Sample records for rsa adaptive authentication

  1. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  2. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  3. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  4. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  5. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  6. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  7. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  8. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  9. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  10. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  11. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  12. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design ofSouthwesternAUTHENTICATED

  13. On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On optimizing energy consumption: An adaptative authentication level in wireless sensor networks-hungry. As energy is a scarce resource in wireless sensor networks, we propose a new approach that consists or third-party nodes. I. INTRODUCTION Wireless sensor networks (WSNs) are used in several fields

  14. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  15. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  16. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  17. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  18. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  19. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  20. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  1. Message Authentication message authentication is concerned with

    E-Print Network [OSTI]

    Message Authentication · message authentication is concerned with: ­protecting the integrity of a message ­validating identity of originator ­non-repudiation of origin (dispute resolution) · will consider the security requirements · then three alternative functions used: ­message encryption ­message authentication

  2. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  3. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  4. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  5. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  6. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  7. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  8. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems --- Can side­channel threats Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro­ cessors. Of independent interest, we

  9. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems -- Can side-channel threats Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro- cessors. Of independent interest, we

  10. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  11. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01T23:59:59.000Z

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  12. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  13. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  14. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  15. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  16. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  17. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  18. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  19. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  20. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  1. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere is a

  2. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  3. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment ofSUSE

  4. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  5. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  6. Protocols and security proofs for data authentication

    E-Print Network [OSTI]

    Mityagin, Anton

    2006-01-01T23:59:59.000Z

    Generalized Carter-Wegman MACs . . . . . . . . . . . . . . .which constitute Carter-Wegman message authentication schemening generalized Carter-Wegman message authentication scheme

  7. Tools for Authentication

    SciTech Connect (OSTI)

    White, G

    2008-07-09T23:59:59.000Z

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  8. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  9. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  10. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  11. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  12. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  13. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma , Ondej Pokorný1 and Tomás Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  14. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19T23:59:59.000Z

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  15. Quantum direct communication with authentication

    SciTech Connect (OSTI)

    Lee, Hwayean [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Institut fuer Experimentalphysik, Universitaet Wien (Austria); Lim, Jongin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Yang, HyungJin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Department of Physics, Korea University, Chochiwon, Choongnam (Korea, Republic of)

    2006-04-15T23:59:59.000Z

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  16. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  17. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  18. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  19. IT Licentiate theses Query Authentication and

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

  20. Biometric Authentication using Nonparametric Methods

    E-Print Network [OSTI]

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01T23:59:59.000Z

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  1. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  2. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    Bernstein, Daniel

    encryption. Keywords: Message authentication, PRFs, Carter-Wegman, symmetric encryption, authenticated-cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter-Wegman (CW) ma-schemes [25, 21, 23, 16, 8, 9

  3. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    encryption. Keywords: Message authentication, PRFs, Carter­Wegman, symmetric encryption, authenticated­cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter­Wegman (CW) ma­schemes [25, 21, 23, 16, 8, 9

  4. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22T23:59:59.000Z

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  5. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  6. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  7. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  8. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, authentication, MAC, Wegman-Carter, provable security 1 Introduction This paper proves

  9. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators Daniel J. Bernstein Department probabilities for f. Keywords: mode of operation, authentication, MAC, Wegman-Carter, provable security 1

  10. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  11. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  12. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  13. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  14. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  15. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01T23:59:59.000Z

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  16. Improving Classical Authentication with Quantum Communication

    E-Print Network [OSTI]

    of short secret keys [1]. Brassard's scheme is itself an improvement of the Wegman-Carter protocol [2 of messages we want to authenticate, as opposed to the Wegman-Carter proposal. The security of PRGs is based

  17. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  18. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02T23:59:59.000Z

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  19. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFactEnergy Bob UnderYour RSA

  20. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  1. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  2. Using Rose and Compass for Authentication

    SciTech Connect (OSTI)

    White, G

    2009-07-09T23:59:59.000Z

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  3. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  4. Comment on 'Quantum direct communication with authentication'

    SciTech Connect (OSTI)

    Zhang, Zhan-jun [Department of Physics and Center for Quantum Information Science, National Cheng Kung University, Tainan 70101, Taiwan (China); Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China); Liu, Jun; Wang, Dong; Shi, Shou-hua [Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China)

    2007-02-15T23:59:59.000Z

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.

  5. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01T23:59:59.000Z

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  6. Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival

    E-Print Network [OSTI]

    Kim, Hyounggon

    2005-02-17T23:59:59.000Z

    the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

  7. authentic cost calculations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ;Abstract iii We also show how to use two existing multicast authentication techniques (TESLA and a master for embedded control networks characterized by few re- ceivers and weak...

  8. authentication system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 58 Integrating identity-based cryptography in IMS...

  9. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Broader source: Energy.gov (indexed) [DOE]

    Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard...

  10. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, MAC, Wegman-Carter, provable security 1 Introduction This paper proves that various

  11. Shouhuai Xu 2000 1 Password-based Authentication and

    E-Print Network [OSTI]

    Sandhu, Ravi

    &AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

  12. A Flexible Approach to Embedded Network Multicast Authentication

    E-Print Network [OSTI]

    Koopman, Philip

    A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

  13. Index Calculation Attacks on RSA Signature and Encryption Jean-Sebastien Coron1, Yvo Desmedt2, David Naccache1,

    E-Print Network [OSTI]

    Minnesota, University of

    a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following the attack iso/iec 9796-1 was withdrawn and iso/iec 9796-2 amended. In this paper, we recall Desmedt and Odlyzko's attack as well as its application to the cryptanalysis of iso/iec

  14. IEEE TRANS. INFORM. THEORY, VOL. X, NO. XX, 2005 1 Authentication with Distortion Criteria

    E-Print Network [OSTI]

    Martinian, Emin

    authentication system constructions. Index Terms-- multimedia security, authentication, digi- tal signatures of possible perturbations, including, for example, degradation due to noise or compression; transformation

  15. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  16. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  17. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26T23:59:59.000Z

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  18. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect (OSTI)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01T23:59:59.000Z

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  19. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  20. Stronger security bounds for WegmanCarterShoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman­Carter­Shoup authenticators Daniel J. Bernstein # Department, Wegman­Carter, provable security 1 Introduction This paper proves that various state­of­the­art 128­bit

  1. Authenticated Encryption: How Reordering can Impact Performance Basel Alomair

    E-Print Network [OSTI]

    ciphertext blocks are then authenticated using a MAC based on a universal hash-function family (in the Carter-Wegman encryption [30]. The GCM standard is based on the Carter- Wegman Counter (CWC) blockcipher mode

  2. austrian meat authenticity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is...

  3. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    form fields. A remote or local user can conduct a cross-site scripting or clickjacking attack to access the username and password of an authenticated session. IMPACT: Disclosure of...

  4. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26T23:59:59.000Z

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  5. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  6. Authenticity and Physiological Changes during Defensive Verbal Response

    E-Print Network [OSTI]

    Yen, Yana

    2013-08-31T23:59:59.000Z

    who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

  7. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  8. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  9. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  10. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  11. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  12. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  13. The fragility of AES-GCM authentication algorithm Shay Gueron1,2

    E-Print Network [OSTI]

    for the authentication. The GHASH algorithm is a special form of the Carter-Wegman polynomial evaluation MAC. Each 16

  14. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  15. Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P. PARKERSON

    E-Print Network [OSTI]

    Thompson, Dale R.

    Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P.S.A. ABSTRACT Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared

  16. University of Newcastle upon Tyne Evaluation of Authorization-Authentication Tools: PERMIS, OASIS,

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    -Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu and P. Periorellis TECHNICAL REPORT SERIES No. CS-TR-935 of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu, P. Periorellis Abstract GOLD (Grid., PERIORELLIS, P.. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH [By] J. Wu

  17. The order of encryption and authentication for protecting communications (Or: how secure is SSL?)

    E-Print Network [OSTI]

    The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

  18. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    , or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

  19. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  20. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Keystroke Biometric Test-Taker Authentication System

    E-Print Network [OSTI]

    Tappert, Charles

    Biometric Test-Taker Authentication System Michael Wuench, Mingfei Bi, Evelin Urbaez, Shaji Mary Varghese

  1. Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS

    E-Print Network [OSTI]

    Maryland at College Park, University of

    ABSTRACT Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS Paul S. Hutchison, Ph.D., 2008 Dissertation Directed By: Professor David Hammer, Departments of Curriculum Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park

  2. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  3. Bucket Hashing and its Application to Fast Message Authentication

    E-Print Network [OSTI]

    Bernstein, Daniel

    the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman to authenticate. But it is well­known that this reasoning is specious: in particular, Wegman and Carter [32. In the Wegman--Carter approach communicating parties S and V share a secret key k = (h; P ) which specifies both

  4. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  5. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  6. Patent-Free Authenticated-Encryption As Fast As OCB

    E-Print Network [OSTI]

    Krovetz, Ted

    . Encryption is achieved via counter-mode while authenti- cation uses the Wegman-Carter paradigm. A single encryption and authentication under a single key. Some of the modes also switch to faster Wegman to nearly x cpb because recent Wegman-Carter schemes are as fast as 0.5 cpb--much faster than any known

  7. Universal hashing and authentication codes 1 D. R. Stinson

    E-Print Network [OSTI]

    Stinson, Douglas

    authentication codes without secrecy. This idea is due to Wegman and Carter [14], who gave a construction which states (plaintext messages). We generalize the Wegman and Carter construction by formally de#12;ning some to decrease the key length by a factor of four (roughly) compared to the Wegman and Carter construction, while

  8. Behavioral Authentication of Server Flows James P. Early

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    Behavioral Authentication of Server Flows James P. Early Carla E. Brodley ¡ Catherine Rosenberg, in the presence of proxy servers that re-map port numbers or host services that have been compromised to act as backdoors or covert channels. We present an approach to classify server traffic based on decision trees

  9. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  10. Authenticated Streamwise On-line Encryption Patrick P. Tsang

    E-Print Network [OSTI]

    and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

  11. SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

  12. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  13. A Hybrid Authentication and Authorization Process for Control System Networks

    SciTech Connect (OSTI)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25T23:59:59.000Z

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybrid authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.

  14. ELmE : A Misuse Resistant Parallel Authenticated Encryption

    E-Print Network [OSTI]

    -Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

  15. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  16. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  17. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  18. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  19. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  20. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  1. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    , video, image, and data, be available anytime and everywhere to everybody. The Federal Communications Commission (FCC), U. S. A., defines personal communications services as "a family of mobile or portable radioC. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain

  2. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Åke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  3. Adaptation Plan 

    E-Print Network [OSTI]

    Durnbaugh, A.

    2011-01-01T23:59:59.000Z

    ? Built Environment ? Natural Environment ? People FIVE STRATEGIES Copyright 2011, City of Chicago ADAPTATION ESL-KT-11-11-16 9 CCAP Adaptation Evolution 2007 2008 2009 2010 ? Understood the climate science: Assess climate impacts... E xi st in g Tr un k Existing on Rogers Rogers Ave CIP Stormwater management: Chicago?s comprehensive sewer model Climate impacts Example actions to prepare the built environment Copyright 2011, City of Chicago ESL-KT-11-11-16 13 CCAP...

  4. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  5. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  6. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  7. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  8. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  9. ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing

    E-Print Network [OSTI]

    such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

  10. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  11. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Xu, Wenyuan

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  12. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  13. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  14. Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang

    E-Print Network [OSTI]

    Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

  15. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  16. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

  17. SSL/TLS Session-Aware User Authentication Rolf Oppliger1

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

  18. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  19. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  20. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    (International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

  1. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  2. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-Print Network [OSTI]

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  3. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  4. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

    E-Print Network [OSTI]

    Nørvåg, Kjetil

    . The performance cost evaluation of security protocols, such as the Internet key exchange version 2 (IKEv2 and IKEv2 in an OPNET simulation environment. They used pre-shared key (PSK) based authentication methodsA Measurement Study on IKEv2 Authentication Performance in Wireless Networks Zolt´an Faigl , Stefan

  5. Atomic-scale Authentication Using Resonant Tunnelling Diodes

    E-Print Network [OSTI]

    J. Roberts; I. E. Bagci; M. A. M. Zawawi; J. Sexton; N. Hulbert; Y. J. Noori; M. P. Young; C. S. Woodhead; M. Missous; M. A. Migliorato; U. Roedig; R. J. Young

    2015-02-23T23:59:59.000Z

    The rapid development of technology has provided a wealth of resources enabling the trust of everyday interactions to be undermined. Authentication schemes aim to address this challenge by providing proof of identity. This can be achieved by using devices that, when challenged, give unique but reproducible responses. At present, these distinct signatures are commonly generated by physically unclonable functions, or PUFs. These devices provide a straightforward measurement of a physical characteristic of their structure that has inherent randomness, due to imperfections in the manufacturing process. These hard-to-predict physical responses can generate a unique identity that can be used for authentication without relying on the secrecy of stored data. However, the classical design of these devices limits both their size and security. Here we show that the extensively studied problematic fluctuations in the current-voltage measurements of resonant tunnelling diodes (RTDs) provide an uncomplicated, robust measurement that can function as a PUF without conventional resource limitations. This is possible due to quantum tunnelling within the RTD, and on account of these room temperature quantum effects, we term such devices QUFs - quantum unclonable functions. As a result of the current-voltage spectra being dependent on the atomic structure and composition of the nanostructure within the RTD, each device provides a high degree of uniqueness, whilst being impossible to clone or simulate, even with state-of-the-art technology. We have thus created PUF-like devices requiring the fewest resources which make use of quantum phenomena in a highly manufacturable electronic device operating at room temperature. Conventional spectral analysis techniques, when applied to our QUFs, will enable reliable generation of unpredictable unique identities which can be employed in advanced authentication systems.

  6. Final report and recommendations of the ESnet Authentication Pilot Project

    SciTech Connect (OSTI)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01T23:59:59.000Z

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  7. Adaptation Plan

    E-Print Network [OSTI]

    Durnbaugh, A.

    2011-01-01T23:59:59.000Z

    /pest introduction. Buildings Fa?ade & structural damage. Higher peak electricity demand. Lake Michigan Decreased lake ice in winter & lower lake levels. Greater stress on water resources in times of need. Homes Increased cooling costs & energy... of Chicago ? 2011 ESL-KT-11-11-16 3 Chicago River Promote & incentivize green infrastructure to manage stormwater. Monitor threat of aquatic invasive species. RESILIENCY Adaptation will help reduce the impact of the changes that can be expected...

  8. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06T23:59:59.000Z

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  9. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21T23:59:59.000Z

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  10. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01T23:59:59.000Z

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  11. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  12. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    be used to replace Wegman-Carter's classical authentication scheme in quantum key distribution (QKD the QKD protocol to bootstrap. The authenti- cation scheme commonly used in QKD is the Wegman

  13. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  14. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  15. Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time

    E-Print Network [OSTI]

    Liwinski, Thomas

    2011-10-21T23:59:59.000Z

    , it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

  16. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  17. Anonymous, authentic, and accountable resource management based on the E-cash paradigm

    E-Print Network [OSTI]

    Lam, Tak Cheung

    2009-05-15T23:59:59.000Z

    AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

  18. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  19. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  20. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  1. Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and

    E-Print Network [OSTI]

    Baras, John S.

    Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

  2. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)

    E-Print Network [OSTI]

    Basin, David

    A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

  3. Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas

    E-Print Network [OSTI]

    Sabatini, David M.

    Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai}@mit.edu ABSTRACT A major security concern with outsourcing data storage to third- party providers is authenticating hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa- per proposes

  4. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  5. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Yang, Junfeng

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  6. Simplified authenticated key exchange based on the q(th) root problem

    SciTech Connect (OSTI)

    JOHNSTON,ANNA M.; GEMMELL,PETER S.

    2000-02-29T23:59:59.000Z

    Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

  7. Distillation Codes and Applications to DoS Resistant Multicast Authentication

    E-Print Network [OSTI]

    Perrig, Adrian

    Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

  8. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

  9. MMH: Software Message Authentication in the Gbit/second Rates \\Lambda

    E-Print Network [OSTI]

    Bernstein, Daniel

    universal hashing) applications. The construction is based on techniques due to Carter and Wegman Universal hash functions, which were first introduced by Carter and Wegman in [CW79], have a wide range authentication (introduced by Wegman and Carter [WC81] as well) received much attention lately. In particular

  10. MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell

    E-Print Network [OSTI]

    Martinian, Emin

    MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell Dept,gww¡ @mit.edu ABSTRACT In many multimedia applications, there is a need to authen- ticate a source that has signature techniques are a natural tool for addressing such problems. However, in many emerging multimedia

  11. SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

  12. An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana

  13. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  14. CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment

    E-Print Network [OSTI]

    Michigan, University of

    . An unfortunate byproduct of building Kerberos-based systems is a loss of functionality, such as long running jobs-- -- CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment A. D. Rubin that a user have a valid token or ticket for a job to run. These tickets are issued with limited lifetimes

  15. Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    Brylow, Dennis

    based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

  16. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  17. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  18. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

    E-Print Network [OSTI]

    Braun, Torsten

    1 Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network is to avoid exchanging security information between networks visited by a roaming user and the user's home network and retrieves the required security information from that AAA server. The AAA servers can

  19. Universal Hashing and Multiple Authentication M. Atici1*2and 11. R,. S t i n ~ o n ' > ~

    E-Print Network [OSTI]

    Bernstein, Daniel

    authentication without secrecy. Our point of view is the uni- vcrsal hashing approach pioneered by Wegman,ions, and obtained some improvements to the Wegman-Carter construction. Since 1991, several authors have given im

  20. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  1. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    SciTech Connect (OSTI)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27T23:59:59.000Z

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  2. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  3. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01T23:59:59.000Z

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  4. Utilitas and venustas: balancing utility and authenticity in the stewardship of our built heritage

    E-Print Network [OSTI]

    Reich, Alene Wilmoth

    2007-04-25T23:59:59.000Z

    Members, John Alexander John Nichols Head of Department, Mardelle Shepley December 2005 Major Subject: Architecture iii ABSTRACT Utilitas and Venustas: Balancing Utility and Authenticity in the Stewardship of Our Built... Services (HPS). The aim of HPS is to, ?[help] our nation's citizens and communities identify, evaluate, protect and preserve historic properties for future generations of Americans.?17 HPS is responsible for the administration of educational, technical...

  5. Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense Surveillance Systems integration Transport / Borde

    E-Print Network [OSTI]

    Rogers, John A.

    Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense

  6. Adaptive Street Lighting Controls

    Broader source: Energy.gov [DOE]

    This two-part DOE Municipal Solid-State Street Lighting Consortium webinar focused on LED street lighting equipped with adaptive control components. In Part I, presenters Amy Olay of the City of...

  7. Climate Change Adaptation Planning

    Office of Energy Efficiency and Renewable Energy (EERE)

    This course provides an introduction to planning for climate change impacts, with examples of tribes that have been going through the adaptation planning process. The course is intended for tribal...

  8. Discriminative Adaptive Training and Bayesian Inference for

    E-Print Network [OSTI]

    de Gispert, Adrià

    adaptation is a standard part of many speech recognition systems. This process requires some adaptation data

  9. Organizational Adaptation Kathleen M. Carley

    E-Print Network [OSTI]

    Sadeh, Norman M.

    Organizational Adaptation Kathleen M. Carley Dept. of Social and Decision Sciences Carnegie Mellon: Kathleen M. Carley, 1998, "Organizational Adaptation." Annals of Operations Research. 75: 25-47. #12;Organizational Adaptation A computational model of organizational adaptation in which change occurs at both

  10. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5 Access

  11. Adaptive Medical Information Delivery Combining User, Task and Situation Models

    E-Print Network [OSTI]

    ., in their model for adaptive hypermedia AHAM [2], distinguish content­adaptation from link­ adaptation

  12. Adaptation and adaptability : expectant design for resilience in coastal urbanity

    E-Print Network [OSTI]

    Ruskeepää, Laura A. Delaney (Laura Ashley Delaney)

    2011-01-01T23:59:59.000Z

    What is the nature of and possibility for urban resiliency through adaptation? Adaptation implies responsiveness to phenomena that are disruptive to a system's functioning; it is a willful evolution in response to changed ...

  13. Adaptive sequential controller

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A. (Renton, WA); Xing, Jian (Seattle, WA); Butler, Nicholas G. (Newberg, OR); Rodriguez, Alonso (Pasadena, CA)

    1994-01-01T23:59:59.000Z

    An adaptive sequential controller (50/50') for controlling a circuit breaker (52) or other switching device to substantially eliminate transients on a distribution line caused by closing and opening the circuit breaker. The device adaptively compensates for changes in the response time of the circuit breaker due to aging and environmental effects. A potential transformer (70) provides a reference signal corresponding to the zero crossing of the voltage waveform, and a phase shift comparator circuit (96) compares the reference signal to the time at which any transient was produced when the circuit breaker closed, producing a signal indicative of the adaptive adjustment that should be made. Similarly, in controlling the opening of the circuit breaker, a current transformer (88) provides a reference signal that is compared against the time at which any transient is detected when the circuit breaker last opened. An adaptive adjustment circuit (102) produces a compensation time that is appropriately modified to account for changes in the circuit breaker response, including the effect of ambient conditions and aging. When next opened or closed, the circuit breaker is activated at an appropriately compensated time, so that it closes when the voltage crosses zero and opens when the current crosses zero, minimizing any transients on the distribution line. Phase angle can be used to control the opening of the circuit breaker relative to the reference signal provided by the potential transformer.

  14. CONTRIBUTED Adaptive Stochastic Control

    E-Print Network [OSTI]

    Powell, Warren B.

    sources, many forms of energy storage, and microgrid management (see Fig. 1). Computationally, controlling of distributed generation and storage within the Smart Grid. KEYWORDS | Adaptive stochastic control (ASC.g., factory assembly lines, petrochemical plants, and nuclear power plants). Below we describe

  15. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  16. ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS

    E-Print Network [OSTI]

    ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS MOODY T. CHU \\Lambda Abstract. The wavefront aberrations induced by atmospheric turbulence can severely degrade the performance of an optical imaging system. Adaptive optics refers to the process of removing unwanted wave front distortions

  17. Adaptive Survey Design Andrew Sage

    E-Print Network [OSTI]

    Carriquiry, Alicia

    . Andrew Sage Iowa State University CSSM March 14, 2014 2 / 35 #12;Adaptive and Responsive Designs collection, although they may be revised during data collection. A responsive design is an adaptive design

  18. Climate Change, Adaptation, and Development

    E-Print Network [OSTI]

    Cole, Daniel H.

    2008-01-01T23:59:59.000Z

    Climate Change, Adaptation, and Development Daniel H. Cole*THE COSTS OF CLIMATE CHANGE . ADAPTATIONCONVENTION ON CLIMATE CHANGE . IV. A.

  19. Universal Hashing and Multiple Authentication M. Atici 1;2 and D. R. Stinson 1;3

    E-Print Network [OSTI]

    Stinson, Douglas

    . Our point of view is the uni­ versal hashing approach pioneered by Wegman and Carter in 1981. We first to the construction of unconditionally secure authentication codes without secrecy. This idea is due to Wegman formal def­ initions of relevant classes of hash functions, and obtained some improvements to the Wegman

  20. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  1. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Edith C. H. Ngai and Michael R. Lyu

    E-Print Network [OSTI]

    Lyu, Michael R.

    distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai

  2. ON ADAPTIVE SAMPLING Philippe Flajolet

    E-Print Network [OSTI]

    Flajolet, Philippe

    . We analyze the storage/accuracy trade--off of an adaptive sampling algorithm due to Wegman that makes. Wegman [11] has proposed an interesting alternative solution to that problem based on Adaptive Sampling 4. 2 Wegman's Adaptive Sampling Method The problem discussed here is the following. We are given

  3. Adaptive control for accelerators

    DOE Patents [OSTI]

    Eaton, Lawrie E. (Los Alamos, NM); Jachim, Stephen P. (Los Alamos, NM); Natter, Eckard F. (Santa Fe, NM)

    1991-01-01T23:59:59.000Z

    An adaptive feedforward control loop is provided to stabilize accelerator beam loading of the radio frequency field in an accelerator cavity during successive pulses of the beam into the cavity. A digital signal processor enables an adaptive algorithm to generate a feedforward error correcting signal functionally determined by the feedback error obtained by a beam pulse loading the cavity after the previous correcting signal was applied to the cavity. Each cavity feedforward correcting signal is successively stored in the digital processor and modified by the feedback error resulting from its application to generate the next feedforward error correcting signal. A feedforward error correcting signal is generated by the digital processor in advance of the beam pulse to enable a composite correcting signal and the beam pulse to arrive concurrently at the cavity.

  4. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  5. Adapting to Survive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinide ChemistryActivitiesAdapting to

  6. Adaptive Energy Grid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 IntroductionActinide ChemistryActivitiesAdapting

  7. BRIDGING NAVIGATION, SEARCH AND ADAPTATION. Adaptive Hypermedia Models Evolution

    E-Print Network [OSTI]

    De Bra, Paul

    Corpus, Dexter Model, AHAM, GAF. Abstract: Adaptive Hypermedia Systems (AHS) have long been concentrating The most referenced (but certainly not only) Adaptive Hypermedia (AH) model dates back to 1999. Since AHAM/Hypermedia modelling from Dexter Model through AHAM to the proposed GAF model, out- line advantages of each framework

  8. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  9. I. INTRODUCTION Hierarchical Adaptive Kalman

    E-Print Network [OSTI]

    Ghosh, Joydeep

    I. INTRODUCTION Hierarchical Adaptive Kalman Filtering for Interplanetary Orbit Determination of Texas at Austin A modular and flexibleapproach to adaptive Kalman filtering has recently been introduced using the framework of a mixture-of-experts regulated by a gating network. Each expert is a Kalman

  10. Adaptation, Learning, and Optimization over

    E-Print Network [OSTI]

    California at Los Angeles, University of

    Adaptation, Learning, and Optimization over Networks Ali H. Sayed University of California at Los 2014 A. H. Sayed DOI: 10.1561/2200000051 Adaptation, Learning, and Optimization over Networks Ali H . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.6 Notation and Symbols . . . . . . . . . . . . . . . . . . . . 8 2 Optimization by Single Agents

  11. Adaptive Optics in Star Formation

    E-Print Network [OSTI]

    Wolfgang Brandner

    2003-09-29T23:59:59.000Z

    Over the past ten years, the concept of adaptive optics has evolved from early experimental stages to a standard observing tool now available at almost all major optical and near-infrared telescope facilities. Adaptive optics will also be essential in exploiting the full potential of the large optical/infrared interferometers currently under construction. Both observations with high-angular resolution and at high contrast, and with a high point source sensitivity are facilitated by adaptive optics. Among the areas which benefit most from the use of adaptive optics are studies of the circumstellar environment (envelopes, disks, outflows), substellar companions and multiple systems, and dense young stellar populations. This contribution highlights some of the recent advances in star formation studies facilitated by adaptive optics, and gives a brief tutorial on optimized observing and data reduction strategies.

  12. 161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at

    E-Print Network [OSTI]

    Boyer, Edmond

    hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

  13. Adaptive excitation control in power systems

    E-Print Network [OSTI]

    Chiu, Pei-Chen

    2006-08-16T23:59:59.000Z

    This thesis presents an adaptive excitation controller of power systems. The control law is derived by using model reference adaptive control (MRAC) or adaptive pole placement control (APPC) and an equilibrium tracking mechanism is implemented...

  14. A Dynamic Platform for Runtime Adaptation

    E-Print Network [OSTI]

    Pham, Hubert

    We present a middleware platform for assembling pervasive applications that demand fault-tolerance and adaptivity in distributed, dynamic environments. Unlike typical adaptive middleware approaches, in which sophisticated ...

  15. Climate Change, Adaptation, and Development

    E-Print Network [OSTI]

    Cole, Daniel H.

    2008-01-01T23:59:59.000Z

    adaptive efficiency in some LDC economies. At this point,capacity-building" in LDC parties. 22 Addition- ally, twoof the over-dependence of many LDC economies on sectors that

  16. COMMENTARY:Limits to adaptation

    SciTech Connect (OSTI)

    Preston, Benjamin L [ORNL

    2013-01-01T23:59:59.000Z

    An actor-centered, risk-based approach to defining limits to social adaptation provides a useful analytic framing for identifying and anticipating these limits and informing debates over society s responses to climate change.

  17. Adaptive multiconfigurational wave functions

    SciTech Connect (OSTI)

    Evangelista, Francesco A., E-mail: francesco.evangelista@emory.edu [Department of Chemistry and Cherry L. Emerson Center for Scientific Computation, Emory University, Atlanta, Georgia 30322 (United States)

    2014-03-28T23:59:59.000Z

    A method is suggested to build simple multiconfigurational wave functions specified uniquely by an energy cutoff ?. These are constructed from a model space containing determinants with energy relative to that of the most stable determinant no greater than ?. The resulting ?-CI wave function is adaptive, being able to represent both single-reference and multireference electronic states. We also consider a more compact wave function parameterization (?+SD-CI), which is based on a small ?-CI reference and adds a selection of all the singly and doubly excited determinants generated from it. We report two heuristic algorithms to build ?-CI wave functions. The first is based on an approximate prescreening of the full configuration interaction space, while the second performs a breadth-first search coupled with pruning. The ?-CI and ?+SD-CI approaches are used to compute the dissociation curve of N{sub 2} and the potential energy curves for the first three singlet states of C{sub 2}. Special attention is paid to the issue of energy discontinuities caused by changes in the size of the ?-CI wave function along the potential energy curve. This problem is shown to be solvable by smoothing the matrix elements of the Hamiltonian. Our last example, involving the Cu{sub 2}O{sub 2}{sup 2+} core, illustrates an alternative use of the ?-CI method: as a tool to both estimate the multireference character of a wave function and to create a compact model space to be used in subsequent high-level multireference coupled cluster computations.

  18. Matrix adaptation in discriminative vector quantization

    E-Print Network [OSTI]

    Zachmann, Gabriel

    . Gabriel Zachmann (Computer Graphics) #12;Matrix adaptation in discriminative vector quantization Petra

  19. Adaptive Liquid Crystal Windows

    SciTech Connect (OSTI)

    Taheri, Bahman; Bodnar, Volodymyr

    2011-12-31T23:59:59.000Z

    Energy consumption by private and commercial sectors in the U.S. has steadily grown over the last decade. The uncertainty in future availability of imported oil, on which the energy consumption relies strongly, resulted in a dramatic increase in the cost of energy. About 20% of this consumption are used to heat and cool houses and commercial buildings. To reduce dependence on the foreign oil and cut down emission of greenhouse gases, it is necessary to eliminate losses and reduce total energy consumption by buildings. To achieve this goal it is necessary to redefine the role of the conventional windows. At a minimum, windows should stop being a source for energy loss. Ideally, windows should become a source of energy, providing net gain to reduce energy used to heat and cool homes. It is possible to have a net energy gain from a window if its light transmission can be dynamically altered, ideally electronically without the need of operator assistance, providing optimal control of the solar gain that varies with season and climate in the U.S. In addition, the window must not require power from the building for operation. Resolution of this problem is a societal challenge and of national interest and will have a broad global impact. For this purpose, the year-round, allclimate window solution to provide an electronically variable solar heat gain coefficient (SHGC) with a wide dynamic range is needed. AlphaMicron, Inc. (AMI) developed and manufactured 1ft × 1ft prototype panels for the world’s first auto-adjusting Adaptive Liquid Crystal Windows (ALCWs) that can operate from sunlight without the need for external power source and demonstrate an electronically adjustable SHGC. This novel windows are based on AlphaMicron’s patented e-Tint® technology, a guesthost liquid crystal system implemented on flexible, optically clear plastic films. This technology is suitable both for OEM and aftermarket (retro-fitting) lamination to new and existing windows. Low level of power consumption by ALCWs allows for on-board power electronics for automatic matching of transmission through windows to varying climate conditions without drawing the power from the power grid. ALCWs are capable of transmitting more sunlight in winters to assist in heating and less sunlight in summers to minimize overheating. As such, they can change the window from being a source of energy loss to a source of energy gain. In addition, the scalable AMI’s roll-to-roll process, proved by making 1ft × 1ftALCW prototype panels, allows for cost-effective production of large-scale window panels along with capability to change easily their color and shape. In addition to architectural glazing in houses and commercial buildings, ALCWs can be used in other applications where control of sunlight is needed, such as green houses, used by commercial produce growers and botanical gardens, cars, aircrafts, etc.

  20. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information

    SciTech Connect (OSTI)

    Oppenheim, Jonathan [Racah Institute of Theoretical Physics, Hebrew University of Jerusalem, Givat Ram, Jerusalem 91904 (Israel); Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland); Horodecki, Michal [Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland)

    2005-10-15T23:59:59.000Z

    Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we introduce relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.

  1. Adaptive Optics for Large Telescopes

    SciTech Connect (OSTI)

    Olivier, S

    2008-06-27T23:59:59.000Z

    The use of adaptive optics was originally conceived by astronomers seeking to correct the blurring of images made with large telescopes due to the effects of atmospheric turbulence. The basic idea is to use a device, a wave front corrector, to adjust the phase of light passing through an optical system, based on some measurement of the spatial variation of the phase transverse to the light propagation direction, using a wave front sensor. Although the original concept was intended for application to astronomical imaging, the technique can be more generally applied. For instance, adaptive optics systems have been used for several decades to correct for aberrations in high-power laser systems. At Lawrence Livermore National Laboratory (LLNL), the world's largest laser system, the National Ignition Facility, uses adaptive optics to correct for aberrations in each of the 192 beams, all of which must be precisely focused on a millimeter scale target in order to perform nuclear physics experiments.

  2. Adaptive Sampling in Hierarchical Simulation

    SciTech Connect (OSTI)

    Knap, J; Barton, N R; Hornung, R D; Arsenlis, A; Becker, R; Jefferson, D R

    2007-07-09T23:59:59.000Z

    We propose an adaptive sampling methodology for hierarchical multi-scale simulation. The method utilizes a moving kriging interpolation to significantly reduce the number of evaluations of finer-scale response functions to provide essential constitutive information to a coarser-scale simulation model. The underlying interpolation scheme is unstructured and adaptive to handle the transient nature of a simulation. To handle the dynamic construction and searching of a potentially large set of finer-scale response data, we employ a dynamic metric tree database. We study the performance of our adaptive sampling methodology for a two-level multi-scale model involving a coarse-scale finite element simulation and a finer-scale crystal plasticity based constitutive law.

  3. Training Adaptive Decision-Making.

    SciTech Connect (OSTI)

    Abbott, Robert G.; Forsythe, James C.

    2014-10-01T23:59:59.000Z

    Adaptive Thinking has been defined here as the capacity to recognize when a course of action that may have previously been effective is no longer effective and there is need to adjust strategy. Research was undertaken with human test subjects to identify the factors that contribute to adaptive thinking. It was discovered that those most effective in settings that call for adaptive thinking tend to possess a superior capacity to quickly and effectively generate possible courses of action, as measured using the Category Generation test. Software developed for this research has been applied to develop capabilities enabling analysts to identify crucial factors that are predictive of outcomes in fore-on-force simulation exercises.

  4. adaptive control algorithm: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    24 25 Next Page Last Page Topic Index 1 ON AN ADAPTIVE CONTROL ALGORITHM FOR ADAPTIVE OPTICS APPLICATIONS Mathematics Websites Summary: ON AN ADAPTIVE CONTROL ALGORITHM FOR...

  5. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  6. authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5

    E-Print Network [OSTI]

    Martin, Jeff

    brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee locally made corn tortillas · smoky pinto beans · salsa · red sauce Bothwell cheddar · two eggs (any style eggs · mesa red sauce · cheddar · salsa · pinto beans BREAKFAST BUN 5 toasted whole wheat bun · fried

  7. When HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li , Tao Wan , Jianping Wu,

    E-Print Network [OSTI]

    Li, Kang

    providers also start to offer DDoS mitigation services by hiding the original web site and distributingWhen HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang technologies, each of which has been well studied individually and independently. This paper provides

  8. BC Agriculture Climate Change Adaptation

    E-Print Network [OSTI]

    Pedersen, Tom

    BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report executive summary #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

  9. BC Agriculture Climate Change Adaptation

    E-Print Network [OSTI]

    Pedersen, Tom

    BC Agriculture Climate Change Adaptation Risk + Opportunity Assessment Provincial Report #12;published March 2012 by the British Columbia Agriculture & Food Climate Action Initiative www.BCAgClimateAction.ca project funding provided by Agriculture and Agri-food Canada BC Ministry of Agriculture BC Ministry

  10. Adaptive Noisy Clustering Michael CHICHIGNOUD

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    with respect to the Lebesgue measure. Since we observe a corrupted sample, a direct approach as the popular k-means is not suitable in this case. In this paper, we propose a noisy k-means minimization, which is based on the k-means an adaptive upper bound for a new selection rule, called ERC (Empirical Risk Comparison). This selection rule

  11. Hierarchical Adaptive Dynamic Power Management

    E-Print Network [OSTI]

    Chen, Yuanzhu Peter

    Hierarchical Adaptive Dynamic Power Management Zhiyuan Ren, Member, IEEE, Bruce H. Krogh, Fellow, IEEE, and Radu Marculescu, Member, IEEE Abstract--Dynamic power management aims at extending battery management strategies can lead to poor performance or unnecessary power consumption when there are wide

  12. Adaptive wiener image restoration kernel

    DOE Patents [OSTI]

    Yuan, Ding (Henderson, NV)

    2007-06-05T23:59:59.000Z

    A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

  13. Adaptive protection algorithm and system

    DOE Patents [OSTI]

    Hedrick, Paul (Pittsburgh, PA) [Pittsburgh, PA; Toms, Helen L. (Irwin, PA) [Irwin, PA; Miller, Roger M. (Mars, PA) [Mars, PA

    2009-04-28T23:59:59.000Z

    An adaptive protection algorithm and system for protecting electrical distribution systems traces the flow of power through a distribution system, assigns a value (or rank) to each circuit breaker in the system and then determines the appropriate trip set points based on the assigned rank.

  14. Adapting Your Home for More Accessible Living

    E-Print Network [OSTI]

    Harris, Janie

    2007-04-27T23:59:59.000Z

    It is important for people to live comfortably and independently in their homes. Homes can be adapted to aid people with various disabilities. This publication explains how to make such adaptations for people with vision loss, hearing loss, problems...

  15. IIR algorithms for adaptive line enhancement

    SciTech Connect (OSTI)

    David, R.A.; Stearns, S.D.; Elliott, G.R.; Etter, D.M.

    1983-01-01T23:59:59.000Z

    We introduce a simple IIR structure for the adaptive line enhancer. Two algorithms based on gradient-search techniques are presented for adapting the structure. Results from experiments which utilized real data as well as computer simulations are provided.

  16. Final Report What Will Adaptation Cost?

    E-Print Network [OSTI]

    ..................................................................................................................26 Task 3: Estimate Costs of Implementing Adaptation Strategies ....................................................................34 Task 2: Calculate the Capital and Maintenance CostsFinal Report What Will Adaptation Cost? An Economic Framework for Coastal Community Infrastructure

  17. CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR

    E-Print Network [OSTI]

    CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

  18. Sequential optimization through adaptive design of experiments

    E-Print Network [OSTI]

    Wang, Hungjen, 1971-

    2007-01-01T23:59:59.000Z

    This thesis considers the problem of achieving better system performance through adaptive experiments. For the case of discrete design space, I propose an adaptive One-Factor-at-A-Time (OFAT) experimental design, study its ...

  19. Article original Adaptation digestive du lapin

    E-Print Network [OSTI]

    Boyer, Edmond

    Article original Adaptation digestive du lapin à la teneur en constituants pariétaux du régime ne diffère pas d'un régime à l'autre, du fait d'une régulation de l'énergie digestible ingérée. L le régime B. lapin / digestion / fibre / adaptation / transit Summary — Digestive adaptation

  20. Formally Analyzing Adaptive Flight Control Ashish Tiwari

    E-Print Network [OSTI]

    Tiwari, Ashish

    tiwari@csl.sri.com Abstract. We formally verify a direct model-reference adaptive control (MRAC) method adaptive flight control. The main source of our model is [8] and [1]. The high-level architectureFormally Analyzing Adaptive Flight Control Ashish Tiwari SRI International Menlo Park, CA 94025

  1. Climate Change Adaptation for Local Government

    E-Print Network [OSTI]

    Pedersen, Tom

    Climate Change Adaptation for Local Government A Resource Guide June 2011 Jenny Fraser, Adaptation to Climate Change Team, Simon Fraser University #12;Page 1 of 26 Climate Change Adaptation for Local: RESOURCES THAT SUPPORT CLIMATE CHANGE ASSESSMENT 3. Past and Future Climate Change and Its Impacts 4

  2. Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs

    E-Print Network [OSTI]

    Peraire, Jaime

    Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs David A. Venditti and David L Anisotropic grid­adaptive strategies are presented for viscous flow simulations in which the accurate estimation and Hessian-based anisotropic grid adaptation. Airfoil test cases are presented to demonstrate

  3. Adaptive security systems -- Combining expert systems with adaptive technologies

    SciTech Connect (OSTI)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01T23:59:59.000Z

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  4. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01T23:59:59.000Z

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  5. adaptive immune regulators: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

  6. adapter protein tsad: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

  7. adaptive numerical treatment: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

  8. adaptive antitumor immunity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

  9. adaptation azole drug: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary: ;2 Baltic Ecosystem Adaptive Management, BEAM, r ett tvrvetenskapligt...

  10. Mechanics and Applications of Pressure Adaptive Honeycomb

    E-Print Network [OSTI]

    Vos, Roelof

    2009-07-31T23:59:59.000Z

    calculations. In addition, I would like to express my gratitude to the undergraduate students that have helped with the preparations of the experiments: Lauren Kerth, Will Pflug, Tom O?Brien, Thomas Statsny, and Ryan Barnhart. v TABLE OF CONTENTS... and Curvature Induced by Pressure adaptive Honeycomb 55 3.2.1 Pressure adaptive Wing Section 60 3.2.2 Pressure adaptive Gurney Flap 63 3.2.3 Pressure adaptive Solid State Flap 65 3.2.4 Pressure adaptive Engine Inlet 67 vi 3.3 Actuation Sources 71 4.1 Cellular...

  11. Adaptive Stabilization of Nonlinear Stochastic Systems

    SciTech Connect (OSTI)

    Florchinger, P. [URA CNRS No. 399, Departement de Mathematiques, UFR MIM, Universite de Metz, Ile du Saulcy, F 57045 Metz Cedex (France)

    1998-07-15T23:59:59.000Z

    The purpose of this paper is to study the problem of asymptotic stabilization in probability of nonlinear stochastic differential systems with unknown parameters. With this aim, we introduce the concept of an adaptive control Lyapunov function for stochastic systems and we use the stochastic version of Artstein's theorem to design an adaptive stabilizer. In this framework the problem of adaptive stabilization of a nonlinear stochastic system is reduced to the problem of asymptotic stabilization in probability of a modified system. The design of an adaptive control Lyapunov function is illustrated by the example of adaptively quadratically stabilizable in probability stochastic differential systems.

  12. Center for Adaptive Optics* Santa Cruz,CA

    E-Print Network [OSTI]

    Grether, Gregory

    Center for Adaptive Optics* Santa Cruz,CA The Center for Adaptive Optics (CfAO) will concentrate on astronomical and vision science applications of adaptive optics and will reach out to other adaptive optics communities to share technologies. It will develop new instruments optimized for adaptive optics. Adaptive

  13. Issues in adaptive mesh refinement

    SciTech Connect (OSTI)

    Dai, William Wenlong [Los Alamos National Laboratory

    2009-01-01T23:59:59.000Z

    In this paper, we present an approach for a patch-based adaptive mesh refinement (AMR) for multi-physics simulations. The approach consists of clustering, symmetry preserving, mesh continuity, flux correction, communications, and management of patches. Among the special features of this patch-based AMR are symmetry preserving, efficiency of refinement, special implementation offlux correction, and patch management in parallel computing environments. Here, higher efficiency of refinement means less unnecessarily refined cells for a given set of cells to be refined. To demonstrate the capability of the AMR framework, hydrodynamics simulations with many levels of refinement are shown in both two- and three-dimensions.

  14. INPUT CONSTRAINED ADAPTIVE TRACKING WITH APPLICATIONS TO

    E-Print Network [OSTI]

    Knobloch,Jürgen

    as models in several industries including continuous polymerization reactors, distillation columns tracking ac- curacy, quantified by > 0 set by the designer, is ensured. The adaptive control strategy does

  15. Training for Climate Adaptation in Conservation

    Broader source: Energy.gov [DOE]

    The Wildlife Conservation Society and the Northern Institute of Applied Climate Science are hosting this two-day training for climate adaptation.

  16. Protein Structure Suggests Role as Molecular Adapter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protein Structure Suggests Role as Molecular Adapter Print To split and copy DNA during replication, all cellular organisms use a multicomponent molecular machine known as the...

  17. Optimization Online - An Adaptive Unified Differential Evolution ...

    E-Print Network [OSTI]

    Ji Qiang

    2015-02-19T23:59:59.000Z

    Feb 19, 2015 ... Abstract: In this paper, we propose a new adaptive unified differential evolution algorithm for single-objective global optimization. Instead of the ...

  18. GLOBAL AND ADAPTIVE SCALING IN A SEPARABLE ...

    E-Print Network [OSTI]

    2007-10-19T23:59:59.000Z

    programs confirm that Adaptive Global Scaling subsumes former scaling ...... Then, the compact convex set B of symmetric matrices eigeinvalues of which.

  19. Mainstreaming Climate Change Adaptation into Development Planning...

    Open Energy Info (EERE)

    Practitioners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mainstreaming Climate Change Adaptation into Development Planning: A Guide for Practitioners Agency...

  20. Assessing Climate Change Impacts, Vulnerability and Adaptation...

    Open Energy Info (EERE)

    The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

  1. adaptive-influence-matrix adaptive optics: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    adaptive-influence-matrix adaptive optics First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Adaptive...

  2. Downhole tool adapted for telemetry

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Fox, Joe (Provo, UT)

    2010-12-14T23:59:59.000Z

    A cycleable downhole tool such as a Jar, a hydraulic hammer, and a shock absorber adapted for telemetry. This invention applies to other tools where the active components of the tool are displaced when the tool is rotationally or translationally cycled. The invention consists of inductive or contact transmission rings that are connected by an extensible conductor. The extensible conductor permits the transmission of the signal before, after, and during the cycling of the tool. The signal may be continuous or intermittent during cycling. The invention also applies to downhole tools that do not cycle, but in operation are under such stress that an extensible conductor is beneficial. The extensible conductor may also consist of an extensible portion and a fixed portion. The extensible conductor also features clamps that maintain the conductor under stresses greater than that seen by the tool, and seals that are capable of protecting against downhole pressure and contamination.

  3. An adaptive radiation model for the origin of new gene functions

    E-Print Network [OSTI]

    Francino, M. Pilar

    2005-01-01T23:59:59.000Z

    An adaptive radiation model for the origin of new genePreadaptation Adaptive radiation Competition among closefor a specific niche Adaptive radiation model Adaptive gene

  4. E-Print Network 3.0 - adaptive systems theory Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems theory Page: << < 1 2 3 4 5 > >> 1 From Adaptive Hypermedia to the Adaptive Web Systems Summary: 1 From Adaptive Hypermedia to the Adaptive Web Systems Peter...

  5. ORIGINAL ARTICLE Mitigation needs adaptation: Tropical forestry

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ORIGINAL ARTICLE Mitigation needs adaptation: Tropical forestry and climate change Manuel R adapt to this change. This paper discusses how tropical forestry practices can contribute to maintaining Forestry Research, P.O. Box 6596 JKPWB, Jakarta 10065, Indonesia e-mail: m.guariguata@cgiar.org J. P

  6. OPTIMAL CONTROL WITH ADAPTIVE INTERNAL DYNAMICS MODELS

    E-Print Network [OSTI]

    Vijayakumar, Sethu

    . The optimal feedback control law for systems with non-linear dynamics and non-quadratic costs can be foundOPTIMAL CONTROL WITH ADAPTIVE INTERNAL DYNAMICS MODELS Djordje Mitrovic, Stefan Klanke, and Sethu, optimal control, adaptive control, robot simulation Abstract: Optimal feedback control has been proposed

  7. Adaptive Web Sites: Automatically Synthesizing Web Pages

    E-Print Network [OSTI]

    Etzioni, Oren

    Adaptive Web Sites: Automatically Synthesizing Web Pages Mike Perkowitz Oren Etzioni Department interfaces Abstract The creation of a complex web site is a thorny problem in user interface design. In IJCAI '97, we challenged the AI community to address this problem by creating adaptive web sites: sites

  8. General Adaptive Replacement Policies Yannis Smaragdakis

    E-Print Network [OSTI]

    Smaragdakis, Yannis

    General Adaptive Replacement Policies Yannis Smaragdakis College of Computing Georgia Institute of Technology yannis@cc.gatech.edu ABSTRACT We propose a general scheme for creating adaptive replace- ment any two existing replacement policies so that the resulting policy provably can never perform worse

  9. ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET

    E-Print Network [OSTI]

    Bouras, Christos

    Chapter 20 ADAPTIVE MULTIMEDIA TRANSMISSION OVER THE INTERNET CHRISTOS BOURAS and APOSTOLOS GKAMAS that are available to multimedia applications can be modified very quickly. Multimedia applications must have to multimedia applications, we can use techniques both at the network and application layers. Adaptive

  10. Adaptive Communication Agent for Group Communication activities

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , limited energy resources), system execute adaptive mechanisms by monitoring the data flow. Also, the actor-wide collaborative environment, managing the adaptive communication is a challenging task. It implies the monitoring and executed without manual intervention. This research is applied to a Crisis Management System (CMS) within

  11. Enabling Informed Adaptation of Reformed Instructional Materials

    E-Print Network [OSTI]

    Elby, Andy

    Enabling Informed Adaptation of Reformed Instructional Materials Rachel E. Scherr and Andrew Elby 20742 USA Abstract. Instructors inevitably need to adapt even the best reform materials to suit instructors, and video clips of students working on the materials. Our materials thus facilitate their own

  12. Adaptive Filtering of Multilingual Document Streams

    E-Print Network [OSTI]

    Oard, Doug

    the volume of new documents that must be examined by the user to manageable levels. This paper presents three techniques for extending adaptive monolingual text ltering techniques to manage multilingual document streamsAdaptive Filtering of Multilingual Document Streams Douglas W. Oard College of Library

  13. DAMS: Distributed Adaptive Metaheuristic Selection Bilel Derbel

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    DAMS: Distributed Adaptive Metaheuristic Selection Bilel Derbel Université Lille 1 LIFL ­ CNRS Metaheuristic Selection (DAMS) frame- work. DAMS is dedicated to adaptive optimization in distributed environments. Given a set of metaheuristics, the goal of DAMS is to coordinate their local execution

  14. A fuzzy-tuned adaptive Kalman filter 

    E-Print Network [OSTI]

    Painter, John H.; Young Hwan Lho

    1993-12-01T23:59:59.000Z

    In this paper, fuzzy processing is applied to the adaptive Kalman filter. The filter gain coefficients are adapted over a 50 dB range of unknown signal/noise dynamics, using fuzzy membership functions. Specific simulation results are shown for a...

  15. Outreach and Adaptive Strategies for Climate Change

    E-Print Network [OSTI]

    Outreach and Adaptive Strategies for Climate Change: The Role of NOAA Sea Grant Extension years and generations about how to adapt to a changing climate. Effective preparation for possible effects of climate change includes engagement of resource managers, planners, public works officials

  16. A fuzzy-tuned adaptive Kalman filter

    E-Print Network [OSTI]

    Painter, John H.; Young Hwan Lho

    1993-12-01T23:59:59.000Z

    In this paper, fuzzy processing is applied to the adaptive Kalman filter. The filter gain coefficients are adapted over a 50 dB range of unknown signal/noise dynamics, using fuzzy membership functions. Specific simulation results are shown for a...

  17. Probing young massive clusters with laser guide star adaptive optics

    E-Print Network [OSTI]

    McCrady, Nate

    2009-01-01T23:59:59.000Z

    laser guide star adaptive optics Nate McCrady Received: 10laser guide star adaptive optics (LGS/AO) on the 10 m Keckof 4 Mpc. Our adaptive optics work is motivated by three

  18. adaptive survival responses: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    changing environment using sleep. We also quantified 15 Scaling adaptation: climate change response and Geosciences Websites Summary: , and the barriers to adaptation are...

  19. An adaptive mesh refinement technique for dynamics of solids

    E-Print Network [OSTI]

    Trivedi, Abhishek

    2007-01-01T23:59:59.000Z

    adaptations; right: cut-off grid with a solution contour.adaptations; right: cut-off grid with a solution contour.

  20. adaptive signal detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

  1. adaptive signal processing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

  2. adaptive information processing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    52 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

  3. adapted damage control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    40 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

  4. adaptive control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 INTERNATIONAL JOURNAL OF ADAPTIVE CONTROL AND SIGNAL PROCESSING Int. J. Adapt. Control Signal Process. (in press) Engineering Websites Summary: predictive control 1....

  5. adaptive predictive control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applied to analyze the transient Antsaklis, Panos 44 ADAPTIVE ROBUST TRACKING CONTROL OF PRESSURE Engineering Websites Summary: 1---- 1 ADAPTIVE ROBUST TRACKING CONTROL OF...

  6. active adaptive management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    begun to embrace the concept adaptive management as an alternative to traditional natural resource planning and management models. Adaptive management may provide BLM managers ......

  7. adaptive management department: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    begun to embrace the concept adaptive management as an alternative to traditional natural resource planning and management models. Adaptive management may provide BLM managers ......

  8. National Adaptation Forum Webinar Series: Out of Town, Not Out...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Adaptation Forum Webinar Series: Out of Town, Not Out of Trouble: Small Agriculture and Indigenous Communities National Adaptation Forum Webinar Series: Out of Town, Not Out of...

  9. Farming in a Changing Climate: Agricultural Adaptation in Canada

    E-Print Network [OSTI]

    Jain, Varinder

    2010-01-01T23:59:59.000Z

    Agricultural Adaptation in Canada Ellen Wall, Barry Smit,Agricultural Adaptation in Canada. Vancouver, BC: Universitythe agri-food sector in Canada, the insights provided are so

  10. Enabling High Efficiency Low Temperature Combustion by Adaptive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Low Temperature Combustion by Adaptive In-Situ Jet Cooling Enabling High Efficiency Low Temperature Combustion by Adaptive In-Situ Jet Cooling A new approach, called...

  11. adaptive interactive technologies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Shock-induced combustion Fluid-structure interaction Implementation Parallel Adaptive Cartesian Upwind Mathematics Websites Summary: Finite volume methods Adaptive mesh refinement...

  12. adaptive responses genomic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Biochemical Adaptation 169 From: Integrative Physiology in the Proteomics and Post-Genomics Age Biology and Medicine Websites Summary: Biochemical Adaptation 169 169 From:...

  13. adaptive optimal control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    result. In this procedure it is essential Campi, Marco 3 Adaptive Control System Optimization for Vibration Control of Flexible Structures Engineering Websites Summary: Adaptive...

  14. adaptive particle swarm: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 An Adaptive Learning Particle Swarm Optimizer for Function Optimization Computer Technologies and Information Sciences Websites Summary: An Adaptive...

  15. adaptive intrusion detection: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Last Page Topic Index 1 Adaptive Model Generation for Intrusion Detection Systems Computer Technologies and Information Sciences Websites Summary: Adaptive Model Generation for...

  16. Seismic Technology Adapted to Analyzing and Developing Geothermal...

    Broader source: Energy.gov (indexed) [DOE]

    Seismic Technology Adapted to Analyzing and Developing Geothermal Systems Below Surface-Exposed High-Velocity Rocks Seismic Technology Adapted to Analyzing and Developing...

  17. Implementing Adaptive Performance Management in Server Applications

    SciTech Connect (OSTI)

    Liu, Yan; Gorton, Ian

    2007-06-11T23:59:59.000Z

    Performance and scalability are critical quality attributes for server applications in Internet-facing business systems. These applications operate in dynamic environments with rapidly fluctuating user loads and resource levels, and unpredictable system faults. Adaptive (autonomic) systems research aims to augment such server applications with intelligent control logic that can detect and react to sudden environmental changes. However, developing this adaptive logic is complex in itself. In addition, executing the adaptive logic consumes processing resources, and hence may (paradoxically) adversely affect application performance. In this paper we describe an approach for developing high-performance adaptive server applications and the supporting technology. The Adaptive Server Framework (ASF) is built on standard middleware services, and can be used to augment legacy systems with adaptive behavior without needing to change the application business logic. Crucially, ASF provides built-in control loop components to optimize the overall application performance, which comprises both the business and adaptive logic. The control loop is based on performance models and allows systems designers to tune the performance levels simply by modifying high level declarative policies. We demonstrate the use of ASF in a case study.

  18. Adaptive control for optimizing microalgae production

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Adaptive control for optimizing microalgae production Francis Mairet Rafael Mu for light-limited microalgae culture. This controller regulates the light absorption factor, defined productivity under day-night cycles. Keywords: Nonlinear controller, Microalgae, Optimization, Biomass

  19. Exponential convergence with adaptive Monte Carlo

    SciTech Connect (OSTI)

    Booth, T.E.

    1997-11-01T23:59:59.000Z

    For over a decade, it has been known that exponential convergence on discrete transport problems was possible using adaptive Monte Carlo techniques. Now, exponential convergence has been empirically demonstrated on a spatially continuous problem.

  20. Multi-model adaptive spatial hypertext 

    E-Print Network [OSTI]

    Francisco-Revilla, Luis

    2005-02-17T23:59:59.000Z

    in response to multiple relevant factors. The framework is composed of four parts: a general system architecture, a definition of the fundamental concepts in spatial hypermedia, an ontological classification of the adaptation strategies, and the philosophy...

  1. Adaptive Importance Sampling via Stochastic Convex Programming

    E-Print Network [OSTI]

    Adaptive Importance Sampling via Stochastic Convex Programming Ernest K. Ryu1 and Stephen P. Boyd1 Abstract We show that the variance of the Monte Carlo estimator that is importance sam- pled from

  2. Scalable Adaptive Multilevel Solvers for Multiphysics Problems

    SciTech Connect (OSTI)

    Xu, Jinchao

    2014-12-01T23:59:59.000Z

    In this project, we investigated adaptive, parallel, and multilevel methods for numerical modeling of various real-world applications, including Magnetohydrodynamics (MHD), complex fluids, Electromagnetism, Navier-Stokes equations, and reservoir simulation. First, we have designed improved mathematical models and numerical discretizaitons for viscoelastic fluids and MHD. Second, we have derived new a posteriori error estimators and extended the applicability of adaptivity to various problems. Third, we have developed multilevel solvers for solving scalar partial differential equations (PDEs) as well as coupled systems of PDEs, especially on unstructured grids. Moreover, we have integrated the study between adaptive method and multilevel methods, and made significant efforts and advances in adaptive multilevel methods of the multi-physics problems.

  3. Adaptive Reliability Analysis of Excavation Problems

    E-Print Network [OSTI]

    Park, Jun Kyung

    2012-10-19T23:59:59.000Z

    . This analysis couples the adaptive design capabilities of the observational method with updated reliability indices, to be used in risk-based design decisions. A probabilistic framework is developed to predict three-dimensional deformation profiles due...

  4. Robust adaptive control of switched systems

    E-Print Network [OSTI]

    El-Rifai, Khalid, 1979-

    2007-01-01T23:59:59.000Z

    In this thesis, robust adaptive controllers are developed for classes of switched nonlinear systems. Switched systems are those governed by differential equations, which undergo vector field switching due to sudden changes ...

  5. Skeletal adaptation to reduced mechanical loading

    E-Print Network [OSTI]

    Eliman, Rachel

    2014-01-01T23:59:59.000Z

    Bone adapts its mass and architecture in response to its mechanical environment. Yet control of this process by mechanical cues is poorly understood, particularly for unloading. Defining the fundamental mechanoregulation ...

  6. Adaptive optic demonstrators for extremely large telescopes 

    E-Print Network [OSTI]

    Campbell, Michael Aloysius

    2011-06-27T23:59:59.000Z

    The next generation of ground-based optical/infrared (IR) telescopes will have primary mirrors of up to 42 m. To take advantage of the large potential increase in angular resolution, adaptive optics will be essential to ...

  7. Adaptive sampling in autonomous marine sensor networks

    E-Print Network [OSTI]

    Eickstedt, Donald Patrick

    2006-01-01T23:59:59.000Z

    In this thesis, an innovative architecture for real-time adaptive and cooperative control of autonomous sensor platforms in a marine sensor network is described in the context of the autonomous oceanographic network scenario. ...

  8. Fast Adaptive Silhouette Area based Template Matching

    E-Print Network [OSTI]

    Zachmann, Gabriel

    Fast Adaptive Silhouette Area based Template Matching Daniel Mohr and Gabriel Zachmann If (Technical Informatics and Computer Systems) Prof. Dr. Gabriel Zachmann (Computer Graphics) Prof. Dr Template Matching Daniel Mohr and Gabriel Zachmann Clausthal University of Technology, Department

  9. A Logical Characterization of Adaptive Educational Hypermedia

    E-Print Network [OSTI]

    Henze, Nicola

    reference models for adaptive hypermedia, e.g. the AHAM Reference Model [4], or the Munich Reference Model [20]. Both, the AHAM and Munich Reference Model, extend the Dexter Hypertext Model [16], and pro- vide

  10. Convert! : the adaptive reuse of churches

    E-Print Network [OSTI]

    Kiley, Christopher John, 1972-

    2004-01-01T23:59:59.000Z

    This thesis examines the phenomenon of vacated churches and analyzes the major issues underlying their adaptive reuse in order to help promulgate an awareness of the range of successful strategies and solutions that are ...

  11. Challenges of Adapting to a Changing Climate

    E-Print Network [OSTI]

    Hurd, Brian H.

    2008-01-01T23:59:59.000Z

    of Global Climate Change on Agriculture: An Interpretiveon U.S. Agriculture, in THE IMPACT OF CLIMATE CHANGE ON THEclimate change and the potential roles for adaptation are more severe for ecosystems than they are for managed systems like agriculture.

  12. Anisotropic Grid Adaptation for Multiple Aerodynamic Outputs

    E-Print Network [OSTI]

    Venditti, David A.

    Anisotropic grid–adaptive strategies are presented for viscous flow simulations in which the accurate prediction of multiple aerodynamic outputs (such as the lift, drag, and moment coefficients) is required from a single ...

  13. Developmental Plasticity Links Local Adaptation and Evolutionary

    E-Print Network [OSTI]

    Badyaev, Alex

    Developmental Plasticity Links Local Adaptation and Evolutionary Diversification in Foraging, University of Arizona, Tucson, Arizona Developmental plasticity is thought to reconcile the constraining role morphology into adulthood, providing an opportunity to directly examine the links between plasticity of bone

  14. Adaptive gain improves reactor control

    SciTech Connect (OSTI)

    Whatley, M.J.; Pott, D.C.

    1984-05-01T23:59:59.000Z

    An interesting application of the modern control theory technique called adaptive control is presently in use on a process located at a plant in the Standard Oil Co. (Ind.) system. The results of this application are: first, the transformation of an uncontrollable process to a controllable one; and, second, a significant economic savings to the corporation. It also shows that a detailed analysis of the mechanical, chemical and control systems can provide both the basis for revising an existing control system and some of the reasons why that system is inadequate. The contrast between classical and modern control theories is seen in four major areas. In classical systems, the controller manipulates the error to calculate its output. The error is subjected to a limited number of analog computing functions such as multiplication by a constant and integration. Each controller has one specific strategy--to hold the measured variable at the setpoint. And each controller controls only one variable, independent of all others. In a modern system, the controller can manipulate many different variables in addition to the error to compute its output. Its computing power is unlimited in a practical sense. It can do all classical computations plus many others, including a table look-up. The controller can independently change its strategy as a function of time or the condition of the process. It can also control many variables at one time to accomplish a complex objective. The implementation of a modern control theory project requires a good understanding of the dynamic, as well as the steady-state character of the process. As you can see we are limited only by our understanding of the process, our imagination, and the economics of the situation.

  15. The Durham ELT adaptive optics simulation platform

    E-Print Network [OSTI]

    Alastair Basden; Timothy Butterley; Richard Myers; Richard Wilson

    2006-11-09T23:59:59.000Z

    Adaptive optics systems are essential on all large telescopes where image quality is important. These are complex systems with many design parameters requiring optimisation before good performance can be achieved. The simulation of adaptive optics systems is therefore necessary to categorise the expected performance. This paper describes an adaptive optics simulation platform, developed at Durham University, which can be used to simulate adaptive optics systems on the largest proposed future extremely large telescopes (ELTs) as well as current systems. This platform is modular, object oriented and has the benefit of hardware application acceleration which can be used to improve the simulation performance, essential for ensuring that the run time of a given simulation is acceptable. The simulation platform described here can be highly parallelised using parallelisation techniques suited for adaptive optics simulation, whilst still offering the user complete control while the simulation is running. Results from the simulation of a ground layer adaptive optics system are provided as an example to demonstrate the flexibility of this simulation platform.

  16. IEEE INFOCOM 2001 1 Pricing Network Resources for Adaptive

    E-Print Network [OSTI]

    Wang, Xin

    , and provides a natural and equitable incentive for applications to adapt their service contract according

  17. Model Reference Adaptive Control Framework for Real Time Traffic

    E-Print Network [OSTI]

    Minnesota, University of

    Adaptive Control #12;12 Prescriptive Dynamic Traffic Assignment A Prediction Model and the Reference ModelModel Reference Adaptive Control Framework for Real Time Traffic Management Under Emergency Movement Volume Adaptive Controller Model Reference Adaptive Control (MRAC) Assumptions Super Zone Concept

  18. DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR

    E-Print Network [OSTI]

    Serdijn, Wouter A.

    DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR Aleksandar Tasiü, Wouter A. Serdijn and John R, an adaptive 2G/3G voltage-controlled oscillator (VCO) is described in this paper. For the DCS1800 operation with this reasoning, an adaptive 2G/3G voltage- controlled oscillator, meant for a dual-standard adaptive front

  19. Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal Morphology and Life History

    E-Print Network [OSTI]

    Gotthard, Karl

    Adaptive Plasticity and Plasticity as an Adaptation: A Selective Review of Plasticity in Animal wide-ranging. All key REVIEW references should be cited. A summary is required. Adaptive plasticity and plasticity as an adaptation: a selective review of plasticity in animal morphology and life history Karl

  20. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22T23:59:59.000Z

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  1. EcoAdapt Working Paper Series N1 Adaptation to climate change for local development

    E-Print Network [OSTI]

    Boyer, Edmond

    1 EcoAdapt Working Paper Series N°1 Adaptation to climate change for local development Análisis in terms of employment, water situation and land use, at a quantitative and qualitative level, in three and summer pastures, due to the geographic and climatic conditions. hal-01059368,version1-30Aug2014 #12

  2. A Rate-Adaptive Multimedia Multicasting Mechanism. . . 23 A Rate-Adaptive Multimedia Multicasting Mechanism in

    E-Print Network [OSTI]

    A Rate-Adaptive Multimedia Multicasting Mechanism. . . 23 A Rate-Adaptive Multimedia Multicasting and Multimedia Department ENST Bretagne, 2, rue de la Chataigneraie - CS 17607 35576 Cesson Sevigne Cedex rapidly. One of the major driving factors of WLANs is multimedia services such as VOD or HDTV delivered

  3. Adaptive and Non-Adaptive Distribution Functions for DSA Melanie Smith

    E-Print Network [OSTI]

    Mailler, Roger

    Adaptive and Non-Adaptive Distribution Functions for DSA Melanie Smith University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104 melanie@utulsa.edu Sandip Sen University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104 sandip-sen@utulsa.edu Roger Mailler University of Tulsa 800 S. Tucker Drive Tulsa, OK 74104

  4. Adapting to WisconsinAdapting to Wisconsin''ss Changing WatersChanging Waters

    E-Print Network [OSTI]

    Sheridan, Jennifer

    spells and droughts in some places, to colder cold spells and more violent storms, more intense flooding://wicci.wisc.edu #12;WICCI Identifying impacts and adaptation strategies Evaluate potential effects on industry, agriculture, tourism, and other human activities. Develop and recommend adaptation strategies. Mission: Assess

  5. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S. (Albuquerque, NM); Lobitz, Donald W. (Albuquerque, NM)

    2003-01-01T23:59:59.000Z

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  6. Load attenuating passively adaptive wind turbine blade

    DOE Patents [OSTI]

    Veers, Paul S.; Lobitz, Donald W.

    2003-01-07T23:59:59.000Z

    A method and apparatus for improving wind turbine performance by alleviating loads and controlling the rotor. The invention employs the use of a passively adaptive blade that senses the wind velocity or rotational speed, and accordingly modifies its aerodynamic configuration. The invention exploits the load mitigation prospects of a blade that twists toward feather as it bends. The invention includes passively adaptive wind turbine rotors or blades with currently preferred power control features. The apparatus is a composite fiber horizontal axis wind-turbine blade, in which a substantial majority of fibers in the blade skin are inclined at angles of between 15 and 30 degrees to the axis of the blade, to produces passive adaptive aeroelastic tailoring (bend-twist coupling) to alleviate loading without unduly jeopardizing performance.

  7. Model Driven Mutation Applied to Adaptative Systems Testing

    E-Print Network [OSTI]

    Bartel, Alexandre; Munoz, Freddy; Klein, Jacques; Mouelhi, Tejeddine; Traon, Yves Le

    2012-01-01T23:59:59.000Z

    Dynamically Adaptive Systems modify their behav- ior and structure in response to changes in their surrounding environment and according to an adaptation logic. Critical sys- tems increasingly incorporate dynamic adaptation capabilities; examples include disaster relief and space exploration systems. In this paper, we focus on mutation testing of the adaptation logic. We propose a fault model for adaptation logics that classifies faults into environmental completeness and adaptation correct- ness. Since there are several adaptation logic languages relying on the same underlying concepts, the fault model is expressed independently from specific adaptation languages. Taking benefit from model-driven engineering technology, we express these common concepts in a metamodel and define the operational semantics of mutation operators at this level. Mutation is applied on model elements and model transformations are used to propagate these changes to a given adaptation policy in the chosen formalism. Preliminary resul...

  8. Adaptive protocols for mobile ad hoc networks

    E-Print Network [OSTI]

    Holland, Gavin Douglas

    2005-02-17T23:59:59.000Z

    . We investigate new link layer mechanisms that dynamically monitor and adapt to changes in link quality, including a protocol that uses common control messages to form a tight feedback control loop for adaptation of the link data rate to best match... of the presence of multirate links. We then investigate the performance of iv TCP, showing how communication outages caused by link failures and routing delays can be very detrimental to its performance. In response, we present a solution to this problem that uses...

  9. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  10. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01T23:59:59.000Z

    All The Way Down: A Clean-Slate, Ground-Up, First-Principlesintegrity using clean-slate, ground-up techniques involvingsensor results, such as the clean slate solution referred to

  11. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492air Comments? We would love to heargovInstrumentstdma Comments?History Organization Participants Facility

  12. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding Removal OngoingCERCLA Sites Quality Assurance Project

  13. Adaptive Training for Large Vocabulary Continuous

    E-Print Network [OSTI]

    Hain, Thomas

    Adaptive Training for Large Vocabulary Continuous Speech Recognition Kai Yu Hughes Hall College for the degree of Doctor of Philosophy #12;ii Summary In recent years, there has been a trend towards training is to train hidden Markov models (HMMs) on the whole data set as if all data comes from a single acoustic

  14. Semantic Web Technologies for the Adaptive Web

    E-Print Network [OSTI]

    Nejdl, Wolfgang

    23 Semantic Web Technologies for the Adaptive Web Peter Dolog1 and Wolfgang Nejdl2 1 Department.de Abstract. Ontologies and reasoning are the key terms brought into focus by the semantic web community. Formal representation of ontologies in a common data model on the web can be taken as a foundation

  15. Provenance Meets Adaptive Hypermedia Evgeny Knutov

    E-Print Network [OSTI]

    De Bra, Paul

    Provenance Meets Adaptive Hypermedia Evgeny Knutov Department of Computer Science Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven, the Netherlands e.knutov@tue.nl Paul De Bra Department of Computer Science Eindhoven University of Technology P.O. Box 513, 5600 MB Eindhoven

  16. A Computational Model for Adaptive Emotion Regulation

    E-Print Network [OSTI]

    Treur, Jan

    A Computational Model for Adaptive Emotion Regulation Tibor Bosse, Matthijs Pontier, and Jan Treur} Abstract. Emotion regulation describes how a subject can use certain strategies to affect emotion response levels. Usually, models for emotion regulation as- sume mechanisms based on feedback loops that indicate

  17. Adaptive Scheduling Algorithms for Planet Searches

    E-Print Network [OSTI]

    Eric B. Ford

    2007-12-17T23:59:59.000Z

    High-precision radial velocity planet searches have surveyed over ~2000 nearby stars and detected over ~200 planets. While these same stars likely harbor many additional planets, they will become increasingly challenging to detect, as they tend to have relatively small masses and/or relatively long orbital periods. Therefore, observers are increasing the precision of their observations, continuing to monitor stars over decade timescales, and also preparing to survey thousands more stars. Given the considerable amounts of telescope time required for such observing programs, it is important use the available resources as efficiently as possible. Previous studies have found that a wide range of predetermined scheduling algorithms result in planet searches with similar sensitivities. We have developed adaptive scheduling algorithms which have a solid basis in Bayesian inference and information theory and also are computationally feasible for modern planet searches. We have performed Monte Carlo simulations of plausible planet searches to test the power of adaptive scheduling algorithms. Our simulations demonstrate that planet searches performed with adaptive scheduling algorithms can simultaneously detect more planets, detect less massive planets, and measure orbital parameters more accurately than comparable surveys using a non-adaptive scheduling algorithm. We expect that these techniques will be particularly valuable for the N2K radial velocity planet search for short-period planets as well as future astrometric planet searches with the Space Interferometry Mission which aim to detect terrestrial mass planets.

  18. A Middleware Framework for the Adaptive Home

    E-Print Network [OSTI]

    Dommel, Hans-Peter

    -friendly access to customized energy-aware home control, as well as the basic ambient intelligence to make a home adapt to user behavior and environmental constraints. Keywords. Network middleware for smart homes behavior. Newer developments in outfitting homes with powerful telematic intelligence [3, 4] catering

  19. Adaptive wavelet deconvolution for strongly mixing sequences

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Adaptive wavelet deconvolution for strongly mixing sequences Christophe Chesneau Abstract square error over Besov balls, we explore the performances of two wavelet estimators: a standard linear, Strongly mixing, Adap- tivity, Wavelets, Hard thresholding. AMS 2000 Subject Classifications: 62G07, 62G20

  20. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  1. Adaptive, full-spectrum solar energy system

    DOE Patents [OSTI]

    Muhs, Jeffrey D.; Earl, Dennis D.

    2003-08-05T23:59:59.000Z

    An adaptive full spectrum solar energy system having at least one hybrid solar concentrator, at least one hybrid luminaire, at least one hybrid photobioreactor, and a light distribution system operably connected to each hybrid solar concentrator, each hybrid luminaire, and each hybrid photobioreactor. A lighting control system operates each component.

  2. Adaptation in constant utility nonstationary environments

    E-Print Network [OSTI]

    Littman, Michael L.

    ­stationary environments are so pathological. Even if the environment, when viewed as a monolithic function, may of the results created by the organism over some given lifespan determines the organism's fitness. The nasty, the fitness produced by any single mapping will be at the chance level. The adaptive challenge is to produce

  3. Energy dissipation in an adaptive molecular circuit

    E-Print Network [OSTI]

    Shou-Wen Wang; Yueheng Lan; Lei-Han Tang

    2015-05-28T23:59:59.000Z

    The ability to monitor nutrient and other environmental conditions with high sensitivity is crucial for cell growth and survival. Sensory adaptation allows a cell to recover its sensitivity after a transient response to a shift in the strength of extracellular stimulus. The working principles of adaptation have been established previously based on rate equations which do not consider fluctuations in a thermal environment. Recently, G. Lan et al. (Nature Phys., 8:422-8, 2012) performed a detailed analysis of a stochastic model for the E. coli sensory network. They showed that accurate adaptation is possible only when the system operates in a nonequilibrium steady-state (NESS). They further proposed an energy-speed-accuracy (ESA) trade-off relation. We present here analytic results on the NESS of the model through a mapping to a one-dimensional birth-death process. An exact expression for the entropy production rate is also derived. Based on these results, we are able to discuss the ESA relation in a more general setting. Our study suggests that the adaptation error can be reduced exponentially as the methylation range increases. Finally, we show that a nonequilibrium phase transition exists in the infinite methylation range limit, despite the fact that the model contains only two discrete variables.

  4. CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT

    E-Print Network [OSTI]

    CLIMATE CHANGE ADAPTATIONS FOR LOCAL WATER MANAGEMENT IN THE SAN FRANCISCO BAY AREA A White Paper from the California Energy Commission's California Climate Change Center JULY 2012 CEC Climate change will affect both sea level and the temporal and spatial distribution of runoff

  5. An Infrastructure for Adaptive Dynamic Optimization

    E-Print Network [OSTI]

    Amarasinghe, Saman

    An Infrastructure for Adaptive Dynamic Optimization Derek Bruening, Timothy Garnett, and Saman,timothyg,saman}@lcs.mit.edu Abstract Dynamic optimization is emerging as a promising ap- proach to overcome many of the obstacles static optimizations, there are very few for developing dynamic optimizations. We present a framework

  6. Grid adaptation for multiscale plasma simulations

    E-Print Network [OSTI]

    Ito, Atsushi

    Grid adaptation for multiscale plasma simulations Gian Luca Delzanno Los Alamos National Laboratory In collaboration with L. Chacon and J.M. Finn #12;delzanno@lanl.gov Outline · Introduction and motivation · Grid tests · New directions · Conclusions #12;delzanno@lanl.gov Outline · Introduction and motivation · Grid

  7. Climate Change Basics: Science, Adaptation, & Mitigation

    E-Print Network [OSTI]

    Fox-Kemper, Baylor

    Science Global atmospheric concentrations of carbon dioxide, methane and nitrous oxide have increased from ice cores spanning many thousands of years. The global increases in carbon dioxide concentrationClimate Change Basics: Science, Adaptation, & Mitigation with a Family Forest Perspective Baylor

  8. Adaptation, Speciation, and Convergence: A Hierarchical Analysis of Adaptive Radiation in Caribbean Anolis Lizards

    E-Print Network [OSTI]

    Losos, Jonathan B.; Glor, Richard E.; Kolbe, Jason J.; Nicholson, Kirsten

    2006-05-01T23:59:59.000Z

    Caribbean Anolis lizards are a classic case of adaptive radiation, repeated four times across islands of the Greater Antilles. On each island, very similar patterns of evolutionary divergence have occurred, resulting in the evolution of the same set...

  9. The Complexity of Adaptation to Climate Change. Exploring adaptation in Rio Grande, Ecuador 

    E-Print Network [OSTI]

    Argudo, Cristina

    2014-11-27T23:59:59.000Z

    Climate change has become one of the most challenging problems in terms of development, having adverse effects in populations that are already vulnerable to other stressors. At present, the importance of adaptation to climate change has been widely...

  10. Funding for adaptation to climate change : the case of Surat

    E-Print Network [OSTI]

    Patel, Toral

    2014-01-01T23:59:59.000Z

    The need for cities to adapt to climate change is widely acknowledged, yet the question of adaptation finance remains uncertain. Unable to access global climate funds, cities must seek out alternative sources to support ...

  11. Learning from Monitoring & Evaluation a blueprint for an adaptive organisation

    E-Print Network [OSTI]

    Learning from Monitoring & Evaluation ­ a blueprint for an adaptive organisation Learning from Monitoring & Evaluation ­ a blueprint for an adaptive organisation Jake Morris and Anna Lawrence Social & Economic Research Group, Forest Research Aim and structure Learning is an essential characteristic

  12. Adaptive array antenna design for wireless communication systems 

    E-Print Network [OSTI]

    Noordin, Nurul Hazlina

    2013-11-28T23:59:59.000Z

    Adaptive array antennas use has been limited to non-commercial applications due to their high cost and hardware complexity. The implementation cost of adaptive array antennas can be kept to a minimum by using cost effective ...

  13. Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs Evaluation and Adaptation of 5-Cycle Fuel Economy Testing and Calculations for HEVs and PHEVs 2012...

  14. adaptive process control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 ADAPTIVE OPTICS CONTROL FOR LASER MATERIAL PROCESSING Mathematics Websites Summary: ADAPTIVE OPTICS...

  15. Geometric Structure of the Adaptive Controller of the Human Arm

    E-Print Network [OSTI]

    Shadmehr, Reza

    1993-07-01T23:59:59.000Z

    The objects with which the hand interacts with may significantly change the dynamics of the arm. How does the brain adapt control of arm movements to this new dynamic? We show that adaptation is via composition of a ...

  16. Adaptive Treatment Strategies Getting SMART About Developing Individualized

    E-Print Network [OSTI]

    Murphy, Susan A.

    Other names are dynamic treatment regimes, treatment algorithms, stepped care models, expert systems: prevent relapse to alcohol abuse · Critical treatment decisions: which treatment to provide first?; which1 Adaptive Treatment Strategies Getting SMART About Developing Individualized Sequences of Adaptive

  17. adaptive fourier analyzer: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    view or analyze the problem in n ways (n >2) Though we have defined these n- adaptive fuzzy models theorectically we are not in a position to get a n-adaptive fuzzy model for n...

  18. Accelerated Adaptive Markov Chain for Partition Function Computation

    E-Print Network [OSTI]

    Keinan, Alon

    Accelerated Adaptive Markov Chain for Partition Function Computation Stefano Ermon, Carla P. Gomes Ithaca NY 14853, U.S.A. Abstract We propose a novel Adaptive Markov Chain Monte Carlo algorithm

  19. Urban climate resilience : a global assessment of city adaptation plans

    E-Print Network [OSTI]

    Katich, Kristina Noel

    2009-01-01T23:59:59.000Z

    As policy makers accept climate change as an irrefutable threat, adaptation planning has emerged as a necessary action for countries, states, and municipalities. This thesis explores adaptive responses to climate change ...

  20. Climate Change Adaptation: A Collective Action Perspective on Federalism Considerations

    E-Print Network [OSTI]

    Glicksman, Robert L.; Levy, Richard E.

    2010-01-01T23:59:59.000Z

    adaptation to minimize the adverse effects of climate change. Climate change adaptation is designed to increase the resilience of natural and human ecosystems to the threats posed by a changing environment. Although an extensive literature concerning...

  1. Performance of Adaptive DualDropping ILUT Preconditioners in Semiconductor

    E-Print Network [OSTI]

    Zhang, Jun

    Performance of Adaptive Dual­Dropping ILUT Preconditioners in Semiconductor Dopant Diffusion for iterative solution of sparse linear systems arising in semiconductor dopant diffusion modeling resolution, timestep in the adaptive ODE integrator and the problem physics. Key words: semiconductor TCAD

  2. Adaptive Robust Control of Robot Manipulators: Theory and Comparative Experiments

    E-Print Network [OSTI]

    Yao, Bin

    of the system such as gravitational load vary from a task to another, and, may not be precisely known in advance-based or direct adaptive control 21 , in which adaptation laws are used to adjust controller gains instead

  3. The Binding of Learning to Action in Motor Adaptation

    E-Print Network [OSTI]

    Gonzalez Castro, Luis Nicolas

    In motor tasks, errors between planned and actual movements generally result in adaptive changes which reduce the occurrence of similar errors in the future. It has commonly been assumed that the motor adaptation arising ...

  4. Optimal adaptive control of cascading power grid failures

    E-Print Network [OSTI]

    Daniel Bienstock

    2010-12-17T23:59:59.000Z

    Dec 17, 2010 ... Abstract: We describe experiments with parallel algorithms for computing adaptive controls for attenuating power grid cascading failures.

  5. Genomic islands predict functional adaptation in marine actinobacteria

    E-Print Network [OSTI]

    Penn, Kevin

    2010-01-01T23:59:59.000Z

    Ecological adaptations among bacterial populations have been linked to genomic islands, strain-specific regions of DNA that house

  6. BIA Request for Proposals for Climate Adaptation Grants for Tribes

    Broader source: Energy.gov [DOE]

    Download the Bureau of Indian Affairs Request for Proposals for Climate Adaptation Grants for Tribes, due November 29.

  7. Communication adapter for use with a drilling component

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Pixton, David S. (Lehi, UT); Hall; Jr.; H. Tracy (Provo, UT); Bradford, Kline (Orem, UT); Rawle, Michael (Springville, UT)

    2007-04-03T23:59:59.000Z

    A communication adapter is disclosed that provides for removable attachment to a drilling component when the drilling component is not actively drilling and for communication with an integrated transmission system in the drilling component. The communication adapter comprises a data transmission coupler that facilitates communication between the drilling component and the adapter, a mechanical coupler that facilitates removable attachment of the adapter to the drilling component, and a data interface.

  8. Automated Web Page Synthesis in Adaptive Web Systems

    E-Print Network [OSTI]

    Ghorbani, Ali

    Automated Web Page Synthesis in Adaptive Web Systems Hossein Sadat and Ali Ghorbani Intelligent, Canada {t15h7,ghorbani}@unb.ca Abstract. An adaptive Web system adapts the Web pages to its users, based of the system. In this paper, we formalize dynamic generation of Web pages and refer to it as Web page synthesis

  9. MEDIA RESOURCES ADAPTATION FOR LIMITED DEVICES TAYEB LEMLOUMA1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    MEDIA RESOURCES ADAPTATION FOR LIMITED DEVICES TAYEB LEMLOUMA1 ; NABIL LAYADA1 1 WAM Project, INRIA.Lemlouma@inrialpes.fr; Nabil.Layaida@inrialpes.fr In this paper, we define a framework for media resources manipulation in an adaptive content delivery system. We discuss the media resources manipulation in an adaptation

  10. An Adaptive Kalman Filter for Removing Baseline Wandering in ECG

    E-Print Network [OSTI]

    Povinelli, Richard J.

    An Adaptive Kalman Filter for Removing Baseline Wandering in ECG Signals MA Mneimneh, EE Yaz, MT to baseline removal. This paper proposes an adaptive Kalman filter for the real time re- moval of baseline is used with an adaptive Kalman filter to estimate the state variables, including the baseline wandering

  11. Adaptive Power Controlled Routing for Underwater Sensor Networks

    E-Print Network [OSTI]

    Zhou, Shengli

    Adaptive Power Controlled Routing for Underwater Sensor Networks Manal Al-Bzoor, Yibo Zhu, Jun Liu of an in- terest packet sent by sink nodes. We use adaptive power control to send at high power level the sink nodes using shortest end to end paths. By using adaptive power control over concentric layered

  12. Semantic Multimedia Document Adaptation with Functional Annotations Sebastien Laborie

    E-Print Network [OSTI]

    Joseph Fourier Grenoble-I, Université

    Semantic Multimedia Document Adaptation with Functional Annotations S´ebastien Laborie IRIT ­ Paul of presentation contexts for multimedia documents requires the adaptation of document specifica- tions. In an earlier work, we have proposed a seman- tic adaptation framework for multimedia documents. This framework

  13. Some Computational Problems Arising in Adaptive Optics Imaging Systems

    E-Print Network [OSTI]

    Plemmons, Robert J.

    Some Computational Problems Arising in Adaptive Optics Imaging Systems Robert J. Plemmons \\Lambda numerical linear algebra tech­ niques in adaptive optics imaging control computations. Real­time adaptive optics is a means for enhancing the resolution of ground based, optical telescopes beyond the limits

  14. Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences

    E-Print Network [OSTI]

    Jourdan, Guy-Vincent

    Checking Sequence Construction Using Adaptive and Preset Distinguishing Sequences Robert M. Hierons of a preset dis- tinguishing sequence for constructing checking sequences. It has been shown that an adaptive distinguishing sequence is sufficient for these methods. This result is significant because adaptive

  15. Grid adaptation for multiscale plasma simulations Gian Luca Delzanno

    E-Print Network [OSTI]

    Ito, Atsushi

    Grid adaptation for multiscale plasma simulations Gian Luca Delzanno Los Alamos National Laboratory tools need to be developed to bridge the gap between these disparate scales. Grid adaptation is one of such tools, useful to address multiple length scales, and we present a new powerful grid adaptation method

  16. Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators

    E-Print Network [OSTI]

    Pfrender, Michael

    Phenotypic plasticity facilitates recurrent rapid adaptation to introduced predators Alison G) A central role for phenotypic plasticity in adaptive evolution is often posited yet lacks empirical support of preexisting developmental pathways, producing rapid adaptive change. We examined the role of plasticity

  17. Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, GeertJan Houben

    E-Print Network [OSTI]

    De Bra, Paul

    model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

  18. Adaptation Control in Adaptive Hypermedia Systems Hongjing Wu, Paul De Bra, Ad Aerts, Geert-Jan Houben

    E-Print Network [OSTI]

    Houben, Geert-Jan

    model for the architecture of adaptive hypermedia applications: AHAM (for Adaptive Hypermedia Application Model) [DHW99], which is an extension of the Dexter hypermedia reference model [HS90, HS94]. AHAM

  19. SU-E-J-153: MRI Based, Daily Adaptive Radiotherapy for Rectal Cancer: Contour Adaptation

    SciTech Connect (OSTI)

    Kleijnen, J; Burbach, M; Verbraeken, T; Weggers, R; Zoetelief, A; Reerink, O; Lagendijk, J; Raaymakers, B; Asselen, B [University Medical Center Utrecht, Utrecht (Netherlands)

    2014-06-01T23:59:59.000Z

    Purpose: A major hurdle in adaptive radiotherapy is the adaptation of the planning MRI's delineations to the daily anatomy. We therefore investigate the accuracy and time needed for online clinical target volume (CTV) adaptation by radiation therapists (RTT), to be used in MRI-guided adaptive treatments on a MRI-Linac (MRL). Methods: Sixteen patients, diagnosed with early stage rectal cancer, underwent a T2-weighted MRI prior to each fraction of short-course radiotherapy, resulting in 4–5 scans per patient. On these scans, the CTV was delineated according to guidelines by an experienced radiation oncologist (RO) and considered to be the gold standard. For each patient, the first MRI was considered as the planning MRI and matched on bony anatomy to the 3–4 daily MRIs. The planning MRI's CTV delineation was rigidly propagated to the daily MRI scans as a proposal for adaptation. Three RTTs in training started the adaptation of the CTV conform guidelines, after a two hour training lecture and a two patient (n=7) training set. To assess the inter-therapist variation, all three RTTs altered delineations of 3 patients (n=12). One RTT altered the CTV delineations (n=53) of the remaining 11 patients. Time needed for adaptation of the CTV to guidelines was registered.As a measure of agreement, the conformity index (CI) was determined between the RTTs' delineations as a group. Dice similarity coefficients were determined between delineations of the RTT and the RO. Results: We found good agreement between RTTs' and RO's delineations (average Dice=0.91, SD=0.03). Furthermore, the inter-observer agreement between the RTTs was high (average CI=0.94, SD=0.02). Adaptation time reduced from 10:33 min (SD= 3:46) to 2:56 min (SD=1:06) between the first and last ten delineations, respectively. Conclusion: Daily CTV adaptation by RTTs, seems a feasible and safe way to introduce daily, online MRI-based plan adaptation for a MRL.

  20. RUMINAL ADAPTATION TO INCREASING LEVELS OF CONCENTRATES

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    .0 % citrus pulp, 1.0 % lard, 7.0 % sugarbeet pulp, 3.3 % oat husk meal, 2.0 % coconut expeller and 2-chromatography. The rate of lactate fermentation was measured by incubation of 10 ml rumen fluid (taken at 14.00 h) with 1. If adaptation occurs one should expect an increase of lactate and a higher rate of L- lactate fermentation

  1. Robust adaptive control of HVDC systems

    SciTech Connect (OSTI)

    Reeve, J.; Sultan, M. (Univ. of Waterloo, Ontario (Canada))

    1994-07-01T23:59:59.000Z

    The transient performance of an HVDC power system is highly dependent on the parameters of the current/voltage regulators of the converter controls. In order to better accommodate changes in system structure or dc operating conditions, this paper introduces a new adaptive control strategy. The advantages of automatic tuning for continuous fine tuning are combined with predetermined gain scheduling in order to achieve robustness for large disturbances. Examples are provided for a digitally simulated back-to-back dc system.

  2. Adaptive powertrain control for plugin hybrid electric vehicles

    DOE Patents [OSTI]

    Kedar-Dongarkar, Gurunath; Weslati, Feisel

    2013-10-15T23:59:59.000Z

    A powertrain control system for a plugin hybrid electric vehicle. The system comprises an adaptive charge sustaining controller; at least one internal data source connected to the adaptive charge sustaining controller; and a memory connected to the adaptive charge sustaining controller for storing data generated by the at least one internal data source. The adaptive charge sustaining controller is operable to select an operating mode of the vehicle's powertrain along a given route based on programming generated from data stored in the memory associated with that route. Further described is a method of adaptively controlling operation of a plugin hybrid electric vehicle powertrain comprising identifying a route being traveled, activating stored adaptive charge sustaining mode programming for the identified route and controlling operation of the powertrain along the identified route by selecting from a plurality of operational modes based on the stored adaptive charge sustaining mode programming.

  3. Adaptive Implicit Non-Equilibrium Radiation Diffusion

    SciTech Connect (OSTI)

    Philip, Bobby [ORNL; Wang, Zhen [ORNL; Berrill, Mark A [ORNL; Rodriguez Rodriguez, Manuel [ORNL; Pernice, Michael [Idaho National Laboratory (INL)

    2013-01-01T23:59:59.000Z

    We describe methods for accurate and efficient long term time integra- tion of non-equilibrium radiation diffusion systems: implicit time integration for effi- cient long term time integration of stiff multiphysics systems, local control theory based step size control to minimize the required global number of time steps while control- ling accuracy, dynamic 3D adaptive mesh refinement (AMR) to minimize memory and computational costs, Jacobian Free Newton-Krylov methods on AMR grids for efficient nonlinear solution, and optimal multilevel preconditioner components that provide level independent solver convergence.

  4. Adaptive schemes for incomplete quantum process tomography

    SciTech Connect (OSTI)

    Teo, Yong Siah [Centre for Quantum Technologies, National University of Singapore, Singapore 117543 (Singapore); NUS Graduate School for Integrative Sciences and Engineering, Singapore 117597 (Singapore); Englert, Berthold-Georg [Centre for Quantum Technologies, National University of Singapore, Singapore 117543 (Singapore); Department of Physics, National University of Singapore, Singapore 117542 (Singapore); Rehacek, Jaroslav; Hradil, Zdenek [Department of Optics, Palacky University, 17. listopadu 12, CZ-77146 Olomouc (Czech Republic)

    2011-12-15T23:59:59.000Z

    We propose an iterative algorithm for incomplete quantum process tomography with the help of quantum state estimation. The algorithm, which is based on the combined principles of maximum likelihood and maximum entropy, yields a unique estimator for an unknown quantum process when one has less than a complete set of linearly independent measurement data to specify the quantum process uniquely. We apply this iterative algorithm adaptively in various situations and so optimize the amount of resources required to estimate a quantum process with incomplete data.

  5. Adaptive Materials Inc | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1AMEE Jump to:Ohio: Energy955°, -89.7755338° ShowAdaptive

  6. WeADAPT | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlin BaxinUmweltVillageGraph HomeWaranaWater PowerWaverly MunicipalWeADAPT

  7. African Adaptation Programme | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2,AUDITCaliforniaWeifangwiki HomeASNAddGlobeJumpAdaptations Programme Name

  8. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, R.S.

    1986-05-02T23:59:59.000Z

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  9. Adapter plate assembly for adjustable mounting of objects

    DOE Patents [OSTI]

    Blackburn, Robert S. (Albuquerque, NM)

    1987-01-01T23:59:59.000Z

    An adapter plate and two locking discs are together affixed to an optic table with machine screws or bolts threaded into a fixed array of internally threaded holes provided in the table surface. The adapter plate preferably has two, and preferably parallel, elongated locating slots each freely receiving a portion of one of the locking discs for secure affixation of the adapter plate to the optic table. A plurality of threaded apertures provided in the adapter plate are available to attach optical mounts or other devices onto the adapter plate in an orientation not limited by the disposition of the array of threaded holes in the table surface. An axially aligned but radially offset hole through each locking disc receives a screw that tightens onto the table, such that prior to tightening of the screw the locking disc may rotate and translate within each locating slot of the adapter plate for maximum flexibility of the orientation thereof.

  10. The Adaptive Optics Lucky Imager: combining adaptive optics and lucky imaging

    E-Print Network [OSTI]

    Crass, Jonathan

    2014-07-01T23:59:59.000Z

    , in particular the adaptive optics system and a new type of wavefront sensor, the non-linear curvature wavefront sensor (nlCWFS), being used within the instrument. The development of the nlCWFS has been the focus of my work, bringing the technique from a...

  11. Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, GeertJan Houben, Paul De Bra

    E-Print Network [OSTI]

    De Bra, Paul

    applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

  12. Supporting User Adaptation in Adaptive Hypermedia Applications Hongjing Wu, Geert-Jan Houben, Paul De Bra

    E-Print Network [OSTI]

    Houben, Geert-Jan

    applications, named AHAM (for Adaptive Hypermedia Application Model) [DHW99]. In AHAM knowledge is represented through hierarchies of large composite abstract concepts as well as small atomic ones. AHAM also divides. In this paper, we concentrate on the user modeling aspects of AHAM, but also describe how they relate

  13. The analysis of convergence for four adaptive filtering algorithms

    E-Print Network [OSTI]

    Sohn, Won

    1990-01-01T23:59:59.000Z

    . The Relation Between AREs of Estimators and Detectors . 29 IV THE ANALYSIS OF THE LMS AI, GORITHM AND ITS FAMILY 31 V A. General Case B. Same Steady-state MSE SIMULATION OF ADAPTIVE FILTERING ALGORITHMS . 42 VI A. Simulation Model 1. Adaptive... Equalization 2. System Identification B. Learning Curves of Adaptive Filtering Algorithms 1. Same Steady-state MSE . 2. Same Speed of Convergence. . . . . . . . . . C. Simulation Results for the ARE 1. Same Steady-state MSE . . 2. Same Speed...

  14. adaptive localization regions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22 23 24 25 Next Page Last Page Topic Index 1 Developing regional and local scenarios for climate change mitigation and adaptation Geosciences Websites Summary: Developing regional...

  15. adapted mucoid strains: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    proposed by Francfort and Marigo in 19 Cremers, Daniel 2 Adaptation CiteSeer Summary: Climate change is expected to bring potentially significant changes to Washington States...

  16. adaptive supply survival: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Pike, Ivy L. 2003-12-01 8 Edinburgh Research Explorer Partial costs of global climate change adaptation for the supply Biology and Medicine Websites Summary: Edinburgh Research...

  17. affects adaptive allocation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of water allocation institutions on societys adaptability to prospective climate change. Such institutions include basic systems of water law, specific statutes, systems of...

  18. adaptive slot allocation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of water allocation institutions on societys adaptability to prospective climate change. Such institutions include basic systems of water law, specific statutes, systems of...

  19. Adaptive Control to Improve Low Temperature Diesel Engine Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Control to Improve Low Temperature Diesel Engine Combustion Adaptive Control to Improve Low Temperature Diesel Engine Combustion Presentation given at DEER 2006, August 20-24,...

  20. adaptive control strategies: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    using any finite number of channel evaluations. Aram W. Harrow; Avinatan Hassidim; Debbie W. Leung; John Watrous 2009-09-01 12 CONTRIBUTED Adaptive Stochastic Control Energy...

  1. Mean and covariance matrix adaptive estimation for a weakly ...

    E-Print Network [OSTI]

    2011-01-25T23:59:59.000Z

    AMS 2000 subject classification: Primary: 62G05, 62M10; Secondary: 90C15. Key words and phrases: Adaptive estimation, weakly stationary process, stochastic ...

  2. adaptive finite element: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    properties and performance of the adaptive finite element approach to the design of nano-photonic components. Central issues are the construction of vectorial finite elements...

  3. adaptive finite elements: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    properties and performance of the adaptive finite element approach to the design of nano-photonic components. Central issues are the construction of vectorial finite elements...

  4. adaptation biological: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1, 3, 4. Here Averof, Michalis 39 Master's theses projects: Adaptations to a warming Baltic Sea We look for candidates interested in aquatic ecology to work on projects...

  5. adapter protein sly1: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to their own needs. This is achieved by enabling users... Heeren, Bastiaan 2010-01-01 157 Baltic Ecosystem Adaptive Management Environmental Sciences and Ecology Websites Summary:...

  6. adaptation taenkbara konsekvenser: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Smart Grid holds the promise of providing the autonomous intelligence of distributed generation and storage within the Smart Grid. KEYWORDS | Adaptive stochastic control (ASC...

  7. adaptive distributed control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Smart Grid holds the promise of providing the autonomous intelligence of distributed generation and storage within the Smart Grid. KEYWORDS | Adaptive stochastic control (ASC...

  8. adapting balanced scorecard: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brusilovsky School of Information and the same links to all - Stores - Museums - Courses - News sites Adaptive Web-based systems and sites Brusilovsky, Peter 237...

  9. How to Integrate Climate Change Adaptation into National-Level...

    Open Energy Info (EERE)

    Integrate Climate Change Adaptation into National-Level Policy and Planning in the Water Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: How to Integrate Climate...

  10. adaptive composite grid: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    space and ti... Thornburg, Jonathan 2009-01-01 10 Adaptive Rate Stream Processing for Smart Grid Applications on Clouds Computer Technologies and Information Sciences Websites...

  11. adaptive grid generation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    space and ti... Thornburg, Jonathan 2009-01-01 12 Adaptive Rate Stream Processing for Smart Grid Applications on Clouds Computer Technologies and Information Sciences Websites...

  12. Adaptive finite element method for eddy current problems

    E-Print Network [OSTI]

    Adaptive finite element method for eddy current problems. In this chapter we shall discuss Maxwell's equations at very low frequencies. We also refer to [bo98 ...

  13. astec code adaptability: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Marom 1997-07-14 2 Adaptive decoding for dense and sparse evaluationinterpolation codes Computer Technologies and Information Sciences Websites Summary: with errors Decoding...

  14. adaptive chemistry dac: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Tool Needs for Faster Mainstream Acceptance of 3D Lim, Sung Kyu 5 Ethical Conduct in Science and Engineering Adapted from Chemistry-Biology Interface Program Ethics Materials...

  15. adaptive aberration correction: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 Accommodation with higher-order monochromatic aberrations corrected with adaptive optics Biology and Medicine Websites Summary: . However, the eye suffers from higher-order...

  16. adaptive signal model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Michael Richard 1990-11-13 2 UNCORRECTED 2 Stochastic adaptive control model for traffic signal systems Environmental Sciences and Ecology Websites Summary: process. The model...

  17. adaptive hifu noise: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Noise Engineering Websites Summary: An Adaptive Noise Removal Approach for Restoration of Digital Images Corrupted by Multimodal Noise process compromises the performance of the...

  18. acquired behaviour adaptations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and their envi- ronment affect each other; and representation of full life cycles. Ecology has contributed to agent-based modelling Boone, Randall B. 22 Adaptive Modelling...

  19. adaptive social immunity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to climate risk in the coffee sector of Chiapas, Mexico Environmental Sciences and Ecology Websites Summary: Social identity, perception and motivation in adaptation to...

  20. adaptive model predictive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mining CERN Preprints Summary: Nullifying the servo bandwidth errors improves the strehl ratio by a substantial quantity in adaptive optics systems. An effective method for...

  1. adaptive control scheme: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems concepts. Based Alpcan, Tansu 5 Adaptive predictive lighting controllers for daylight artificial light integrated schemes. Open Access Theses and Dissertations Summary:...

  2. adapted phi29 motor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    an adjustment in the tension felt by the transduction channels. It has been suggested that steady- state tension is regulated a mathematical model for an adaptation motor...

  3. adaptation project pay: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is adapting Linux for use in enterprise-scale networking Michigan, University of 445 Siemens Global Studio Project: Experiences Adopting an Integrated GSD Infrastructure...

  4. adaptive antenna system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    widely used in civil engineering to evaluate building's structural re-sistance to seismic events... Munoz, Freddy 2009-01-01 164 User Models for Adaptive Hypermedia and...

  5. adaptive nonparametric instrumental: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    both selects Faraway, Julian 27 Spanish Version of the Sport Satisfaction Instrument (SSI) Adapted to Physical Education CiteSeer Summary: The objective of this research was to...

  6. adaptive management tool: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    management as an alternative to traditional natural resource planning and management models. Adaptive management may provide BLM managers ... Brandenburg, Peter (Peter J.)...

  7. Central African Republic-National Adaptation Plan Global Support...

    Open Energy Info (EERE)

    manual, Publications, Workshop Website http:undp-alm.orgprojectsn Program Start 2013 Country Central African Republic Middle Africa References National Adaptation Plan...

  8. adaptive numerical methods: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Websites Summary: An adaptive numerical method for the Richards equation with root growth Olga Wilderotter and plant root growth is presented. It allows the calculation of the...

  9. activity trial adapt: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    addressed ways to reduce greenhouse gas emissions Acting on Climate Change effects on industry, agriculture, tourism, and other human activities. Develop and recommend adaptation...

  10. adaptive neural coding: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    examples and in an application to image compression. 1 Introduction The self Zachmann, Gabriel 42 Adaptive Control Using Combined Online and Background Learning Neural...

  11. adapted neural population: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    examples and in an application to image compression. 1 Introduction The self Zachmann, Gabriel 24 Adaptive Control Using Combined Online and Background Learning Neural...

  12. adaptive interferometer based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    current hardware: the science camera, the wavefront sensor, and the adaptive secondary mirror. In preliminary testing, we have implemented an eye doctor'' grid search approach...

  13. adaptive human aware: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    they display afterwards. They also show significantly larger aftereffects than ... Roach, Louise 2007-01-01 15 An Adaptive Quality of Service Aware Middleware for Replicated...

  14. adaptations impaired oxidative: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    learning of phonetic consistency and generalized neural adaptation deficits in dyslexia MIT - DSpace Summary: Developmental dyslexia is a neurological condition that...

  15. Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Injection Strategies (AIS) for Ultra-low Emissions Diesel Engines Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel Engines Presentation given at the 2007 Diesel...

  16. adaptive control design: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    deployment mechanism is also 497 DESIGNER INTEGRATION IN TRAINING CYCLES : IEEE LTSA MODEL ADAPTATION Computer Technologies and Information Sciences Websites Summary: . The...

  17. adapting cardiovascular training: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (more) Brown, Allan 1991-01-01 217 DESIGNER INTEGRATION IN TRAINING CYCLES : IEEE LTSA MODEL ADAPTATION Computer Technologies and Information Sciences Websites Summary: . The...

  18. adaptive design clinical: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    deployment mechanism is also 146 DESIGNER INTEGRATION IN TRAINING CYCLES : IEEE LTSA MODEL ADAPTATION Computer Technologies and Information Sciences Websites Summary: . The...

  19. Applying Climate Information for Adaptation Decision-Making:...

    Open Energy Info (EERE)

    Applying Climate Information for Adaptation Decision-Making: A Guidance and Resource Document Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Applying Climate...

  20. Financing Climate Adaptation and Mitigation in Rural Areas of...

    Open Energy Info (EERE)

    Countries Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Financing Climate Adaptation and Mitigation in Rural Areas of Developing Countries AgencyCompany...

  1. Quantitative Adaptation Analytics for Assessing Dynamic Systems of Systems.

    SciTech Connect (OSTI)

    Gauthier, John H.; Miner, Nadine E.; Wilson, Michael L.; Le, Hai D.; Kao, Gio K; Melander, Darryl J.; Longsine, Dennis Earl [Sandia National Laboratories, Unknown, Unknown; Vander Meer, Robert Charles,

    2015-01-01T23:59:59.000Z

    Our society is increasingly reliant on systems and interoperating collections of systems, known as systems of systems (SoS). These SoS are often subject to changing missions (e.g., nation- building, arms-control treaties), threats (e.g., asymmetric warfare, terrorism), natural environments (e.g., climate, weather, natural disasters) and budgets. How well can SoS adapt to these types of dynamic conditions? This report details the results of a three year Laboratory Directed Research and Development (LDRD) project aimed at developing metrics and methodologies for quantifying the adaptability of systems and SoS. Work products include: derivation of a set of adaptability metrics, a method for combining the metrics into a system of systems adaptability index (SoSAI) used to compare adaptability of SoS designs, development of a prototype dynamic SoS (proto-dSoS) simulation environment which provides the ability to investigate the validity of the adaptability metric set, and two test cases that evaluate the usefulness of a subset of the adaptability metrics and SoSAI for distinguishing good from poor adaptability in a SoS. Intellectual property results include three patents pending: A Method For Quantifying Relative System Adaptability, Method for Evaluating System Performance, and A Method for Determining Systems Re-Tasking.

  2. adaptive numerical dissipative: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    linear function while the frictional dissipation rate is a cubic power of surface wind speed, the dissipation rate is generally smaller Wang, Yuqing 7 An Adaptive Numerical...

  3. adaptive phase tracking: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    de 107 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 9, NO. 7, OCTOBER 1999 1025 Adaptive Motion Tracking Block Matching Algorithms for Video Coding...

  4. ADAPTIVE AND ROBUST TECHNIQUES (ART) FOR THERMOACOUSTIC TOMOGRAPHY

    E-Print Network [OSTI]

    Xie, Yao

    ADAPTIVE AND ROBUST TECHNIQUES (ART) FOR THERMOACOUSTIC TOMOGRAPHY By YAO XIE A DISSERTATION.1 Thermoacoustic Tomography . . . . . . . . . . . . . . . . . . . . . 1 1.2 Image Reconstruction Algorithms for TAT

  5. adaptive harvest management: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workload. Martin, W. Powley, R. Horman, and P. Bird, "Workload Adaptation in Autonomic DBMs", Proceedings of CASCON 2006, Toronto, Canada, October 16 - 19, 2006, pp 161 - 173"...

  6. adaptive antioxidant methionine: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Departments of *Ecology for review July 26, 2005) Adaptive radiation is defined as the evolution of ecological and phenotypic diversity within a rapidly multiplying lineage....

  7. Development based climate change adaptation and mitigation-conceptual...

    Open Energy Info (EERE)

    countries AgencyCompany Organization: Lawrence Berkeley National Laboratory (LBNL) Sector: Climate, Energy, Land, Water Topics: Adaptation, Co-benefits assessment, -...

  8. adaptive regression modeling: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences Websites Summary: Kernel smoothing is a widely used non-parametric pattern recognition technique. By nature, it suffers, adaptive metric, cross-vali-...

  9. adaptive learning environments: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    In Saarbrucken we are developing the web-based, user-adaptive, interactive learning environment Active 69 Medium-based design: Extending a medium to create and exploratory...

  10. Characterizing Uncertainty for Regional Climate Change Mitigation and Adaptation Decisions

    SciTech Connect (OSTI)

    Unwin, Stephen D.; Moss, Richard H.; Rice, Jennie S.; Scott, Michael J.

    2011-09-30T23:59:59.000Z

    This white paper describes the results of new research to develop an uncertainty characterization process to help address the challenges of regional climate change mitigation and adaptation decisions.

  11. adaptive optics parameters: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    projects for large telescopes demand a proper knowledge of atmospheric turbulence to design efficient adaptive optics systems in order to reach large Strehl ratios. However, the...

  12. Adaptation to Climate Variability and Change: A Guidance Manual...

    Open Energy Info (EERE)

    to Climate Variability and Change: A Guidance Manual for Development Planning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Adaptation to Climate Variability and...

  13. Economic Evaluation of Climate Change Adaptation Projects: Approaches...

    Open Energy Info (EERE)

    of Climate Change Adaptation Projects: Approaches for the Agricultural Sector and Beyond Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Economic Evaluation of Climate...

  14. adaptive feedback control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    45 Adaptive Management of Irrigation with Feedback Control to Avoid Groundwater Pollution by Nitrate University of California eScholarship Repository Summary: cmhr) Soil...

  15. Adaptive Injection Strategies (AIS) for Ultra-low Emissions Diesel...

    Broader source: Energy.gov (indexed) [DOE]

    * Motivation and background * Adaptive Injection Strategy (AIS) * Simulation and optimization - Two-Stage Combustion (TSC -- HCCI + Diffusion combustion) optimization using AIS...

  16. adaptive genetic algorithm: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a xed crossover Emmerich, Michael 2 Self-Adaptive Genetic Algorithm for Constrained Optimization. Open Access Theses and Dissertations Summary: ??This study proposes a...

  17. adaptive sampling strategy: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ADAPTATION STRATEGIES FOR SAN LUIS OBISPO COUNTY: Preliminary Climate Change Climate Change Center JULY 2012 CEC5002012054 Prepared for: California Energy Commission...

  18. adapted seawater microbiota: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the anticancer immune effects Cai, Long 8 Adaptation CiteSeer Summary: Climate change is expected to bring potentially significant changes to Washington States natural,...

  19. Adaptive Stack with Subdivided Cells for Improved Stability,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    with Subdivided Cells for Improved Stability, Reliability, and Durability under Automotive Load Cycle Adaptive Stack with Subdivided Cells for Improved Stability, Reliability,...

  20. Seismic Technology Adapted to Analyzing and Developing Geothermal...

    Broader source: Energy.gov (indexed) [DOE]

    Program 2010 Peer Review Seismic Technology Adapted to Analyzing and Developing Geothermal Systems Below Surface-Exposed High-Velocity Rocks Principal Investigator: Bob A. Hardage...

  1. Apollo: Adaptive power optimization and Control for the land Warrior

    E-Print Network [OSTI]

    Pedram, Massoud

    Apollo: Adaptive power optimization and Control for the land Warrior Massoud Pedram Dept. of EE management Architecture organization techniquesArchitecture organization techniques Apollo TestbedApollo

  2. Assessment of Autonomic Control and Respiratory Sinus Arrhythmia Using Point Process Models of Human Heart Beat Dynamics

    E-Print Network [OSTI]

    Chen, Zhe

    Tracking the autonomic control and respiratory sinus arrhythmia (RSA) from electrocardiogram and respiratory measurements is an important problem in cardiovascular control. We propose a point process adaptive filter algorithm ...

  3. User Guide Remote Access to VDI/Workplace Using RSA

    Office of Environmental Management (EM)

    benefits include the following. * Full-featured Microsoft Outlook client * Microsoft Word, Excel, and other Microsoft Office applications * Network files, such as the N, O, and...

  4. U-090: RSA enVision Discloses Environment Variable Information...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

  5. Exploratory Group Problem: RSA Encryption November 5, 2008

    E-Print Network [OSTI]

    Stange, Katherine E.

    result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

  6. Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work-in-Progress/Application Paper track.

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    Adaptive SSL: Design, Implementation and Overhead Analysis submission for Work an adaptation controller for SSL (Secure Socket Layer), called Adaptive SSL. 1 Introduction Applications adaptation of the Secure Socket Layer (SSL) protocol [3]. Adaptive SSL (ASSL) aims to provide appropriate se

  7. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M; Lee, Vo

    2014-04-15T23:59:59.000Z

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  8. Adaptive model training system and method

    DOE Patents [OSTI]

    Bickford, Randall L; Palnitkar, Rahul M

    2014-11-18T23:59:59.000Z

    An adaptive model training system and method for filtering asset operating data values acquired from a monitored asset for selectively choosing asset operating data values that meet at least one predefined criterion of good data quality while rejecting asset operating data values that fail to meet at least the one predefined criterion of good data quality; and recalibrating a previously trained or calibrated model having a learned scope of normal operation of the asset by utilizing the asset operating data values that meet at least the one predefined criterion of good data quality for adjusting the learned scope of normal operation of the asset for defining a recalibrated model having the adjusted learned scope of normal operation of the asset.

  9. Adaptable radiation monitoring system and method

    DOE Patents [OSTI]

    Archer, Daniel E. (Livermore, CA); Beauchamp, Brock R. (San Ramon, CA); Mauger, G. Joseph (Livermore, CA); Nelson, Karl E. (Livermore, CA); Mercer, Michael B. (Manteca, CA); Pletcher, David C. (Sacramento, CA); Riot, Vincent J. (Berkeley, CA); Schek, James L. (Tracy, CA); Knapp, David A. (Livermore, CA)

    2006-06-20T23:59:59.000Z

    A portable radioactive-material detection system capable of detecting radioactive sources moving at high speeds. The system has at least one radiation detector capable of detecting gamma-radiation and coupled to an MCA capable of collecting spectral data in very small time bins of less than about 150 msec. A computer processor is connected to the MCA for determining from the spectral data if a triggering event has occurred. Spectral data is stored on a data storage device, and a power source supplies power to the detection system. Various configurations of the detection system may be adaptably arranged for various radiation detection scenarios. In a preferred embodiment, the computer processor operates as a server which receives spectral data from other networked detection systems, and communicates the collected data to a central data reporting system.

  10. Weitzenböck's Torsion, Fermi Coordinates and Adapted Frames

    E-Print Network [OSTI]

    Donato Bini; Bahram Mashhoon

    2015-04-19T23:59:59.000Z

    We study Weitzenb\\"ock's torsion and discuss its properties. Specifically, we calculate the measured components of Weitzenb\\"ock's torsion tensor for a frame field adapted to static observers in a Fermi normal coordinate system that we establish along the world line of an arbitrary accelerated observer in general relativity. A similar calculation is carried out in the standard Schwarzschild-like coordinates for static observers in the exterior Kerr spacetime; we then compare our results with the corresponding curvature components. Our work supports the contention that in the extended general relativistic framework involving both the Levi-Civita and Weitzenb\\"ock connections, curvature and torsion provide complementary representations of the gravitational field.

  11. Adaptively refined large eddy simulations of clusters

    E-Print Network [OSTI]

    Maier, A; Schmidt, W; Niemeyer, J C

    2009-01-01T23:59:59.000Z

    We present a numerical scheme for modelling unresolved turbulence in cosmological adaptive mesh refinement codes. As a first application, we study the evolution of turbulence in the intra-cluster medium and in the core of a galaxy cluster. Simulations with and without subgrid scale model are compared in detail. Since the flow in the ICM is subsonic, the global turbulent energy contribution at the unresolved length scales is smaller than 1% of the internal energy. We find that the production of turbulence is closely correlated with merger events occurring in the cluster environment, and its dissipation locally affects the cluster energy budget. Because of this additional source of dissipation, the core temperature is larger and the density is smaller in the presence of subgrid scale turbulence than in the standard adiabatic run, resulting in a higher entropy core value.

  12. Adapting MARSSIM for FUSRAP site closure.

    SciTech Connect (OSTI)

    Johnson, R.; Durham, L.; Rieman, C.; Hoover, R.

    2001-12-21T23:59:59.000Z

    The Multi-Agency Radiation Survey and Site Investigation Manual (MARSSIM) provides a coherent, technically defensible process for establishing that exposed surfaces satisfy site cleanup requirements. Unfortunately, many sites have complications that challenge a direct application of MARSSIM. Example complications include Record of Decision (ROD) requirements that are not MARSSIM-friendly, the potential for subsurface contamination, and incomplete characterization information. These types of complications are typically the rule, rather than the exception, for sites undergoing radiologically-driven remediation and closure. One such site is the Formerly Utilized Sites Remedial Action Program (FUSRAP) Linde site in Tonawanda, New York. Cleanup of the site is currently underway. The Linde site presented a number of challenges to designing and implementing a closure strategy consistent with MARSSIM. This paper discusses some of the closure issues confronted by the U.S. Army Corps of Engineers Buffalo District at the Linde site, and describes how MARSSIM protocols were adapted to address these issues.

  13. 9 Towards Adaptive Management of Native Vegetation in Regional Landscapes

    E-Print Network [OSTI]

    Burgman, Mark

    management remains widely cited as the most logical and elegant frame- work for continuous improvement9 Towards Adaptive Management of Native Vegetation in Regional Landscapes David H Duncan1 of the `adaptive management' paradigm to natural resource man- agement, using regional management of native

  14. Particle Systems for Adaptive, Isotropic Meshing of CAD Models

    E-Print Network [OSTI]

    Utah, University of

    Particle Systems for Adaptive, Isotropic Meshing of CAD Models Jonathan R. Bronson, Joshua A adaptive triangular surface and tetrahedral volume meshes from CAD models. Input shapes are treated. These particles reach a good distribution by minimizing an energy computed in 3D world space, with movements

  15. Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias

    E-Print Network [OSTI]

    Equivocal Blind Signatures and Adaptive UC-Security Aggelos Kiayias Hong-Sheng Zhou April 12, 2007 Abstract We study the design of practical blind signatures in the universal composability (UC) setting against adaptive adversaries. We introduce a new property for blind signature schemes

  16. Adaptive Blind Signal Processing--Neural Network Approaches

    E-Print Network [OSTI]

    Vialatte, François

    Adaptive Blind Signal Processing--Neural Network Approaches SHUN-ICHI AMARI, FELLOW, IEEE are presented for the problem of adaptive blind signal processing, especially instantaneous blind separation and multichannel blind deconvolution/equalization of independent source signals. We dis- cuss recent developments

  17. Are three-dimensional spider webs defensive adaptations?

    E-Print Network [OSTI]

    Blackledge, Todd

    LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

  18. adapted fish chionodraco: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    adapted fish chionodraco First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 NEWS AND COMMENTARY Adaptive...

  19. ADAPTIVE FINITE ELEMENT FREQUENCY DOMAIN METHOD FOR EDDY CURRENT PROBLEMS

    E-Print Network [OSTI]

    Zheng, Weiying

    ADAPTIVE FINITE ELEMENT FREQUENCY DOMAIN METHOD FOR EDDY CURRENT PROBLEMS WEIYING ZHENG-harmonic eddy current problems in the case of three-dimensional isotropic and linear materials. We adopt. Time-harmonic Maxwell's equations, eddy current, adaptive finite element method, multiply connected

  20. adaptive optics experiment: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    adaptive optics experiment First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Adaptive Optical Transport...