable mirror (without involving dark hole algorithms). This was done as a complementary test to the GPI coronagraph testbed at American Museum of Natural History, which studied the coronagraph itself without wavefront correction. Because we needed a full aperture, the coronagraph design is very different from the GPI design. We also tested a coronagraph with central obstruction similar to that of GPI. We investigated the performance of the APLC coronagraph and more particularly the effect of the apodizer profile accuracy on the contrast. Finally, we compared the resulting contrast to predictions made with a wavefront propagation model of the testbed to understand the effects of phase and amplitude errors on the final contrast.

Thomas, Sandrine J.; Dillon, Daren; Gavel, Donald [Laboratory for Adaptive Optics, University of California/Lick Observatories, University of California Santa Cruz, 1156 High Street, Santa Cruz, CA 95064 (United States); Soummer, Remi [Space Telescope Science Institute, 3700 San Martin Drive, Baltimore, MD 21218 (United States); Macintosh, Bruce [Lawrence Livermore National Laboratory, 7000 East Ave., Livermore, CA 94550 (United States); Sivaramakrishnan, Anand, E-mail: sthomas@ucolick.org, E-mail: dillon@ucolick.org, E-mail: gavel@ucolick.org, E-mail: soummer@stsci.edu, E-mail: macintosh1@mail.llnl.gov, E-mail: anand@amnh.org [Department of Astrophysics, American Museum of Natural History, 79th Street at Central Park West, New York, NY 10024 (United States)

2011-10-15T23:59:59.000Z

458

Adaptive Nodal Transport Methods for Reactor Transient Analysis  

SciTech Connect (OSTI)

Develop methods for adaptively treating the angular, spatial, and time dependence of the neutron flux in reactor transient analysis. These methods were demonstrated in the DOE transport nodal code VARIANT and the US NRC spatial kinetics code, PARCS.

Thomas Downar; E. Lewis

2005-08-31T23:59:59.000Z

459

Designing adaptable housing : the specific case of INFONAVIT  

E-Print Network [OSTI]

The traditional way of designing housing of the Mexican government agencies, obliges the population they serve (mostly working class people), to live in rigid dwellings that have little or no flexibility to be adapted to ...

Martin, Andrea M

1981-01-01T23:59:59.000Z

460

The mesh adaptive direct search algorithm with treed Gaussian ...  

E-Print Network [OSTI]

May 24, 2013 ... Keywords: Blackbox optimization, treed Gaussian processes (TGP), mesh adaptive ...... We first consider a chemical engineering simulator for styrene production described ..... Application of MATLAB and Python optimizers.

Gramacy and Le Digabel

2013-05-24T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Adaptive tool selection strategies for drilling in flexible manufacturing systems  

E-Print Network [OSTI]

The thesis presents an approach to adaptive decision making strategies to reduce bottlenecks in a drilling operation and to extend tool life. It is an attempt to portray the real drilling system in a typical Flexible Manufacturing System (FMS...

Chander, Karthik Balachandran

2004-09-30T23:59:59.000Z

462

Parallel Solutions of Partial Differential Equations with Adaptive Multigrid Methods  

E-Print Network [OSTI]

Parallel Solutions of Partial Differential Equations with Adaptive Multigrid Methods results for the solution of partial differential equations based on the software platform UG. State/coarsening, robust parallel multigrid methods, various dis cretizations, dynamic load balancing, mapping and grid

Wieners, Christian

463

Democratic Republic of Congo-National Adaptation Plan Global...  

Open Energy Info (EERE)

that the NAP could build on Vision 2035 and that the NAP-GSP could help identify political entry-points for long term adaptation planning through Vision 2015. DRC are keen for...

464

Error estimation and adaptive mesh refinement for aerodynamic flows  

E-Print Network [OSTI]

Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann1 and Paul Houston2 1 Institute of Aerodynamics and Flow Technology DLR (German Aerospace Center) Lilienthalplatz 7

Hartmann, Ralf

465

adaptive notch filters: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 12;1 Introduction Filter bank theory 1 is by now a mature topic Reilly, James P. 133 ANALYSIS OF THE ADAPTIVE MATCHED FILTER ALGORITHM FOR CASES WITH...

466

adaptive filtering system: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 12;1 Introduction Filter bank theory 1 is by now a mature topic Reilly, James P. 51 Study on Adaptive Kalman Filtering Algorithms in Human Movement Tracking...

467

adaptive notch filter: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 12;1 Introduction Filter bank theory 1 is by now a mature topic Reilly, James P. 133 ANALYSIS OF THE ADAPTIVE MATCHED FILTER ALGORITHM FOR CASES WITH...

468

adaptive smoothing filter: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 12;1 Introduction Filter bank theory 1 is by now a mature topic Reilly, James P. 162 ANALYSIS OF THE ADAPTIVE MATCHED FILTER ALGORITHM FOR CASES WITH...

469

adaptive large neighborhood: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

1 12;1 Introduction Filter bank theory 1 is by now a mature topic Reilly, James P. 136 First Light Adaptive Optics System for Large Binocular Telescope S....

470

Adaptive control of hypersonic vehicles in presence of actuation uncertainties  

E-Print Network [OSTI]

The thesis develops a new class of adaptive controllers that guarantee global stability in presence of actuation uncertainties. Actuation uncertainties culminate to linear plants with a partially known input matrix B. ...

Somanath, Amith

2010-01-01T23:59:59.000Z

471

The effects of age and awareness on prism adaptation  

E-Print Network [OSTI]

Neglect patients show a lack of awareness of both the prismatic displacement induced during prism adaptation and of the negative aftereffect they display afterwards. They also show significantly larger aftereffects than ...

Roach, Louise

2007-01-01T23:59:59.000Z

472

Adaptive load control of microgrids with non-dispatchable generation  

E-Print Network [OSTI]

Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

Brokish, Kevin Martin

2009-01-01T23:59:59.000Z

473

Speech coding using spline wavelet and adaptive backward prediction  

E-Print Network [OSTI]

effort seems to be lacking in the application of using semi-orthogonal wavelets to speech coding, especially in real-time mode. In this thesis, the application of splinewavelets incorporating adaptive backward prediction to speech coding is investigated...

Zeng, Jingdong

1994-01-01T23:59:59.000Z

474

adaptation physiological: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

cues predictive of favorable food availability and climate serve Saltzman, Wendy 10 Bennett, A. F. 1997. Adaptation and the evolution of physiological characters,pp. 3-16. In:...

475

Adaptive properties of stochastic memristor networks: a computational study  

E-Print Network [OSTI]

., Berzina, T., Erokhin, V., Fontana, M.P. 2008. Polymeric electrochemical element for adaptive networks-scale configurations. Using this simulation platform we have shown that memristor networks stimulated with random noise

476

UNCORRECTED 2 Stochastic adaptive control model for traffic signal systems  

E-Print Network [OSTI]

UNCORRECTED PROOF 1 2 Stochastic adaptive control model for traffic signal systems 3 X.-H. Yu a,1 , W.W. Recker b,* 4 a Department of Electrical Engineering, California Polytechnic State University

Detwiler, Russell

477

ADAPTIVE MODELLING IN THE DESIGN OF INTERACTIVE DEVICES  

E-Print Network [OSTI]

of the device. But now consider the problem of adapting the design of a waterwheel to harness wind energy the scope of any process of tweaking the values of the variables characterising the waterwheel. The history

Prabhakar, Sattiraju

478

adapte au petit: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences Websites Summary: par l'extrait suivant : Human-induced climate change is real and beyond. So, given the necessity to adapt to the impacts of these climate...

479

adapted phi29 motor: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: Coordinated Adaptive Robust Contour Tracking of Linear-Motor-Driven Tables in Task Space 1 Li Xu: byao@ecn.purdue.edu Abstract In order to improve the overall contouring...

480

Directed Evolution Study of Temperature Adaptation in a Psychrophilic Enzyme  

E-Print Network [OSTI]

important insights into the molecular basis of pro- tein adaptation. Based on studies of this kind, a number, circular dichroism; HEPPS, N-2-hydroxyethylpiperazine-NH -3-propane sulfonic acid; StEP, staggered

Arnold, Frances H.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

adaptive extended phenotype: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 PERSPECTIVE Climate change, adaptation, and phenotypic plasticity Environmental Sciences and Ecology Websites...

482

Grid adaptation for functional outputs of compressible flow simulations  

E-Print Network [OSTI]

An error correction and grid adaptive method is presented for improving the accuracy of functional outputs of compressible flow simulations. The procedure is based on an adjoint formulation in which the estimated error in ...

Venditti, David Anthony, 1973-

2002-01-01T23:59:59.000Z

483

Towards verifiable adaptive control for safety critical applications  

E-Print Network [OSTI]

To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to ...

Schwager, Mac

2005-01-01T23:59:59.000Z

484

Adaptive Gaussian Predictive Process Approximation Surya T Tokdar  

E-Print Network [OSTI]

exploration of Gaussian process models, including Bayesian treatments. For theoreti- cal details on commonAdaptive Gaussian Predictive Process Approximation Surya T Tokdar Duke University Abstract We address the issue of knots selection for Gaussian predictive process methodology. Predictive process

West, Mike

485

Run-time optimization of adaptive irregular applications  

E-Print Network [OSTI]

adaptive irregular applications for parallel execution, a common observation is that the effectiveness of the optimizing transformations depends on programs' input data and their dynamic phases. This dissertation presents a set of run-time optimization...

Yu, Hao

2004-11-15T23:59:59.000Z

486

The digestive adaptation of flying vertebrates: High intestinal paracellular absorption  

E-Print Network [OSTI]

The digestive adaptation of flying vertebrates: High intestinal paracellular absorption compensates analysis. Significantly greater amplification of digestive surface area by villi in small birds, also in actively flying vertebrates. digestion gut morphometrics nutrient absorption paracellular uptake Birds have

Mladenoff, David

487

Unsteady adjoint analysis for output sensitivity and mesh adaptation  

E-Print Network [OSTI]

Adjoint analysis in computational fluid dynamics (CFD) has been applied to design optimization and mesh adaptation, but due to the relative expense of unsteady analysis these applications have predominantly been for steady ...

Krakos, Joshua Ambre

2012-01-01T23:59:59.000Z

488

adaptive tree code: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

9 A fast tree-based method for estimating column densities in Adaptive Mesh Refinement codes Influence of UV radiation field on the structure of molecular clouds CERN Preprints...

489

Identifying Recent Adaptations in Large-Scale Genomic Data  

E-Print Network [OSTI]

Although several hundred regions of the human genome harbor signals of positive natural selection, few of the relevant adaptive traits and variants have been elucidated. Using full-genome sequence variation from the 1000 ...

Andersen, KristianG.

490

adaptive speckle imaging: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a fast readout mode to take short exposures of stellar images corrected by adaptive optics at the ground-based UCOLick Observatory, with integration times of 5 ms and a time...

491

AN ADAPTIVE SAMPLING APPROACH TO INCOMPRESSIBLE PARTICLE-BASED FLUID  

E-Print Network [OSTI]

I propose a particle-based technique for simulating incompressible uid that includes adaptive re nement of particle sampling. Each particle represents a mass of uid in its local region. Particles are split into several particles for ner sampling...

Hong, Woo-Suck

2010-01-16T23:59:59.000Z

492

Adaptive Distributed Parameter and Input Estimation in Plasma Tokamak Heat  

E-Print Network [OSTI]

. Keywords: Thermonuclear fusion, distributed parameter systems, input state and parameter estimation, adaptive infinite-dimensional estimation, Galerkin method 1. INTRODUCTION In a controlled thermonuclear fusion reactor, the plasma thermal diffusivity and heating energy play an important role

Boyer, Edmond

493

Hypermutation and adaptation of experimentally evolved marine Vibrio bacteria  

E-Print Network [OSTI]

Environmental bacteria display tremendous genetic diversity, but we are still learning how this diversity arises and relates to their wide range of habitats. Investigating how bacteria adapt helps us understand their ...

Clarke, Sean Aidan

2013-01-01T23:59:59.000Z

494

Nonlinear Adaptive Control for Bioreactors with Unknown Kinetics  

E-Print Network [OSTI]

, unknown kinetics, wastewater treatment. 1 Introduction Biological processes have become widely used on a real life wastewater treatment plant. Key words: Nonlinear adaptive control, continuous bioprocesses a pollutant (wastewater treatment...). There- fore, bioreactors require advanced regulation procedures

Bernard, Olivier

495

From reconfigurable architectures to self-adaptive autonomic systems  

E-Print Network [OSTI]

Systems on a chip (SoC) can draw various benefits such as adaptability and efficient acceleration of compute-intensive tasks from the inclusion of reconfigurable hardware as a system component. Dynamic reconfiguration ...

Santambrogio, Marco Domenico

496

Lymphatic Functional Adaptations to Prolonged Changes in Mechanical Stimuli  

E-Print Network [OSTI]

). The adaptive responses first reported in the present work, are thus consistent with an accepted understanding of interstitial volume regulation (4). 3.1.3b. Strengths of the experimental model The difficulty in studying adaptation of blood vessels..., one end of a fluid-filled tube (Tygon R3603, Saint- Gobain Performance Plastic, Garden Grove, CA) was inserted through the wall of the vein while the other end was brought outside of the animal. Exteriorized intestine and mesentery were...

Nguyen, Tam L

2013-03-21T23:59:59.000Z

497

Preparing Cities for Climate Change: An International Comparative Assessment of Urban Adaptation Planning. MIT-ICLEI Climate Adaptation Survey Instrument  

E-Print Network [OSTI]

The research objective of this project is to conduct an international comparative assessment of urban adaptation planning. Cities throughout the world are experiencing chronic problems and extreme events that are being ...

Carmin, JoAnn

2014-09-14T23:59:59.000Z

498

Operator-adapted finite element wavelets : theory and applications to a posteriori error estimation and adaptive computational modeling  

E-Print Network [OSTI]

We propose a simple and unified approach for a posteriori error estimation and adaptive mesh refinement in finite element analysis using multiresolution signal processing principles. Given a sequence of nested discretizations ...

Sudarshan, Raghunathan, 1978-

2005-01-01T23:59:59.000Z

499

E-Print Network 3.0 - adaptive optics systems Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptive optics systems...

500

E-Print Network 3.0 - adaptive optics system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

system Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptive optics system...