Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Adaptive Authentication Has Unspecified Remote 6: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw August 18, 2011 - 3:09pm Addthis PROBLEM: A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. reference LINKS: Security Tracker: 1025956

2

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticate...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A vulnerability was reported in RSA Adaptive Authentication. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3, 6.0.2.1 SP2 and SP2 Patch 1, 6.0.2.1 SP3 ABSTRACT: An issue with...

3

V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Adaptive Authentication (On-Premise) Input Validation 4: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks November 27, 2012 - 2:00am Addthis PROBLEM: RSA Adaptive Authentication (On-Premise) Input Validation Flaws Permit Cross-Site Scripting Attacks PLATFORM: RSA Adaptive Authentication (On-Premise) 6.x ABSTRACT: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). REFERENCE LINKS: SecurityTracker Alert ID: 1027811 SecurityFocus Security Alert RSA Customer Support CVE-2012-4611 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in RSA Adaptive Authentication (On-Premise). A remote user can conduct cross-site scripting attacks. The software does not

4

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

5

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA Authentication Agent Lets Remote Users Bypass 3: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was reported in RSA Authentication Agent. REFERENCE LINKS: RSA SecurCare SecurityTracker Alert ID: 1028230 CVE-2013-0931 IMPACT ASSESSMENT: Medium DISCUSSION: On systems configured for Quick PIN Unlock, the system will request a PIN instead of a full Passcode when the session is activated from an active screensaver after the Quick PIN Unlock timeout has expired. RSA Authentication Agent on Windows Vista, Windows 7, Windows 2008, and

6

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

7

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SNMP, and HTTP plug-in proxy passwords. SOLUTION: The vendor has issued a fix (8.0 Patch 1 (P1)). Addthis Related Articles V-195: RSA Authentication Manager Lets Local Users...

8

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

95: RSA Authentication Manager Lets Local Users View the 95: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password July 9, 2013 - 12:51am Addthis PROBLEM: RSA Authentication Manager Lets Local Users View the Administrative Account Password PLATFORM: RSA Authentication Manager 7.1, 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1028742 CVE-2013-3273 RSA IMPACT ASSESSMENT: Medium DISCUSSION: When the RSA Authentication Manager Software Development Kit (SDK) is used to develop a custom application that connects with RSA Authentication Manager and the trace logging is set to verbose, the administrative account password used by the custom application is written in clear text to trace

9

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, 4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files June 10, 2013 - 12:47am Addthis PROBLEM: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A vulnerability was reported in RSA Authentication Manager. REFERENCE LINKS: RSA SecurityTracker Alert ID: 1028638 CVE-2013-0947 IMPACT ASSESSMENT: Medium DISCUSSION: The system may write operating system, SNMP, and HTTP plug-in proxy passwords in clear text to log and configuration files. IMPACT: A local user can obtain operating system, SNMP, and HTTP plug-in proxy

10

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA Authentication Manager Flaws Permit Cross-Site and 2: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other versions may also be affected. ABSTRACT: RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

11

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

NLE Websites -- All DOE Office Websites (Extended Search)

3: RSA Authentication Agent for PAM Allows Remote Users to Make 3: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts V-223: RSA Authentication Agent for PAM Allows Remote Users to Make Unlimited Login Attempts August 21, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA Authentication Agent for PAM PLATFORM: RSA Authentication Agent for PAM 7.0.2 and prior ABSTRACT: A remote user can make unlimited login attempts REFERENCE LINKS: Security Tracker Alert ID 1028930 CVE-2013-3271 IMPACT ASSESSMENT: Medium DISCUSSION: The system does not restrict the number of login attempts made via the agent IMPACT: System Access SOLUTION: Vendor has issued a fix Addthis Related Articles U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability

12

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

704: RSA enVision Lets Remote Users View Files and Remote 704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

13

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: RSA enVision Lets Remote Users View Files and Remote 4: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password August 29, 2011 - 3:45am Addthis PROBLEM: Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT: RSA enVision lets remote users view files and remote authenticated users obtain password. reference LINKS: SecurityTracker Alert ID: 1025979 CVE-2011-2736 CVE-2011-2737 RSA enVision Product Security IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA enVision. A remote user can view files on the target system. A remote authenticated user can obtain

14

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

can view the administrative account password SOLUTION: The vendor has issued a fix (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0...

15

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

actions on the site acting as the target user. Solution: The vendor has issued a fix (Patch 14 (P14) for RSA Authentication Manager 7.1 SP4 and Appliance 3.0 SP4). Addthis...

16

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network (OSTI)

. Related concepts to deniable authentication are plausible deniability and prevention of surreptitious

17

Deniable Authentication with RSA and Multicasting Daniel R. L. Brown  

E-Print Network (OSTI)

of surreptitious forwarding. The IETF S/MIME protocol, which can be used to secure email, includes an Authenticated

18

T-659: Update support for RSA Authentication Manager | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Manager July 1, 2011 - 7:15am Addthis PROBLEM: Authentication Manager SP4 Patch 4 Windows Server 2008 PLATFORM: Windows Server 2008 SP4 Patch 4 32bit & 64bit...

19

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

20

T-582: RSA systems has resulted in certain information being extracted from  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA systems has resulted in certain information being 2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely sophisticated cyber attack in progress, targeting their RSA business unit. RSA took a variety of aggressive measures against the threat to protect their business and their customers, including further hardening of their IT infrastructure. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agent Discloses Node Secret Encryption Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5...

22

T-642: RSA SecurID update to Customers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: RSA SecurID update to Customers 2: RSA SecurID update to Customers T-642: RSA SecurID update to Customers June 9, 2011 - 12:45am Addthis PROBLEM: Certain characteristics of the attack on RSA indicated that the perpetrator's most likely motive was to obtain an element of security information that could be used to target defense secrets and related IP, rather than financial gain, PII, or public embarrassment. PLATFORM: RSA SecurID implementations ABSTRACT: RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. reference LINKS: Open Letter to RSA Customers (update) CVE-2011-0322 RSA Fraud Resource Center RSA Security Practice DOE-CIRC T-640: RSA Access Manager Server CVE-2011-0322 Update

23

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

24

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

25

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA® Authentication Agent 7.1 for Microsoft Windows® and 7: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability September 25, 2012 - 6:00am Addthis PROBLEM: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft Windows version 7.1 Platforms: Windows XP and Windows 2003 Product: RSA Authentication Client 3.5 Platforms: Windows XP and Windows 2003 ABSTRACT: RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662

26

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network (OSTI)

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

27

Using Two-Factor RSA Token  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Two-Factor RSA Token Using Two-Factor RSA Token with VPN User Guide November 2013 Using Your RSA token with WebVPN 1. Establish a connection to the Internet and connect to https://connect.doe.gov 2. Users who are using their RSA Token for the first time should follow the steps below for PIN creation. Others who have already set up their PIN and used their RSA token previously should enter their six digit numeric username and passcode; this is the PIN + the RSA token code. The result of this successful login will be Step 8 below. 3. A login page similar to the picture below will be displayed. Enter your VPN Username (six-digit numeric ID) and your Password by typing your generated RSA Token code and then click the Login button. Example; your generated RSA token code is 032848 (from above). In the Password box, you will enter

28

T-582: RSA systems has resulted in certain information being...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

certain information being extracted from RSA systems that relates to RSA SecurID March 17, 2011 - 11:45pm Addthis PROBLEM: Recently EMC's security systems identified an extremely...

29

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

30

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA Access Manager Server CVE-2011-0322 Update 0: RSA Access Manager Server CVE-2011-0322 Update T-640: RSA Access Manager Server CVE-2011-0322 Update June 7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server. PLATFORM: RSA Access Manager Server version 5.5.x, 6.0.x, and 6.1.x ABSTRACT: RSA strongly recommends that all customers running RSA Access Manager Server versions 5.5.3, 6.0.4, and 6.1 apply the following updated security hot fixes, which contain the resolution to this issue, at the earliest opportunity. The hot fixes can be downloaded from SecurCare Online or by contacting RSA Security Customer Support. ?Security Hot fix # 5.5.3.174 for RSA Access Manager Server version 5.5.3

31

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network (OSTI)

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

32

U-090: RSA enVision Discloses Environment Variable Information...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and enVision V4.0 Service Pack 4 Patch 5. Impact: Exposure of sensitive information...

33

Two-Factor Authentication  

Energy.gov (U.S. Department of Energy (DOE))

Two-Factor Authentication (2FA) is a system wherein two different methods are used to authenticate an individual. 2FA is based on something you know (a secret PIN) and something you have (an...

34

Robust video authentication system over internet protocol  

Science Journals Connector (OSTI)

This paper presents a video authentication system over internet protocol that is insusceptible to illumination and expression variations. The illumination and expression invariant features are extracted using multi-band feature extraction. These features are classified by a radial basis function neural network. A new adaptive decision fusion method is proposed to combine the scores from different modalities and the different frames during the authentication process. Three levels of decision fusion are carried out in the proposed adaptive decision fusion. Depending on the level of decision fusion, the level of illumination influence is taken into account during the decision making.

Sue Inn Ch'ng; Kah Phooi Seng; Li-Minn Ang; Fong Tien Ong; Yee Wan Wong

2011-01-01T23:59:59.000Z

35

Multi-factor authentication  

DOE Patents (OSTI)

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

36

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

37

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network (OSTI)

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

38

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network (OSTI)

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

39

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: RSA SecurID Software Token for Windows DLL Loading Error 3: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

40

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: RSA SecurID Software Token for Windows DLL Loading Error 63: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code December 16, 2011 - 8:00am Addthis PROBLEM: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code. PLATFORM: RSA SecurID Software Token 4.1 for Microsoft Windows ABSTRACT: A remote user can cause the target application to execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026426 ESA-2011-039 Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA SecurID Software Token. A remote user

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA SecurID Software Token Converter Unspecified Buffer 0: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability U-120: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability March 8, 2012 - 7:00am Addthis PROBLEM: RSA SecurID Software Token Converter Unspecified Buffer Overflow Vulnerability PLATFORM: RSA SecurID Software Token Converter 2.x ABSTRACT: Successful exploitation may allow execution of arbitrary code. reference LINKS: Secunia Advisory SA48297 CVE-2012-0397 IMPACT ASSESSMENT: High Discussion: A vulnerability has been reported in RSA SecurID Software Token Converter, which can be exploited by malicious people to compromise a user's system. Impact: An unspecified error can be exploited to cause a buffer overflow. Solution: Update to version 2.6.1. Addthis Related Articles

42

Authentication of quantum messages.  

SciTech Connect

Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

Barnum, Howard; Crpeau, Jean-Claude; Gottesman, D. (Daniel); Smith, A. (Adam); Tapp, Alan

2001-01-01T23:59:59.000Z

43

QKD Quantum Channel Authentication  

E-Print Network (OSTI)

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

44

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: EMC RSA Archer GRC Open Redirection Weakness and Security 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing attacks REFERENCE LINKS: Secunia Advisory SA54717 SecurityTracker Alert ID 1028971 EMC Identifier: ESA-2013-057 CVE-2013-3276 CVE-2013-3277 IMPACT ASSESSMENT: Medium DISCUSSION: 1) The application does not properly restrict deactivated users. This can be exploited by deactivated users to login and gain access to otherwise

45

U-090: RSA enVision Discloses Environment Variable Information to Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: RSA enVision Discloses Environment Variable Information to 0: RSA enVision Discloses Environment Variable Information to Remote Users U-090: RSA enVision Discloses Environment Variable Information to Remote Users January 27, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in RSA enVision PLATFORM: Version(s): 4.0 prior to 4.0 SP4 P5, 4.1 prior to 4.1 P3 ABSTRACT: A remote user can view potentially sensitive data on the target system. reference LINKS: CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain environment variables containing web system setup information via the web interface. Further information about this resolution and other fixes can be found in the Release Notes associated with RSA enVision 4.1, Patch 3 and

46

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network (OSTI)

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

47

Key recycling in authentication  

E-Print Network (OSTI)

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2012-02-06T23:59:59.000Z

48

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: RSA Access Manager Session Replay Flaw Lets Remote Users 5: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

49

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

205: RSA Access Manager Session Replay Flaw Lets Remote Users 205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System July 5, 2012 - 7:02am Addthis PROBLEM: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System PLATFORM: Version(s): Server version 6.0.x, 6.1, 6.1 SP1, 6.1 SP2, 6.1 SP3; all Agent versions ABSTRACT: A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. reference LINKS: SecurityFocus ESA-2012-026 SecurityTracker Alert ID: 1027220 CVE-2012-2281 RSA SecurCare Online MPACT ASSESSMENT: Medium Discussion: RSA Access Manager contains a vulnerability that can be potentially exploited by a malicious user to replay the session with compromised session tokens. This is due to improper invalidation of session tokens

50

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain 84: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks February 5, 2013 - 12:01am Addthis PROBLEM: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks PLATFORM: RSA Archer SmartSuite Framework version 4.x RSA Archer GRC version 5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: Security Alert: ESA-2013-002 SecurityTracker Alert ID: 1028073 CVE-2012-1064 CVE-2012-2292 CVE-2012-2293 CVE-2012-2294 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can cause arbitrary scripting code to be executed by the target user's browser [CVE-2012-1064]. The code will originate from the

51

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL  

NLE Websites -- All DOE Office Websites (Extended Search)

259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic 259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code PLATFORM: RSA BSAFE SSL-C prior to 2.8.6 ABSTRACT: RSA BSAFE SSL-C Multiple Vulnerabilities reference LINKS: Secunia Advisory SA50601 SecurityTracker Alert ID: 1027514 SecurityTracker Alert ID: 1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can

52

CERTIFICATE OF AUTHENTICITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair Michael G. Mueller presiding. ATTENDEES: MIKE MUELLER, Arneren Energy Fuels & Services Company, Chair RICH EIMER, Dynegy Inc., Vice-Chair ROBERT BECK, National Coal Council, Executive Vice-President SY ALI, Clean Energy Consulting BARB ALTIZER, Eastern Coal Council

53

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can...

54

Using Semantics for Automating the Authentication of Web APIs  

E-Print Network (OSTI)

Abstract. Recent technology developments in the area of services on the Web are marked by the proliferation of Web applications and APIs. The implementation and evolution of applications based on Web APIs is, however, hampered by the lack of automation that can be achieved with current technologies. Research on semantic Web services is therefore trying to adapt the principles and technologies that were devised for traditional Web services, to deal with this new kind of services. In this paper we show that currently more than 80 % of the Web APIs require some form of authentication. Therefore authentication plays a major role for Web API invocation and should not be neglected in the context of mashups and composite data applications. We present a thorough analysis carried out over a body of publicly available APIs that determines the most commonly used authentication approaches. In the light of these results, we propose an ontology for the semantic annotation of Web API authentication information and demonstrate how it can be used to create semantic Web API descriptions. We evaluate the applicability of our approach by providing a prototypical implementation, which uses authentication annotations as the basis for automated service invocation. 1

Maria Maleshkova; Carlos Pedrinaci; John Domingue; Guillermo Alvaro; Ivan Martinez

55

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network (OSTI)

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

56

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol  

E-Print Network (OSTI)

An Efficient Abuse-Free Fair Contract-Signing Protocol Based on RSA Signature and -protocol Xi in this paper. The proposed protocol is not only fair and optimistic, but also efficient and abuse the Internet. In such scenario, fairness is critical, because they may be potentially mistrusted. That is

57

Research Student Handbook www.leeds.ac.uk/rsa/handbooks.html  

E-Print Network (OSTI)

that the information contained in this Handbook is accurate it does not accept liability for any inaccuraciesResearch Student Handbook 2011-2012 www.leeds.ac.uk/rsa/handbooks.html This Handbook should be read;Research Student Handbook 2011-2012 Important This Handbook was published in August 2011. Whilst

Haase, Markus

58

User Authentication Policy | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Eureka / Gadzooks Eureka / Gadzooks Policies Pullback Policy ALCF Acknowledgment Policy Account Sponsorship & Retention Policy Accounts Policy Data Policy INCITE Quarterly Report Policy Job Scheduling Policy on BG/P Job Scheduling Policy on BG/Q Refund Policy Software Policy User Authentication Policy Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] User Authentication Policy Users of the Argonne production systems are required to use a CRYPTOCard one time password, multifactor authentication system. This document explains the policies users must follow regarding CRYPTOCard tokens for accessing the Argonne resources. MultiFactor Authentication "Authentication systems are frequently described by the authentication

59

Obfuscated authentication systems, devices, and methods  

DOE Patents (OSTI)

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

60

CERTIFICATE OF AUTHENTICITY | Department of Energy  

Energy Savers (EERE)

D.C. Tran001.pdf CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

A DAWP Technique for Audio Authentication  

Science Journals Connector (OSTI)

Digital audio content protection is part of information security for audio authentication and audio integrity evaluation. Watermarking is widely used in copyright protection. However, watermark requires a thir...

Tung-Shou Chen; Jeanne Chen; Jiun-Lin Tang; Keshou Wu

2011-01-01T23:59:59.000Z

62

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network (OSTI)

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

63

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

64

Instructions for using HSPD-12 Authenticated Outlook Web Access...  

Energy Savers (EERE)

Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

65

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

66

AUTHENTICATED  

NLE Websites -- All DOE Office Websites (Extended Search)

2. AMENDMENT OF AGREEMENT BPA and Port Townsend amend the Agreement as follows: (a) The following Section 2.24 ("Wheel Turning Load") shall be added to the Agreement: "2.24...

67

E-Print Network 3.0 - archeological gold authentication Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

't do. Tests and quizzes aren't the gold standard either. - Fixed-choice test questions tend... by authentic use & authentic assessment. 12;Authentic performance...

68

Hardware device binding and mutual authentication  

DOE Patents (OSTI)

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

69

The application of hyperspectral image techniques on MODIS data for the detection of oil spills in the RSA1  

E-Print Network (OSTI)

The application of hyperspectral image techniques on MODIS data for the detection of oil spills Oceanography Centre, Empress Dock, Southampton, S014 3ZH, UK ABSTRACT Oil spills pose a serious threat to the sensitive marine ecosystem of the RSA. The study aims to detect and identify oil spills using remote sensing

Quartly, Graham

70

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents (OSTI)

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

71

T-646: Debian fex authentication bypass | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Debian fex authentication bypass 6: Debian fex authentication bypass T-646: Debian fex authentication bypass June 14, 2011 - 3:45pm Addthis PROBLEM: The vulnerability is caused due to the application not properly verifying the existence of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the service properly validates existing authentication IDs, an attacker who is not specifying any authentication ID at all, can bypass the authentication procedure. reference LINKS: DSA-2259-1 fex Secunia Advisory SA44940 Debian Security Advisory DSA-2259-1 fex-20110610.tar Vulnerability Report: Debian GNU/Linux 6.0

72

A service-oriented architecture for authentication and authorization  

E-Print Network (OSTI)

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

73

CLOC: Authenticated Encryption for Short Input Tetsu Iwata1  

E-Print Network (OSTI)

. CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

74

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network (OSTI)

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

75

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network (OSTI)

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

76

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network (OSTI)

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

77

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network (OSTI)

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

78

A generic mechanism for efficient authentication in B3G networks  

Science Journals Connector (OSTI)

A user in Beyond 3rd Generation (B3G) networks in order to get access to the network services must perform a multi-pass authentication procedure, which includes two or three sequential authentications steps. These multiple authentication steps include ... Keywords: Authentication performance, B3G networks, B3G security, Multi-pass authentication, Security binding

Christoforos Ntantogian, Christos Xenakis, Ioannis Stavrakakis

2010-06-01T23:59:59.000Z

79

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

80

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Factor Factor RSA Tokens with Citrix Workplace Environment (CWE) Revision 1.13 December, 2009 Associate CIO for Operations (IM) United States Department of Energy DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment Using Your RSA Token with Citrix Note: If you access Citrix Workplace from within the DOE network (DOEnet or VPN) then you do not need an RSA Two-Factor token. The Citrix Workplace logon screen will prompt you only for your Windows User name and Password. Step 1 - Establish a connection to the Internet and connect to https://workplace.doe.gov. Step 2 - Click "OK" to bypass the Government warning banner. DOE HQ OCIO Application Hosting Environment Instructions for Using RSA Token with Citrix Workplace Environment

82

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

83

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges. IMPACT: A remote authenticated user can...

84

U-268: Oracle Database Authentication Protocol Discloses Session...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the authentication protocol at the time of this entry. Please visit the Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin for additional information when it...

85

Dos and don'ts of client authentication on the web  

Science Journals Connector (OSTI)

Client authentication has been a continuous source of problems on the Web. Although many well-studied techniques exist for authentication, Web sites continue to use extremely weak authentication schemes, especially in non-enterprise environments such ...

Kevin Fu; Emil Sit; Kendra Smith; Nick Feamster

2001-08-01T23:59:59.000Z

86

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network (OSTI)

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

87

Secure password-based authenticated key exchange for web services  

Science Journals Connector (OSTI)

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based ... Keywords: authenticated key exchange, password, security, web services

Liang Fang; Samuel Meder; Olivier Chevassut; Frank Siebenlist

2004-10-01T23:59:59.000Z

88

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network (OSTI)

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

89

Challenges and architectural approaches for authenticating mobile users  

Science Journals Connector (OSTI)

This paper casts an architectural eye at existing work on security and privacy in mobile computing. Specifically, it focuses on authentication as it leads up to access control from two points of view: servicer providers granting access to users, and ... Keywords: access control, anonymity, authentication, mobile computing, trust, ubiquitous computing, user mobility

Joo Pedro Sousa

2008-05-01T23:59:59.000Z

90

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

91

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

92

2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization,Authentication, Authorization,  

E-Print Network (OSTI)

23-1 ©2011 Raj JainCSE571SWashington University in St. Louis Authentication, Authorization://www.cse.wustl.edu/~jain/cse571-11/ #12;23-2 ©2011 Raj JainCSE571SWashington University in St. Louis OverviewOverview RADIUS 802.1X #12;23-3 ©2011 Raj JainCSE571SWashington University in St. Louis RADIUSRADIUS Remote

Jain, Raj

93

Citrix_2FA_Authentication_09.09 | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

More Documents & Publications Microsoft Word - Citrix2FAAuthentication1232009.doc Using Two-Factor RSA Token with WebVPN Microsoft Word - SMailSecureWeb-BasedEmailv3 2...

94

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

95

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: EMC Smarts Network Configuration Manager Database 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. REFERENCE LINKS: EMC Identifier: ESA-2012-057 Secunia Advisory SA51408 SecurityTracker Alert ID: 1027812 CVE-2012-4614 CVE-2012-4615 IMPACT ASSESSMENT: Medium DISCUSSION: The systems uses a hard-coded key to encrypt authentication credentials on the target system [CVE-2012-4615]. A local user with knowledge of the key

96

Secure password-based authenticated key exchange for web services  

SciTech Connect

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

97

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

98

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network (OSTI)

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

99

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

Science Journals Connector (OSTI)

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot be satisfied by this scheme. ...

Depeng Li; Zeyar Aung; John R. Williams; Abel Sanchez

2012-01-01T23:59:59.000Z

100

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

LDAP Authentication Bug Lets Remote Users Bypass Authentication U-185: OpenLDAP May Ignore TLSCipherSuite Setting in Some Cases T-535: Oracle Critical Patch Update - January 2011...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks  

E-Print Network (OSTI)

PAAS: A Privacy-Preserving Attribute-based Authentication System for eHealth Networks Linke Guo PAAS which leverages users' verifiable attributes to authenticate users in eHealth systems while

Latchman, Haniph A.

102

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network (OSTI)

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

103

Quantum-Secure Authentication with a Classical Key  

E-Print Network (OSTI)

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

104

Current Projects: Product Authenticity Tags - Vulnerability Assessment Team  

NLE Websites -- All DOE Office Websites (Extended Search)

Product Authenticity Tags Product Authenticity Tags VAT Projects Introducing the VAT Adversarial Vulnerability Assessments Safety Tags & Product Counterfeiting Election Security Spoofing GPS Defeating Existing Tamper-Indicating Seals Specialty Field Tools & Sampling Tools Insider Threat Mitigation Drug Testing Security Microprocessor Prototypes The Journal of Physical Security Vulnerability Assessments Vulnerability Assessments Insanely Fast µProcessor Shop Insanely Fast µProcessor Shop Seals About Seals Applications of Seals Common Myths about Tamper Indicating Seals Definitions Findings and Lessons Learned New Seals Types of Seals Seals References Selected VAT Papers Selected VAT Papers Selected Invited Talks Self-Assessment Survey Security Maxims Devil's Dictionary of Security Terms Argonne's VAT (brochure)

105

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 19, 2011 August 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 16, 2011 T-694: IBM Tivoli Federated Identity Manager Products Multiple

106

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

19, 2011 19, 2011 T-697: Google Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Attackers can exploit these issues to execute arbitrary code in the context of the browser or cause denial-of-service conditions; other attacks may also be possible. August 18, 2011 T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets

107

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

108

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

109

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

110

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network (OSTI)

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

111

Robust RFID Authentication Protocol with Formal Proof and Its Feasibility  

E-Print Network (OSTI)

security models compatible with formal security analysis tools. We show that an RFID authentication, such as by letting us reference the price, origin and circulation route of specic goods. On the other hand-in-the-middle adversary and communication fault. We dene model and security proofs via a game-based approach makes our

112

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network (OSTI)

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

113

Final report for the mobile node authentication LDRD project.  

SciTech Connect

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

114

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network (OSTI)

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

115

Secure Password-Based Authenticated Key Exchange for Web Services  

E-Print Network (OSTI)

sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

116

SP 800-38B. Recommendation for Block Cipher Modes of Operation: the CMAC Mode for Authentication  

Science Journals Connector (OSTI)

This Recommendation specifies a message authentication code (MAC) algorithm based on a symmetric key block cipher. This block cipher-based MAC algorithm, called CMAC, may be used to provide assurance of the authenticity and, hence, the integrity of binary ... Keywords: Authentication, block cipher, cryptography, information security, integrity, message authentication code, mode of operation.

Morris J. Dworkin

2005-05-01T23:59:59.000Z

117

Hardware device to physical structure binding and authentication  

DOE Patents (OSTI)

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

118

Improving the security of quantum direct communication with authentication  

E-Print Network (OSTI)

Two protocols of quantum direct communication with authentication [Phys. Rev. A {\\bf 73}, 042305 (2006)] are recently proposed by Lee, Lim and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message of communication. The first protocol can be eavesdropped by Trent using the the intercept-measure-resend attack, while the second protocol can be eavesdropped by Trent using single-qubit measurement. To fix these leaks, I revise the original versions of the protocols by using the Pauli-Z operation $\\sigma_z$ instead of the original bit-flip operation $X$. As a consequence, the protocol securities are improved.

Zhan-jun Zhang

2006-04-18T23:59:59.000Z

119

Simultaneous Authentication and Certification of Arms-Control Measurement Systems  

SciTech Connect

Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

120

Authenticated group Diffie-Hellman key exchange: theory and practice  

SciTech Connect

Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

Chevassut, Olivier

2002-10-03T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-057: eXtplorer "ext_find_user()" Authentication Bypass V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug.

122

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

123

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

124

U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apache CXF Lets Remote Authenticated Users Execute 6: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions U-266: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions September 24, 2012 - 6:00am Addthis PROBLEM: Apache CXF Lets Remote Authenticated Users Execute Unauthorized SOAP Actions PLATFORM: This vulnerability affects all released versions of Apache CXF. ABSTRACT: A vulnerability was reported in Apache CXF reference LINKS: SecurityTracker Alert ID: 1027554 Apache CXF Security Advisories Apache CXF Advisory - CVE-2012-3451 CVE-2012-3451 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache CXF. A remote authenticated user can execute unauthorized commands on the target web service. Impact: A remote authenticated user can execute potentially unauthorized actions on

125

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct 5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks May 14, 2013 - 12:08am Addthis PROBLEM: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat SecurityTracker Alert ID: 1028534 CVE-2013-2067 IMPACT ASSESSMENT: High DISCUSSION: A remote user can repeatedly send a specially crafted request for a resource requiring authentication while the target user is completing the login form to cause the FORM authentication process to execute the remote user's request with the privileges of the target user.

126

E-Print Network 3.0 - authentic cost calculations Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

cost calculations Search Powered by Explorit Topic List Advanced Search Sample search results for: authentic cost calculations Page: << < 1 2 3 4 5 > >> 1 A Lightweight...

127

E-Print Network 3.0 - authentications algorithms based Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

functionality based... . 2.1 Authentication systems and techniques ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

128

E-Print Network 3.0 - authenticated key agreement Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

for authentication and managing and secret-key based proce... . An ... Source: Brunato, Mauro - Dipartimento di Ingegneria e Scienza dell'Informazione, Universit di Trento...

129

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network (OSTI)

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

130

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents (OSTI)

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

131

A mutual authentication and key establishment scheme for heterogeneous sensor networks supporting nodes mobility  

Science Journals Connector (OSTI)

In the last two decades, wireless sensor networks (WSNs) have greatly attracted the attention of the research community because their flexibility, adaptability and self-organising properties make them a technology solution suitable for diverse application scenarios ranging from home and industrial automation to military surveillance. Since these networks consist of resource constrained devices and can be deployed in remote and unattended areas, supporting security could represent a challenging task especially if mobility scenarios are taken into consideration. In this context, key management facilitates the adoption of cryptography techniques to support secure data communication and to protect the resource constrained devices from various security attacks. This paper specifically focuses on mobile heterogeneous wireless sensor networks consisting of mobile sensor nodes with few fixed sensor nodes and presents a mutual authentication and key management scheme suitable for the considered scenario. Analytical and OMNET++ simulation results show that the proposed scheme provides better network connectivity, consumes less memory, has better network resilience against attacks and introduces lower communication overhead compared to state-of-the-art solutions.

Sarmad Ullah Khan; Claudio Pastrone; Luciano Lavagno; Maurizio A. Spirito

2012-01-01T23:59:59.000Z

132

Adaptation Plan  

E-Print Network (OSTI)

Environment ? Natural Environment ? People FIVE STRATEGIES Copyright 2011, City of Chicago ADAPTATION ESL-KT-11-11-16 9 CCAP Adaptation Evolution 2007 2008 2009 2010 ? Understood the climate science: Assess climate impacts ? Assessed economic... E xi st in g Tr un k Existing on Rogers Rogers Ave CIP Stormwater management: Chicago?s comprehensive sewer model Climate impacts Example actions to prepare the built environment Copyright 2011, City of Chicago ESL-KT-11-11-16 13 CCAP...

Durnbaugh, A.

2011-01-01T23:59:59.000Z

133

Authentication of medicinal plant material by DNA fingerprinting  

Science Journals Connector (OSTI)

Based on their positive therapeutic results, herbal medicines are gaining popularity worldwide for human wellbeing and healthcare. Unfortunately, one major hurdle that might impair their potential future as 'medicine of choice' is the lack of standardisation. Many scientific studies on adulteration of herbal medicines have demonstrated that health consequences of adulterants may vary from life threatening to death. Fortunately, the breakthrough in genetic analysis and identification promise herbal medicines challenging era. Genetics permit the capacity to police adulterants to protect patients and public from dangerous fraud. This article highlights useful analytical techniques that can be employed to analyse DNA for quality assurance, control and authentication of medicinal plant species.

Sundus Tewfik

2008-01-01T23:59:59.000Z

134

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network (OSTI)

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

135

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network (OSTI)

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

136

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network (OSTI)

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

137

End-to-end aggregate authentication of time-series data  

Science Journals Connector (OSTI)

We consider the problem of providing integrity of aggregate result in the presence of an untrusted data aggregator who may introduce errors into data fusion, causing the final aggregate result to far deviate from the true result determined by participating ... Keywords: aggregate authentication, computation over authenticated data, time-series

Di Ma; Yan Zhu; Mengyang Yu

2013-05-01T23:59:59.000Z

138

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, ... Keywords: Authentication, Confidentiality, Key exchange, Security, WLAN

Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan

2007-08-01T23:59:59.000Z

139

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network (OSTI)

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

140

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS  

E-Print Network (OSTI)

AUDIO FORENSIC AUTHENTICATION BASED ON MOCC BETWEEN ENF AND REFERENCE SIGNALS Zhisheng Lv1 of Warwick, Coventry CV4 7AL, UK ABSTRACT This paper proposes a new audio authenticity detection algorithm Frequency) signal and the reference signal. We first extract the ENF signal from a query audio signal

Li, Chang-Tsun

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

94: IBM solidDB Password Hash Authentication Bypass 94: IBM solidDB Password Hash Authentication Bypass Vulnerability T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability April 4, 2011 - 6:08am Addthis PROBLEM: A vulnerability has been reported in IBM solidDB, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: IBM solidDB 4.x - IBM solidDB 6.x ABSTRACT: This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability. REFERENCE LINKS: IBM Security Alert Secunia Advisory: SA44030 ZDI Advisory: ZDI-11-115 IBM solidDB Support IMPACT ASSESSMENT: Medium Discussion: The specific flaw exists within the solid.exe process which listens by default on TCP ports 1315, 1964 and 2315. The authentication protocol

142

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

143

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache VCL Input Validation Flaw Lets Remote Authenticated 0: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges May 7, 2013 - 12:01am Addthis PROBLEM: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Apache VCL Versions: 2.1, 2.2, 2.2.1, 2.3, 2.3.1 ABSTRACT: A vulnerability was reported in Apache VCL. REFERENCE LINKS: Apache Securelist SecurityTracker Alert ID: 1028515 CVE-2013-0267 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated administrative user with minimal administrative privileges (i.e., nodeAdmin, manageGroup, resourceGrant, or userGrant) can send specially crafted data via the web interface or XMLRPC API to gain additional administrative privileges.

144

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

145

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

146

A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment  

E-Print Network (OSTI)

In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

Ruckmani, V

2010-01-01T23:59:59.000Z

147

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

148

INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7/2013 Page 1 7/2013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. HSPD-12 OWA REQUIREMENTS:  An EITS provided Exchange email account  A DOE issued HSPD-12 badge  DOEnet or Internet access and a supported web browser  A smart card reader installed* on your computer (*Windows Vista, Windows XP, MAC OS X 10.7 & 10.8, will also require smart card software to be installed in order to read the HSPD-12 badge) HSPD-12 OWA LOGIN PROCEDURE: 1. Insert HSPD-12 badge into card reader

149

Adaptive sampler  

DOE Patents (OSTI)

An adaptive data compression device for compressing data having variable frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, Bobby L. (Idaho Falls, ID); Aeby, Ian (Fremont, CA)

1982-01-01T23:59:59.000Z

150

Adaptive sampler  

DOE Patents (OSTI)

An adaptive data compression device for compressing data is described. The device has a frequency content, including a plurality of digital filters for analyzing the content of the data over a plurality of frequency regions, a memory, and a control logic circuit for generating a variable rate memory clock corresponding to the analyzed frequency content of the data in the frequency region and for clocking the data into the memory in response to the variable rate memory clock.

Watson, B.L.; Aeby, I.

1980-08-26T23:59:59.000Z

151

V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP-UX Directory Server Discloses Passwords to Remote 6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May 29, 2013 - 12:32am Addthis PROBLEM: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users PLATFORM: Directory Server B.08.10.04 ABSTRACT: Two vulnerabilities were reported in HP-UX Directory Server. REFERENCE LINKS: HP Document ID: c03772083 SecurityTracker Alert ID: 1028593 CVE-2012-2678 CVE-2012-2746 IMPACT ASSESSMENT: High DISCUSSION: A local user can access the plaintext password in certain cases [CVE-2012-2678]. A remote authenticated user can can view the password for a target LDAP user when audit logging is enabled by reading the audit log [CVE-2012-2678].

152

U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

54: Webmin Flaws Let Remote Authenticated Users Execute 54: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files September 10, 2012 - 6:00am Addthis PROBLEM: Webmin Multiple Input Validation Vulnerabilities PLATFORM: The vulnerabilities are reported in version 1.580. Other versions may also be affected. ABSTRACT: An authenticated attacker may be able to execute arbitrary commands. reference LINKS: Webmin Security Alerts Bugtraq ID: 55446 Secunia Advisory SA50512 SecurityTracker Alert ID: 1027507 US CERT Vulnerability Note VU#788478 CVE-2012-2981 CVE-2012-2982 CVE-2012-2983 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities have been reported in Webmin, which can be exploited by malicious users to compromise a vulnerable system and by

153

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: HP Virtual Server Environment Lets Remote Authenticated 8: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges April 22, 2011 - 7:47am Addthis PROBLEM: A vulnerability was reported in HP Virtual Server Environment. A remote authenticated user can obtain elevated privileges on the target system. PLATFORM: HP Virtual Server Environment prior to v6.3 ABSTRACT: A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges. reference LINKS: HP Document ID: c02749050 SecurityTracker Alert ID: 1025429 CVE-2011-1724 HP Insight Software media set 6.3 HP Technical Knowledge Base Discussion: System management and security procedures must be reviewed frequently to

154

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: MediaWiki CentralAuth Extension Authentication Bypass 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for MediaWik REFERENCE LINKS: Secunia Advisory SA54723 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauth_User" cookie. IMPACT:

155

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network (OSTI)

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

156

Integrating an Efficient Authorization Protocol with Trigon-Based Authentication Mechanism for Improving Grid Security  

Science Journals Connector (OSTI)

Security is a vital part of an integrated grid application in which heterogeneous services and resources ... dynamically. Authentication and authorization are the major security concerns in grid environment. Most...

V. Ruckmani; G. Sudha Sadasivam

2010-01-01T23:59:59.000Z

157

Determination of 5-hydroxymethylfurfural after Winkler and by the HPLC method for authentication of honey  

Science Journals Connector (OSTI)

The quality and authenticity of commercially available honey from Slovak market and the development of HPLC method for determination of hydroxymethylfurfural (HMF) content of honey with fine separation efficie...

K. Kukurova; J. Karovi?ov; G. Greif; Z. Kohajdov; J. Lehkoivov

2006-06-01T23:59:59.000Z

158

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network (OSTI)

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

159

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

160

T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker Alert ID:1025190 Secunia Advisory:SA43331 OpenLDAP Issue OpenLDAP Download CVE-2011-1025 IMPACT ASSESSMENT: Medium Discussion: A remote user with knowledge of the target distinguished name can provide an arbitrary password to successfully authenticate on systems using the NDB back-end. Impact: Some vulnerabilities have been reported in OpenLDAP, which can be exploited

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: eXtplorer "ext_find_user()" Authentication Bypass 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA51636 eXtplorer 2.1.3 Security Release IMPACT ASSESSMENT: Medium DISCUSSION: eXtplorer was notified of a problem within the authentication system of eXtplorer Versions 2.1.2, 2.1.1, 2.1.0 and 2.1.0RC5 that have been found to be vulnerable to an authentication bypass bug. IMPACT: An error within the "ext_find_user()" function in users.php can be

162

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medium Impact Medium Impact Assessment Bulletins JC3 Medium Impact Assessment Bulletins RSS December 4, 2012 V-039: Samsung and Dell printers Firmware Backdoor Unauthorized Access Vulnerability Samsung has issued a security advisory and an optional firmware update for all current Samsung networked laser printers and multifunction devices to enhance Simple Network Management Protocol (SNMP) security. November 30, 2012 V-037: Wireshark Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Wireshark. November 29, 2012 V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. November 27, 2012 V-034: RSA Adaptive Authentication (On-Premise) Input Validation Flaws

163

Scatter secure code authentication for efficient reprogramming in wireless sensor networks  

Science Journals Connector (OSTI)

Currently proposed solutions to secure code dissemination in wireless sensor networks (WSNs) involve the use of expensive public-key digital signatures. In this work, we present Scatter, a secure code dissemination protocol that enables sensor nodes to authenticate the program image efficiently. To achieve this, we use a scheme that offers source authentication in the group setting like a public-key signature scheme, but with signature and verification times much closer to those of a MAC (message authentication code). In this way, Scatter avoids the use of elliptic curve cryptography and manages to surpass all previous attempts for secure code dissemination in terms of energy consumption, memory and time efficiency. Besides the design and theoretical analysis of the protocol, we also report the experimental evaluation of Scatter in two different hardware platforms, Mica2 and MicaZ, which proves its efficiency in practice.

Ioannis Krontiris; Tassos Dimitriou

2011-01-01T23:59:59.000Z

164

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network (OSTI)

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

165

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

166

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44: McAfee Email Gateway Lets Remote Users Bypass Authentication 44: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

167

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: McAfee Email Gateway Lets Remote Users Bypass Authentication 4: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks August 27, 2012 - 7:00am Addthis PROBLEM: McAfee Email Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks PLATFORM: McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6 and earlier ABSTRACT: Several vulnerabilities were reported in McAfee Email Gateway. reference LINKS: McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444

168

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato  

Science Journals Connector (OSTI)

Multielemental Fingerprinting as a Tool for Authentication of Organic Wheat, Barley, Faba Bean, and Potato ... Potato peels were also manually removed by a ceramic peeler on selected subsamples to allow comparison with automatically peeled potatoes. ... Analysis of automatically and manually peeled potatoes as well as potato peels confirmed that the automatic peeling process did not induce any systematic and significant contamination. ...

Kristian H. Laursen; Jan K. Schjoerring; Jrgen E. Olesen; Margrethe Askegaard; Ulrich Halekoh; Sren Husted

2011-03-21T23:59:59.000Z

169

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network (OSTI)

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

170

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network (OSTI)

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

171

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network (OSTI)

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

172

Biometric authentication system using reduced joint feature vector of iris and face  

Science Journals Connector (OSTI)

In this paper, we present the biometric authentication system based on the fusion of two user-friendly biometric modalities: Iris and Face. Using one biometric feature can lead to good results, but there is no reliable way to verify the classification. ...

Byungjun Son; Yillbyung Lee

2005-07-01T23:59:59.000Z

173

Distillation Codes and Applications to DoS Resistant Multicast Authentication  

E-Print Network (OSTI)

Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

Perrig, Adrian

174

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks  

E-Print Network (OSTI)

Sciences Temple University Philadelphia, PA 19122 Email: jiewu@temple.edu Abstract--Message authentication by the degree of the polynomial: when the number of messages transmitted is larger than this threshold allows any node to transmit an unlimited number of messages without suffering the threshold problem

Wu, Jie

175

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2  

E-Print Network (OSTI)

Hardware Acceleration of the SRP Authentication Protocol Peter Groen1,2 , Panu H¨am¨al¨ainen2 , Ben employed is the Secure Remote Password (SRP) authenti- cation protocol [15]. It makes extensive use of hash that can be called from soft- ware routines in the SRP protocol. This paper is structured as follows

Kuzmanov, Georgi

176

Integration of IEEE 802.21 services and pre-authentication framework  

Science Journals Connector (OSTI)

Providing multi-interface device users the ability to roam between different access networks is becoming a key requirement for service providers. The availability of multiple mobile broadband access technologies together with increasing use of real ... Keywords: IEEE 80221, MIH, MPA, authentication, handover performance, heterogeneous networks, media-independent handover, media-independent pre-, multi-interface devices, seamless mobility, testbed

Miriam Tauil; Ashutosh Dutta; Yuu-Heng Cheng; Subir Das; Donald Baker; Maya Yajnik; David Famolari; Yoshihiro Ohba; Kenichi Taniuchi; Victor Fajardo; Henning Schulzrinne

2010-07-01T23:59:59.000Z

177

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network (OSTI)

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

178

Generalized Adaptive A* Xiaoxun Sun  

E-Print Network (OSTI)

Generalized Adaptive A* Xiaoxun Sun USC Computer Science Los Angeles, California xiaoxuns spaces changes. Adaptive A* [7] is a Cite as: Generalized Adaptive A*, Xiaoxun Sun, Sven Koenig

Yeoh, William

179

The genomics of adaptation  

Science Journals Connector (OSTI)

...introduction Special feature 1001 70 197 198 The genomics of adaptation Jacek Radwan 1 * Wieslaw...One contribution to a Special Feature Genomics of adaptation. The amount and nature...aspects of the broad field of adaptation genomics. This introductory article sets up a...

2012-01-01T23:59:59.000Z

180

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO. 9, SEPTEMBER 2006 2569 Mutual Authentication and Key Exchange Protocols  

E-Print Network (OSTI)

compromise and service abuse, etc. Several authentication Manuscript received February 3, 2005; revised May}@bbcr.uwaterloo.ca). Digital Object Identifier 10.1109/TWC.2006.05063. Internet B's home network, home agent (H) Fixed Internet

Shen, Xuemin "Sherman"

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonzalez Nieto  

E-Print Network (OSTI)

ID-based One-pass Authenticated Key Establishment M. Choudary Gorantla Colin Boyd Juan Manuel Gonz, Brisbane, QLD 4001, Australia. Email: mc.gorantla@isi.qut.edu.au, {c.boyd

Boyd, Colin

182

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 22680 of 26,764 results. 71 - 22680 of 26,764 results. Article Small Wind Electric Systems Small wind electric systems are one of the most cost-effective home-based renewable energy systems -- with zero emissions and pollution. http://energy.gov/energysaver/articles/small-wind-electric-systems Article T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products http://energy.gov/cio/articles/t-642-rsa-securid-update-customers Article T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain

183

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

184

Enhancing security of electronic health records through grid-based user authentication scheme  

Science Journals Connector (OSTI)

Medical research and electronic health record (EHR) maintenance involves large databases that are geographically distributed which calls naturally for a grid computing environment. Huge data in medical image analysis, storage and genome processing demand large medical data storage and computing power. Data sharing, software specialisation and data processing which occur in a heterogeneous way tend to make use of the grid computing environment for the medical field. The security solution for authentication in the existing grid environment is non-scalable. This major drawback can hinder the growth of the user community in the medical field. A simple user authentication scheme is proposed, which enhances the security of the overall system but takes less time for execution and lesser communication cost.

G. Jaspher Willsie Kathrine; E. Kirubakaran; Elijah Blessing Rajsingh

2014-01-01T23:59:59.000Z

185

Comparative studies on authentication and key exchange methods for 802.11 wireless LAN  

Science Journals Connector (OSTI)

IEEE 802.11 wireless LAN has become one of the hot topics on the design and development of network access technologies. In particular, its authentication and key exchange (AKE) aspects, which form a vital building block for modern security mechanisms, deserve further investigation. In this paper we first identify the general requirements used for WLAN authentication and key exchange (AKE) methods, and then classify them into three levels (mandatory, recommended, and additional operational requirements). We present a review of issues and proposed solutions for AKE in 802.11 WLANs. Three types of existing methods for addressing AKE issues are identified, namely, the legacy, layered and access control-based AKE methods. Then, we compare these methods against the identified requirements. Based on the analysis, a multi-layer AKE framework is proposed, together with a set of design guidelines, which aims at a flexible, extensible and efficient security as well as easy deployment.

Jun Lei; Xiaoming Fu; Dieter Hogrefe; Jianrong Tan

2007-01-01T23:59:59.000Z

186

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network (OSTI)

the proper context for authenticity will be to clarify those existential structures that describe what it means for Dasein to exist concretely in the world. Since Heidegger provides a fairly comprehensive account of the ontological constitution... the ontological and the ontic, and the existential and the existentiell. As a result, the traditional notions of selfhood and subjectivity get split between this new landscape of categories and subsequently lose their meaning. As Francois Raffoul points out...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

187

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

188

Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication  

SciTech Connect

During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

Karpius, Peter J [Los Alamos National Laboratory; Williams, Richard B [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

189

Adaptive Video Retrieval  

E-Print Network (OSTI)

Hopfgartner,F. Villa,R. Urban,J. Jose,J.M. Proceedings of the First International Workshop on Adaptive Information Retrieval pp 28-29

Hopfgartner, F.

190

Leak test adapter for containers  

DOE Patents (OSTI)

An adapter is provided for facilitating the charging of containers and leak testing penetration areas. The adapter comprises an adapter body and stem which are secured to the container's penetration areas. The container is then pressurized with a tracer gas. Manipulating the adapter stem installs a penetration plug allowing the adapter to be removed and the penetration to be leak tested with a mass spectrometer. Additionally, a method is provided for using the adapter.

Hallett, Brian H. (Elizabeth, PA); Hartley, Michael S. (Canonsburg, PA)

1996-01-01T23:59:59.000Z

191

BIODIVERSITY Incorporating sociocultural adaptive  

E-Print Network (OSTI)

BIODIVERSITY VIEWPOINT Incorporating sociocultural adaptive capacity in conservation hotspot of biodiversity threats. Conservation biogeography (Whittaker et al., 2005) has emerged as a critical area biodiversity (Mawdsley et al., 2009). Adjusting conservation strategies to maintain diversity in recognition

192

Adaptive Street Lighting Controls  

Energy.gov (U.S. Department of Energy (DOE))

This two-partDOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of...

193

Adaptability and human genetics.  

Science Journals Connector (OSTI)

...parts of the system follow logically...desiccating winds, and extreme solar radiation...inclusive population system, is a major...Chung, 1966). Hybrid studies are...with population systems, dynamic population...adaptive traits. Hybrid individuals...

W S Laughlin

1968-01-01T23:59:59.000Z

194

Dynamic Adaptation using Xen  

SciTech Connect

The topic of virtualization has received renewed attention. Xen is a popular open source type-I hypervisor. The Xen hypervisor currently has limited capabilities for runtime modification to the core hypervisor, which impairs research into dynamic adaptation for system-level virtualization. This paper discusses recent investigations into the feasibility of extending Xen to support runtime adaptation for core hypervisor service, e.g., scheduler.

Naughton, III, Thomas J [ORNL; Vallee, Geoffroy R [ORNL; Scott, Stephen L [ORNL

2007-01-01T23:59:59.000Z

195

Adaptation and risk management  

SciTech Connect

Adaptation assessment methods are compatible with the international risk management standard ISO:31000. Risk management approaches are increasingly being recommended for adaptation assessments at both national and local levels. Two orientations to assessments can commonly be identified: top-down and bottom-up, and prescriptive and diagnostic. Combinations of these orientations favor different types of assessments. The choice of orientation can be related to uncertainties in prediction and taking action, in the type of adaptation and in the degree of system stress. Adopting multiple viewpoints is to be encouraged, especially in complex situations. The bulk of current guidance material is consistent with top-down and predictive approaches, thus is most suitable for risk scoping and identification. Abroad range ofmaterial fromwithin and beyond the climate change literature can be used to select methods to be used in assessing and implementing adaptation. The framing of risk, correct formulation of the questions being investigated and assessment methodology are critical aspects of the scoping phase. Only when these issues have been addressed should be issue of specific methods and tools be addressed. The reorientation of adaptation from an assessment focused solely on anthropogenic climate change to broader issues of vulnerability/resilience, sustainable development and disaster risk, especially through a risk management framework, can draw from existing policy and management understanding in communities, professions and agencies, incorporating existing agendas, knowledge, risks, and issues they already face.

Preston, Benjamin L [ORNL

2011-01-01T23:59:59.000Z

196

Poster sessions as an authentic assessment approach in an open-Ended University general chemistry laboratory  

Science Journals Connector (OSTI)

The purpose of this study is to explore the views of Pre-service Science Teachers (PSTs) on their posters as an authentic assessment tool in an open-ended chemistry laboratory course. Forty-three \\{PSTs\\} set up their research questions, designed and performed laboratory investigations, obtained results of their experiments and prepared their posters as an alternative to traditional laboratory reports. They engaged in the process of assessment in the course as both self and peer evaluators. At the end of each laboratory session, each group of the \\{PSTs\\} presented posters of their laboratory investigations to their peers and instructors. Results of the PSTs interview analyses indicated that most \\{PSTs\\} expressed many benefits to the presentation of laboratory investigations using posters in comparison to the traditional laboratory reports.

Alev Do?an; Osman Naf?z Kaya

2009-01-01T23:59:59.000Z

197

EER of fixed and trainable fusion classifiers: A theoretical study with application to biometric authentication tasks  

E-Print Network (OSTI)

Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 256 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules.

Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

198

EER of Fixed and Trainable Fusion Classifiers: A Theoretical Study with Application to Biometric Authentication Tasks  

E-Print Network (OSTI)

submitted for publication Abstract. Biometric authentication is a process of verifying an identity claim using a persons behavioural and physiological characteristics. Due to the vulnerability of the system to environmental noise and variation caused by the user, fusion of several biometric-enabled systems is identified as a promising solution. In the literature, various fixed rules (e.g. min, max, median, mean) and trainable classifiers (e.g. linear combination of scores or weighted sum) are used to combine the scores of several base-systems. How exactly do correlation and imbalance nature of base-system performance affect the fixed rules and trainable classifiers? We study these joint aspects using the commonly used error measurement in biometric authentication, namely Equal Error Rate (EER). Similar to several previous studies in the literature, the central assumption used here is that the class-dependent scores of a biometric system are approximately normally distributed. However, different from them, the novelty of this study is to make a direct link between the EER measure and the fusion schemes mentioned. Both synthetic and real experiments (with as many as 512 fusion experiments carried out on the XM2VTS benchmark score-level fusion data sets) verify our proposed theoretical modeling of EER of the two families of combination scheme. In particular, it is found that weighted sum can provide the best generalisation performance when its weights are estimated correctly. It also has the additional advantage that score normalisation prior to fusion is not needed, contrary to the rest of fixed fusion rules. 2 IDIAPRR 05-01 1

Norman Poh A; Samy Bengio A; Norman Poh; Samy Bengio

2005-01-01T23:59:59.000Z

199

Climate Change Adaptation Planning  

E-Print Network (OSTI)

of Colorado Law School #12;What is Climate Change Adaptation? "Adjustment in natural or human systems: Vulnerability and Risk Assessments - Current Example - Golden Eagles on the Colorado Plateau Current impact: Golden eagle populations have been declining in portions of the western U.S. Source: BLM Colorado Plateau

Neff, Jason

200

Adaptive sequential controller  

DOE Patents (OSTI)

An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Climate Change Adaptation | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Climate Change Adaptation Climate Change Adaptation Mission The Climate Change Adaptation (CCA) team affirms the overall DOE commitment to plan for and manage the short and...

202

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS  

E-Print Network (OSTI)

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU \\Lambda Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

203

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS  

E-Print Network (OSTI)

ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

204

Adaptation of Microvasculature to Pulsatility  

E-Print Network (OSTI)

adaptation has not yet been fully characterized. In fact, standard mathematical models using the common assumption that vessels solely adapt to steady flow do not reproduce normal vascular structure. Therefore, we developed a simple, mathematical model of a...

Bimal, Tia

2013-09-24T23:59:59.000Z

205

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, A.J. Stell, D. Martin, G. Stewart  

E-Print Network (OSTI)

Federated Authentication & Authorisation for e-Science J. Watt, R.O. Sinnott, J. Jiang, T. Doherty, UK j.watt@nesc.gla.ac.uk Abstract The Grid and Web service community are defining a range of stan

Glasgow, University of

206

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

was reported in RSA Authentication Manager. July 8, 2013 V-194: Citrix XenServer Memory Management Error Lets Local Administrative Users on the Guest Gain Access on the Host...

207

Adaptive control for energy conservation  

SciTech Connect

The objective of this project is to investigate the use of adaptive control concepts in buildings with solar-assisted heating, ventilating, and air-conditioning (HVAC) systems to maintain occupant comfort conditions while minimizing auxiliary energy use. Accomplishing this objective requires an energy management system capable of making sound tradeoffs. Optimal control theory is used along with a system identification technique to provide an adaptable stratgy. The resulting overall approach is known as adaptive optimal control (AOC).

Farris, D.R.

1980-03-01T23:59:59.000Z

208

Timing Attacks on software implementation of RSA  

E-Print Network (OSTI)

the amount of time required to perform private key operations (Decryptions etc.). Timing attacks are related to a class of attacks called side-channel attacks. Others include power analysis and attacks based decryption times are masked by many concurrent processes running on the system. It is also believed

209

Adaptive capacity and its assessment  

SciTech Connect

This paper reviews the concept of adaptive capacity and various approaches to assessing it, particularly with respect to climate variability and change. I find that adaptive capacity is a relatively under-researched topic within the sustainability science and global change communities, particularly since it is uniquely positioned to improve linkages between vulnerability and resilience research. I identify opportunities for advancing the measurement and characterization of adaptive capacity by combining insights from both vulnerability and resilience frameworks, and I suggest several assessment approaches for possible future development that draw from both frameworks and focus on analyzing the governance, institutions, and management that have helped foster adaptive capacity in light of recent climatic events.

Engle, Nathan L.

2011-04-20T23:59:59.000Z

210

BRIDGING NAVIGATION, SEARCH AND ADAPTATION. Adaptive Hypermedia Models Evolution  

E-Print Network (OSTI)

Corpus, Dexter Model, AHAM, GAF. Abstract: Adaptive Hypermedia Systems (AHS) have long been concentrating The most referenced (but certainly not only) Adaptive Hypermedia (AH) model dates back to 1999. Since AHAM/Hypermedia modelling from Dexter Model through AHAM to the proposed GAF model, out- line advantages of each framework

De Bra, Paul

211

Personalized video adaptation framework (PIAF): high-level semantic adaptation  

Science Journals Connector (OSTI)

Despite much work on Universal Multimedia Experience (UME), existing video adaptation approaches cannot yet be considered as truly user-centric, mostly due to their poor handling of semantic user preferences. Indeed, these works mainly concentrate on ... Keywords: MPEG-21, MPEG-7, Personalized video, Semantic adaptation, Semantic constraint, Universal multimedia experience

Vanessa El-Khoury, David Coquil, Nadia Bennani, Lionel Brunie

2014-05-01T23:59:59.000Z

212

Adaptive Medical Information Delivery Combining User, Task and Situation Models  

E-Print Network (OSTI)

., in their model for adaptive hypermedia AHAM [2], distinguish content­adaptation from link­ adaptation

213

Introduction Adaptive LBM Realistic computations Conclusions A block-structured parallel adaptive Lattice-Boltzmann  

E-Print Network (OSTI)

Lattice-Boltzmann method for rotating geometries Ralf Deiterding & Stephen Wood+ Deutsches Zentrum f Conclusions Outline Introduction AMROC software Adaptive LBM Lattice Boltzmann method Structured adaptive mesh Introduction AMROC software Adaptive LBM Lattice Boltzmann method Structured adaptive mesh refinement

Deiterding, Ralf

214

Adaptation, Learning, and Optimization over  

E-Print Network (OSTI)

Adaptation, Learning, and Optimization over Networks Ali H. Sayed University of California at Los 2014 A. H. Sayed DOI: 10.1561/2200000051 Adaptation, Learning, and Optimization over Networks Ali H . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.6 Notation and Symbols . . . . . . . . . . . . . . . . . . . . 8 2 Optimization by Single Agents

California at Los Angeles, University of

215

Organizational Adaptation Kathleen M. Carley  

E-Print Network (OSTI)

-humans. For example, they suggest that organizational learning resides not just in the minds of the personnel withinOrganizational Adaptation Kathleen M. Carley Dept. of Social and Decision Sciences Carnegie Mellon: Kathleen M. Carley, 1998, "Organizational Adaptation." Annals of Operations Research. 75: 25-47. #12

Sadeh, Norman M.

216

African Adaptation Programme | Open Energy Information  

Open Energy Info (EERE)

Adaptation Programme Adaptation Programme Jump to: navigation, search Logo: African Adaptations Programme Name African Adaptations Programme Agency/Company /Organization United Nations Development Programme, Government of Japan Topics Adaptation, Finance, Implementation, Policies/deployment programs Website http://www.undp-adaptation.org References AAP[1] Overview "UNDP, with funding from the Government of Japan, recently launched a new programme that uses an innovative approach to climate change adaptation in Africa. Under this programme, UNDP will assist 21 African countries in implementing integrated and comprehensive adaptation actions and resilience plans. The projects will ensure that national development processes incorporate climate change risks and opportunities to secure development gains under a

217

Adaptive Materials Inc | Open Energy Information  

Open Energy Info (EERE)

Michigan Zip: MI 48108 Product: Adaptive Materials Inc (AMI) is a developer of portable fuel cell technology. References: Adaptive Materials Inc1 This article is a stub. You...

218

Energy Efficiency Limits of Load Adaptive Networks  

Science Journals Connector (OSTI)

Based on traffic models the energy consumption of adaptive networks is compared to networks with constant power consumption. The results show that adaptive network resource...

Lange, Christoph; Gladisch, Andreas

219

Authenticity of the Traditional Cypriot Spirit Zivania on the Basis of Metal Content Using a Combination of Coupled Plasma Spectroscopy and Statistical Analysis  

Science Journals Connector (OSTI)

Porous Solids Group, Department of Chemistry, University of Cyprus, P.O. ... In various publications, 1H and 13C NMR, as well as 2H SNIF (site natural isotopic fractionation) NMR, are mentioned as the most applicable methodologies to characterize the geographic origin and authenticity of wine products and are considered to be powerful tools for the authentication of beverages (11?13). ... Gas chromatography on a chiral stationary phase coupled with selected ion monitoring mass spectrometry was used to examine the presence of amino acid enantiomers (d-Aas) in different beers and vinegar (16). ...

Rebecca Kokkinofta; Panos V. Petrakis; Thomas Mavromoustakos; Charis R. Theocharis

2003-09-16T23:59:59.000Z

220

WeADAPT | Open Energy Information  

Open Energy Info (EERE)

WeADAPT WeADAPT Jump to: navigation, search Name WeADAPT Agency/Company /Organization weADAPT Sector Energy, Land, Water, Climate Resource Type Training materials, Lessons learned/best practices Website http://www.weadapt.org/ References weADAPT[1] "weADAPT.org is an online 'open space' on climate adaptation issues (including the synergies between adaptation and mitigation) which allows practitioners, researchers and policy makers to access credible, high quality information and to share experiences and lessons learnt with the weADAPT community. It is designed to facilitate learning, exchange, collaboration and knowledge integration to build a professional community of practice on adaptation issues while developing policy-relevant tools and guidance for adaptation planning and decision-making.

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

AfricaAdapt | Open Energy Information  

Open Energy Info (EERE)

AfricaAdapt AfricaAdapt Jump to: navigation, search Logo: Africa Adapt Name Africa Adapt Agency/Company /Organization AfricaAdapt Resource Type Training materials, Lessons learned/best practices Website http://www.africa-adapt.net/AA UN Region Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa References AfricaAdapt[1] Abstract AfricaAdapt is an independent bilingual network (French/English) focused exclusively on Africa. The Network's aim is to facilitate the flow of climate change adaptation knowledge for sustainable livelihoods between researchers, policy makers, civil society organisations and communities who are vulnerable to climate variability and change across the continent. Africa Adapt Screenshot "AfricaAdapt is an independent bilingual network (French/English) focused

222

Autonomous adaptive acoustic relay positioning  

E-Print Network (OSTI)

We consider the problem of maximizing underwater acoustic data transmission by adaptively positioning an autonomous mobile relay so as to learn and exploit spatial variations in channel performance. The acoustic channel ...

Cheung, Mei Yi, S.M. Massachusetts Institute of Technology

2013-01-01T23:59:59.000Z

223

Adaptive and Temporallydependent Document Filtering  

E-Print Network (OSTI)

Adaptive and Temporally­dependent Document Filtering een wetenschappelijke proeve op het gebied van . . . . . . . . . . . . . . . . . . . . . 1 1.2 Document Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Filtering Filtering Track 57 5.1 What is TREC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 5

Arampatzis, Avi

224

Adaptive multiconfigurational wave functions  

SciTech Connect

A method is suggested to build simple multiconfigurational wave functions specified uniquely by an energy cutoff ?. These are constructed from a model space containing determinants with energy relative to that of the most stable determinant no greater than ?. The resulting ?-CI wave function is adaptive, being able to represent both single-reference and multireference electronic states. We also consider a more compact wave function parameterization (?+SD-CI), which is based on a small ?-CI reference and adds a selection of all the singly and doubly excited determinants generated from it. We report two heuristic algorithms to build ?-CI wave functions. The first is based on an approximate prescreening of the full configuration interaction space, while the second performs a breadth-first search coupled with pruning. The ?-CI and ?+SD-CI approaches are used to compute the dissociation curve of N{sub 2} and the potential energy curves for the first three singlet states of C{sub 2}. Special attention is paid to the issue of energy discontinuities caused by changes in the size of the ?-CI wave function along the potential energy curve. This problem is shown to be solvable by smoothing the matrix elements of the Hamiltonian. Our last example, involving the Cu{sub 2}O{sub 2}{sup 2+} core, illustrates an alternative use of the ?-CI method: as a tool to both estimate the multireference character of a wave function and to create a compact model space to be used in subsequent high-level multireference coupled cluster computations.

Evangelista, Francesco A., E-mail: francesco.evangelista@emory.edu [Department of Chemistry and Cherry L. Emerson Center for Scientific Computation, Emory University, Atlanta, Georgia 30322 (United States)

2014-03-28T23:59:59.000Z

225

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 21, 2011 March 21, 2011 T-584: Microsoft March 2011 Security Bulletin Release Microsoft released 3 bulletins to address vulnerabilities involving Microsoft Office Suites and Software in Windows OS. This Microsoft Bulletin contains 1 Critical vulnerabilities which require a restart after the applied patch. The Exploitability Index, displays both CVE and Microsoft bulletin ID associated to vulnerability. March 17, 2011 T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products. March 14, 2011 T-577: Security Advisory for Adobe Flash Player, Adobe Reader and Acrobat

226

Regional Water Management: Adapting to Uncertain Water  

E-Print Network (OSTI)

Regional Water Management: Adapting to Uncertain Water Supply and Demand Jim Schneider, Ph · How Nebraska manages water · Dealing with uncertain water supplies: adaptive management #12;Regional-wide, systematic approach · Flexible--Adaptive Management Adaptive Manageme nt #12;Integrated Water Management

Nebraska-Lincoln, University of

227

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network (OSTI)

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

228

Adaptive Sampling in Hierarchical Simulation  

SciTech Connect

We propose an adaptive sampling methodology for hierarchical multi-scale simulation. The method utilizes a moving kriging interpolation to significantly reduce the number of evaluations of finer-scale response functions to provide essential constitutive information to a coarser-scale simulation model. The underlying interpolation scheme is unstructured and adaptive to handle the transient nature of a simulation. To handle the dynamic construction and searching of a potentially large set of finer-scale response data, we employ a dynamic metric tree database. We study the performance of our adaptive sampling methodology for a two-level multi-scale model involving a coarse-scale finite element simulation and a finer-scale crystal plasticity based constitutive law.

Knap, J; Barton, N R; Hornung, R D; Arsenlis, A; Becker, R; Jefferson, D R

2007-07-09T23:59:59.000Z

229

Training Adaptive Decision-Making.  

SciTech Connect

Adaptive Thinking has been defined here as the capacity to recognize when a course of action that may have previously been effective is no longer effective and there is need to adjust strategy. Research was undertaken with human test subjects to identify the factors that contribute to adaptive thinking. It was discovered that those most effective in settings that call for adaptive thinking tend to possess a superior capacity to quickly and effectively generate possible courses of action, as measured using the Category Generation test. Software developed for this research has been applied to develop capabilities enabling analysts to identify crucial factors that are predictive of outcomes in fore-on-force simulation exercises.

Abbott, Robert G.; Forsythe, James C.

2014-10-01T23:59:59.000Z

230

Adaptive constructive processes 1 Running head: Adaptive constructive processes  

E-Print Network (OSTI)

to a current environmental demand when automatic, learned responses are not elicited. Bartlett argued further of Psychology Harvard University Cambridge, Massachusetts 02138 phone: (617) 495-3856 fax: (617) 496-3122 e to be operating in any well-adapted organic response (1932, p. 201)". He further emphasized the importance of "the

Schacter, Daniel

231

BC Agriculture Climate Change Adaptation  

E-Print Network (OSTI)

BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

Pedersen, Tom

232

BC Agriculture Climate Change Adaptation  

E-Print Network (OSTI)

BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report executive summary #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

Pedersen, Tom

233

Adaptive wiener image restoration kernel  

DOE Patents (OSTI)

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

234

7, 72357275, 2007 Adaptive radiative  

E-Print Network (OSTI)

Discussions Two adaptive radiative transfer schemes for numerical weather prediction models V. Venema 1 , A numerical weather prediction (NWP) and climate models. The atmosphere and the land surface are complex-stream approximation. In most weather prediction models these parameterisation schemes are therefore called infre

Boyer, Edmond

235

Investigating Intrusiveness of Workload Adaptation  

Science Journals Connector (OSTI)

In this paper, we investigate how an automatic task assistant which can detect and react to a user's workload level is able to support the user in a complex, dynamic task. In a user study, we design a dispatcher scenario with low and high workload conditions ... Keywords: brain computer interface, intrusiveness, user study, workload adaptive assistance

Felix Putze, Tanja Schultz

2014-11-01T23:59:59.000Z

236

Climate Change Adaptation Planning | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Change Adaptation Planning Climate Change Adaptation Planning October 7, 2014 6:00AM CDT to October 9, 2014 3:00PM CDT Norman, Oklahoma This course provides an introduction to...

237

E-Print Network 3.0 - adaptive systems Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

adaptive systems Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: 1 From Adaptive Hypermedia to the Adaptive Web Systems Peter...

238

Brief Supervision of adaptive control algorithms  

Science Journals Connector (OSTI)

An adaptive controller needs supervisory functions in order to function well in an industrial environment. This paper describes these needs, and provides examples of supervisory functions that presently are used in industrial adaptive controllers. These ... Keywords: Adaptive control, Detection, Industrial control, Supervision

Tore HGglund; Karl Johan StrM

2000-08-01T23:59:59.000Z

239

Entropy Adaptive On-Line Compression  

Science Journals Connector (OSTI)

Self-Organization is based on adaptivity. Adaptivity should start with the very basic fundamental communication tasks such as encoding the information to be transmitted or stored. Obviously, the less signal transmitted the less energy in transmission ... Keywords: On-line compression, adaptive compression

Shlomi Dolev, Sergey Frenkel, Marina Kopeetsky

2014-08-01T23:59:59.000Z

240

Adaptive Comfort Model: Simulations & Future Directions  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Comfort Model: Simulations & Future Directions Adaptive Comfort Model: Simulations & Future Directions Speaker(s): Richard de Dear Date: February 4, 2011 - 12:00pm Location: 90-4133 Seminar Host/Point of Contact: Philip Haves The last 20 years of thermal comfort have witnessed a shift away from the "static" approach (exemplified by the PMV/PPD model) towards the adaptive approach (exemplified by the adaptive models in ASHRAE's Standard 55 (2004, 2010) and the European Union's counterpart standard, EN15251 (2007). - the basis and derivation of the adaptive comfort model - adaptive comfort standards (ASHRAE 55 and EN15251) - new developments and directions (reporting back from the January 2011 ASHRAE Meeting of SSPC-55 in Las Vegas) - environmental variables other than dry bulb, in the adaptive model

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Center for Adaptive Optics* Santa Cruz,CA  

E-Print Network (OSTI)

Center for Adaptive Optics* Santa Cruz,CA The Center for Adaptive Optics (CfAO) will concentrate on astronomical and vision science applications of adaptive optics and will reach out to other adaptive optics communities to share technologies. It will develop new instruments optimized for adaptive optics. Adaptive

Grether, Gregory

242

Issues in adaptive mesh refinement  

SciTech Connect

In this paper, we present an approach for a patch-based adaptive mesh refinement (AMR) for multi-physics simulations. The approach consists of clustering, symmetry preserving, mesh continuity, flux correction, communications, and management of patches. Among the special features of this patch-based AMR are symmetry preserving, efficiency of refinement, special implementation offlux correction, and patch management in parallel computing environments. Here, higher efficiency of refinement means less unnecessarily refined cells for a given set of cells to be refined. To demonstrate the capability of the AMR framework, hydrodynamics simulations with many levels of refinement are shown in both two- and three-dimensions.

Dai, William Wenlong [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

243

Microsoft Word - SMail_Secure_Web-Based_Email_v3 _2_.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

HQ OCIO Instructions for Using Secure Email (SMail) via HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy DOE HQ OCIO Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Requirements SMail: 1. An Energy IT Services (EITS) provided Exchange email account. 1 2. An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server. 2 3. Appropriate access granted Active Directory group membership. 3 4. DOEnet or Internet access and a supported web browser. Login Procedure for SMail:

244

Climate adaptation planning in practice: an evaluation of adaptation plans from three developed nations  

SciTech Connect

Formal planning for climate change adaptation is emerging rapidly at a range of geo-political scales. This first generation of adaptation plans provides useful information regarding how institutions are framing the issue of adaptation and the range of processes that are recognized as being part of an adaptation response. To better understand adaptation planning among developed nations, a set of 57 adaptation plans from Australia, the United Kingdom and the United States was evaluated against a suite of 19 planning processes identified from existing guidance instruments for adaptation planning. Total scores among evaluated plans ranged from 16% of the maximum possible score to 61%, with an average of 37%. These results suggest adaptation plans are largely under-developed. Critical weaknesses in adaptation planning are related to limited consideration for non-climatic factors as well as neglect for issues of adaptive capacity including entitlements to various forms of capital needed for effective adaptation. Such gaps in planning suggest there are opportunities for institutions to make better use of existing guidance for adaptation planning and the need to consider the broader governance context in which adaptation will occur. In addition, the adaptation options prescribed by adaptation plans reflect a preferential bias toward low-risk capacity-building (72% of identified options) over the delivery of specific actions to reduce vulnerability. To the extent these findings are representative of the state of developed nation adaptation planning, there appear to be significant deficiencies in climate change preparedness, even among those nations often assumed to have the greatest adaptive capacity.

Preston, Benjamin L [ORNL; Westaway, Richard M. [IMS Consulting, Bristol, Avon, England; Yuen, Emma J. [CSIRO Climate Adaptation Flagship, Aspendale, Vic, Australia

2011-04-01T23:59:59.000Z

245

Forecasting with adaptive extended exponential smoothing  

Science Journals Connector (OSTI)

Much of product level forecasting is based upon time series techniques. However, traditional time series forecasting techniques have offered either smoothing constant adaptability or consideration of various t...

John T. Mentzer Ph.D.

246

ChapterTitle ADAPTIVE EXPONENTIAL SMOOTHING  

Science Journals Connector (OSTI)

The single exponential smoothing forecasting model requires the specification of a ... ?, which determines the degree of model smoothing. Proper selection of the coefficient ? is...adaptive exponential smoothing,...

2000-01-01T23:59:59.000Z

247

Training for Climate Adaptation in Conservation  

Energy.gov (U.S. Department of Energy (DOE))

The Wildlife Conservation Society and the Northern Institute of Applied Climate Science are hosting this two-day training for climate adaptation.

248

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

249

Mainstreaming Climate Change Adaptation into Development Planning...  

Open Energy Info (EERE)

Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Agency...

250

Machine Learning for Adaptive Computer Game Opponents .  

E-Print Network (OSTI)

??This thesis investigates the use of machine learning techniques in computer games to create a computer player that adapts to its opponent's game-play. This includes (more)

Miles, Jonathan David

2009-01-01T23:59:59.000Z

251

Adaptive Barrier Strategies for Nonlinear Interior Methods  

E-Print Network (OSTI)

Feb 25, 2005 ... that adaptive choices, such as Mehrotra's probing procedure, outperform ... focus on the effects of merit functions or filters, and on regularization...

2005-02-25T23:59:59.000Z

252

Crosscutting Subsurface Initiative: Adaptive Control of Subsurface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

in the ability to access, characterize, predict, and adaptively manipulate fracture and flow processes over scales from nanometers to kilometers. This town hall...

253

2014 DOE Climate Change Adaptation Plan  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

systems face increasing risks from shifting disease vectors, temperature increases and health care system infrastructure from a changing climate DOE Climate Change Adaptation...

254

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 1880 of 28,905 results. 71 - 1880 of 28,905 results. Download EA-1388: Final Environmental Assessment Ground Water Compliance at the Shiprock Uranium Mill Tailings Site http://energy.gov/nepa/downloads/ea-1388-final-environmental-assessment Download Document Management & Control System (DMCS) http://energy.gov/cio/downloads/document-management-control-system-dmcs Article U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. http://energy.gov/cio/articles/u-129-rsa-envision-bugs-permit-cross-site-scripting-sql-injection-and-directory

255

EOLSS ADAPTATIONS TO LIFE IN MARINE CAVES PAGE 1 ADAPTATIONS TO LIFE IN MARINE CAVES  

E-Print Network (OSTI)

EOLSS ­ ADAPTATIONS TO LIFE IN MARINE CAVES PAGE 1 ADAPTATIONS TO LIFE IN MARINE CAVES Thomas M. Iliffe, Department of Marine Biology, Texas A&M University at Galveston, USA Renée E. Bishop, Department, biodiversity, ecology, adaptation, evolution, behavior, conservation, endangered species, cave diving

Iliffe, Thomas M.

256

Adaptive Port Reduction in Static Condensation  

E-Print Network (OSTI)

Adaptive Port Reduction in Static Condensation JL Eftang DBP Huynh DJ Knezevic EM Rønquist a framework for adaptive reduction of the degrees of freedom associated with ports in static condensation (SC reduction for the interior of a component with model order reduction on the ports in order to rapidly

Rønquist, Einar M.

257

Adaptive Composite Map Projections Bernhard Jenny  

E-Print Network (OSTI)

Adaptive Composite Map Projections Bernhard Jenny Abstract--All major web mapping services use.The proposed composite map projection combines several projections that are recommended in cartographic.The composite projection adapts the maps geometry to scale, to the maps height-to-width ratio

Jenny, Bernhard

258

Outreach and Adaptive Strategies for Climate Change  

E-Print Network (OSTI)

Outreach and Adaptive Strategies for Climate Change: The Role of NOAA Sea Grant Extension years and generations about how to adapt to a changing climate. Effective preparation for possible effects of climate change includes engagement of resource managers, planners, public works officials

259

A fuzzy-tuned adaptive Kalman filter  

E-Print Network (OSTI)

In this paper, fuzzy processing is applied to the adaptive Kalman filter. The filter gain coefficients are adapted over a 50 dB range of unknown signal/noise dynamics, using fuzzy membership functions. Specific simulation results are shown for a...

Painter, John H.; Young Hwan Lho

1993-12-01T23:59:59.000Z

260

WORKLOAD ADAPTATION IN AUTONOMIC DATABASE MANAGEMENT SYSTEMS  

E-Print Network (OSTI)

in Autonomic DBMSs", Proceedings of the 2nd International Workshop on Self-Managing Database Systems (SMDB 2007 to meet its Service Level Objectives (SLOs). It is a challenge to adapt multiple workloads with complex scheduler that performs workload adaptation in a DBMS, as the test bed to prove the effectiveness

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Proceedings of the International Workshop on Adaptation,  

E-Print Network (OSTI)

Proceedings of the 1st International Workshop on Adaptation, Personalization and REcommendation. Carrero3 1 Universidad Autónoma de Madrid, Spain {ivan.cantador, david.vallet}@uam.es 2 Yahoo! Research.carrero}@uem.es #12;#12;Preface The 1st International Workshop on Adaptation, Personalization and REcommendation

Cantador, Iván

262

Adaptive computations on conforming quadtree meshes  

Science Journals Connector (OSTI)

In this paper, the quadtree data structure and conforming polygonal interpolants are used to develop an h-adaptive finite element method. Quadtree is a hierarchical data structure that is computationally attractive for adaptive numerical simulations. ... Keywords: Barycentric coordinates, Hanging nodes, Laplace interpolant, Meshfree methods, Natural neighbors, Quadtree data structure

A. Tabarraei; N. Sukumar

2005-04-01T23:59:59.000Z

263

Safety implementation of adaptive embedded control components  

Science Journals Connector (OSTI)

The paper deals with dynamic reconfigurations of component-based adaptive embedded control systems to be automatically handled at run-time by intelligent agents. We define a Control Component as a software unit supporting control tasks of the system ... Keywords: adaptive embedded control system, dynamic reconfiguration, intelligent agent, semaphore, software control component

Atef Gharbi; Mohamed Khalgui; Samir Ben Ahmed

2011-09-01T23:59:59.000Z

264

Adaptive performance support for fault diagnosis  

Science Journals Connector (OSTI)

This paper introduces a strategy, a user model, and a methodology for utilising adaptive hypermedia in performance support domain and specifically for fault diagnosis. This utilisation is implemented by employing task-specific and user-centred hypermedia ... Keywords: adaptive hypermedia, diagnostic expert systems, performance support systems, semantic data modelling, user modelling

Ammar M. Huneiti

2008-07-01T23:59:59.000Z

265

Petascale Adaptive Computational Fluid Dynamics | Argonne Leadership  

NLE Websites -- All DOE Office Websites (Extended Search)

Petascale Adaptive Computational Fluid Dynamics Petascale Adaptive Computational Fluid Dynamics PI Name: Kenneth Jansen PI Email: jansen@rpi.edu Institution: Rensselaer Polytechnic Institute The specific aim of this request for resources is to examine scalability and robustness of our code on BG/P. We have confirmed that, during the flow solve phase, our CFD flow solver does exhibit perfect strong scaling to the full 32k cores on our local machine (CCNI-BG/L at RPI) but this will be our first access to BG/P. We are also eager to study the performance of the adaptive phase of our code. Some aspects have scaled well on BG/L (e.g., refinement has produced adaptive meshes that take a 17 million element mesh and perform local adaptivity on 16k cores to match a requested size field to produce a mesh exceeding 1 billion elements) but other aspects (e.g.,

266

E-Print Network 3.0 - adaptive systems theory Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

systems theory Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: 1 From Adaptive Hypermedia to the Adaptive Web Systems Peter...

267

GRACE-2: integrating fine-grained application adaptation with global adaptation for saving energy  

Science Journals Connector (OSTI)

Energy efficiency has become a primary design criterion for mobile multimedia devices. Prior work has proposed saving energy through coordinated adaptation in multiple system layers, in response to changing application demands and system resources. The scope and frequency of adaptation pose a fundamental conflict in such systems. The Illinois GRACE project addresses this conflict through a hierarchical solution which combines: 1) infrequent (expensive) global adaptation that optimises energy for all applications in the system, 2) frequent (cheap) per-application (or per-app) adaptation that optimises for a single application at a time. This paper demonstrates the benefits of the hierarchical adaptation through a second-generation prototype, GRACE-2. Specifically, it shows that in a network bandwidth constrained environment, per-app application adaptation yields significant energy benefits over and above global adaptation.

Vibhore Vardhan; Wanghong Yuan; Albert F. Harris; Sarita V. Adve; Robin H. Kravets; Klara Nahrstedt; Daniel G. Sachs; Douglas L. Jones

2009-01-01T23:59:59.000Z

268

Pacific Adaptation Strategy Assistance Program Dynamical Seasonal Forecasting  

E-Print Network (OSTI)

Pacific Adaptation Strategy Assistance Program Dynamical Seasonal Forecasting Seasonal Prediction · POAMA · Issues for future Outline #12;Pacific Adaptation Strategy Assistance Program Major source Adaptation Strategy Assistance Program El Nino Mean State · Easterlies westward surface current upwelling

Lim, Eun-pa

269

2014 DOE Climate Change Adaptation Plan | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

2014 DOE Climate Change Adaptation Plan 2014 DOE Climate Change Adaptation Plan Document presents the U.S. Department of Energy (DOE) 2014 plan for adapting to climate change....

270

National Adaptation Forum Webinar Series: Out of Town, Not Out...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Adaptation Forum Webinar Series: Out of Town, Not Out of Trouble: Small Agriculture and Indigenous Communities National Adaptation Forum Webinar Series: Out of Town, Not Out of...

271

Burundi-National Adaptation Plan of Action to Climate Change...  

Open Energy Info (EERE)

Burundi-National Adaptation Plan of Action to Climate Change Jump to: navigation, search Name Burundi-National Adaptation Plan of Action to Climate Change AgencyCompany...

272

GIZ Sourcebook Module 5f: Adapting Urban Transport to Climate...  

Open Energy Info (EERE)

f: Adapting Urban Transport to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: GIZ Sourcebook Module 5f: Adapting Urban Transport to Climate Change...

273

Rwanda-National Adaptation Programs of Action to Climate Change...  

Open Energy Info (EERE)

Name Rwanda-National Adaptation Programs of Action to Climate Change AgencyCompany Organization United Nations Environment Programme Topics Adaptation, Background analysis...

274

Software Adaptation Patterns for Service-Oriented Architectures .  

E-Print Network (OSTI)

??This thesis describes the concept of software adaptation patterns and how they can be used in software adaptation of service-oriented architectures. The patterns are described (more)

Hashimoto, Koji

2010-01-01T23:59:59.000Z

275

Adapting technology to keep the national infrastructure safe...  

NLE Websites -- All DOE Office Websites (Extended Search)

Adapting technology to keep the national infrastructure safe and secure Identifying threats and responding to disasters September 1, 2013 Adapting Lab technology to help recover...

276

Development of an adaptive fuzzy logic controller for HVAC system.  

E-Print Network (OSTI)

??An adaptive approach to control a cooling coil chilled water valve operation, called adaptive fuzzy logic control (AFLC), is developed and validated in this study. (more)

Navale, Rahul Laxman

2006-01-01T23:59:59.000Z

277

Adaptive Rejection of Narrow Band Disturbance in Hard Disk Drives  

E-Print Network (OSTI)

feedback representation of the PAA for adapting narrow bandrepresentation of the PAA for stability analysis. .92adaptation algorithm (PAA). These identified parameters are

Zheng, Qixing

2009-01-01T23:59:59.000Z

278

Information Resources: Adaptive Street Lighting Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Street Lighting Controls Adaptive Street Lighting Controls This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of San Jose, CA, and Kelly Cunningham of the California Lighting Technology Center at UC Davis discussed their experiences as early adopters of these smart street lighting systems. In Part II, presenters Laura Stuchinsky of the City of San Jose, CA, and Michael Poplawski of Pacific Northwest National Laboratory explored the MSSLC's recently released Model Specification for Adaptive Control and Remote Monitoring of LED Roadway Luminaires. Part I: Experiences and Benefits June 11, 2013 View the presentation slides Part II: Reviewing the MSSLC's Model Specification

279

Human adaptation of avian influenza viruses  

E-Print Network (OSTI)

Human adaptation of avian influenza viruses pose an enormous public health challenge as the human population is predominantly naive to avian influenza antigens. As such, constant surveillance is needed to monitor the ...

Srinivasan, Karunya

2012-01-01T23:59:59.000Z

280

Marginalized Monitoring: Adaptively Managing Urban Stormwater  

E-Print Network (OSTI)

environmental assessment, 28 Superfund decisionmaking, 29 Endangered Species Act decisionmaking, 30 and water management.Environmental Impacts Under Florida Water Law: From Water Wars Towards Adaptive Management ,water infrastructure problems. And yet, the environmental management

Scanlan, Melissa K; Tai, Stephanie

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A Logical Characterization of Adaptive Educational Hypermedia  

E-Print Network (OSTI)

reference models for adaptive hypermedia, e.g. the AHAM Reference Model [4], or the Munich Reference Model [20]. Both, the AHAM and Munich Reference Model, extend the Dexter Hypertext Model [16], and pro- vide

Henze, Nicola

282

Adaptive Resource Management Craig E. Wills  

E-Print Network (OSTI)

Adaptive Resource Management Craig E. Wills Surendar Chandra # Computer Science Department fixed approaches to manage information. However fixed solutions to information management. These servers manage information about machines, users, files and other objects. The typical approach

Chandra, Surendar

283

Optimization Online - Multistage Adaptive Robust Optimization for ...  

E-Print Network (OSTI)

Sep 5, 2014 ... ... with the increasing penetration of wind and solar power generation has ... Keywords: Electric energy systems, multistage robust optimization, ... Multistage Adaptive Robust Optimization for the Unit Commitment Problem.

Alvaro Lorca

2014-09-05T23:59:59.000Z

284

Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs  

E-Print Network (OSTI)

Anisotropic gridadaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

Venditti, David A.

285

Statistical Design for Adaptive Weather Observations  

Science Journals Connector (OSTI)

Suppose that one has the freedom to adapt the observational network by choosing the times and locations of observations. Which choices would yield the best analysis of the atmospheric state or the best subsequent forecast? Here, this problem of ...

L. Mark Berliner; Zhan-Qian Lu; Chris Snyder

1999-08-01T23:59:59.000Z

286

Adaptive unstructured volume remeshing - I: the method  

Science Journals Connector (OSTI)

We present an adaptive remeshing algorithm for meshes of unstructured triangles in two dimensions and unstructured tetrahedra in three dimensions. The algorithm automatically adjusts the size of the elements with time and position in the computational ...

Anthony Anderson; Xiaoming Zheng; Vittorio Cristini

2005-09-01T23:59:59.000Z

287

Content adaptivity in wireless web access  

Science Journals Connector (OSTI)

While the demand for wireless access to web-based systems increases, it becomes apparent that the design of most systems does not support the use of small screen end-devices such as PDAs or mobile phones. However, enabling wireless access should ... Keywords: adaptivity, cohesion preorder, conceptual modelling, content adaptation, internet, media types, mobile clients, mobile communications, proximity values, web-based systems, wireless access

Klaus-Dieter Schewe; Kinshuk; Tiong Goh

2004-09-01T23:59:59.000Z

288

Fully Adaptive AMG Scott MacLachlan  

E-Print Network (OSTI)

" Ah "-1 ik ff Energy measure: Let G (i) j = (Ah )-1 ij , Sij = G(i) - G (i) j e(j) Ah G(i) Ah Fully, Sij? Apply (localized) relaxation to Ah G(i) = e(i) Fully Adaptive AMG ­ p.11 #12;Approximating Sij to Ah G(i) = e(i) Weighted Jacobi, 1 step: Fully Adaptive AMG ­ p.11 #12;Approximating Sij Can

MacLachlan, Scott

289

Adaptation semantique de documents multimedia Sebastien Laborie  

E-Print Network (OSTI)

Adaptation s´emantique de documents multim´edia S´ebastien Laborie Soutenance de th`ese - 28 Mai 2008 1 S´ebastien Laborie Adaptation s´emantique de documents multim´edia #12;Introduction Probl´ematique Un document multim´edia Constitu´e d'objets multim´edia Texte Image Son Vid´eo Assembl´e par un

Joseph Fourier Grenoble-I, Université

290

On adaptive grid computations of variable stars  

SciTech Connect

We show that the use of an implicit adaptive-grid technique is an efficient and up-to-date approach for the calculations of radial oscillations in variable stars. We chose as an illustrative example the radiative envelope of an RR Lyrae variable. For the hydrostatic initial model we compare the Lagrangean ratioed zoning with an adaptive-grid rezoning. We show that the adaptive-grid yields an optimal distribution of the mesh points in the sense that the relevant physical features, the H{minus} and He 1{minus}, He 2{minus} ionization zones, are well resolved. For the hydrodynamical evolution we present the full-amplitude model for both the Lagrangean and adaptive-grid computations. We perform a detailed comparison and show that the adaptive-grid method yields limit cycle solutions that are substantially improved over the Lagrangean grid model. This is due to the fact that the Lagrangean mesh sweeps through the ionization zones twice during one oscillation period, whereas the adaptive-mesh resolves them and tracks them continuously. The results are, in particular, smooth radial velocity and light curves. Beyond a physically better defined solution we also observe larger time steps for the convergence towards the limit cycle and for the evolution during one period. 12 refs., 13 figs., 5 tabs.

Cox, A.N.; Deupree, R.G.; Gehmeyr, M.

1991-01-01T23:59:59.000Z

291

ARM - Central Authentication Service  

NLE Websites -- All DOE Office Websites (Extended Search)

History History Organization Participants Facility Statistics Forms Contacts Research Themes Research Highlights Journal Articles Collaborations Atmospheric System Research (ASR) Propose a Campaign Submitting Proposals: Guidelines Featured Campaigns Campaign Data List of Campaigns Aerial Facility Mobile Facilities North Slope of Alaska Southern Great Plains Tropical Western Pacific Eastern North Atlantic Location Table Contacts Instrument Datastreams Value-Added Products PI Data Products Field Campaign Data Related Data Data Plots Data Policy Data Documentation Data Gathering and Delivery Data Quality Data Tools Data Archive Data Management Facility External Data Center Features and Releases Facility News Blogs: Air Time & Field Notes Meetings and Events Employment Research Highlights Data Announcements

292

Coding AuthentiCity  

E-Print Network (OSTI)

This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

Mercier, Rachel Havens

2008-01-01T23:59:59.000Z

293

A low cost adaptive optics system using a membrane mirror  

Science Journals Connector (OSTI)

A low cost adaptive optics system constructed almost entirely of commercially available components is presented.

Paterson, Carl; Munro, I; Dainty, J

2000-01-01T23:59:59.000Z

294

UNDP-Adaptation Learning Mechanism | Open Energy Information  

Open Energy Info (EERE)

Adaptation Learning Mechanism Adaptation Learning Mechanism Jump to: navigation, search Logo: UNDP-Adaptation Learning Mechanism Name UNDP-Adaptation Learning Mechanism Agency/Company /Organization United Nations Development Programme Sector Climate, Energy, Land, Water Topics Adaptation Resource Type Lessons learned/best practices, Training materials Website http://www.adaptationlearning. Program Start 2007 References Adaptation Learning Mechanism[1] Abstract Seeking to provide stakeholders with a common platform for sharing and learning, the ALM bridges knowledge gaps by bringing relevant knowledge and stakeholders together to exchange information, experiences, and expertise. Additionally, the ALM complements the wide range of adaptation knowledge networks and initiatives already underway.

295

Solid-State Lighting: Adaptive Street Lighting Controls  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptive Street Lighting Adaptive Street Lighting Controls to someone by E-mail Share Solid-State Lighting: Adaptive Street Lighting Controls on Facebook Tweet about Solid-State Lighting: Adaptive Street Lighting Controls on Twitter Bookmark Solid-State Lighting: Adaptive Street Lighting Controls on Google Bookmark Solid-State Lighting: Adaptive Street Lighting Controls on Delicious Rank Solid-State Lighting: Adaptive Street Lighting Controls on Digg Find More places to share Solid-State Lighting: Adaptive Street Lighting Controls on AddThis.com... Conferences & Meetings Presentations Publications Webcasts Videos Tools Adaptive Street Lighting Controls This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components.

296

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2011 31, 2011 T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. August 30, 2011 T-706: Microsoft Fraudulent Digital Certificate Issued by DigiNotar Fraudulent Digital Certificate Issued by DigiNotar, a Certification Authority Present in the Trusted Root Certification Authorities August 30, 2011 T-705: Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks Linux Kernel Weakness in Sequence Number Generation Facilitates Packet Injection Attacks. August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users

297

Comparing Elliptic Curve Cryptography and RSA on 8-Bit CPUs  

E-Print Network (OSTI)

.Patel,Arvinderpal.Wander,Hans.Eberle, Sheueling.Chang}@sun.com http://www.research.sun.com/projects/crypto Abstract. Strong public

Han, Richard Y.

298

AdaptiveARC | Open Energy Information  

Open Energy Info (EERE)

AdaptiveARC AdaptiveARC Jump to: navigation, search Name AdaptiveARC Address 7683 Sitio Manana Place Carlsbad, California Zip 92009 Sector Biomass Product Waste-to-clean-energy startup is developing an arc-plasma reactor Website http://www.adaptivearc.com/ Coordinates 33.07959°, -117.22539° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":33.07959,"lon":-117.22539,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

299

Petascale, Adaptive CFD | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Petascale, Adaptive CFD Petascale, Adaptive CFD Petascale, Adaptive CFD PI Name: Kenneth Jansen PI Email: jansenke@colorado.edu Institution: U. Colorado-Boulder Allocation Program: ESP Allocation Hours at ALCF: 150 Million Year: 2010 to 2013 Research Domain: Engineering The aerodynamic simulations proposed will involve modeling of active flow control based on synthetic jet actuation that has been shown experimentally to produce large-scale flow changes (e.g., re-attachment of separated flow or virtual aerodynamic shaping of lifting surfaces) from micro-scale input (e.g., a 0.1 W piezoelectric disk resonating in a cavity alternately pushes/pulls out/in the fluid through a small slit to create small-scale vortical structures that interact with, and thereby dramatically alter, the cross flow). This is a process that has yet to be understood fundamentally.

300

A National Strategy for Adaptation to Climate Change | Open Energy  

Open Energy Info (EERE)

A National Strategy for Adaptation to Climate Change A National Strategy for Adaptation to Climate Change Jump to: navigation, search Tool Summary Name: A National Strategy for Adaptation to Climate Change Agency/Company /Organization: Coalition for Rainforest Nations Topics: Adaptation, Pathways analysis Resource Type: Guide/manual Website: www.rainforestcoalition.org/eng/ References: A National Strategy for Adaptation to Climate Change[1] Logo: A National Strategy for Adaptation to Climate Change Click here to view document A National Strategy for Adaptation to Climate Change References ↑ "A National Strategy for Adaptation to Climate Change" Retrieved from "http://en.openei.org/w/index.php?title=A_National_Strategy_for_Adaptation_to_Climate_Change&oldid=382940" Category: Tools

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Adaptive Resource Management Schemes for Web Services  

E-Print Network (OSTI)

ADAPTIVE RESOURCE MANAGEMENT SCHEMES FOR WEB SERVICES A Dissertation by HEUNG KI LEE Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR OF PHILOSOPHY December 2009... Major Subject: Computer Science ADAPTIVE RESOURCE MANAGEMENT SCHEMES FOR WEB SERVICES A Dissertation by HEUNG KI LEE Submitted to the O?ce of Graduate Studies of Texas A&M University in partial fulflllment of the requirements for the degree of DOCTOR...

Lee, Heung Ki

2011-02-22T23:59:59.000Z

302

Instructions for Using Secure Email via Outlook Web Access | Department of  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Email via Outlook Web Access Secure Email via Outlook Web Access Instructions for Using Secure Email via Outlook Web Access Outlook Web Access provides access to unencrypted email only and is suitable for use from any computer. Secure Email Requirements: An EITS provided Exchange email account An EITS provided RSA SecureID Token with an active account in the EITS-managed RSA Authentication Server Appropriate access granted Active Directory group membership DOEnet or Internet access and a supported web browser Secure Email Login Procedure: Enter https://smail.doe.gov/ in the address field of your Internet browser. The Outlook Web Access window appears. When using an RSA SecurID hardware token: Enter your user name in the User name field. Enter your password, which is your RSA token PIN plus the number

303

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10, 2011 10, 2011 T-644: Prenotification Security Advisory - Adobe Acrobat & Adobe Readers Updates A prenotification Security Advisory has been posted in regards to the upcoming quarterly Adobe Reader and Acrobat updates scheduled for Tuesday, June 14, 2011. The updates will address critical security issues in the products. June 9, 2011 T-643: HP OpenView Storage Data Protector Unspecified Code Execution Vulnerability A vulnerability has been reported in HP OpenView Storage Data Protector, which can be exploited by malicious people to compromise a vulnerable system. June 9, 2011 T-642: RSA SecurID update to Customers RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products

304

ADAPTIVE ROBUST TRACKING CONTROL OF PRESSURE  

E-Print Network (OSTI)

accuracy of pressure trajectory in the chamber when the pneumatic cylinder is moving. Off-line fitting, it is necessary to utilize the adaptive model compensation for improving the tracking accuracy of pressure and attenuation in pneumatic lines, valve dynamics, flow nonlinearities through the valve orifice, piston friction

Yao, Bin

305

Provably Efficient Two-Level Adaptive Scheduling  

E-Print Network (OSTI)

processor reallocation, our schedulers provide control over the scheduling overhead and ensure effectiveProvably Efficient Two-Level Adaptive Scheduling Yuxiong He1 , Wen-Jing Hsu1 , and Charles E. Multiprocessor scheduling in a shared multiprogramming en- vironment can be structured in two levels, where

Feitelson, Dror

306

Modelling adaptations requirements in web workflows  

Science Journals Connector (OSTI)

Workflows play a major role in nowadays business and therefore its requirement elicitation must be accurate and clear for achieving the closest solution to business's needs. Due to Web applications popularity, the Web is becoming the standard platform ... Keywords: adaptation, model-driven paradigm, requirements, web

M. Urbieta; W. Retschitzegger; G. Rossi; W. Schwinger; S. Gordillo; E. Robles Luna

2012-12-01T23:59:59.000Z

307

Efficiency considerations in triangular adaptive mesh refinement  

Science Journals Connector (OSTI)

...mesh generated by this generator is shown in figure-8...Behrens, J. 1998 Atmospheric and ocean modeling with...solver for the shallow-water equations. Appl. Numer...space-filling curves in adaptive atmospheric modeling. In Frontiers...an unstructured grid generator with a space-filling...

2009-01-01T23:59:59.000Z

308

Reservation Price Estimation by Adaptive Conjoint Analysis  

E-Print Network (OSTI)

Reservation Price Estimation by Adaptive Conjoint Analysis Christoph Breidert1 , Michael Hahsler1 applied the eco- nomic definition of reservation price in combination with a conjoint study on product pricing. In this paper we present a novel approach to estimate the economic reser- vation price using

Schmidt-Thieme, Lars

309

CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT  

E-Print Network (OSTI)

CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT IN THE SAN FRANCISCO BAY AREA A White Paper from the California Energy Commission's California Climate Change Center JULY 2012 CEC Climate change will affect both sea level and the temporal and spatial distribution of runoff

310

Adaptive Reliability Analysis of Excavation Problems  

E-Print Network (OSTI)

........................................................................... 26 2.5.3 Structure of ?z ............................................................................. 28 2.6 Solution Strategies ................................................................................ 29 2.6.1 Markov Chain Monte Carlo... simulation Metropolis-Hastings (MH) algorithm ........................................................................... 30 viii Page 2.6.2 Delayed Rejection Adaptive Metropolis (DRAM) method ........ 32 2.7 Application...

Park, Jun Kyung

2012-10-19T23:59:59.000Z

311

The Building Adaptive Re-Use  

E-Print Network (OSTI)

81 The Building 7.0 #12;82 Adaptive Re-Use 7.1 7.1.1 Retaining the Ruskin Building's Facades building fabric. The need for a fully accessible and environmentally sustainable building led the team to a solution that requires the full reconstruction of the Ruskin Building, save its primary facades

Flynn, E. Victor

312

Projected Climate Impacts and Adaptation Strategies  

E-Print Network (OSTI)

Projected Climate Impacts and Adaptation Strategies for Wisconsin's Urban Areas UWM ­ School Rainfall Etc. #12;Downscaling: Focus global projections to a scale relevant to climate impacts in Wisconsin-Engineering Professional Development DNR Photo: WDNR #12;Overview · Wisconsin's Changing climate · Expected Impacts · How

Sheridan, Jennifer

313

Adaptive Training for Large Vocabulary Continuous  

E-Print Network (OSTI)

Adaptive Training for Large Vocabulary Continuous Speech Recognition Kai Yu Hughes Hall College for the degree of Doctor of Philosophy #12;ii Summary In recent years, there has been a trend towards training is to train hidden Markov models (HMMs) on the whole data set as if all data comes from a single acoustic

Hain, Thomas

314

IBM Software Data Sheet IBM adaptive threat  

E-Print Network (OSTI)

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

315

Adaptive Personalisation for Researcher-Independent  

E-Print Network (OSTI)

Adaptive Personalisation for Researcher-Independent Brain-Body Interface Usage Abstract In this case study, we report what we believe to be the first prolonged in-situ use of a brain-body interface for rehabilitation of individuals with severe neurological impairment due to traumatic brain injury

Boetticher, Gary D.

316

MODEL ADAPTATION FOR HYPERBOLIC SYSTEMS WITH RELAXATION  

E-Print Network (OSTI)

MODEL ADAPTATION FOR HYPERBOLIC SYSTEMS WITH RELAXATION H. MATHIS, C. CANC`ES, E. GODLEWSKI, N the phenomenon under consideration. We focus in this work on general hyperbolic systems with stiff relaxation source terms together with the corre- sponding hyperbolic equilibrium systems. The goal is to determine

Paris-Sud XI, Université de

317

Adaptive aberration correction in a confocal microscope  

Science Journals Connector (OSTI)

...corresponds to a restoration of the axial sectioning...degradation and restoration of the axial resolution...of the adaptive system in imaging biological...cycle, the laser power was reduced to...the experimental system allowed visualization...B , ed( 1995 ) Handbook of Biological Confocal...

Martin J. Booth; Mark A. A. Neil; Rimas Jukaitis; Tony Wilson

2002-01-01T23:59:59.000Z

318

Gaia as a complex adaptive system  

Science Journals Connector (OSTI)

...the environment. The model does not include natural selection...within clusters). The model does include a sys- tem selection...adaptive behaviour, but that it does not reside in a critical state...as cyber- netic systems. In Handbook of ecosystem theories and manage...

2002-01-01T23:59:59.000Z

319

Contract Signature Using Quantum Information  

E-Print Network (OSTI)

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

320

E-Print Network 3.0 - adaptive seamless design Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

(VTP) to adapt video... need to be resolved: 1) seamless mobility across het- erogeneous networks, 2) application adaptation... incorporate both seamless handoff and adaptive ......

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

E-Print Network 3.0 - adaptive methods final Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

mechanisms. Finally the actors in the process of adaptation will be discussed like the user (adaptable... adaptation methods and tools that are under the control of the user...

322

E-Print Network 3.0 - acquired behaviour adaptations Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Collection: Computer Technologies and Information Sciences 6 Adaptive LEGO Robots. A RobotHuman View on Robotics. Summary: is the Adaptive LEGO Pet Robot. The Adaptive LEGO Pet...

323

An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control An Enabling Study of Diesel Low-Temperautre Combustion via Adaptive Control Adaptive control strategies...

324

E-Print Network 3.0 - adaptive noise cancellation Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

adaptive filtering, DMT... algorithm. The adaptive equation can be rewritten B LCA echo canceller in the presence of narrow band noise... Constrained Adaptive Echo ......

325

E-Print Network 3.0 - adaptive signal model Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

LMS Adaptive Predictor for Chirped Input Signals Jun Han Department of Electrical... of adaptive filters, adaptive prediction, is studied. The class of input signals which will...

326

E-Print Network 3.0 - adaptive specialization conditional Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

conditional Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: Adaptive presentation techniques Conditional text filtering - ITEM...

327

E-Print Network 3.0 - adaptive direct search Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

direct search Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: Evaluation of Adaptive Link Sorting HYPERFLEX: IR System -...

328

Hands-on Energy Adaptation Toolkit (HEAT) | Open Energy Information  

Open Energy Info (EERE)

Hands-on Energy Adaptation Toolkit (HEAT) Hands-on Energy Adaptation Toolkit (HEAT) Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Hands-on Energy Adaptation Toolkit (HEAT) Agency/Company /Organization: Energy Sector Management Assistance Program of the World Bank Sector: Energy Focus Area: Renewable Energy Topics: Adaptation, Implementation, Pathways analysis Resource Type: Guide/manual Website: esmap.org/esmap/node/312 Hands-on Energy Adaptation Toolkit (HEAT) Screenshot References: HEAT[1] Background "HEAT- A Hands-on Energy Adaptation Toolkit is designed to lead you through as assessment of climate vulnerabilities and adaptation options in the energy sector of your country. HEAT can help you raise awareness among key stakeholders and initiate dialogue on energy sector adaptation.

329

Numerical Modeling of Acoustic Timescale Detonation Initiation Using the Adaptive  

E-Print Network (OSTI)

Numerical Modeling of Acoustic Timescale Detonation Initiation Using the Adaptive Wavelet 2008 #12;This thesis entitled: Numerical Modeling of Acoustic Timescale Detonation Initiation Using. (Ph.D.) Numerical Modeling of Acoustic Timescale Detonation Initiation Using the Adaptive Wavelet

Vasilyev, Oleg V.

330

Adaptive Power Control for Single and Multiuser Opportunistic Systems  

E-Print Network (OSTI)

In this dissertation, adaptive power control for single and multiuser opportunistic systems is investigated. First, a new adaptive power-controlled diversity combining scheme for single user systems is proposed, upon which is extended...

Nam, Sung Sik

2010-07-14T23:59:59.000Z

331

Funding for adaptation to climate change : the case of Surat  

E-Print Network (OSTI)

The need for cities to adapt to climate change is widely acknowledged, yet the question of adaptation finance remains uncertain. Unable to access global climate funds, cities must seek out alternative sources to support ...

Patel, Toral

2014-01-01T23:59:59.000Z

332

Adaptive radiation of chemosymbiotic deep-sea mussels  

Science Journals Connector (OSTI)

...are credited. Adaptive radiation of chemosymbiotic deep-sea...Research Department, Japan Agency for Marine-Earth...Yokosuka 237-0061, Japan 2 Geoscience Center...Yamanashi 400-8510, Japan Adaptive radiations present fascinating opportunities...

2013-01-01T23:59:59.000Z

333

Climate Change Adaptation: A Collective Action Perspective on Federalism Considerations  

E-Print Network (OSTI)

adaptation to minimize the adverse effects of climate change. Climate change adaptation is designed to increase the resilience of natural and human ecosystems to the threats posed by a changing environment. Although an extensive literature concerning...

Glicksman, Robert L.; Levy, Richard E.

2010-01-01T23:59:59.000Z

334

Artificial gravity : neurovestibular adaptation to incremental exposure to centrifugation  

E-Print Network (OSTI)

(cont.) not build up adaptation, all subjects in the experimental group who completed the protocol showed signs of adaptation to the stimulus. Only one subject did not complete the five sessions, setting the drop-out rate ...

Bruni, Sylvain, 1981-

2004-01-01T23:59:59.000Z

335

Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs 2012...

336

Design and evaluation of an adaptive icon toolbar  

Science Journals Connector (OSTI)

At the user's convenience, the adaptive bar offers suggestions for adding or removing command icons, based on the frequency and probability of ... adaptive behavior of displaying the frequency of each icon's use ...

Matjaz Debevc; Beth Meyer; Dali Donlagic

1996-01-01T23:59:59.000Z

337

Urban climate resilience : a global assessment of city adaptation plans  

E-Print Network (OSTI)

As policy makers accept climate change as an irrefutable threat, adaptation planning has emerged as a necessary action for countries, states, and municipalities. This thesis explores adaptive responses to climate change ...

Katich, Kristina Noel

2009-01-01T23:59:59.000Z

338

BIA Request for Proposals for Climate Adaptation Grants for Tribes  

Energy.gov (U.S. Department of Energy (DOE))

Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

339

What Should Adaptivity Mean to Interactive Software Programmers?  

E-Print Network (OSTI)

and adaptation are combined in a simple and innovative manner. Author Keywords Adaptive software, plasticity.2.11.Software engineering: Software Architectures INTRODUCTION Software adaptivity is a long time- stood as the self-modification of a system under context vari- ations, arose as a significant issue

Paris-Sud XI, Université de

340

Creating an adaptable workforce: important implications for CIOs  

E-Print Network (OSTI)

talent Planning for leadership succession Fostering workforce adaptability Unquestionably, to winMarch 2008 Creating an adaptable workforce: important implications for CIOs #12;Creating an adaptable workforce: important implications for CIOs Page 2 Contents 2 Introduction 3 The IBM Global Human

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Market-based mechanisms for climate change adaptation  

E-Print Network (OSTI)

of Climate Change and Energy Efficiency) and the National Climate Change Adaptation Research FacilityMarket-based mechanisms for climate change adaptation Final Report John McAneney, Ryan Crompton FOR CLIMATE CHANGE ADAPTATION Assessing the potential for and limits to insurance and market-based mechanisms

Colorado at Boulder, University of

342

Adaptive control based on neural network system identification  

Science Journals Connector (OSTI)

In adaptive control and system identification the self tuning regulator has wide range of applications. Neural network and artificial intelligence have big role in this area. This paper presents adaptive neural network control based on self tuning regulator ... Keywords: adaptive control, neural network, neuro control, self tuning regulator, system identification

Hassan E. A. Ibrahim

2012-02-01T23:59:59.000Z

343

Waters, Seas and Wine: Science for Successful Climate Adaptation  

SciTech Connect

is a growing demand for adaptation science as a vehicle for delivering critical knowledge to public and private organizations that are attempting to adapt to the changing climate. This expansion of adaptation science is occurring, however, in the absence of a robust understanding of how that science can or should contribute to successful adaptation. For the adaptation science enterprise to be successful, it must provide knowledge that has value to adaptation actors. Accomplishing this objective, however, often requires more than just research, and, in fact, may necessitate new cultural perspectives regarding the role of science in public policy as well as new kinds of researchers and research institutions. These issues are explored through a series of case studies from Australia and the United Kingdom that illustrate the various ways in which adaptation science engages with adaptation processes and the extent to which that science can be judged as successful. The case studies demonstrate that there are multiple pathways by which adaptation science can be successful, depending on the knowledge that is needed by a particular actor at a particular stage in the adaptation process. Nevertheless, there are significant opportunities for the more explicit alignment of the needs of decision-makers and the adaptation research that is undertaken as well as critical reflection on, and evaluation of, the return on investment from research that is pursued in the name of enabling adaptation.

Preston, Benjamin L [ORNL

2012-01-01T23:59:59.000Z

344

Autopoiesis, the immune system, and adaptive information filtering  

Science Journals Connector (OSTI)

Adaptive information filtering is a challenging and fascinating problem. It requires the adaptation of a representation of a user's multiple interests to various changes in them. We tackle this dynamic problem with Nootropia, a model inspired by the ... Keywords: Adaptive information filtering, Autopoiesis, Immune-inspired

Nikolaos Nanas; Anne Roeck

2009-06-01T23:59:59.000Z

345

Adaptive beam profile control using a simulated annealing algorithm  

E-Print Network (OSTI)

adaptive optics system," Opt. Commun. 176, 339-345 (2000). 3. R. B. Shake and B. C. Platt, "Production. Murnane, H. C. Kapteyn, S. Backus, G. Vdovin "Adaptive pulse compensation for transform-limited 15-fs high-energy transverse mode control and optimisation of an all-solid-state laser using an intracavity adaptive

346

Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, Geert-Jan Houben  

E-Print Network (OSTI)

model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

Houben, Geert-Jan

347

Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, GeertJan Houben  

E-Print Network (OSTI)

model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

De Bra, Paul

348

Adaptive phase measurements for narrowband squeezed beams  

E-Print Network (OSTI)

We have previously [Phys. Rev. A 65, 043803 (2002)] analyzed adaptive measurements for estimating the continuously varying phase of a coherent beam, and a broadband squeezed beam. A real squeezed beam must have finite photon flux N and hence can be significantly squeezed only over a limited frequency range. In this paper we analyze adaptive phase measurements of this type for a realistic model of a squeezed beam. We show that, provided it is possible to suitably choose the parameters of the beam, a mean-square phase uncertainty scaling as (N/kappa)^{-5/8} is possible, where kappa is the linewidth of the beam resulting from the fluctuating phase. This is an improvement over the (N/kappa)^{-1/2} scaling found previously for coherent beams. In the experimentally realistic case where there is a limit on the maximum squeezing possible, the variance will be reduced below that for coherent beams, though the scaling is unchanged.

Dominic W. Berry; Howard M. Wiseman

2006-03-22T23:59:59.000Z

349

Multi-model adaptive spatial hypertext  

E-Print Network (OSTI)

of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved as to style and content by: ________________________________ Frank M. Shipman, III (Chair of Committee) ________________________________ Richard K. Furuta (Member...-Model Adaptive Spatial Hypertext. (December 2004) Luis Francisco-Revilla, B.S., Universidad Iberoamericana; M.S., Texas A&M University Chair of Advisory Committee: Dr. Frank M. Shipman, III Information delivery on the Web often relies on general purpose Web...

Francisco-Revilla, Luis

2005-02-17T23:59:59.000Z

350

Adaptive excitation control in power systems  

E-Print Network (OSTI)

control input pu? and output gE? , we have puBxAx ?+?=? ? (2.25) xig ? (2.26) where ?? ? ?? ? ?== 6667 2 rJA , ?? ? ?? ?= 67 0 iB , [ ]08213.1=C 32....38) or puBxAx ?+?=? ? (2.39) xip ? (2.40) where p is a measurable output and iii C are uncertain system parameters. In the Chapter IV, we apply our adaptive control approaches to the real DAE system. We...

Chiu, Pei-Chen

2006-08-16T23:59:59.000Z

351

Robust adaptive control of HVDC systems  

SciTech Connect

The transient performance of an HVDC power system is highly dependent on the parameters of the current/voltage regulators of the converter controls. In order to better accommodate changes in system structure or dc operating conditions, this paper introduces a new adaptive control strategy. The advantages of automatic tuning for continuous fine tuning are combined with predetermined gain scheduling in order to achieve robustness for large disturbances. Examples are provided for a digitally simulated back-to-back dc system.

Reeve, J.; Sultan, M. (Univ. of Waterloo, Ontario (Canada))

1994-07-01T23:59:59.000Z

352

Protein Structure Suggests Role as Molecular Adapter  

NLE Websites -- All DOE Office Websites (Extended Search)

Protein Structure Suggests Role Protein Structure Suggests Role as Molecular Adapter Protein Structure Suggests Role as Molecular Adapter Print Wednesday, 24 June 2009 00:00 To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the replisome. An essential step in replisome assembly is the loading of ring-shaped helicases (motor proteins) onto the separated strands of DNA. Dedicated ATP-fueled proteins regulate the loading; however, the mechanism by which these proteins recruit and deposit helicases has remained unclear. To better understand this process, researchers at the University of California, Berkeley, recently determined the structure of the ATPase region of DnaC, a bacterial helicase loader. The structure revealed that DnaC is a close cousin of DnaA, the protein thought to be responsible for unwinding DNA. Unexpectedly, the team further found that DnaC forms a right-handed helix similar to the state adopted by ATP-bound DnaA. These findings, together with biochemical studies, implicate DnaC as a molecular adapter that uses ATP-activated DnaA as a docking site for ensuring that DnaB (the ring-shaped helicase) is correctly deposited at the onset of replication.

353

E-Print Network 3.0 - adaptive learning environments Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

to adapt the learning environment... Adaptability and ... Source: Oppermann, Reinhard - Fraunhofer-Institute for Applied Information Technology & Fachbereich Informatik,...

354

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

355

Economic Evaluation of Climate Change Adaptation Projects: Approaches for  

Open Energy Info (EERE)

Economic Evaluation of Climate Change Adaptation Projects: Approaches for Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary Name: Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Agency/Company /Organization: Global Environment Facility Sector: Land Focus Area: Agriculture Topics: Adaptation, Policies/deployment programs Website: siteresources.worldbank.org/ENVIRONMENT/Resources/DevCC1_Adaptation.pd Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Screenshot References: Economic Evaluation of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond[1] Overview "This paper identifies key challenges and solutions for carrying out

356

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

357

Financing Climate Adaptation and Mitigation in Rural Areas of Developing  

Open Energy Info (EERE)

Financing Climate Adaptation and Mitigation in Rural Areas of Developing Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Agency/Company /Organization: U.S. Agency for International Development Topics: Adaptation, Co-benefits assessment, Finance Resource Type: Publications Website: pdf.usaid.gov/pdf_docs/PNADO826.pdf Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries Screenshot References: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries[1] Summary "In order to determine how USAID assistance may help overcome barriers to financing these types of projects, this report addresses the following

358

Climate Change Adaptation and Mitigation in the Tourism Sector | Open  

Open Energy Info (EERE)

Climate Change Adaptation and Mitigation in the Tourism Sector Climate Change Adaptation and Mitigation in the Tourism Sector Jump to: navigation, search Tool Summary Name: Climate Change Adaptation and Mitigation in the Tourism Sector Agency/Company /Organization: United Nations Environment Programme Topics: Adaptation, Co-benefits assessment Resource Type: Publications Website: www.unep.fr/shared/publications/pdf/DTIx1047xPA-ClimateChange.pdf Climate Change Adaptation and Mitigation in the Tourism Sector Screenshot References: Climate Change Adaptation and Mitigation in the Tourism Sector[1] Summary "This document forms part of the " UNEP Manuals on Sustainable Tourism" and the UNWTO sustainable tourism policy guidebooks publication series, aiming to provide guidance to tourism stakeholders to integrate

359

Adaptation to Climate Variability and Change: A Guidance Manual for  

Open Energy Info (EERE)

Adaptation to Climate Variability and Change: A Guidance Manual for Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning Agency/Company /Organization: United States Agency for International Development Sector: Climate, Energy, Land, Water Topics: Adaptation Resource Type: Guide/manual Website: pdf.usaid.gov/pdf_docs/PNADJ990.pdf References: Adaptation to Climate Variability and Change: A Guidance Manual for Development Planning[1] "This Adaptation Guidance Manual is the first of several tools we are developing to assist planners and stakeholders as they cope with a changing climate. As we work with Missions to apply the methods described here, we

360

Microsoft PowerPoint - Powerpoint_Adaptive.ppt [Compatibility Mode]  

NLE Websites -- All DOE Office Websites (Extended Search)

Response Response to Low Dose Radiation Adaptive Response Adaptive Response When large radiation When large radiation exposure is preceded by a ll " i kl " d h small "tickle" dose, the effect of the large dose is effect of the large dose is sometimes diminished The first time you go to the beach in the summer you don't usually spend 8 hours in summer, you don t usually spend 8 hours in the sun. You begin by being out an hour or d dd ddi i l i h i ki two and add additional time as their skin adapts to the sunny condition and develops protective mechanisms.... Adaptive Response Adaptive Response In some cases, cells also show an "adaptive response" to radiation, although researchers p , g are still trying to understand how the protective mechanisms work. Small doses p

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of  

Open Energy Info (EERE)

Impacts, Vulnerability and Adaptation: The Case of Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Agency/Company /Organization World Agroforestry Centre Sector Land Focus Area Forestry Topics Adaptation, Background analysis, Co-benefits assessment Resource Type Publications Website http://www.worldagroforestry.o Country Philippines UN Region South-Eastern Asia References Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed[1] Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan Watershed Screenshot This article is a stub. You can help OpenEI by expanding it.

362

Study Shows Roles of Receptor, Thiol on Adaptive Response  

NLE Websites -- All DOE Office Websites (Extended Search)

Study Shows Roles of Receptor, Thiol on Adaptive Response Study Shows Roles of Receptor, Thiol on Adaptive Response Jeffrey Murley Jeffrey Murley, Ph.D. David Grdina, Ph.D. Low Dose program-supported scientists at The University of Chicago have gained more insight into adaptive protective responses indicating the role of oxidative stress, the role of reactive oxygen species (ROS), and the induction of SOD2 (manganese Superoxide Dismutase) activity. These changes are central to the production of adaptive protective responses. Why Study Adaptive Response? Exposing cells to low doses of ionizing radiation has been reported to elevate resistance to genomic damage when the same cells are subsequently exposed to a much higher dose of radiation. This phenomenon, called adaptive response, is characterized by an increase

363

Restricted Complexity Framework for Nonlinear Adaptive Control in Complex Systems  

SciTech Connect

Control law adaptation that includes implicit or explicit adaptive state estimation, can be a fundamental underpinning for the success of intelligent control in complex systems, particularly during subsystem failures, where vital system states and parameters can be impractical or impossible to measure directly. A practical algorithm is proposed for adaptive state filtering and control in nonlinear dynamic systems when the state equations are unknown or are too complex to model analytically. The state equations and inverse plant model are approximated by using neural networks. A framework for a neural network based nonlinear dynamic inversion control law is proposed, as an extrapolation of prior developed restricted complexity methodology used to formulate the adaptive state filter. Examples of adaptive filter performance are presented for an SSME simulation with high pressure turbine failure to support extrapolations to adaptive control problems.

Williams, Rube B. [Los Alamos National Laboratory, P.O. Box 1663, MS K575, Los Alamos, NM 87545 (United States)

2004-02-04T23:59:59.000Z

364

Mainstreaming Climate Change Adaptation into Development Planning: A Guide  

Open Energy Info (EERE)

Mainstreaming Climate Change Adaptation into Development Planning: A Guide Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Agency/Company /Organization: United Nations Environment Programme (UNEP) Sector: Climate Focus Area: Economic Development Topics: Co-benefits assessment, Pathways analysis Resource Type: Guide/manual Website: www.unpei.org/component/docman/doc_download/79-pei-mainstreaming-clima Cost: Free Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Screenshot References: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners[1] Logo: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners

365

Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, Geert-Jan Houben, Paul De Bra  

E-Print Network (OSTI)

applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

Houben, Geert-Jan

366

Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, GeertJan Houben, Paul De Bra  

E-Print Network (OSTI)

applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

De Bra, Paul

367

A linearly constrained adaptive algorithm for seismic array processing  

E-Print Network (OSTI)

is described. The constrained IPS adaptive algorithm of Frost ( 1972) is derived from this linearly constrained LNS algorithm and compared with other algorithms. Theoretical analyses show that the constrained LMS adaptive algorithm is able to provide1 a... better than simple channel-averaging. hut in the case of the real seismic data, it takes advantage of the coher- ence feature of noise between channels to reduce the noise power. Further experiments indicate that the constrained LNS adaptive algorithm...

Byun, Bok Sub

2012-06-07T23:59:59.000Z

368

Adaptive heterogeneous multi-robot teams  

SciTech Connect

This research addresses the problem of achieving fault tolerant cooperation within small- to medium-sized teams of heterogeneous mobile robots. The author describes a novel behavior-based, fully distributed architecture, called ALLIANCE, that utilizes adaptive action selection to achieve fault tolerant cooperative control in robot missions involving loosely coupled, largely independent tasks. The robots in this architecture possess a variety of high-level functions that they can perform during a mission, and must at all times select an appropriate action based on the requirements of the mission, the activities of other robots, the current environmental conditions, and their own internal states. Since such cooperative teams often work in dynamic and unpredictable environments, the software architecture allows the team members to respond robustly and reliably to unexpected environmental changes and modifications in the robot team that may occur due to mechanical failure, the learning of new skills, or the addition or removal of robots from the team by human intervention. After presenting ALLIANCE, the author describes in detail the experimental results of an implementation of this architecture on a team of physical mobile robots performing a cooperative box pushing demonstration. These experiments illustrate the ability of ALLIANCE to achieve adaptive, fault-tolerant cooperative control amidst dynamic changes in the capabilities of the robot team.

Parker, L.E.

1998-11-01T23:59:59.000Z

369

Adaptive Non-Boltzmann Monte Carlo  

SciTech Connect

This manuscript generalizes the use of transition probabilities (TPs) between states, which are efficient relative to histogram procedures in deriving system properties. The empirical TPs of the simulation depend on the importance weights and are temperature-specific, so they are not conducive to accumulating statistics as weights change or to extrapolating in temperature. To address these issues, the authors provide a method for inferring Boltzmann-weighted TPs for one temperature from simulations run at other temperatures and/or at different adaptively varying importance weights. They refer to these as canonical transition probabilities (CTPs). System properties are estimated from CTPs. Statistics on CTPs are gathered by inserting a low-cost easily-implemented bookkeeping step into the Metropolis algorithm for non-Boltzmann sampling. The CTP method is inherently adaptive, can take advantage of partitioning of the state space into small regions using either serial or (embarrassingly) parallel architectures, and reduces variance by avoiding histogramming. They also demonstrate how system properties may be extrapolated in temperature from CTPs without the extra memory required by using energy as a microstate label. Nor does it require the solution of non-linear equations used in histogram methods.

Fitzgerald, M.; Picard, R.R.; Silver, R.N.

1998-06-01T23:59:59.000Z

370

Adaptive management of coastal ecosystem restoration projects  

Science Journals Connector (OSTI)

There is a clear need to apply better and more effective management schemes to coastal ecosystem restoration projects. It is very common for aquatic ecosystem restoration projects not to meet their goals. Poor performance has led to a high degree of uncertainty about the potential success of any restoration effort. Under adaptive management, the knowledge gained through monitoring of the project and social policies is translated into restoration policy and program redesign. Planners and managers can utilize the information from the monitoring programs in an effective way to assure that project goals are met or that informed and objective decisions are made to address both ecological and societal needs. The three main ingredients of an effective adaptive management plan in a restoration project are: (1) a clear goal statement; (2) a conceptual model; and (3) a decision framework. The goal drives the design of the project and helps guide the development of performance criteria. The goal statement and performance criteria provide the means by which the system can be judged. With the conceptual model, the knowledge base from the field of ecological science plays an active and critical role in designing the project to meet the goal. A system-development matrix provides a simple decision framework to view the alternative states for the system during development, incorporate knowledge gained through the monitoring program, and formulate a decision on actions to take if the system is not meeting its goal.

Ronald M Thom

2000-01-01T23:59:59.000Z

371

Regional Climate Change Adaptation Platform for Asia | Open Energy  

Open Energy Info (EERE)

Platform for Asia Platform for Asia Jump to: navigation, search Logo: Regional Climate Change Adaptation Platform for Asia Name Regional Climate Change Adaptation Platform for Asia Agency/Company /Organization United Nations Environment Programme, Swedish International Development Cooperation Agency, Stockholm Environment Institute, Asian Institute of Technology/UNEP Regional Resource Centre for Asia and the Pacific Topics Adaptation, Policies/deployment programs Website http://www.climateadapt.asia/ Country Cambodia, China, Laos, Myanmar, Thailand, Vietnam, Bangladesh, Bhutan, Nepal, Sri Lanka, Indonesia, Malaysia, Philippines UN Region Eastern Asia, South-Eastern Asia References Regional Climate Change Adaptation Platform for Asia[1] Overview "This initiative supports research and capacity building on climate change

372

The Cost to Developing Countries of Adapting to Climate Change...  

Open Energy Info (EERE)

to Climate Change Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Cost to Developing Countries of Adapting to Climate Change AgencyCompany Organization:...

373

A synthetic DNA based approach to design of adaptive systems  

Science Journals Connector (OSTI)

Development of large engineered systems involves large amount of investments. Yet the value of these systems decreases significantly as requirements and environments change. For mission critical systems the capability of adapting to unpredictable situations is the key for success. While the importance of system adaptability has been recognized, little research has been done for design for adaptability. We take a naturalistic design approach to developing adaptive lifelike systems by exploiting natural design processes and mimicking its DNA based way of capturing, representing and applying design information pertaining to needed functions and changing operational situations. The concepts and examples of this approach are discussed.

Y. Jin; G.E. Zouein; S.C.-Y. Lu

2009-01-01T23:59:59.000Z

374

Financing Climate Adaptation and Mitigation in Rural Areas of...  

Open Energy Info (EERE)

areas that USAID could explore to enable the implementation of projects that produce climate change benefits." References "Financing Climate Adaptation and Mitigation in...

375

Quantitative Adaptation Analytics for Assessing Dynamic Systems of Systems.  

SciTech Connect

Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

Gauthier, John H.; Miner, Nadine E.; Wilson, Michael L.; Le, Hai D.; Kao, Gio K; Melander, Darryl J.; Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Robert Charles,

2015-01-01T23:59:59.000Z

376

ADAPT Elektronik GmbH | Open Energy Information  

Open Energy Info (EERE)

GmbH Jump to: navigation, search Name: ADAPT Elektronik GmbH Place: Grobheubach, Germany Zip: 63920 Sector: Solar Product: Germany-based manufacturer of electronic connector...

377

Development based climate change adaptation and mitigation-conceptual...  

Open Energy Info (EERE)

based climate change adaptation and mitigation-conceptual issues and lessons learned in studies in developing countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name:...

378

Adaptation to Climate Variability and Change: A Guidance Manual...  

Open Energy Info (EERE)

to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and...

379

Adapting Urban Transport to Climate Change- Module 5f - Sustainable...  

Open Energy Info (EERE)

Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Jump to: navigation, search Tool Summary LAUNCH...

380

Economic Evaluation of Climate Change Adaptation Projects: Approaches...  

Open Energy Info (EERE)

of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Economic Evaluation of Climate...

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

How to Integrate Climate Change Adaptation into National-Level...  

Open Energy Info (EERE)

Integrate Climate Change Adaptation into National-Level Policy and Planning in the Water Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: How to Integrate Climate...

382

Ethiopia-Climate Change National Adaptation Programme of Action...  

Open Energy Info (EERE)

Action Jump to: navigation, search Name Ethiopia-Climate Change National Adaptation Programme of Action AgencyCompany Organization United Nations Development Programme, Global...

383

Agricultural Technologies for Climate Change Mitigation and Adaptation...  

Open Energy Info (EERE)

Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for...

384

Benin-National Adaptation Plan Global Support Programme (NAP...  

Open Energy Info (EERE)

Adaptation Plans (NAPs). NAPs will bring greater focus and coordination to country-led efforts in disaster management and disaster risk reduction, and climate change...

385

Bangladesh-National Adaptation Plan Global Support Programme...  

Open Energy Info (EERE)

Adaptation Plans (NAPs). NAPs will bring greater focus and coordination to country-led efforts in disaster management and disaster risk reduction, and climate change...

386

Burkina Faso-National Adaptation Plan Global Support Programme...  

Open Energy Info (EERE)

Adaptation Plans (NAPs). NAPs will bring greater focus and coordination to country-led efforts in disaster management and disaster risk reduction, and climate change...

387

Applying Climate Information for Adaptation Decision-Making:...  

Open Energy Info (EERE)

Applying Climate Information for Adaptation Decision-Making: A Guidance and Resource Document Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Applying Climate...

388

Optimization Online - An Adaptive Partition-based Approach for ...  

E-Print Network (OSTI)

Dec 2, 2014 ... Our computational results show that the proposed adaptive partition-based approach converges very fast to a small partition for our test...

Yongjia Song

2014-12-02T23:59:59.000Z

389

USE OF QUADRATIC MODELS WITH MESH ADAPTIVE DIRECT ...  

E-Print Network (OSTI)

Mar 6, 2011 ... differences remain: the mesh adaptive direct search (MADS [6, ... implicit filtering method described in [19] may also be viewed as a hybrid...

Le Digabel

2011-03-06T23:59:59.000Z

390

Modeling and adaptive control of indoor unmanned aerial vehicles  

E-Print Network (OSTI)

The operation of unmanned aerial vehicles (UAVs) in constrained indoor environments presents many unique challenges in control and planning. This thesis investigates modeling, adaptive control and trajectory optimization ...

Michini, Bernard (Bernard J.)

2009-01-01T23:59:59.000Z

391

Characterizing Uncertainty for Regional Climate Change Mitigation and Adaptation Decisions  

SciTech Connect

This white paper describes the results of new research to develop an uncertainty characterization process to help address the challenges of regional climate change mitigation and adaptation decisions.

Unwin, Stephen D.; Moss, Richard H.; Rice, Jennie S.; Scott, Michael J.

2011-09-30T23:59:59.000Z

392

Africa Adaptation Programme: Capacity Building Experiences-Improving...  

Open Energy Info (EERE)

Data and Information Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding...

393

An adaptive attack on Wiesner's quantum money  

E-Print Network (OSTI)

Unlike classical money, which is hard to forge for practical reasons (e.g. producing paper with a certain property), quantum money is attractive because its security might be based on the no-cloning theorem. The first quantum money scheme was introduced by Wiesner circa 1970. Although more sophisticated quantum money schemes were proposed, Wiesner's scheme remained appealing because it is both conceptually clean and relatively easy to implement. We show efficient adaptive attacks on Wiesner's quantum money scheme [Wie83] (and its variant by Bennett et al. [BBBW83]), when valid money is accepted and passed on, while invalid money is destroyed. We propose two attacks, the first is inspired by the Elitzur-Vaidman bomb testing problem [EV93, KWH+95], while the second is based on the idea of protective measurements [AAV93]. It allows us to break Wiesner's scheme with 4 possible states per qubit, and generalizations which use more than 4 states per qubit.

Aharon Brodutch; Daniel Nagaj; Or Sattath; Dominique Unruh

2014-09-22T23:59:59.000Z

394

Adaptive Probabilistic Flooding for Multipath Routing  

E-Print Network (OSTI)

In this work, we develop a distributed source routing algorithm for topology discovery suitable for ISP transport networks, that is however inspired by opportunistic algorithms used in ad hoc wireless networks. We propose a plug-and-play control plane, able to find multiple paths toward the same destination, and introduce a novel algorithm, called adaptive probabilistic flooding, to achieve this goal. By keeping a small amount of state in routers taking part in the discovery process, our technique significantly limits the amount of control messages exchanged with flooding -- and, at the same time, it only minimally affects the quality of the discovered multiple path with respect to the optimal solution. Simple analytical bounds, confirmed by results gathered with extensive simulation on four realistic topologies, show our approach to be of high practical interest.

Betoule, Christophe; Clavier, Remi; Rossi, Dario; Rossini, Giuseppe; Thouenon, Gilles

2011-01-01T23:59:59.000Z

395

Adaptive model training system and method  

DOE Patents (OSTI)

An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

Bickford, Randall L; Palnitkar, Rahul M

2014-11-18T23:59:59.000Z

396

Adaptive model training system and method  

DOE Patents (OSTI)

An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

Bickford, Randall L; Palnitkar, Rahul M; Lee, Vo

2014-04-15T23:59:59.000Z

397

Phase sensor for solar adaptive-optics  

E-Print Network (OSTI)

Wavefront sensing in solar adaptive-optics is currently done with correlating Shack-Hartmann sensors, although the spatial- and temporal-resolutions of the phase measurements are then limited by the extremely fast computing required to correlate the sensor signals at the frequencies of daytime atmospheric-fluctuations. To avoid this limitation, a new wavefront-sensing technique is presented, that makes use of the solar brightness and is applicable to extended sources. The wavefront is sent through a modified Mach-Zehnder interferometer. A small, central part of the wavefront is used as reference and is made to interfere with the rest of the wavefront. The contrast of two simultaneously measured interference-patterns provides a direct estimate of the wavefront phase, no additional computation being required. The proposed optical layout shows precise initial alignment to be the critical point in implementing the new wavefront-sensing scheme.

Kellerer, Aglae

2011-01-01T23:59:59.000Z

398

Electronic-structure calculations in adaptive coordinates  

Science Journals Connector (OSTI)

The plane-wave method for electronic-structure calculations is reformulated in generalized curvilinear coordinates. This introduces a new set of basis functions that depend continuously on a coordinate transformation, and can adapt themselves to represent optimally the solutions of the Schrdinger equation. As a consequence, the effective plane-wave energy cutoff is allowed to vary in the unit cell in an unbiased way. The efficiency of this method is demonstrated in the calculation of the equilibrium structures of the CO and H2O molecules using the local-density approximation of density-functional theory, and norm-conserving, nonlocal pseudopotentials. The easy evaluation of forces on all degrees of freedom makes the method suitable for ab initio molecular-dynamics applications.

Franois Gygi

1993-10-15T23:59:59.000Z

399

Adaptive Competition, Market Efficiency, and Phase Transitions  

Science Journals Connector (OSTI)

In many social and biological systems agents simultaneously and adaptively compete for limited resources, thereby altering their environment. We analyze a simple model that incorporates fundamental features of such systems. If the space of strategies available to the agents is small, the system is in a phase in which all information available to the agents' strategies is traded away, and agents' choices are maladaptive, resulting in a poor collective utilization of resources. For larger strategy spaces, the system is in a phase in which the agents are able to coordinate their actions to achieve a better utilization of resources. The best utilization of resources occurs at a critical point, when the dimension of the strategy space is on the order of the number of agents.

Robert Savit; Radu Manuca; Rick Riolo

1999-03-08T23:59:59.000Z

400

ADAPTIVE ONLINE ENERGY SAVING FOR HETEROGENEOUS SENSOR Meikang Qiu1  

E-Print Network (OSTI)

ADAPTIVE ONLINE ENERGY SAVING FOR HETEROGENEOUS SENSOR NETWORKS Meikang Qiu1 Jingtong Hu2 Edwin H-to-predict environments and have limited lifetime. We use a novel adaptive online energy saving (AOES) algorithm to save as a probabilistic random variable to save energy by se- lecting the best mode assignment for each node, which

Sha, Edwin

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Structural adaptations to diverse fighting styles in sexually selected weapons  

E-Print Network (OSTI)

Structural adaptations to diverse fighting styles in sexually selected weapons Erin L. McCullough1 11, 2014 (received for review May 22, 2014) The shapes of sexually selected weapons differ widely weapon shapes reflect structural adaptations to different fighting styles, yet explicit tests

Emlen, Douglas J.

402

Grid Computing: Adaptive Software, Tools, and Applications Call For Papers  

E-Print Network (OSTI)

Grid Computing: Adaptive Software, Tools, and Applications Call For Papers Software Technology Mini-Track, HICSS-41 http://wcl.cs.rpi.edu/hicss-grid/ Grid computing environments are highly heteroge- neous and dynamic. Software for grid computing must be able to adapt dynamically to changes in the underlying

Varela, Carlos

403

Parametric Adaptive Spectrum Sensing Framework for Dynamic Spectrum Access Networks  

E-Print Network (OSTI)

- ture for dynamic spectrum sensing. In our approach, the radio learns the statistics of the channel Spectrum Sensing Architecture The proposed PASS architecture enables the radio to adapt its spectrumParametric Adaptive Spectrum Sensing Framework for Dynamic Spectrum Access Networks Dinesh Datla

Kansas, University of

404

Sufficient Conditions for Well-behaved Adaptive Hypermedia Systems  

E-Print Network (OSTI)

for the architecture of adaptive hypermedia applications: the Adaptive Hypermedia Application Model (AHAM) [DHW99]. AHAM describes AHS at an abstract level, using an architecture consisting of three parts: · a domain (AE) are discussed in earlier paper [WDD01]. We defined a rule language for AHS, AHAM-CA and proposed

De Bra, Paul

405

Adapting to Climate Change and Variability in the  

E-Print Network (OSTI)

projects form part of the broader regional Project. As part of the Project, a Symposium Adapting to Climate the Project. The stakeholders responded by sharing their perspectives on the impacts of the climate change1 Adapting to Climate Change and Variability in the Great Lakes-St. Lawrence Basin PROCEEDINGS

406

Saving Energy with Architectural and Frequency Adaptations for Multimedia Applications  

E-Print Network (OSTI)

Saving Energy with Architectural and Frequency Adaptations for Multimedia Applications will benefit DVS. Our adaptation control algorithm is effective in saving energy and exploits most. The existence of this idle time, called slack, implies that the processor can be slowed to save energy

Adve, Sarita

407

Non-Adaptive Complex Group Testing with Multiple Positive Sets  

E-Print Network (OSTI)

Non-Adaptive Complex Group Testing with Multiple Positive Sets Francis Y.L. Chin, Henry C.M. Leung Given n items with at most d of them having a particular property (referred as positive items), a test-adaptive group testing problem is to design how to group the items to minimize the number of tests required

Chin, Francis Y.L.

408

Efficiently Decodable Non-adaptive Group Testing Piotr Indyk  

E-Print Network (OSTI)

. The answer to the test tells whether xi = 0 for all i S or not. The objective is to design as few tests]. In this case, items are blood samples, which are positive if they are infected, and a test is a pool of samples: the outcome of one test cannot be used to adaptively design another test. Non- adaptive group testing (NAGT

409

Runtime Performance Modeling and Measurement of Adaptive Distributed Object Applications  

Science Journals Connector (OSTI)

Distributed applications that can adapt at runtime to changing quality of service (QoS) require a model of the expected QoS and of the possible application adaptations. QoS models in turn require runtime measurements, both in-band and out-of-band, from ...

John A. Zinky; Joseph P. Loyall; Richard Shapiro

2002-10-01T23:59:59.000Z

410

Overcoming Dataset Bias: An Unsupervised Domain Adaptation Approach  

E-Print Network (OSTI)

Overcoming Dataset Bias: An Unsupervised Domain Adaptation Approach Boqing Gong Dept. of Computer that recognition datasets are biased. Paying no heed to those biases, learning algorithms often result in classifiers with poor cross- dataset generalization. We are developing domain adaptation techniques to over

Grauman, Kristen

411

Adaptive Optics in Astronomy Jay J. McCarthy  

E-Print Network (OSTI)

Adaptive Optics in Astronomy Jay J. McCarthy NW Computational Intelligence Laboratory Portland State University Abstract ­ The field of adaptive optics (AO) has developed as a means to correct for the phase disturbances of an optical signal by understanding the medium through which it passes. This paper

La Rosa, Andres H.

412

Adaptive Organizations and Emergent Forms Kathleen M. Carley  

E-Print Network (OSTI)

individual learning (micro-behavior) and organizational learning and adaptation (macro of organizations using intelligent artificial agents. Using ORGAHEAD, a multi-agent model of organizational behavior, a series of virtual experiments were run to examine issues of organizational adaptation. Results

Sadeh, Norman M.

413

Adaptive Organizations and Emergent Forms Kathleen M. Carley  

E-Print Network (OSTI)

learning (micro-behavior) and organizational learning and adaptation (macro-behavior) is the subject of organizations using intelligent artificial agents. Using ORGAHEAD, a multi-agent model of organizational behavior, a series of virtual experiments were run to examine issues of organizational adaptation. Results

Sadeh, Norman M.

414

Adaptive Management Strategies May be Answer to Water Disputes  

E-Print Network (OSTI)

Adaptive Management Strategies May be Answer to Water Disputes LINCOLN, Neb. -- Adaptive management leader in water- management and water-quality research. It has the largest underground aquifer in 1971 spurred new water management districts. Later developments have sought to undo environmental

Nebraska-Lincoln, University of

415

Energy-aware complexity adaptation for mobile video calls  

Science Journals Connector (OSTI)

High energy consumption has become a challenge for multimedia applications on mobile platforms. We propose a cross layer framework that integrates complexity adaptation and energy conservation for mobile video calls. First we select the most utility-aware ... Keywords: adaptation, energy-use optimization, mobile video calls

Haiyang Ma; Deepak Gangadharan; Nalini Venkatasubramanian; Roger Zimmermann

2011-11-01T23:59:59.000Z

416

Are three-dimensional spider webs defensive adaptations?  

E-Print Network (OSTI)

LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

Blackledge, Todd

417

On Adaptive Mesh Refinement for Atmospheric Pollution Models  

E-Print Network (OSTI)

On Adaptive Mesh Refinement for Atmospheric Pollution Models Emil M. Constantinescu and Adrian Springer-Verlag Berlin Heidelberg 2005 #12;On Adaptive Mesh Refinement for Atmospheric Pollution Models 799 res- olution system for modeling regional air pollution based on the chemical transport model STEM

Sandu, Adrian

418

Fast Concurrent Dynamic Linking for an Adaptive Operating System  

E-Print Network (OSTI)

Fast Concurrent Dynamic Linking for an Adaptive Operating System Crispin Cowan, Tito Autrey operating system is one that can adapt to some particular circumstance to gain some functional or perfor due to the cost of inter-process protection barriers. Commercial operating systems that can e ciently

Walpole, Jonathan

419

Africa Adaptation Programme: Capacity Building Experiences-Improving  

Open Energy Info (EERE)

Africa Adaptation Programme: Capacity Building Experiences-Improving Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Jump to: navigation, search Tool Summary Name: Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Agency/Company /Organization: United Nations Development Programme (UNDP) Sector: Climate, Energy Topics: Adaptation, Co-benefits assessment, - Energy Access Resource Type: Dataset, Lessons learned/best practices Website: www.undp.org/environment/library.shtml Cost: Free UN Region: Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa Language: English Africa Adaptation Programme: Capacity Building Experiences-Improving Access, Understanding and Application of Climate Data and Information Screenshot

420

Agricultural Technologies for Climate Change Mitigation and Adaptation in  

Open Energy Info (EERE)

Agricultural Technologies for Climate Change Mitigation and Adaptation in Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Jump to: navigation, search Tool Summary Name: Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Agency/Company /Organization: International Centre for Trade and Sustainable Development Sector: Land Focus Area: Agriculture, Biomass Topics: Adaptation, Implementation, Policies/deployment programs Resource Type: Guide/manual, Publications Website: ictsd.org/downloads/2010/06/agricultural-technologies-for-climate-chan Language: English Agricultural Technologies for Climate Change Mitigation and Adaptation in Developing Countries: Policy Options for Innovations and Technology Diffusion Screenshot

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Asia-Pacific Regional Climate Change Adaptation Assessment | Open Energy  

Open Energy Info (EERE)

Asia-Pacific Regional Climate Change Adaptation Assessment Asia-Pacific Regional Climate Change Adaptation Assessment Jump to: navigation, search Tool Summary Name: Asia-Pacific Regional Climate Change Adaptation Assessment Agency/Company /Organization: U.S. Agency for International Development Sector: Energy Topics: Adaptation, Co-benefits assessment, Policies/deployment programs Resource Type: Publications Website: www.usaid.gov/rdma/documents/RDMA_Asia-Pacific_Climate_Change_Adaptati Country: China, Bangladesh, India, Indonesia, Laos, Marshall Islands, Federated States of Micronesia, Philippines, Thailand, Vietnam, Cambodia, Maldives, Mongolia, Nepal, Papua New Guinea, Timor-Leste, Solomon Islands, Sri Lanka, Vanuatu UN Region: Central Asia, Eastern Asia, South-Eastern Asia References: Asia-Pacific Adaptation Assessment[1]

422

India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate  

Open Energy Info (EERE)

Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Agency/Company /Organization Swiss Agency for Development and Cooperation Sector Energy, Land, Water Focus Area Agriculture Topics Co-benefits assessment, Background analysis Resource Type Lessons learned/best practices Website http://www.intercooperation.or Country India Southern Asia References India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change[1] India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change Screenshot Contents 1 Introduction [1] 2 Community-based Institutions [2] 3 Pasture Land Development [3]

424

Characterization Of High-Stroke High-Aspect Ratio Micro Electro Mechanical Systems Deformable Mirrors For Adaptive Optics  

E-Print Network (OSTI)

Mirrors For Adaptive Optics, PhD Thesis, University ofFabrication Adaptive optics applications in astronomy Max, Center for Adaptive Optics, University of California,

Bouchti, Mohamed Amine

2013-01-01T23:59:59.000Z

425

Integrating Adaptive Components: An Emerging Challenge in Performance-Adaptive Systems and a Server Farm Case-Study  

E-Print Network (OSTI)

into larger adaptive sys- tems, however, presents challenges that arise from potential incompatibilities among, for identifying potential incompatibilities between com- posed adaptation policies and (ii) illustrates a general computing initiative [13], sug- gest increased need for self-managing, self-calibrating, self- healing

Liu, Xue

426

Closed-loop Reference Model adaptive control : with application to very flexible aircraft  

E-Print Network (OSTI)

One of the main features of adaptive systems is an oscillatory convergence that exacerbates with the speed of adaptation. Over the past two decades several attempts have been made to provide adaptive solutions with guaranteed ...

Gibson, Travis Eli

2014-01-01T23:59:59.000Z

427

E-Print Network 3.0 - adaptive mixture modelling Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary: for each mixture in the prior model. Unlike the second step of the EM algorithm, for adaptation these "new... Using Adapted Gaussian Mixture Models. Digital Signal...

428

A Comparative Performance Study of Load Adaptive Energy Saving Schemes for IP-Over-WDM Networks  

Science Journals Connector (OSTI)

Load adaptive energy saving schemes for backbone IP networks use dynamic transport circuit services to adapt the active network resources to the current traffic demand in order to...

Caria, Marcel; Chamania, Mohit; Jukan, Admela

2012-01-01T23:59:59.000Z

429

Improved evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt, and Bruce A. Robinson  

E-Print Network (OSTI)

Improved evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt evolutionary optimization from genetically adaptive multimethod search Jasper A. Vrugt* and Bruce A. Robinson

Vrugt, Jasper A.

430

E-Print Network 3.0 - automatic spatially-adaptive balancing...  

NLE Websites -- All DOE Office Websites (Extended Search)

balancing Page: << < 1 2 3 4 5 > >> 1 Automatic Spatially-Adaptive Balancing of Energy Terms for Image Segmentation Summary: Automatic Spatially-Adaptive Balancing of Energy Terms...

431

E-Print Network 3.0 - academic adaptation styles Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

Whatever the process or level of adaptation implemented by a learning system... of Cognitive Style Relative to Other Individual Variables Adapting the environment to suit...

432

E-Print Network 3.0 - adaptive management plan Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

results for: adaptive management plan Page: << < 1 2 3 4 5 > >> 1 Regional Water Management: Adapting to Uncertain Water Summary: & Implement Management Options Monitor &...

433

E-Print Network 3.0 - adaptive dimension reduction Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

reduction of the crosstalk-resistant adaptive noise canceller (CTRANC) 12... with two adaptive filters. Simulation results will prove that in spite of this complexity...

434

E-Print Network 3.0 - adaptive signal processing Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

into the following sections. Section 2 deals with acoustic signal processing theory in adaptive filters. Section 3... ," An Introduction to Adaptive Signal Processing", McGraw-...

435

E-Print Network 3.0 - adaptive immunity human Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

studied Summary: in adaptive immunity 12;The MHC and neutrophin paralogy groups in the human genome 12;Two distinct forms... of the adaptive immune system "%&'() ...

436

Advancing Adaptive Optics Technology: Laboratory Turbulence Simulation and Optimization of Laser Guide Stars  

E-Print Network (OSTI)

of cone photoreceptors with adaptive optics spectral-domaincoherence tomography, Optics Express, Vol. 14, Issue 10,of Multi-Object Adaptive Optics on a Simulated 10-Meter

Rampy, Rachel

2013-01-01T23:59:59.000Z

437

E-Print Network 3.0 - adaptation technologies related Sample...  

NLE Websites -- All DOE Office Websites (Extended Search)

related Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: details - Comparisons Low level technology - Text programming...

438

E-Print Network 3.0 - adaptive short forms Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

at San Diego Collection: Biology and Medicine 13 Appeared in: International Journal of Human-Computer Studies (1994) 40, 544 -472 Adaptively supported Adaptability Summary: in...

439

Chapter 4 - Phytoremediation: Mechanisms and Adaptations  

Science Journals Connector (OSTI)

Abstract Metal contamination of soils is ubiquitous around the globe. Metals accumulate in the soils to toxic levels that may lead to accumulation of metals in plants to unacceptable levels. Metal accumulation is a subject of serious concern due to the threat to plant growth, soil quality, animal and human health. Cleaning up of the soils to remove metals is a current necessity, but it is a challenging task. Different technologies being used nowadays are ex situ which ensues in destruction of soil structure thus leaving it non-useable with poor vegetative cover. Growing plants to clean up the soils is a cost-effective and environmentally friendly alternative. Phytoremediation seems attractive due to non-invasive and non-destructive technology which leaves the soil intact and biologically productive. Plants use different adaptive mechanisms to accumulate or exclude metals, thus maintaining their growth. Accumulation and tolerance of metals by the plants is a complex phenomenon. Movement of metals across the root membrane, loading and translocation of metals through the xylem and sequestration and detoxification of metals at cellular and whole plant levels are important mechanisms adopted by accumulator plants. Understanding the mechanism involved in phytoremediation is necessary to effectively use this technique for metal-contaminated soils. This chapter discusses different mechanisms adopted by plants for remediation of metal-contaminated soils.

Muhammad Sabir; Ejaz Ahmad Waraich; Khalid Rehman Hakeem; Mnir ztrk; Hamaad Raza Ahmad; Muhammad Shahid

2015-01-01T23:59:59.000Z

440

Adaptive filters for detection of gravitational waves from coalescing binaries  

SciTech Connect

In this work we propose use of infinite impulse response adaptive line enhancer (IIR ALE) filters for detection of gravitational waves from coalescing binaries. We extend our previous work and define an adaptive matched filter structure. Filter performance is analyzed in terms of the tracking capability and determination of filter parameters. Furthermore, following the Neyman-Pearson strategy, receiver operating characteristics are derived, with closedform expressions for detection threshold, false alarm, and detection probability. Extensive tests demonstrate the effectiveness of adaptive filters both in terms of small computational cost and robustness.

Eleuteri, Antonio; Milano, Leopoldo; De Rosa, Rosario; Garufi, Fabio; Acernese, Fausto; Barone, Fabrizio; Giordano, Lara; Pardi, Silvio [Dip. di Scienze Fisiche, Universita di Napoli 'Federico II', via Cintia, I-80126 Naples (Italy) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy); Dip. di Scienze Farmaceutiche, Universita di Salerno, via Ponte Don Melillo, 84084 Fisciano (Saudi Arabia) (IT) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy); Dip. di Matematica ed Applicazioni, Universita di Napoli 'Federico II', via Cintia, I-80126 Naples (Italy) and INFN sez. Napoli, via Cintia, I-80126 Naples (Italy)

2006-06-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Ch.3 User Authentication Textbook?  

E-Print Network (OSTI)

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

442

Development based climate change adaptation and mitigation-conceptual  

Open Energy Info (EERE)

Development based climate change adaptation and mitigation-conceptual Development based climate change adaptation and mitigation-conceptual issues and lessons learned in studies in developing countries Jump to: navigation, search Tool Summary Name: Development based climate change adaptation and mitigation-conceptual issues and lessons learned in studies in developing countries Agency/Company /Organization: Lawrence Berkeley National Laboratory (LBNL) Sector: Climate, Energy, Land, Water Topics: Adaptation, Co-benefits assessment, - Energy Access, - Energy Security, - Health Resource Type: Case studies/examples, Lessons learned/best practices, Publications Website: ies.lbl.gov/iespubs/2halsaes.pdf Country: India, China, South Africa, Brazil, Bangladesh, Senegal Cost: Free Southern Asia, Eastern Asia, Southern Africa, South America, Southern Asia, Western Africa

443

Adaptive Gaussian Predictive Process Approximation Surya T Tokdar  

E-Print Network (OSTI)

exploration of Gaussian process models, including Bayesian treatments. For theoreti- cal details on commonAdaptive Gaussian Predictive Process Approximation Surya T Tokdar Duke University Abstract We address the issue of knots selection for Gaussian predictive process methodology. Predictive process

West, Mike

444

Run-time optimization of adaptive irregular applications  

E-Print Network (OSTI)

adaptive irregular applications for parallel execution, a common observation is that the effectiveness of the optimizing transformations depends on programs' input data and their dynamic phases. This dissertation presents a set of run-time optimization...

Yu, Hao

2004-11-15T23:59:59.000Z

445

Dynamic Resource Management for Adaptive Distributed Information Fusion in  

E-Print Network (OSTI)

Dynamic Resource Management for Adaptive Distributed Information Fusion in Large Volume for distributed information fusion to address large volume surveil- lance challenges, assuming a multitude of different sensor types on multi- ple mobile platforms for intelligence, surveillance and reconnaissance. Our

Zhang, Richard "Hao"

446

Self-adaptive architectures for autonomic computational science  

Science Journals Connector (OSTI)

Self-adaptation enables a system to modify it's behaviour based on changes in its operating environment. Such a system must utilize monitoring information to determine how to respond either through a systems administrator or automatically (based on policies ...

Shantenu Jha; Manish Parashar; Omer Rana

2009-09-01T23:59:59.000Z

447

Co-adapting human collaborations and software architectures  

Science Journals Connector (OSTI)

Human collaboration has become an integral part of large-scale systems for massive online knowledge sharing, content distribution, and social networking. Maintenance of these complex systems, however, still relies on adaptation mechanisms that remain ...

Christoph Dorn; Richard N. Taylor

2012-06-01T23:59:59.000Z

448

Identifying Recent Adaptations in Large-Scale Genomic Data  

E-Print Network (OSTI)

Although several hundred regions of the human genome harbor signals of positive natural selection, few of the relevant adaptive traits and variants have been elucidated. Using full-genome sequence variation from the 1000 ...

Andersen, KristianG.

449

Adaptive load control of microgrids with non-dispatchable generation  

E-Print Network (OSTI)

Intelligent appliances have a great potential to provide energy storage and load shedding for power grids. Microgrids are simulated with high levels of wind energy penetration. Frequency-adaptive intelligent appliances are ...

Brokish, Kevin Martin

2009-01-01T23:59:59.000Z

450

Nonlinear adaptive control using radial basis function approximants  

E-Print Network (OSTI)

The purpose of this research is to present an adaptive control strategy using the radial basis function approximation method. Surface approximation methods using radial basis function approximants will first be discussed. The Hamiltonian dynamical...

Petersen, Jerry Lee

1993-01-01T23:59:59.000Z

451

Reduced rank regression via adaptive nuclear norm penalization  

Science Journals Connector (OSTI)

......of the 500 simulated datasets: 100 Pred( ^ CH...method often outperforms nuclear norm penalized regression...other methods. The nuclear norm penalized estimator...intensive for large datasets, while other methods...DISCUSSION Adaptive nuclear norm penalization can......

Kun Chen; Hongbo Dong; Kung-Sik Chan

2013-12-01T23:59:59.000Z

452

Error estimation and adaptive mesh refinement for aerodynamic flows  

E-Print Network (OSTI)

Error estimation and adaptive mesh refinement for aerodynamic flows Ralf Hartmann1 and Paul Houston2 1 Institute of Aerodynamics and Flow Technology DLR (German Aerospace Center) Lilienthalplatz 7

Hartmann, Ralf

453

Continuous Adaptive Bias Technique for Radiofrequency Power Amplifiers  

Science Journals Connector (OSTI)

Chapter 3 proposes an adaptive-bias power amplifier that is based on a finely tuned envelope injection principle. Such flexible technique makes a simultaneous improvement of linearity and efficiency possible a...

Laurent Leyssenne; Eric Kerherv; Yann Deval

2011-01-01T23:59:59.000Z

454

Designing adaptable housing : the specific case of INFONAVIT  

E-Print Network (OSTI)

The traditional way of designing housing of the Mexican government agencies, obliges the population they serve (mostly working class people), to live in rigid dwellings that have little or no flexibility to be adapted to ...

Martin, Andrea M

1981-01-01T23:59:59.000Z

455

The mesh adaptive direct search algorithm with treed Gaussian ...  

E-Print Network (OSTI)

May 24, 2013 ... Keywords: Blackbox optimization, treed Gaussian processes (TGP), mesh adaptive ...... We first consider a chemical engineering simulator for styrene production described ..... Application of MATLAB and Python optimizers.

Gramacy and Le Digabel

2013-05-24T23:59:59.000Z

456

CLIMATE CHANGE Businesses see opportunity in adaptation, report finds  

Science Journals Connector (OSTI)

Companies that are able to adapt to climate change will gain a competitive business advantage in the future, according to a new report prepared by the United Nations Global Compact, a corporate network committed to social and environmental goals, in ...

MARC REISCH

2011-06-27T23:59:59.000Z

457

Adaptive control of hypersonic vehicles in presence of actuation uncertainties  

E-Print Network (OSTI)

The thesis develops a new class of adaptive controllers that guarantee global stability in presence of actuation uncertainties. Actuation uncertainties culminate to linear plants with a partially known input matrix B. ...

Somanath, Amith

2010-01-01T23:59:59.000Z

458

Democratic Republic of Congo-National Adaptation Plan Global...  

Open Energy Info (EERE)

that the NAP could build on Vision 2035 and that the NAP-GSP could help identify political entry-points for long term adaptation planning through Vision 2015. DRC are keen for...

459

Output-based Adaptive Meshing Using Triangular Cut Cells  

E-Print Network (OSTI)

This report presents a mesh adaptation method for higher-order (p > 1) discontinuous Galerkin (DG) discretizations of the two-dimensional, compressible Navier-Stokes equations. The method uses a mesh of triangular elements ...

Fidkowski, Krzysztof J.

460

Grid adaptation for functional outputs of compressible flow simulations  

E-Print Network (OSTI)

An error correction and grid adaptive method is presented for improving the accuracy of functional outputs of compressible flow simulations. The procedure is based on an adjoint formulation in which the estimated error in ...

Venditti, David Anthony, 1973-

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Design of an adaptable, protective covering for precision experiments  

E-Print Network (OSTI)

The following work provides the necessary details to assemble an adaptable enclosure device to protect precision experiments from the influence of outside factors. Through the use of UV resistant, sound resistant, electric ...

Turner, Shannon (Shannon Elizabeth)

2006-01-01T23:59:59.000Z

462

Nonlinear Adaptive Control for Bioreactors with Unknown Kinetics  

E-Print Network (OSTI)

on a real life wastewater treatment plant. Key words: Nonlinear adaptive control, continuous bioprocesses, unknown kinetics, wastewater treatment. 1 Introduction Biological processes have become widely used a pollutant (wastewater treatment...). There- fore, bioreactors require advanced regulation procedures

Bernard, Olivier

463

Adaptive Agent-Based Service Composition for Wireless Terminals  

Science Journals Connector (OSTI)

Software agents are one of the building blocks of ambient intelligence and pervasive computing. Adaptation to changes in the execution context is necessary in order to provide continuous and smooth provision o...

Sasu Tarkoma; Mikko Laukkanen

2003-01-01T23:59:59.000Z

464

Adaptive properties of stochastic memristor networks: a computational study  

E-Print Network (OSTI)

., Berzina, T., Erokhin, V., Fontana, M.P. 2008. Polymeric electrochemical element for adaptive networks-scale configurations. Using this simulation platform we have shown that memristor networks stimulated with random noise

465

Active Optics, Adaptive Optics, and Laser Guide Stars  

Science Journals Connector (OSTI)

...Southern Observatory, Karl-Schwarzschild-Strasse 2, 85748 Garching...WITH A SEGMENTED ADAPTIVE MIRROR, APPLIED OPTICS 31 : 3161...Southern Observatory, Karl-Schwarzschild-Strasse 2, 85748 Garching...defo-cusing, decentering, or mirror deformations generated by...

N. Hubin; L. Noethe

1993-11-26T23:59:59.000Z

466

Functional safety of adaptive embedded control systems: new solutions  

Science Journals Connector (OSTI)

This paper deals with the functional safety of embedded control system following component-based technologies. The functional safety in a device of the interconnected control components is handled by an agent that controls and adapts the local behaviour ...

Atef Gharbi, Mohamed Khalgui

2014-09-01T23:59:59.000Z

467

ADAPTIVE MODELLING IN THE DESIGN OF INTERACTIVE DEVICES  

E-Print Network (OSTI)

of the device. But now consider the problem of adapting the design of a waterwheel to harness wind energy the scope of any process of tweaking the values of the variables characterising the waterwheel. The history

Prabhakar, Sattiraju

468

From reconfigurable architectures to self-adaptive autonomic systems  

E-Print Network (OSTI)

Systems on a chip (SoC) can draw various benefits such as adaptability and efficient acceleration of compute-intensive tasks from the inclusion of reconfigurable hardware as a system component. Dynamic reconfiguration ...

Santambrogio, Marco Domenico

469

Proxy Documentation, Cyber Security, Information Technology Division, ITD  

NLE Websites -- All DOE Office Websites (Extended Search)

Proxy Configuration Proxy Configuration Here you will find instructions for using the FTP and Web proxies. Keep in mind that depending on where you access the proxies from (whether you are inside or outside of the BNL network), the process will differ slightly. For FTP, you will not be required to enter any passwords to use the proxies while on the BNL network. However, when accessing the proxies from an outside network (e.g. anything not .bnl.gov), you will be required to authenticate using a RSA SecurID Token. If you do not already have one of these, please visit the RSA SecurID User Guide for instructions on obtaining one. Users who are only interested in configuring their web browsers need NOT bother with RSA SecurID, as the web proxies will not be needed when you are outside the BNL network.

470

Adaptable Sensor Packaging for High Temperature Fossil Fuel Energy System  

NLE Websites -- All DOE Office Websites (Extended Search)

Adaptable Sensor Packaging for High Adaptable Sensor Packaging for High Temperature Fossil Fuel Energy Systems Background The Advanced Research Sensors and Controls Program is leading the effort to develop sensing and control technologies and methods to achieve automated and optimized intelligent power systems. The program is led by the U.S. Department of Energy (DOE) Office of Fossil Energy National Energy Technology Laboratory (NETL) and is implemented through research and development agreements with other

471

Segmentation of speech based on adaptive pitch prediction  

E-Print Network (OSTI)

SEGMENTATION OF SPEECH BASED ON ADAPTIVE PITCH PREDICTION A Thesis by JAN ERIK 8DEGARD Submitted to the 0%ce of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August... 1990 Major Subject: Electrical Engineering SEGMENTATION OF SPEECH BASED OiN ADAPTIVE PITCH PREDICTION A Thesis by JAN ERII( 8DEGARD Approved as to style and content, by: Shiping Li (Chair of Committee) D. R. Halverson J. H. Painter (Ivlernber...

dega?rd, Jan Erik

2012-06-07T23:59:59.000Z

472

Adaptation spatio-temporelle et hypermedia de documents multimedia  

E-Print Network (OSTI)

Adaptation spatio-temporelle et hyperm´edia de documents multim´edia S´ebastien Laborie, J S´ebastien Laborie, J´er^ome Euzenat et Nabil Laya¨ida Adaptation spatio-temporelle et hyperm´edia #12;Introduction Probl´ematique Un document multim´edia Constitu´e d'objets multim´edia Texte Image

Joseph Fourier Grenoble-I, Université

473

A Critical Examination of the Adaptive Response for Cytogenetic Damagein Human Cells, and Insights into the Adaptive Response Mechanism  

NLE Websites -- All DOE Office Websites (Extended Search)

Critical Examination of the Adaptive Response for Cytogenetic Damage Critical Examination of the Adaptive Response for Cytogenetic Damage in Human Cells, and Insights into the Adaptive Response Mechanism Björn E. Rydberg, Torsten Groesser, Antoine Snijders, Kelly Trego, Ju Han, Do Yup Lee, Bahram Parvin, Trent Northen, Andrew J. Wyrobek, and Priscilla K. Cooper Berkeley Lab SFA P.I.: Gary Karpen Life Sciences Division, Lawrence Berkeley National Laboratory, Berkeley, CA 94720 Goal: Task 1 of the Berkeley Lab SFA is designed to identify adaptive response (AR) mechanisms that may affect risk of developing radiation-induced cancer and to assess the linearity with dose of processes that influence mammary gland carcinogenesis. We use both in vitro and in vivo experimental systems in a parallelogram strategy. Our human cell culture

474

Preparing Cities for Climate Change: An International Comparative Assessment of Urban Adaptation Planning. MIT-ICLEI Climate Adaptation Survey Instrument  

E-Print Network (OSTI)

The research objective of this project is to conduct an international comparative assessment of urban adaptation planning. Cities throughout the world are experiencing chronic problems and extreme events that are being ...

Carmin, JoAnn

2014-09-14T23:59:59.000Z

475

Operator-adapted finite element wavelets : theory and applications to a posteriori error estimation and adaptive computational modeling  

E-Print Network (OSTI)

We propose a simple and unified approach for a posteriori error estimation and adaptive mesh refinement in finite element analysis using multiresolution signal processing principles. Given a sequence of nested discretizations ...

Sudarshan, Raghunathan, 1978-

2005-01-01T23:59:59.000Z

476

E-Print Network 3.0 - adaptation psychology Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

psychology Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptation psychology...

477

Could Tourism Carrying Capacity Be A Useful Tool For Adapting To Climate Change?  

E-Print Network (OSTI)

Could Tourism Carrying Capacity Be A Useful Tool For Adapting To Climate Change? Alexandre MAGNAN reflection on the potential role of the tourism carrying capacity approach (TCC) in the context of adaptation implementing ACC? Keywords: tourism carrying capacity, adaptation to climate change. 1. Introduction Adaptation

Boyer, Edmond

478

E-Print Network 3.0 - adaptive notch filters Sample Search Results  

NLE Websites -- All DOE Office Websites (Extended Search)

filters Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptive notch filters...

479

A Graph-based Approach to API Usage Adaptation Hoan Anh Nguyen,1a  

E-Print Network (OSTI)

A Graph-based Approach to API Usage Adaptation Hoan Anh Nguyen,1a Tung Thanh Nguyen,1b Gary Wilson the updated libraries. Existing API usage adaptation techniques support simple adaptation such as replacing the target of calls to a deprecated API, however, cannot handle complex adaptations such as creat- ing a new

Kim, Miryung

480

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 29, 2011 August 29, 2011 T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password RSA enVision lets remote users view files and remote authenticated users obtain password. August 25, 2011 T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks. August 22, 2011 T-698: Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks Adobe ColdFusion Input Validation Flaw in 'probe.cfm' Permits Cross-Site Scripting Attacks. August 17, 2011 T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

Note: This page contains sample records for the topic "rsa adaptive authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 12, 2013 June 12, 2013 V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code A vulnerability was reported in Adobe Flash Player. June 10, 2013 V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files A vulnerability was reported in RSA Authentication Manager. June 5, 2013 V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks Several vulnerabilities were reported in Apple Safari. June 4, 2013 V-170: Apache Subversion Hook Scripts Arbitrary Command Injection Vulnerability A vulnerability has been reported in Apache Subversion. June 3, 2013 V-169: Linux Kernel "iscsi_add_notunderstood_response()" Buffer Overflow

482

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6, 2012 6, 2012 U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information. July 5, 2012 U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. July 3, 2012 U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The

483

Adapting to Climate ChangeAdapting to Climate Change ExtremeExtreme Water Levels, Invasive Species andWater Levels, Invasive Species and  

E-Print Network (OSTI)

Adapting to Climate ChangeAdapting to Climate Change ­­ ExtremeExtreme Water Levels, Invasive." IPCC Risk management is the framework to discuss adaptation to climate change impacts. Risk The Water Resources Working Group will assess and synthesize climate change impacts to Wisconsin's water

Sheridan, Jennifer

484

Adaptations in Electronic Structure Calculations in Heterogeneous Environments  

SciTech Connect

Modern quantum chemistry deals with electronic structure calculations of unprecedented complexity and accuracy. They demand full power of high-performance computing and must be in tune with the given architecture for superior e#14;ciency. To make such applications resourceaware, it is desirable to enable their static and dynamic adaptations using some external software (middleware), which may monitor both system availability and application needs, rather than mix science with system-related calls inside the application. The present work investigates scienti#12;c application interlinking with middleware based on the example of the computational chemistry package GAMESS and middleware NICAN. The existing synchronous model is limited by the possible delays due to the middleware processing time under the sustainable runtime system conditions. Proposed asynchronous and hybrid models aim at overcoming this limitation. When linked with NICAN, the fragment molecular orbital (FMO) method is capable of adapting statically and dynamically its fragment scheduling policy based on the computing platform conditions. Signi#12;cant execution time and throughput gains have been obtained due to such static adaptations when the compute nodes have very di#11;erent core counts. Dynamic adaptations are based on the main memory availability at run time. NICAN prompts FMO to postpone scheduling certain fragments, if there is not enough memory for their immediate execution. Hence, FMO may be able to complete the calculations whereas without such adaptations it aborts.

Talamudupula, Sai

2011-11-29T23:59:59.000Z

485

Neural and Fuzzy Adaptive Control of Induction Motor Drives  

SciTech Connect

This paper proposes an adaptive neural network speed control scheme for an induction motor (IM) drive. The proposed scheme consists of an adaptive neural network identifier (ANNI) and an adaptive neural network controller (ANNC). For learning the quoted neural networks, a back propagation algorithm was used to automatically adjust the weights of the ANNI and ANNC in order to minimize the performance functions. Here, the ANNI can quickly estimate the plant parameters and the ANNC is used to provide on-line identification of the command and to produce a control force, such that the motor speed can accurately track the reference command. By combining artificial neural network techniques with fuzzy logic concept, a neural and fuzzy adaptive control scheme is developed. Fuzzy logic was used for the adaptation of the neural controller to improve the robustness of the generated command. The developed method is robust to load torque disturbance and the speed target variations when it ensures precise trajectory tracking with the prescribed dynamics. The algorithm was verified by simulation and the results obtained demonstrate the effectiveness of the IM designed controller.

Bensalem, Y. [Research Unit of Modelisation, Analyse, Command of Systems MACS (Tunisia); Sbita, L.; Abdelkrim, M. N. [6029 Universite High School of Engineering-Gabes-Tunisia (Tunisia)

2008-06-12T23:59:59.000Z

486

Track and vertex reconstruction: From classical to adaptive methods  

SciTech Connect

This paper reviews classical and adaptive methods of track and vertex reconstruction in particle physics experiments. Adaptive methods have been developed to meet the experimental challenges at high-energy colliders, in particular, the CERN Large Hadron Collider. They can be characterized by the obliteration of the traditional boundaries between pattern recognition and statistical estimation, by the competition between different hypotheses about what constitutes a track or a vertex, and by a high level of flexibility and robustness achieved with a minimum of assumptions about the data. The theoretical background of some of the adaptive methods is described, and it is shown that there is a close connection between the two main branches of adaptive methods: neural networks and deformable templates, on the one hand, and robust stochastic filters with annealing, on the other hand. As both classical and adaptive methods of track and vertex reconstruction presuppose precise knowledge of the positions of the sensitive detector elements, the paper includes an overview of detector alignment methods and a survey of the alignment strategies employed by past and current experiments.

Strandlie, Are; Fruehwirth, Rudolf [Gjoevik University College, P.O. Box 191, N-2802 Gjoevik (Norway); Institute of High Energy Physics of the Austrian Academy of Sciences, Nikolsdorfer Gasse 18, A-1050 Wien (Austria)

2010-04-15T23:59:59.000Z

487

Molecular Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation  

NLE Websites -- All DOE Office Websites (Extended Search)

Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation Mechanism Underlying Cellular Adaptive Response to Low Dose Radiation Colette A. Sacksteder § , DJ Black ‡ , Heather Smallwood § , David G. Camp II † , and Thomas C. Squier § § Cell Biology and Biochemistry; † Biological Sciences Division Pacific Northwest National Laboratory, Richland WA 99352 ‡ School of Biological Sciences, University of Missouri, Kansas City MO 64110 The goal of this research is to identify the molecular mechanisms by which cells adapt to low dose radiation exposure. Previously we have shown a radiation dependent increase of Calmodulin (CaM) in RAW 264.7 macrophages (RAW). Therefore we hypothesize that CaM and associated signaling complexes are sensors of low-dose radiation, resulting in alterations in energy metabolism and gene expression. The ultimate experimental goal

488

Adapting Urban Transport to Climate Change- Module 5f - Sustainable  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adapting Urban Transport to Climate Change- Module 5f - Sustainable transport: a sourcebook for policy-makers in developing cities Agency/Company /Organization: gtz- Transport Policy Advisory Services, Federal Ministry for Economic Cooperation and Development Focus Area: Governance - Planning - Decision-Making Structure Topics: Analysis Tools Resource Type: Reports, Journal Articles, & Tools Website: www.giz.de/Themen/en/dokumente/gtz2010-en-adapting-urban-transport-to- This sourcebook addresses the key areas of a sustainable transport policy

489

Advancements in the ADAPT Photospheric Flux Transport Model  

E-Print Network (OSTI)

Maps of the solar photospheric magnetic flux are fundamental drivers for simulations of the corona and solar wind which makes photospheric simulations important predictors of solar events on Earth. However, observations of the solar photosphere are only made intermittently over small regions of the solar surface. The Air Force Data Assimilative Photospheric Flux Transport (ADAPT) model uses localized ensemble Kalman filtering techniques to adjust a set of photospheric simulations to agree with the available observations. At the same time this information is propagated to areas of the simulation that have not been observed. ADAPT implements a local ensemble transform Kalman filter (LETKF) to accomplish data assimilation, allowing the covariance structure of the flux transport model to influence assimilation of photosphere observations while eliminating spurious correlations between ensemble members arising from a limited ensemble size. We give a detailed account of the ADAPT model and the implementation of the LETKF. Advantages of the LETKF scheme over previously implemented assimilation methods are highlighted.

Kyle S. Hickmann; Humberto C. Godinez; Carl J. Henney; C. Nick Arge

2014-10-22T23:59:59.000Z

490

An Adaptive Unified Differential Evolution Algorithm for Global Optimization  

SciTech Connect

In this paper, we propose a new adaptive unified differential evolution algorithm for single-objective global optimization. Instead of the multiple mutation strate- gies proposed in conventional differential evolution algorithms, this algorithm employs a single equation unifying multiple strategies into one expression. It has the virtue of mathematical simplicity and also provides users the flexibility for broader exploration of the space of mutation operators. By making all control parameters in the proposed algorithm self-adaptively evolve during the process of optimization, it frees the application users from the burden of choosing appro- priate control parameters and also improves the performance of the algorithm. In numerical tests using thirteen basic unimodal and multimodal functions, the proposed adaptive unified algorithm shows promising performance in compari- son to several conventional differential evolution algorithms.

Qiang, Ji; Mitchell, Chad

2014-11-03T23:59:59.000Z

491

Adapting the intellectual property system to new technologies  

Science Journals Connector (OSTI)

Consideration is given as to whether the system of protecting intellectual property rights is capable of adapting to the changes taking place in the new technologies. The paper uses biotechnology, computer software and computer databases as examples of fundamentally new technologies and describes the new issues posed by these technologies and reviews the approaches taken to adapt the intellectual property system in each case. It then evaluates the performance of this adaptation process, looking at three levels: the mechanisms for developing doctrine; the systems (e.g. patent offices) that grant intellectual property rights; and the formal systems (primarily courts) and informal systems (e.g. cross-licences) that enforce intellectual property rights and shape their practical economic implementation. In a number of the areas, the analysis is international and comparative; the conclusions are intended to be international as well.

John H. Barton

1995-01-01T23:59:59.000Z

492

Use of adaptive matching filters to improve reservoir definition  

SciTech Connect

Improvements in seismic resolution through better seismic acquisition and processing coupled with geometric improvements provided by 3-D surveys should allow better depiction of reservoir settings. To more fully benefit from these data improvements, is is desirable to translate the seismic acoustic attributes into a form that has more lithologic meaning. Tuning and thin bed effects etc. are automatically taken into account, and the acoustic data rendered into rock terms by matched filtering. The advantage of the present method is that the matching filter is allowed to adapt over time, but only slowly. The result is adaptive filters that give better prediction of lithologic characteristics in areas adjacent to the control data. Slowly adaptive matching filters can provide better prediction of reservoir characteristics between control points (wells). Such techniques are particularly suitable in multiwell settings where it is possible to frequently calibrate the filters.

DuBose, J.B. Jr; Blackwelder, B.

1995-12-31T23:59:59.000Z

493

Biological Basis for Radiation Adaptive Responses that Protect Against  

NLE Websites -- All DOE Office Websites (Extended Search)

Basis for Radiation Adaptive Responses that Protect Against Basis for Radiation Adaptive Responses that Protect Against Bronchial Epithelial Cell Transformation Wenshu Chen Lovelace Respiratory Research Institute Abstract The major hypothesis in this project is that low-dose, low linear-energy-transfer (LET) radiation stimulates an adaptive response that protects cells from neoplastic transformation involving modulation of paracrine factors (e.g., cytokines), cell survival/death signaling pathways, and reprogramming of the epigenome. To test this hypothesis, a validated, sensitive in vitro transformation model and a media transfer method were used to study the mechanisms of low-LET gamma radiation activated natural protection (ANP) against chemical carcinogen-induced bronchial cell transformation. Immortalized human bronchial epithelial cell

494

Genomic and Expression Analyses of Cold-Adapted Microorganisms.  

SciTech Connect

Contents 7.1 Introduction 7.2 Ecological evidence of bacterial adaptation to cold 7.2.1 Characteristics of cold environments and implications for microbial ecology 7.2.2 Ecological adaptation in Exiguobacterium spp. and Psychrobacter spp. 7.3 Gene Expression Responses to the Cold 7.3.1 Fundamentals of Gene Expression Responses to Cold 7.3.2 Acclimation for Life in Cold Habitats 7.3.2.1 Translation and Chaperone Proteins: Safeguarding the functional units of cellular physiology 7.3.2.2 Carbon and Energy metabolism: resource efficiency over long generation times 7.3.2.3 Amino Acid Biosynthesis: Species-specific responses to species-specific deficiencies 7.3.2.4 Compatible solutes: a concomitant response in cryoenvironments 7.3.2.5 Membrane fluidity: A major role in the overall metabolic rate at temperature 7.3.2.6 The cell wall at low temperature: A poorly understood growth rate determinant 7.3.2.7 Transporters: The balance between local nutrient uptake and depletion 7.3.2.8 Genome plasticity. The potential role of transposases and repeated sequences. 7.4 Protein adaptations to cold 7.4.1 The low temperature challenge 7.4.2 The stability activity relationship 7.4.3 Structural features of cold adapted enzymes. 7.4.4 Hydrophobic interactions 7.4.5 Electrostatic interactions 7.4.5.1 Arginine 7.4.5.2 Acidic residues 7.4.6 Structural elements 7.4.6.1 -helices and -sheets 7.4.6.2 Proline and Glycine 7.4.6.3 Disordered regions 7.5 Comparison of cold- and warm-adapted Exiguobacterium strains 7.5.1 Phylogeny reflects adaptations to environmental conditions 7.5.2 Genomic comparison of two strains 7.6 Summary and future directions

Bakermans, Corien [Pennsylvania State University; Bergholz, Peter W. [Cornell University; Rodrigues, Debora F. [University of Houston, Houston; Vishnivetskaya, T. [University of Tennessee, Knoxville (UTK); Ayala-del-Ro, Hector L. [University of Puerto Rico; Tiedje, James M. [Michigan State University, East Lansing

2011-01-01T23:59:59.000Z

495

Implementation of a low power adaptive binary encoder  

E-Print Network (OSTI)

encoder is the BinaryEncoder block. This is the block which contains the most original design and the key to the adaptive portion for 30 P robability aout[5:0] bout[5:0] cout[5:0] dout[5:0] eout[5:0] fout[5:0] gout[5:0] newprob ttl& O'U 8 u- 0) I C... FIGURE 19 Probability symbol next countertotal d D countera counterb counterc counterd aout bout cout dout countere counterl counter tout gout FIGURE 20 Probability schematic 31 this adaptive binary encoder. Figure 21 shows the input...

Herrin, Scott W

2012-06-07T23:59:59.000Z

496

Cine-anim: adaptations of realistic lighting styles  

E-Print Network (OSTI)

CINE-ANIM?E: ADAPTATIONS OF REALISTIC LIGHTING STYLES A Thesis by ELLEN MAN NGOC TRINH Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE August 2005... Major Subject: Visualization Sciences CINE-ANIM?E: ADAPTATIONS OF REALISTIC LIGHTING STYLES A Thesis by ELLEN MAN NGOC TRINH Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree...

Trinh, Ellen Man Ngoc

2005-11-01T23:59:59.000Z

497

Identification and Adaptive Control Methods for Some Stochastic Systems  

E-Print Network (OSTI)

of adaptive control procedure. At each time t; the process xt is observed based upon its value, the control ut is selected from a set U. The parameter has the constant value 0 which is not known in advance. It is known, however, that 0 belongs to a xed... nite set I or a compact set. The following adaptive control is considered. At each time t the estimate ^ t of the unknown parameter is made. Having the estimate ^ t the control action is selected to be ut = (^ t;xt). One of the most interesting...

Zachariou, Ioannis

2011-02-21T23:59:59.000Z

498

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

499

Authentic science experiences as a vehicle for assessing orientation towards science and science careers relative to identity and agency: a response to learning from the path followed by Brad  

Science Journals Connector (OSTI)

This response draws from the literature on adaptive learning, traditional ecological knowledge, and socialecological systems to show that Brads choice is not a simple decision between traditional ecological ...

Pauline W. U. Chinn

2009-09-01T23:59:59.000Z

500

Reducing Network Energy Consumption via Sleeping and Rate-Adaptation  

E-Print Network (OSTI)

Reducing Network Energy Consumption via Sleeping and Rate-Adaptation Sergiu Nedevschi Lucian Popa of two forms of power management schemes that reduce the energy consumption of networks. The first the energy consumed when actively processing packets. For real-world traffic workloads and topologies and us

California at Irvine, University of