Sample records for rsa authentication agent

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  3. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  4. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  5. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  6. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  7. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  8. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  9. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  10. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  11. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  12. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  13. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment ofSUSE

  14. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design ofSouthwesternAUTHENTICATED

  15. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  16. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5 Access

  17. Another Generalization of Wiener's Attack on RSA

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

  18. T-582: RSA systems has resulted in certain information being...

    Broader source: Energy.gov (indexed) [DOE]

    2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

  19. A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption

    E-Print Network [OSTI]

    Pateriya, R K; Shrivastava, S C; Patel, Jaideep

    2009-01-01T23:59:59.000Z

    Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

  20. Identity-Based Mediated RSA , Xuhua Ding2

    E-Print Network [OSTI]

    Ding, Xuhua

    certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

  1. A new attack on RSA and CRT-RSA Abderrahmane Nitaj

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

  2. Message Authentication message authentication is concerned with

    E-Print Network [OSTI]

    Message Authentication · message authentication is concerned with: ­protecting the integrity of a message ­validating identity of originator ­non-repudiation of origin (dispute resolution) · will consider the security requirements · then three alternative functions used: ­message encryption ­message authentication

  3. User Guide Remote Workplace to VDI Using RSA | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide Remote Workplace to VDI Using RSA User Guide Remote Workplace to VDI Using RSA Last updated on March 17, 2015 This document provides instructions for logging onto Remote...

  4. An Attack on RSA Using LSBs of Multiples of the Prime Factors

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

  5. U-063: RSA SecurID Software Token for Windows DLL Loading Error...

    Broader source: Energy.gov (indexed) [DOE]

    Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

  6. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  7. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...

    Energy Savers [EERE]

    4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

  8. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  9. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems --- Can side­channel threats Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro­ cessors. Of independent interest, we

  10. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    Parallel FPGA Implementation of RSA with Residue Number Systems -- Can side-channel threats Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA signature in parallel on a set of identical and independent copro- cessors. Of independent interest, we

  11. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  12. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01T23:59:59.000Z

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  13. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Energy Savers [EERE]

    U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

  14. U-027: RSA Key Manager Appliance Session Logout Bug Fails to...

    Broader source: Energy.gov (indexed) [DOE]

    the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

  15. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Broader source: Energy.gov (indexed) [DOE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

  16. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Energy Savers [EERE]

    in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

  17. T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...

    Broader source: Energy.gov (indexed) [DOE]

    7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

  18. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  20. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  1. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6:EnergyScripting

  2. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConductThere is a

  3. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  4. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  5. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

  6. Protocols and security proofs for data authentication

    E-Print Network [OSTI]

    Mityagin, Anton

    2006-01-01T23:59:59.000Z

    Generalized Carter-Wegman MACs . . . . . . . . . . . . . . .which constitute Carter-Wegman message authentication schemening generalized Carter-Wegman message authentication scheme

  7. Tools for Authentication

    SciTech Connect (OSTI)

    White, G

    2008-07-09T23:59:59.000Z

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  8. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  9. Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2

    E-Print Network [OSTI]

    Reluga, Tim

    , change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

  10. Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

  11. A New Attack on RSA with Two or Three Decryption Exponents

    E-Print Network [OSTI]

    Nitaj, Abderrahmane

    A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

  12. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes

    E-Print Network [OSTI]

    Odlyzko, Andrew M.

    A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

  13. Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma

    E-Print Network [OSTI]

    Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klíma , Ondej Pokorný1 and Tomás Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

  14. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19T23:59:59.000Z

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  15. Quantum direct communication with authentication

    SciTech Connect (OSTI)

    Lee, Hwayean [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Institut fuer Experimentalphysik, Universitaet Wien (Austria); Lim, Jongin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Yang, HyungJin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Department of Physics, Korea University, Chochiwon, Choongnam (Korea, Republic of)

    2006-04-15T23:59:59.000Z

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  16. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  17. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

  18. Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

  19. IT Licentiate theses Query Authentication and

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

  20. Biometric Authentication using Nonparametric Methods

    E-Print Network [OSTI]

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01T23:59:59.000Z

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  1. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges |VulnerabilitiesCode

  2. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: SinceDevelopment | Department of EnergyEnergy 94: IBM MultipleFixation

  3. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

    2014-10-06T23:59:59.000Z

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  4. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    Bernstein, Daniel

    encryption. Keywords: Message authentication, PRFs, Carter-Wegman, symmetric encryption, authenticated-cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter-Wegman (CW) ma-schemes [25, 21, 23, 16, 8, 9

  5. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    encryption. Keywords: Message authentication, PRFs, Carter­Wegman, symmetric encryption, authenticated­cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter­Wegman (CW) ma­schemes [25, 21, 23, 16, 8, 9

  6. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22T23:59:59.000Z

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  7. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  8. Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack

    E-Print Network [OSTI]

    Chen, Sheng-Wei

    Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

  9. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  10. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, authentication, MAC, Wegman-Carter, provable security 1 Introduction This paper proves

  11. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators Daniel J. Bernstein Department probabilities for f. Keywords: mode of operation, authentication, MAC, Wegman-Carter, provable security 1

  12. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  13. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  14. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  15. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  16. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  17. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01T23:59:59.000Z

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  18. Improving Classical Authentication with Quantum Communication

    E-Print Network [OSTI]

    of short secret keys [1]. Brassard's scheme is itself an improvement of the Wegman-Carter protocol [2 of messages we want to authenticate, as opposed to the Wegman-Carter proposal. The security of PRGs is based

  19. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  20. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02T23:59:59.000Z

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  1. Using Two-Factor RSA Token with WebVPN | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFactEnergy Bob UnderYour RSA

  2. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  3. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  4. VOLTTRON: An Agent Execution Platform for the Electric Power System

    SciTech Connect (OSTI)

    Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

    2012-06-05T23:59:59.000Z

    Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

  5. Using Rose and Compass for Authentication

    SciTech Connect (OSTI)

    White, G

    2009-07-09T23:59:59.000Z

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  6. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  7. Comment on 'Quantum direct communication with authentication'

    SciTech Connect (OSTI)

    Zhang, Zhan-jun [Department of Physics and Center for Quantum Information Science, National Cheng Kung University, Tainan 70101, Taiwan (China); Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China); Liu, Jun; Wang, Dong; Shi, Shou-hua [Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China)

    2007-02-15T23:59:59.000Z

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.

  8. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01T23:59:59.000Z

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  9. Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival

    E-Print Network [OSTI]

    Kim, Hyounggon

    2005-02-17T23:59:59.000Z

    the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

  10. authentic cost calculations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ;Abstract iii We also show how to use two existing multicast authentication techniques (TESLA and a master for embedded control networks characterized by few re- ceivers and weak...

  11. authentication system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 58 Integrating identity-based cryptography in IMS...

  12. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Broader source: Energy.gov (indexed) [DOE]

    Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard...

  13. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, MAC, Wegman-Carter, provable security 1 Introduction This paper proves that various

  14. Shouhuai Xu 2000 1 Password-based Authentication and

    E-Print Network [OSTI]

    Sandhu, Ravi

    &AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

  15. A Flexible Approach to Embedded Network Multicast Authentication

    E-Print Network [OSTI]

    Koopman, Philip

    A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

  16. Index Calculation Attacks on RSA Signature and Encryption Jean-Sebastien Coron1, Yvo Desmedt2, David Naccache1,

    E-Print Network [OSTI]

    Minnesota, University of

    a twitch in the technique made it effective against two very popular RSA signature standards, namely iso/iec 9796-1 and iso/iec 9796-2. Following the attack iso/iec 9796-1 was withdrawn and iso/iec 9796-2 amended. In this paper, we recall Desmedt and Odlyzko's attack as well as its application to the cryptanalysis of iso/iec

  17. IEEE TRANS. INFORM. THEORY, VOL. X, NO. XX, 2005 1 Authentication with Distortion Criteria

    E-Print Network [OSTI]

    Martinian, Emin

    authentication system constructions. Index Terms-- multimedia security, authentication, digi- tal signatures of possible perturbations, including, for example, degradation due to noise or compression; transformation

  18. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  19. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  20. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26T23:59:59.000Z

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  1. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect (OSTI)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01T23:59:59.000Z

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  2. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  3. Stronger security bounds for WegmanCarterShoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman­Carter­Shoup authenticators Daniel J. Bernstein # Department, Wegman­Carter, provable security 1 Introduction This paper proves that various state­of­the­art 128­bit

  4. Authenticated Encryption: How Reordering can Impact Performance Basel Alomair

    E-Print Network [OSTI]

    ciphertext blocks are then authenticated using a MAC based on a universal hash-function family (in the Carter-Wegman encryption [30]. The GCM standard is based on the Carter- Wegman Counter (CWC) blockcipher mode

  5. austrian meat authenticity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is...

  6. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    form fields. A remote or local user can conduct a cross-site scripting or clickjacking attack to access the username and password of an authenticated session. IMPACT: Disclosure of...

  7. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26T23:59:59.000Z

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  8. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  9. Authenticity and Physiological Changes during Defensive Verbal Response

    E-Print Network [OSTI]

    Yen, Yana

    2013-08-31T23:59:59.000Z

    who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

  10. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  11. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  12. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  13. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  14. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  15. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  16. The fragility of AES-GCM authentication algorithm Shay Gueron1,2

    E-Print Network [OSTI]

    for the authentication. The GHASH algorithm is a special form of the Carter-Wegman polynomial evaluation MAC. Each 16

  17. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  18. Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P. PARKERSON

    E-Print Network [OSTI]

    Thompson, Dale R.

    Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P.S.A. ABSTRACT Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared

  19. University of Newcastle upon Tyne Evaluation of Authorization-Authentication Tools: PERMIS, OASIS,

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    -Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu and P. Periorellis TECHNICAL REPORT SERIES No. CS-TR-935 of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu, P. Periorellis Abstract GOLD (Grid., PERIORELLIS, P.. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH [By] J. Wu

  20. The order of encryption and authentication for protecting communications (Or: how secure is SSL?)

    E-Print Network [OSTI]

    The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

  1. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    , or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

  2. AgentSpeak+ : AgentSpeak with

    E-Print Network [OSTI]

    Liu, Weiru

    by observing nearby signposts (e.g. the agent is near a supermarket or a petrol station). Travelling between

  3. Distributed Agent Search Efficiency 

    E-Print Network [OSTI]

    Murray, Christopher C

    2014-09-19T23:59:59.000Z

    Multi-agent systems where there exists a group of agents all working towards the same goal are gaining increased focus. One subset of these systems is groups of agents who have intermittent communication with one another. In an environment...

  4. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Keystroke Biometric Test-Taker Authentication System

    E-Print Network [OSTI]

    Tappert, Charles

    Biometric Test-Taker Authentication System Michael Wuench, Mingfei Bi, Evelin Urbaez, Shaji Mary Varghese

  5. Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS

    E-Print Network [OSTI]

    Maryland at College Park, University of

    ABSTRACT Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS Paul S. Hutchison, Ph.D., 2008 Dissertation Directed By: Professor David Hammer, Departments of Curriculum Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park

  6. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  7. Bucket Hashing and its Application to Fast Message Authentication

    E-Print Network [OSTI]

    Bernstein, Daniel

    the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman to authenticate. But it is well­known that this reasoning is specious: in particular, Wegman and Carter [32. In the Wegman--Carter approach communicating parties S and V share a secret key k = (h; P ) which specifies both

  8. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  9. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  10. Patent-Free Authenticated-Encryption As Fast As OCB

    E-Print Network [OSTI]

    Krovetz, Ted

    . Encryption is achieved via counter-mode while authenti- cation uses the Wegman-Carter paradigm. A single encryption and authentication under a single key. Some of the modes also switch to faster Wegman to nearly x cpb because recent Wegman-Carter schemes are as fast as 0.5 cpb--much faster than any known

  11. Universal hashing and authentication codes 1 D. R. Stinson

    E-Print Network [OSTI]

    Stinson, Douglas

    authentication codes without secrecy. This idea is due to Wegman and Carter [14], who gave a construction which states (plaintext messages). We generalize the Wegman and Carter construction by formally de#12;ning some to decrease the key length by a factor of four (roughly) compared to the Wegman and Carter construction, while

  12. Behavioral Authentication of Server Flows James P. Early

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    Behavioral Authentication of Server Flows James P. Early Carla E. Brodley ¡ Catherine Rosenberg, in the presence of proxy servers that re-map port numbers or host services that have been compromised to act as backdoors or covert channels. We present an approach to classify server traffic based on decision trees

  13. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  14. Authenticated Streamwise On-line Encryption Patrick P. Tsang

    E-Print Network [OSTI]

    and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

  15. SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

  16. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  17. A Hybrid Authentication and Authorization Process for Control System Networks

    SciTech Connect (OSTI)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25T23:59:59.000Z

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybrid authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.

  18. ELmE : A Misuse Resistant Parallel Authenticated Encryption

    E-Print Network [OSTI]

    -Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

  19. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  20. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  1. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  2. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  3. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  4. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  5. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    , video, image, and data, be available anytime and everywhere to everybody. The Federal Communications Commission (FCC), U. S. A., defines personal communications services as "a family of mobile or portable radioC. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain

  6. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Åke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  7. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  8. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  9. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  10. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  11. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  12. ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing

    E-Print Network [OSTI]

    such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

  13. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  14. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Xu, Wenyuan

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  15. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  16. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  17. Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang

    E-Print Network [OSTI]

    Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

  18. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  19. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

  20. SSL/TLS Session-Aware User Authentication Rolf Oppliger1

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

  1. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  2. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  3. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    (International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

  4. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  5. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-Print Network [OSTI]

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  6. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  7. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

    E-Print Network [OSTI]

    Nørvåg, Kjetil

    . The performance cost evaluation of security protocols, such as the Internet key exchange version 2 (IKEv2 and IKEv2 in an OPNET simulation environment. They used pre-shared key (PSK) based authentication methodsA Measurement Study on IKEv2 Authentication Performance in Wireless Networks Zolt´an Faigl , Stefan

  8. Atomic-scale Authentication Using Resonant Tunnelling Diodes

    E-Print Network [OSTI]

    J. Roberts; I. E. Bagci; M. A. M. Zawawi; J. Sexton; N. Hulbert; Y. J. Noori; M. P. Young; C. S. Woodhead; M. Missous; M. A. Migliorato; U. Roedig; R. J. Young

    2015-02-23T23:59:59.000Z

    The rapid development of technology has provided a wealth of resources enabling the trust of everyday interactions to be undermined. Authentication schemes aim to address this challenge by providing proof of identity. This can be achieved by using devices that, when challenged, give unique but reproducible responses. At present, these distinct signatures are commonly generated by physically unclonable functions, or PUFs. These devices provide a straightforward measurement of a physical characteristic of their structure that has inherent randomness, due to imperfections in the manufacturing process. These hard-to-predict physical responses can generate a unique identity that can be used for authentication without relying on the secrecy of stored data. However, the classical design of these devices limits both their size and security. Here we show that the extensively studied problematic fluctuations in the current-voltage measurements of resonant tunnelling diodes (RTDs) provide an uncomplicated, robust measurement that can function as a PUF without conventional resource limitations. This is possible due to quantum tunnelling within the RTD, and on account of these room temperature quantum effects, we term such devices QUFs - quantum unclonable functions. As a result of the current-voltage spectra being dependent on the atomic structure and composition of the nanostructure within the RTD, each device provides a high degree of uniqueness, whilst being impossible to clone or simulate, even with state-of-the-art technology. We have thus created PUF-like devices requiring the fewest resources which make use of quantum phenomena in a highly manufacturable electronic device operating at room temperature. Conventional spectral analysis techniques, when applied to our QUFs, will enable reliable generation of unpredictable unique identities which can be employed in advanced authentication systems.

  9. Final report and recommendations of the ESnet Authentication Pilot Project

    SciTech Connect (OSTI)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01T23:59:59.000Z

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  10. Computing with strategic agents

    E-Print Network [OSTI]

    Immorlica, Nicole, 1978-

    2005-01-01T23:59:59.000Z

    This dissertation studies mechanism design for various combinatorial problems in the presence of strategic agents. A mechanism is an algorithm for allocating a resource among a group of participants, each of which has a ...

  11. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06T23:59:59.000Z

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  12. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21T23:59:59.000Z

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  13. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01T23:59:59.000Z

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  14. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  15. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    be used to replace Wegman-Carter's classical authentication scheme in quantum key distribution (QKD the QKD protocol to bootstrap. The authenti- cation scheme commonly used in QKD is the Wegman

  16. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  17. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  18. Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time

    E-Print Network [OSTI]

    Liwinski, Thomas

    2011-10-21T23:59:59.000Z

    , it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

  19. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  20. Anonymous, authentic, and accountable resource management based on the E-cash paradigm

    E-Print Network [OSTI]

    Lam, Tak Cheung

    2009-05-15T23:59:59.000Z

    AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

  1. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  2. Agent Technology: Enabling Next Generation Computing

    E-Print Network [OSTI]

    Luck, Michael

    Agent Technology: Enabling Next Generation Computing A Roadmap for Agent Based Computing MichaelTechnology:ARoadmapLuck,McBurney&PreistAgentLink #12;i AgentLink Roadmap Agent Technology: Enabling Next Generation Computing A Roadmap for Agent, Peter McBurney and Chris Preist Agent Technology: Enabling Next Generation Computing A Roadmap for Agent

  3. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  4. Agent-based Simulation Platforms Agent-based Simulation Platforms

    E-Print Network [OSTI]

    Boone, Randall B.

    Agent-based Simulation Platforms Agent-based Simulation Platforms: Review and Development 1081 Fritz Ave. McKinleyville, CA 95519, USA Five software platforms for scientific agent-based models (ABMs) were reviewed by implementing example models in each. NetLogo is the highest-level platform

  5. Hydroxypyridonate and hydroxypyrimidinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth N.; Doble, Daniel M.; Sunderland, Christopher J.; Thompson, Marlon

    2005-01-25T23:59:59.000Z

    The present invention provides hydroxypyridinone and hydroxypyrimidone chelating agents. Also provides are Gd(III) complexes of these agents, which are useful as contrast enhancing agents for magnetic resonance imaging. The invention also provides methods of preparing the compounds of the invention, as well as methods of using the compounds in magnetic resonance imaging applications.

  6. Secret Agent Man Johnny Rivers Tuning: Normal

    E-Print Network [OSTI]

    Reiners, Peter W.

    ----------------------------------------------------------------------------- Secret Agent Man tomorrow Chorus: Bm Em Bm Em Secret Agent Man, Secret Agent Man C B7 Em They've given you a number

  7. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  8. Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and

    E-Print Network [OSTI]

    Baras, John S.

    Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

  9. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)

    E-Print Network [OSTI]

    Basin, David

    A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

  10. Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas

    E-Print Network [OSTI]

    Sabatini, David M.

    Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai}@mit.edu ABSTRACT A major security concern with outsourcing data storage to third- party providers is authenticating hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa- per proposes

  11. Flexible, secure agent development framework

    DOE Patents [OSTI]

    Goldsmith; Steven Y. (Rochester, MN)

    2009-04-07T23:59:59.000Z

    While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

  12. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  13. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Yang, Junfeng

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  14. Simplified authenticated key exchange based on the q(th) root problem

    SciTech Connect (OSTI)

    JOHNSTON,ANNA M.; GEMMELL,PETER S.

    2000-02-29T23:59:59.000Z

    Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

  15. Distillation Codes and Applications to DoS Resistant Multicast Authentication

    E-Print Network [OSTI]

    Perrig, Adrian

    Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

  16. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

  17. MMH: Software Message Authentication in the Gbit/second Rates \\Lambda

    E-Print Network [OSTI]

    Bernstein, Daniel

    universal hashing) applications. The construction is based on techniques due to Carter and Wegman Universal hash functions, which were first introduced by Carter and Wegman in [CW79], have a wide range authentication (introduced by Wegman and Carter [WC81] as well) received much attention lately. In particular

  18. MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell

    E-Print Network [OSTI]

    Martinian, Emin

    MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell Dept,gww¡ @mit.edu ABSTRACT In many multimedia applications, there is a need to authen- ticate a source that has signature techniques are a natural tool for addressing such problems. However, in many emerging multimedia

  19. SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

  20. On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On optimizing energy consumption: An adaptative authentication level in wireless sensor networks-hungry. As energy is a scarce resource in wireless sensor networks, we propose a new approach that consists or third-party nodes. I. INTRODUCTION Wireless sensor networks (WSNs) are used in several fields

  1. An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana

  2. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  3. CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment

    E-Print Network [OSTI]

    Michigan, University of

    . An unfortunate byproduct of building Kerberos-based systems is a loss of functionality, such as long running jobs-- -- CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment A. D. Rubin that a user have a valid token or ticket for a job to run. These tickets are issued with limited lifetimes

  4. Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    Brylow, Dennis

    based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

  5. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  6. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  7. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

    E-Print Network [OSTI]

    Braun, Torsten

    1 Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network is to avoid exchanging security information between networks visited by a roaming user and the user's home network and retrieves the required security information from that AAA server. The AAA servers can

  8. Agent Server Architecture for the Ajanta MobileAgent System

    E-Print Network [OSTI]

    Minnesota, University of

    's behalf, allowing them to roam the network either on a predeter­ mined path, or one that the agents, information search and filtering, network maintenance, testing, fault diagnosis and for software installation. It also makes some basic primitives available to programmers, such as those that allow agents to migrate

  9. Plasmids encoding therapeutic agents

    DOE Patents [OSTI]

    Keener, William K. (Idaho Falls, ID)

    2007-08-07T23:59:59.000Z

    Plasmids encoding anti-HIV and anti-anthrax therapeutic agents are disclosed. Plasmid pWKK-500 encodes a fusion protein containing DP178 as a targeting moiety, the ricin A chain, an HIV protease cleavable linker, and a truncated ricin B chain. N-terminal extensions of the fusion protein include the maltose binding protein and a Factor Xa protease site. C-terminal extensions include a hydrophobic linker, an L domain motif peptide, a KDEL ER retention signal, another Factor Xa protease site, an out-of-frame buforin II coding sequence, the lacZ.alpha. peptide, and a polyhistidine tag. More than twenty derivatives of plasmid pWKK-500 are described. Plasmids pWKK-700 and pWKK-800 are similar to pWKK-500 wherein the DP178-encoding sequence is substituted by RANTES- and SDF-1-encoding sequences, respectively. Plasmid pWKK-900 is similar to pWKK-500 wherein the HIV protease cleavable linker is substituted by a lethal factor (LF) peptide-cleavable linker.

  10. Universal Hashing and Multiple Authentication M. Atici1*2and 11. R,. S t i n ~ o n ' > ~

    E-Print Network [OSTI]

    Bernstein, Daniel

    authentication without secrecy. Our point of view is the uni- vcrsal hashing approach pioneered by Wegman,ions, and obtained some improvements to the Wegman-Carter construction. Since 1991, several authors have given im

  11. Nuclear magnetic resonance contrast agents

    DOE Patents [OSTI]

    Smith, P.H.; Brainard, J.R.; Jarvinen, G.D.; Ryan, R.R.

    1997-12-30T23:59:59.000Z

    A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC{sub 16}H{sub 14}N{sub 6}. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques. 10 figs.

  12. Decisiones sociales en Sistemas Multi-Agente

    E-Print Network [OSTI]

    Guerra Hernández, Alejandro

    Agent Resource Allocation Ayer (vieron): Asignaciones, preferencias (funciones de utilidad), bienestar social bienestar social para valorar asignaciones. Resolución de un problema MARA: Protocolos de asignación1 Decisiones sociales en Sistemas Multi-Agente MARA (Multi-Agent Resource Allocation) MADe

  13. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  14. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    SciTech Connect (OSTI)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27T23:59:59.000Z

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  15. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  16. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01T23:59:59.000Z

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  17. Utilitas and venustas: balancing utility and authenticity in the stewardship of our built heritage

    E-Print Network [OSTI]

    Reich, Alene Wilmoth

    2007-04-25T23:59:59.000Z

    Members, John Alexander John Nichols Head of Department, Mardelle Shepley December 2005 Major Subject: Architecture iii ABSTRACT Utilitas and Venustas: Balancing Utility and Authenticity in the Stewardship of Our Built... Services (HPS). The aim of HPS is to, ?[help] our nation's citizens and communities identify, evaluate, protect and preserve historic properties for future generations of Americans.?17 HPS is responsible for the administration of educational, technical...

  18. A amphoteric copolymer profile modification agent

    SciTech Connect (OSTI)

    Wang HongGuan; Yu LianCheng; Tian HongKun [Scientific Research Inst. of Petroleum Exploration and Development, Beijing (China)

    1995-11-01T23:59:59.000Z

    This report provides a new gel profile modification agent prepared by an amphoteric copolymer (FT-213) and a novel crosslinking agent (BY), and introduces the preparations of the amphoteric polymer, the crosslinking agent and the profile modification agent, the action mechanism, the test conditions and the evaluations of the performance of the agent. The 45 well treatments in oilfields demonstrate that the agent can be prepared conveniently, the agent has better compatibility and application performances, and the treatment life is longer with the use of the agent. 80,000 tons incremental oil and 60,000 m{sup 3} decreasing water production have been achieved.

  19. Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense Surveillance Systems integration Transport / Borde

    E-Print Network [OSTI]

    Rogers, John A.

    Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense

  20. Heterogeneous Temporal Probabilistic Agents JURGEN DIX

    E-Print Network [OSTI]

    Kraus, Sarit

    and software modules. We will define the concept of a heterogeneous temporal probabilistic (HTP) agent). Intuitively, an FTPSI specifies what all an HTP agent is permitted/forbidden/obliged to do at various times t. As changes occur in the environment, the HTP agent must compute a new FTPSI. HTP agents continuously compute

  1. Mobile Agents: An Introduction Gian Pietro Picco

    E-Print Network [OSTI]

    Picco, Gian Pietro

    , illustrating the foun- dations of architectures and technologies for mobile agents, and discussing some, including mobile agents. Section IV con- tains a critical discussion of the mobile agent technology1 Mobile Agents: An Introduction Gian Pietro Picco Dipartimento di Elettronica e Informazione

  2. Proactive communication in multi-agent teamwork 

    E-Print Network [OSTI]

    Zhang, Yu

    2007-04-25T23:59:59.000Z

    problems arise, agents in the system must coordinate with one another to ensure that interdependent problems are properly managed. Thus, they form multi-agent systems. In a multi-agent system, multiple agents that cooperate towards the achievement of a... will revise its procedures. 13 The evolving process mentioned above obviously requires agents? observation and communication. Shared Plan theory touches the proactive communication problem in other ways. First, as in joint intention, the theory requires...

  3. Limonene and tetrahydrofurfurly alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, George W. (Harrisonville, MO); Carter, Richard D. (Lee's Summit, MO); Hand, Thomas E. (Lee's Summit, MO); Powers, Michael T. (Santa Rosa, CA)

    1997-10-21T23:59:59.000Z

    The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  4. Limonene and tetrahydrofurfuryl alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

    1996-05-07T23:59:59.000Z

    The present invention is a tetrahydrofurfuryl alcohol and limonene or terpineol cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  5. Limonene and tetrahydrofurfuryl alcohol cleaning agent

    DOE Patents [OSTI]

    Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

    1997-10-21T23:59:59.000Z

    The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

  6. ACTINIDE-SPECIFIC SEQUESTERING AGENTS AND DECONTAMINATION APPLICATIONS

    E-Print Network [OSTI]

    Smith, William L.

    2013-01-01T23:59:59.000Z

    SEQUESTERING AGENTS AND DECONTAMINATION APPLICATIONS WilliamSequestering Agents and Decontamination Applications by

  7. Concurrent Objects, Agents, Aki Yonezawa

    E-Print Network [OSTI]

    Fukai, Tomoki

    room 50m*60m=3,000m2 Electric power up to 30MW Gas-turbine cogeneration 5MW*2 Water Cooling System) RIKEN, Kobe #12;My Background, Current and in the past · Currently: ­ in charge of the research scale agent-based modeling and simulation. · In the past: ­ have been engaged in research on concurrent

  8. How Minds Work Minds, Agents, Senses, Actions

    E-Print Network [OSTI]

    Memphis, University of

    · Some mobile robots · Autonomous software agents · Some organizations #12;HMW: Minds, Agents, Senses of the senses tell us the truth about perception For a website devoted to this proposition, go to http://www.michaelbach.de/ot

  9. Approximation algorithms for distributed and selfish agents

    E-Print Network [OSTI]

    Mirrokni, Vahab S

    2005-01-01T23:59:59.000Z

    Many real-world systems involve distributed and selfish agents who optimize their own objective function. In these systems, we need to design efficient mechanisms so that system-wide objective is optimized despite agents ...

  10. Agents on the Web Supply Chains

    E-Print Network [OSTI]

    Almor, Amit

    Agents on the Web Automating Supply Chains 90 JULY · AUGUST 2001 http://computer.org/internet/ 1089

  11. Adding structure to agent programming languages

    E-Print Network [OSTI]

    Zachmann, Gabriel

    Zachmann (Computer Graphics) #12;Adding structure to agent programming languages Peter Novák, Jürgen Dix

  12. Chelating agents for technetium-99M

    DOE Patents [OSTI]

    Fritzberg, A.R.; Kasina, S.

    1987-06-02T23:59:59.000Z

    The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

  13. MOBILE AGENT MANAGEMENT Patricia Cuesta Rivalta

    E-Print Network [OSTI]

    MOBILE AGENT MANAGEMENT By Patricia Cuesta Rivalta A Thesis Submitted to the Faculty of Graduate to Faculty of Graduate Studies and Research acceptance of this thesis MOBILE AGENT MANAGEMENT Submitted with the mobile agent technology. This thesis extends the Mobile Code Toolkit of the Perpetuum Mobile Procura

  14. Nonintrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non­intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non­intrusive approach to building information management systems, based on software agents. Software is a non­intrusive, lightweight software agent that manages bookmarks (web browser pointers to favourite

  15. Agent-Based Modeling and Simulation for Hydrogen Transition Analysis...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Agent-Based Modeling and Simulation for Hydrogen Transition Analysis Agent-Based Modeling and Simulation for Hydrogen Transition Analysis Presentation on Agent-Based Modeling and...

  16. agents offered cash: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JADE uses an agent model and Java implementation that allow good runtime efficiency, software reuse, agent mobility and the realization of different agent architectures. 1....

  17. Mobile agents for e-commerce Roll No. : 99329011

    E-Print Network [OSTI]

    Iyer, Sridhar

    aspects of mobile agent technology. #12;2 1 Introduction..............................................................................................5 2 Mobile agent technology......................................................................................................10 3.1 Java as technology base for mobile agents

  18. Universal Hashing and Multiple Authentication M. Atici 1;2 and D. R. Stinson 1;3

    E-Print Network [OSTI]

    Stinson, Douglas

    . Our point of view is the uni­ versal hashing approach pioneered by Wegman and Carter in 1981. We first to the construction of unconditionally secure authentication codes without secrecy. This idea is due to Wegman formal def­ initions of relevant classes of hash functions, and obtained some improvements to the Wegman

  19. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  20. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Edith C. H. Ngai and Michael R. Lyu

    E-Print Network [OSTI]

    Lyu, Michael R.

    distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai

  1. Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining

    E-Print Network [OSTI]

    Atkinson, Katie

    Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining Santhana Chaimontree, Katie.Chaimontree, katie, Coenen}@liverpool.ac.uk Abstract. A framework for Multi Agent Data Mining (MADM) is de- scribed. The framework comprises a collection of agents cooperating to address given data mining tasks. The fundamental

  2. Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining

    E-Print Network [OSTI]

    Coenen, Frans

    Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining Santhana Chaimontree, Katie.Chaimontree,katie,Coenen}@liverpool.ac.uk Abstract. A framework for Multi Agent Data Mining (MADM) is de- scribed. The framework comprises a collection of agents cooperating to address given data mining tasks. The fundamental concept underpinning

  3. Agent-based health care management An Agent-based Approach to Health Care Management

    E-Print Network [OSTI]

    Mascardi, Viviana

    Agent-based health care management 1 An Agent-based Approach to Health Care Management Jun Huang1, London WC2A 3PX, UK. Abbreviated title: Agent-based health care management Complete Mailing Address. London E1 4NS UK #12;Agent-based health care management 2 Abstract The provision of medical care

  4. MDE and Mobile agents: another reflection on the agent migration Tahar GHERBI

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    code. Mobile agents are a very interesting technology to develop applications for mobile introduces MDE. Section 3 presents the mobile-agent technology, describes the migration operationMDE and Mobile agents: another reflection on the agent migration Tahar GHERBI Computer science

  5. Intelligent Agents An agent perceives its environment through sensors and acts on this

    E-Print Network [OSTI]

    Imberman, Susan

    Intelligent Agents An agent perceives its environment through sensors and acts on this environment environment through sensors and acting upon that environment through actuators · Human agent: eyes, ears far 3) knowledge about environment 4) action agent performs What is the difference between omniscience

  6. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  7. Intelligent agent for aircraft collision avoidance

    E-Print Network [OSTI]

    Shandy, Surya Utama

    2002-01-01T23:59:59.000Z

    Executive Agent Federal Aviation Regulation Flight Management System Flight Simulation Laboratory General Aviation Global Positioning System Ground Proximity Warning System Heads Down Display Horizontal Separation Performance Heads Up Display Hz... Centered Aviation Automation. . , . 22 23 24 24 27 3 TRAFFIC AGENT SYSTEM DEVELOPMENT. 30 3. 1 Introduction 3. 2 Concept and Approach. 3. 3 Traffic Agent Structure and Assumptions, 3. 4 Minimum System Inputs . 3. 5 Enhanced System Inputs . 3. 6...

  8. Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept

    E-Print Network [OSTI]

    Roth, Volker

    for the safe management of mobile agents they deploy onto the Internet. Our in- frastructural approach is basedMacro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Security Research Centre Queensland University of Technology Brisbane, Queensland, Australia and Dept

  9. Agent Based Power System Transient Stability Enhancement

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    Agent Based Power System Transient Stability Enhancement M. S. Rahman, Student Member, IEEE, M. J. Hossain and H. R. Pota Abstract--This paper describes an intelligent agent approach to power system fault electric power system is most capital investive and vast complex network with increasing interconnections

  10. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  11. 161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at

    E-Print Network [OSTI]

    Boyer, Edmond

    hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

  12. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, E.T.

    1985-06-11T23:59:59.000Z

    This invention relates to the production of metal-binding compounds useful for the therapy of heavy metal poisoning, for biological mining and for decorporation of radionuclides. The present invention deals with an orderly and effective method of producing new therapeutically effective chelating agents. This method uses challenge biosynthesis for the production of chelating agents that are specific for a particular metal. In this approach, the desired chelating agents are prepared from microorganisms challenged by the metal that the chelating agent is designed to detoxify. This challenge induces the formation of specific or highly selective chelating agents. The present invention involves the use of the challenge biosynthetic method to produce new complexing/chelating agents that are therapeutically useful to detoxify uranium, plutonium, thorium and other toxic metals. The Pseudomonas aeruginosa family of organisms is the referred family of microorganisms to be used in the present invention to produce the new chelating agent because this family is known to elaborate strains resistant to toxic metals.

  13. agent system solution: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 12 Agent Tcl: A flexible and secure mobile-agent system CiteSeer Summary: An...

  14. agent kikai system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 7 Agent Tcl: A flexible and secure mobile-agent system CiteSeer Summary: An...

  15. Prctica: Simulacin Social Basada en Agentes Objetivos

    E-Print Network [OSTI]

    Guerra Hernández, Alejandro

    bienestar social elegido. Las funciones de utilidad coletivas permitidas son: egalitaria, utilitariaPráctica: Simulación Social Basada en Agentes Objetivos ­ Familiarizarse con el uso de las expresen sus preferencias mediante funciones de utilidad y sociedades que evaluen su bienestar mediante

  16. For whom will the Bayesian agents vote?

    E-Print Network [OSTI]

    Caticha, Nestor; Vicente, Renato

    2015-01-01T23:59:59.000Z

    Within an agent-based model where moral classifications are socially learned, we ask if a population of agents behaves in a way that may be compared with conservative or liberal positions in the real political spectrum. We assume that agents first experience a formative period, in which they adjust their learning style acting as supervised Bayesian adaptive learners. The formative phase is followed by a period of social influence by reinforcement learning. By comparing data generated by the agents with data from a sample of 15000 Moral Foundation questionnaires we found the following. 1. The number of information exchanges in the formative phase correlates positively with statistics identifying liberals in the social influence phase. This is consistent with recent evidence that connects the dopamine receptor D4-7R gene, political orientation and early age social clique size. 2. The learning algorithms that result from the formative phase vary in the way they treat novelty and corroborative information with mo...

  17. Computing with Mobile Agents in Distributed Networks

    E-Print Network [OSTI]

    Kranakis, Evangelos

    .......................... 1-12 1.7 Network Decontamination and Black Holes ....... 1-15 Network decontamination · Black holes the decontamination problem and black hole search. 1.2 Modeling Mobile Agents in Distribu

  18. Dissolution of Barite Scale using Chelating Agents 

    E-Print Network [OSTI]

    Shende, Aniket Vishwanath

    2012-07-16T23:59:59.000Z

    , increases with increasing concentrations of chelating agents, even going as high as 239 mM. However experimental or field constraints lead to significant decrease in dissolution, especially at higher chelant concentrations. Thus, field tests to determine...

  19. acid lowering agent: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficacyeffectiveness or in safety between agents. 2. Colchicine is the only agent for gout and Famalial Mediterranean Fever. 3. Febuxostat reduces serum urate below 6mgdl in a...

  20. abortifacient agents nonsteroidal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    efficacyeffectiveness or in safety between agents. 2. Colchicine is the only agent for gout and Famalial Mediterranean Fever. 3. Febuxostat reduces serum urate below 6mgdl in a...

  1. agent based model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

  2. agent based models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

  3. agent based modeling: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

  4. agents statutaires sur: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (Jennings et al., 1995) and Carnot (Huhns et al., 1992)). Broadly speaking Woolridge, Mike 50 Unknown Agent(s) (starting material) Biology and Medicine Websites Summary:...

  5. Temporary Bridging Agents for Use in Drilling and Completions...

    Broader source: Energy.gov (indexed) [DOE]

    Temporary Bridging Agents for Use in Drilling and Completions of EGS Temporary Bridging Agents for Use in Drilling and Completions of EGS DOE Geothermal Peer Review 2010 -...

  6. agents detain journalist: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 145 Agent Communication and Cooperative Information Frank Dignum Computer...

  7. agente antimicrobiano phmb: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 128 Agent Communication and Cooperative Information Frank Dignum Computer...

  8. agentes antimicrobianos diante: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 130 Agent Communication and Cooperative Information Frank Dignum Computer...

  9. antithyroid agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  10. anti-asthmatic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  11. agent structure characterization: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    agent programming languages Peter Novk, Jrgen Dix IfI Technical Report Series Zachmann (Computer Graphics) 12;Adding structure to agent programming languages Peter...

  12. antifibrinolytic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  13. agent diorhabda elongata: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 130 Agent Communication and Cooperative Information Frank Dignum Computer...

  14. agent myrica rubra: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 138 Agent Communication and Cooperative Information Frank Dignum Computer...

  15. ads harvesting agent: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    agent programming languages Peter Novk, Jrgen Dix IfI Technical Report Series Zachmann (Computer Graphics) 12;Adding structure to agent programming languages Peter...

  16. agentes ligantes para: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 134 Agent Communication and Cooperative Information Frank Dignum Computer...

  17. adrenergics-blocking agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  18. alguns procariotas agentes: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  19. agentes compatibilizantes obtenidos: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 128 Agent Communication and Cooperative Information Frank Dignum Computer...

  20. anti-allergic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  1. antitrichomonal agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  2. anticholesteremic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  3. agente seletivo alternativos: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  4. agentes antitumorais inibidores: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  5. antineoplastic agents phytogenic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  6. antirheumatic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  7. antifouling agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  8. antisickling agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  9. agent marcaje indirecto: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  10. antiparkinson agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  11. anti-infective agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  12. agentes infecciosos relacionados: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

  13. agents tiamulin olanquindox: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  14. agentes microbianos reportados: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  15. agent ulocladium atrum: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  16. antitubercular agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 129 Agent Communication and Cooperative Information Frank Dignum Computer...

  17. anticestodal agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  18. antiparasitic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

  19. agente solidificante para: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  20. agent gadofosveset trisodium: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  1. agente quelante sulfoxina: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  2. anticarcinogenic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  3. agente tensioactivo pulmonar: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 134 Agent Communication and Cooperative Information Frank Dignum Computer...

  4. agent detection system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 19 An Architecture for Intrusion Detection using Autonomous Agents CiteSeer...

  5. anti-obesity agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  6. agentes quimicos para: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 133 Agent Communication and Cooperative Information Frank Dignum Computer...

  7. antidiuretic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  8. antipoxviral agents mitoxantrone: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  9. anti-anxiety agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  10. agentes clareadores ativados: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 127 Agent Communication and Cooperative Information Frank Dignum Computer...

  11. agents pargyline nomifensine: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  12. agents gadopentetate dimeglumine: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  13. anti-arrhythmia agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  14. alguns agentes lixiviantes: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  15. antihypertensive agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 135 Agent Communication and Cooperative Information Frank Dignum Computer...

  16. 1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    E-Print Network [OSTI]

    Tripathi, Anand

    Contents 1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Historical perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Applications of mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Drawbacks

  17. Scheduling of Two Agents Task Chains with a Central Selection ...

    E-Print Network [OSTI]

    2014-06-13T23:59:59.000Z

    each task belongs to one agent, and each agent is only interested in optimizing his/her own performance index. Although these problems can be viewed as a ...

  18. Precursors to radiopharmaceutical agents for tissue imaging

    DOE Patents [OSTI]

    Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

    1988-01-01T23:59:59.000Z

    A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

  19. Agents, Beliefs, and Plausible Behavior in a Temporal Setting

    E-Print Network [OSTI]

    Zachmann, Gabriel

    Zachmann (Computer Graphics) #12;Agents, Beliefs, and Plausible Behavior in a Temporal Setting Nils Bulling

  20. Normative Agents in Health Care: Uses and Challenges

    E-Print Network [OSTI]

    Utrecht, Universiteit

    Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda institute;Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda 1 Abstract. The use of Multi-Agent Systems (MAS) in health-care domains is increasing. Such Agent-mediated Medical Systems are designed

  1. An operational semantics of a timely bounded agent abstract machine

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An operational semantics of a timely bounded agent abstract machine Technical Report LIRMM #RR an agent abstract machine and its operational semantics. The dynamics of the agent abstract machine of the agent abstract machine using parallel evaluations. Simplicity and expressiveness are important features

  2. Integrating Mobile Agent Technology into an e-Marketplace Solution

    E-Print Network [OSTI]

    Integrating Mobile Agent Technology into an e-Marketplace Solution - The InterMarket Marketplace. The mobile agent technology might take e-commerce trading to the next phase. Mobile agents are intelligent technology. A feasibility study, made for two existing software applications, the mobile-agent system Tracy

  3. Making Products Active with Intelligent Agents for Supporting PLM Making Products Active with Intelligent Agents for

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Making Products Active with Intelligent Agents for Supporting PLM Making Products Active with Intelligent Agents for Supporting Product Lifecycle Management Martin G. Marchetta1 , Frédérique Mayer2, in order for enterprises to increase their productivity and be more competitive in front of shorter due

  4. How to reuse a one-time pad and other notes on authentication, encryption, and protection of quantum information

    SciTech Connect (OSTI)

    Oppenheim, Jonathan [Racah Institute of Theoretical Physics, Hebrew University of Jerusalem, Givat Ram, Jerusalem 91904 (Israel); Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland); Horodecki, Michal [Institute of Theoretical Physics and Astrophysics, University of Gdansk (Poland)

    2005-10-15T23:59:59.000Z

    Quantum information is a valuable resource which can be encrypted in order to protect it. We consider the size of the one-time pad that is needed to protect quantum information in a number of cases. The situation is dramatically different from the classical case: we prove that one can recycle the one-time pad without compromising security. The protocol for recycling relies on detecting whether eavesdropping has occurred, and further relies on the fact that information contained in the encrypted quantum state cannot be fully accessed. We prove the security of recycling rates when authentication of quantum states is accepted, and when it is rejected. We note that recycling schemes respect a general law of cryptography which we introduce relating the size of private keys, sent qubits, and encrypted messages. We discuss applications for encryption of quantum information in light of the resources needed for teleportation. Potential uses include the protection of resources such as entanglement and the memory of quantum computers. We also introduce another application: encrypted secret sharing and find that one can even reuse the private key that is used to encrypt a classical message. In a number of cases, one finds that the amount of private key needed for authentication or protection is smaller than in the general case.

  5. Detection of electrophilic and nucleophilic chemical agents

    DOE Patents [OSTI]

    McElhanon, James R.; Shepodd, Timothy J.

    2014-08-12T23:59:59.000Z

    A "real time" method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

  6. Intelligent Software Agents: Sensor Integration and Response

    SciTech Connect (OSTI)

    Kulesz, James J [ORNL; Lee, Ronald W [ORNL

    2013-01-01T23:59:59.000Z

    Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at the sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations including the Threat Detection and Analysis System (TDAS) at the International Port of Memphis and the Biological Warning and Incident Characterization System (BWIC) Environmental Monitoring (EM) Component. Technologies developed for these 24/7 operational systems have applications for improved real-time system integrity awareness as well as provide incident response (as needed) for production and field applications.

  7. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  8. authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5

    E-Print Network [OSTI]

    Martin, Jeff

    brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee locally made corn tortillas · smoky pinto beans · salsa · red sauce Bothwell cheddar · two eggs (any style eggs · mesa red sauce · cheddar · salsa · pinto beans BREAKFAST BUN 5 toasted whole wheat bun · fried

  9. When HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang, Haixin Duan, Kang Li , Tao Wan , Jianping Wu,

    E-Print Network [OSTI]

    Li, Kang

    providers also start to offer DDoS mitigation services by hiding the original web site and distributingWhen HTTPS Meets CDN: A Case of Authentication in Delegated Service Jinjin Liang, Jian Jiang technologies, each of which has been well studied individually and independently. This paper provides

  10. Quantum speedup for active learning agents

    E-Print Network [OSTI]

    Giuseppe Davide Paparo; Vedran Dunjko; Adi Makmal; Miguel Angel Martin-Delgado; Hans J. Briegel

    2014-07-14T23:59:59.000Z

    Can quantum mechanics help us in building intelligent robots and agents? One of the defining characteristics of intelligent behavior is the capacity to learn from experience. However, a major bottleneck for agents to learn in any real-life situation is the size and complexity of the corresponding task environment. Owing to, e.g., a large space of possible strategies, learning is typically slow. Even for a moderate task environment, it may simply take too long to rationally respond to a given situation. If the environment is impatient, allowing only a certain time for a response, an agent may then be unable to cope with the situation and to learn at all. Here we show that quantum physics can help and provide a significant speed-up for active learning as a genuine problem of artificial intelligence. We introduce a large class of quantum learning agents for which we show a quadratic boost in their active learning efficiency over their classical analogues. This result will be particularly relevant for applications involving complex task environments.

  11. Agents on the Web The Sentient Web

    E-Print Network [OSTI]

    Huhns, Michael N.

    Agents on the Web The Sentient Web "I n a startling revelation, a team of uni- versity scientists. In spite of the ominous tone typically cho- sen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. When people find the Web frustrating, it is usual- ly not because

  12. Agent Program Planning Information Wisdom, Power, Control

    E-Print Network [OSTI]

    Agent Program Planning Information Wisdom, Power, Control (A culturally appropriate type 2 diabetes, Power, Control training (a prerequisite to teach the program). · Market the program to community · Effective glycemic control and early detection are critical to reduce the risk for microvascular

  13. Automated Information Management via Abductive Logic Agents

    E-Print Network [OSTI]

    Toni, Francesca

    Automated Information Management via Abductive Logic Agents F.Toni 1 Imperial College of Science representation of networks and meta-data via abductive logic programs and make use of the reasoning engine abductive logic pro- grams are equipped with for checking as well as enforcing the properties represented

  14. ANIMATION OF TALKING AGENTS Jonas Beskow

    E-Print Network [OSTI]

    Beskow, Jonas

    . Animation issues Animation of human, or humanoid, faces is a key technology in this context. There existANIMATION OF TALKING AGENTS Jonas Beskow Centre for Speech Technology KTH 10044 Stockholm, Sweden screen. This paper describes an architecture that can be used to design and animate characters capable

  15. Agent Notes Day 4 ~ Health Training

    E-Print Network [OSTI]

    ­ Agent Notes Day 4 ~ Health Training In preparation for the Health Day, you could order the National Institute on Aging, National Institutes of Health. To order these free booklets, go to www in the afternoon, and edit your agenda to reflect your choices. Several HealthHints newsletters are referenced

  16. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, Donald M. (1204 Linwood, Ann Arbor, MI 48103); Brown, Lawrence E. (523 Thomas St., Ypsilanti, MI 48197); Beierwaltes, William H. (1025 Forest Rd., Ann Arbor, MI 48105); Wu, Jiann-long (2672 Velvet Way, Walnut Creek, CA 94596)

    1986-04-22T23:59:59.000Z

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

  17. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

    1986-04-22T23:59:59.000Z

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

  18. Coordination and sociability for intelligent virtual agents

    E-Print Network [OSTI]

    Grimaldo, Francisco

    produce low quality animations where characters do not act realistically. Moreover, virtual humans an elegant and formal framework to animate synthetic humans. When designing such agents, the main concern has that will be finally animated. Virtual actors normally operate in dynamic resource bounded contexts; thus, multi

  19. Agents and Electronic Commerce, Hype and Reality

    E-Print Network [OSTI]

    Dignum, Frank

    . Some good examples are Kasbah (Chavez & Maes 1996), the Fishmarket project (Rodriguez 1997) and Auction at the selling side and strike bargains with these agents. The scenario assumes that prices are fixed and can a price, but this price does not have to be the final selling price. In case of an auction model the price

  20. Agent-based Evolutionary Multiobjective Optimisation

    E-Print Network [OSTI]

    Coello, Carlos A. Coello

    University of Mining and Metallurgy, Krak´ow, Poland e-mail: doroh@agh.edu.pl Abstract - This work presents-renewable resource called life energy. Selection is realised in such a way that agents with high energy are more likely to reproduce, whereas a low level of energy increases possibility of death. In fact all decisions

  1. Multiscale Agent-Based Consumer Market Modeling

    E-Print Network [OSTI]

    Kemner, Ken

    , and Visualization Group; and 3 Center for Energy, Environmental, and Economic Systems Analysis, Argonne NationalMultiscale Agent-Based Consumer Market Modeling MICHAEL J. NORTH,1 CHARLES M. MACAL,1 JAMES ST 8, 2009; revised August 19, 2009; accepted September 8, 2009 Consumer markets have been studied

  2. Device Selection by a Personal Proxy Agent

    E-Print Network [OSTI]

    von Bochmann, Gregor

    Device Selection by a Personal Proxy Agent N. Hadibi, K. El-khatib, Eric Z. Zhang, Ken Chan, G. v user to access communication devices currently present in his Personal Area Network (PAN) Performs PreferencesDevice Capability An example Scenario: Connecting Alice and Bob w/o a Personal Proxy Internet Home

  3. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01T23:59:59.000Z

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  4. Reactive behaviour for autonomous virtual agents using fuzzy logic 

    E-Print Network [OSTI]

    Jaafar, Jafreezal

    2009-11-26T23:59:59.000Z

    One of the fundamental aspects of a virtual environment is the virtual agents that inhabit them. In many applications, virtual agents are required to perceive input information from their environment and make decisions ...

  5. Agents of seed dispersal : animal--zoochary / Wind--anemonochory

    E-Print Network [OSTI]

    Lysakowski, Lukasz Kamil, 1974-

    2004-01-01T23:59:59.000Z

    Agents of seed dispersal is a project designed to address the increase of environmental degradation, which occurs as a result of the perpetual spread of the asphalt and concrete of the contemporary urban situation. Agents ...

  6. Market Microstructure Patterns Powering Trading and Surveillance Agents

    E-Print Network [OSTI]

    Cao, Longbing

    Market Microstructure Patterns Powering Trading and Surveillance Agents Longbing Cao (University are then used for powering market trading and surveillance agents for automatically detecting market models. From data analysis perspective, we view it valuable for smart trading in designing legal

  7. International Conference on Computer Animation and Social Agents

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    , Facial Animation; Social Agents: Social Agents and Avatars, Emotion and Personality, Virtual Humans Humans/Environments, Animation Analysis and Structuring, Anthropometric Virtual Human Models, Acquisition; Other Related Topics: Animation Compression and Transmission, Semantics and Ontologies for Virtual

  8. A router agent for capacity assessment in packet video

    E-Print Network [OSTI]

    Woodings, Mark Alexander

    1997-01-01T23:59:59.000Z

    available multicast bandwidth on the subnet and reports this information to receivers upon request. Prior to joining the enhancement layer, the receiver checks with the agent and video source to ensure that sufficient bandwidth is available. The agent...

  9. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, Eugene T. (East Moriches, NY)

    1988-01-01T23:59:59.000Z

    This invention relates to the preparation of new, naturally produced chelating agents as well as to the method and resulting chelates of desorbing cultures in a bioavailable form involving Pseudomonas species or other microorganisms. A preferred microorganism is Pseudomonas aeruginosa which forms multiple chelates with thorium in the range of molecular weight 100-1,000 and also forms chelates with uranium of molecular weight in the area of 100-1,000 and 1,000-2,000.

  10. Lithium based electrochemical cell systems having a degassing agent

    DOE Patents [OSTI]

    Hyung, Yoo-Eup (Naperville, IL); Vissers, Donald R. (Naperville, IL); Amine, Khalil (Downers Grove, IL)

    2012-05-01T23:59:59.000Z

    A lithium based electrochemical cell system includes a positive electrode; a negative electrode; an electrolyte; and a degassing agent.

  11. Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci

    E-Print Network [OSTI]

    Aiello, Marco

    Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci University of Modena and RE illustrate an implementation includ- ing the interfacing with a physical Smart Meter and provide initial--Intelligent agents, Multiagent systems General Terms Design, Economy Keywords Energy trade, agents, smart meter 1

  12. Web Service Access Management for Integration with Agent Systems

    E-Print Network [OSTI]

    Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

  13. An abductive logic programming architecture for negotiating agents

    E-Print Network [OSTI]

    Torroni, Paolo

    An abductive logic programming architecture for negotiating agents Fariba Sadri1 , Francesca Toni1@deis.unibo.it Abstract. In this paper, we present a framework for agent negotiation based on abductive logic programming and dialogue cycle, and in the results that apply in the gen- eral case of abductive agents and in the specific

  14. Managing a Relational Database with Intelligent Agents Ira Rudowsky1

    E-Print Network [OSTI]

    Rudowsky, Ira

    Managing a Relational Database with Intelligent Agents Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin quality for search and retrieval. An intelligent agent was designed using JACKTM (Agent Oriented Software in genomic studies, which could impact data analysis and further research [9, 10]. A number of software tools

  15. Original article Effects of gelling agents on growth,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Original article Effects of gelling agents on growth, mineral composition and naphthoquinone May 1992; accepted 22 October 1992) Summary — Gelling agents affect growth of walnut in vitro, induced mature leaf formation and necroses. The 2 gelling agents differed significantly in mineral content

  16. Towards an Intelligent Affective Multimodal Virtual Agent for Uncertain Environments

    E-Print Network [OSTI]

    Baldassarri, Sandra

    . It is based on the integration of Maxine, a powerful multimodal animation engine for managing virtual agents-time animation. 1. INTRODUCTION Most research on social interfaces is related to the design of virtual agents human- computer interface [1, 2]. A virtual agent must be believable: it has to move properly, paying

  17. Jacob -An Animated Instruction Agent in Virtual Reality

    E-Print Network [OSTI]

    Nijholt, Anton

    of a 3D virtual environment where an animated human- like agent called Jacob gives instructionJacob - An Animated Instruction Agent in Virtual Reality Marc Evers1, Anton Nijholt1 1 University of virtual reality techniques and in- volves the design and construction of an animated agent in a 3

  18. Non-intrusive Lightweight Agents for Information Management

    E-Print Network [OSTI]

    Graham, Nick

    Non-intrusive Lightweight Agents for Information Management S. Varma D.B. Skillicorn November 1997 a non-intrusive approach to building information management systems, based on software agents. Software is a non-intrusive, lightweight software agent that manages bookmarks web browser pointers to favourite

  19. Trading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work A Platform for Trading Agent Competition

    E-Print Network [OSTI]

    Zhang, Dongmo

    -2011 TAC Ad Auctions: 2009-2012 Power TAC: 2011-2012 #12;Trading Agent Competition Market Design GameTrading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work A Platform for Trading Agent Competition Dongmo Zhang and Chun Gao Intelligent Systems Laboratory University

  20. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, N.G.; Wai, C.M.; Lin, Y.; Kwang, Y.H.

    1998-11-24T23:59:59.000Z

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO{sub 2}, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO{sub 2} and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process. 1 fig.

  1. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, Neil G. (Moscow, ID); Wai, Chien M. (Moscow, ID); Lin, Yuehe (Moscow, ID); Kwang, Yak Hwa (Moscow, ID)

    1998-01-01T23:59:59.000Z

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO.sub.2, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO.sub.2 and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process.

  2. Distributed coordination of autonomous agents by communicating on a need-to-know basis

    E-Print Network [OSTI]

    Chen, Judy Y. (Judy Yann-Yun), 1980-

    2004-01-01T23:59:59.000Z

    Intelligent autonomous agents working cooperatively accomplish tasks more efficiently than single agents, as well as tasks that were infeasible for the single agent. For example, a single agent transporting a ton of blocks ...

  3. Designed TPR Modules as Novel Anticancer Agents

    SciTech Connect (OSTI)

    Cortajarena,A.; Yi, F.; Regan, L.

    2008-01-01T23:59:59.000Z

    Molecules specifically designed to modulate protein-protein interactions have tremendous potential as novel therapeutic agents. One important anticancer target is the chaperone Hsp90, whose activity is essential for the folding of many oncogenic proteins, including HER2, IGFIR, AKT, RAF-1, and FLT-3. Here we report the design and characterization of new tetratricopeptide repeat modules, which bind to the C-terminus of Hsp90 with higher affinity and with greater specificity than natural Hsp90-binding co-chaperones. Thus, when these modules are introduced into the cell, they out-compete endogenous co-chaperones for binding, thereby inhibiting Hsp90 function. The effect of Hsp90 inhibition in this fashion is dramatic; HER2 levels are substantially decreased and BT474 HER2 positive breast cancer cells are killed. Our designs thus provide new tools with which to dissect the mechanism of Hsp90-mediated protein folding and also open the door to the development of an entirely new class of anticancer agents.

  4. Quantum-enhanced deliberation of learning agents using trapped ions

    E-Print Network [OSTI]

    Vedran Dunjko; Nicolai Friis; Hans J. Briegel

    2015-01-31T23:59:59.000Z

    A scheme that successfully employs quantum mechanics in the design of autonomous learning agents has recently been reported in the context of the projective simulation (PS) model for artificial intelligence. In that approach, the key feature of a PS agent, a specific type of memory which is explored via random walks, was shown to be amenable to quantization. In particular, classical random walks were substituted by Szegedy-type quantum walks, allowing for a speed-up. In this work we propose how such classical and quantum agents can be implemented in systems of trapped ions. We employ a generic construction by which the classical agents are `upgraded' to their quantum counterparts by nested coherent controlization, and we outline how this construction can be realized in ion traps. Our results provide a flexible modular architecture for the design of PS agents. Furthermore, we present numerical simulations of simple PS agents which analyze the robustness of our proposal under certain noise models.

  5. agent based approaches: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a survey of existing research on agent-based approaches to transportation and traffic management. A framework for describing and assessing this work will be presented and...

  6. agent initial results: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Applications of Artificial Intelligence, pp. 265-278, 2005. 4 I. Moura, "A model System Initiative Dialogue of Mixed Initiative Conversational Agent using Global*** . , . . ....

  7. agent initial experience: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Applications of Artificial Intelligence, pp. 265-278, 2005. 4 I. Moura, "A model System Initiative Dialogue of Mixed Initiative Conversational Agent using Global*** . , . . ....

  8. agent communication framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Er D. Korzyk 2000-01-01 55 Semantics of Communicating Agents Based on Deduction and Abduction Computer Technologies and Information Sciences Websites Summary: Semantics of...

  9. agent concise communication: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Er D. Korzyk 2000-01-01 32 Semantics of Communicating Agents Based on Deduction and Abduction Computer Technologies and Information Sciences Websites Summary: Semantics of...

  10. agentes coagulantes para: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Comrcio Electrnico de Livros na Internet da Silva, Alberto Rodrigues 2 ARQUITECTURA BASADA EN AGENTES INTELIGENTES Y SERVICIOS WEB PARA LA ADAPTACIN DE CONTENIDOS...

  11. agent theories architectures: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    J. Wooldridge; Nicholas R. Jennings 1995-01-01 2 Interactive agent generated architecture MIT - DSpace Summary: The thesis explores architectural form generation through two...

  12. autonomic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CiteSeer Summary: This paper describes the New Millennium Remote Agent NMRA architecture for autonomous spacecraft control systems. This architecture integrates traditional...

  13. autonomic blocking agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CiteSeer Summary: This paper describes the New Millennium Remote Agent NMRA architecture for autonomous spacecraft control systems. This architecture integrates traditional...

  14. agente oxidante uma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    cognitive science. In this paper we describe the various memory systems in the LIDA Architecture, which Ramamurthy, Uma 2 Conscious Learning In An Adaptive Software Agent Uma...

  15. Temporary Bridging Agents for Use in Drilling and Completions...

    Broader source: Energy.gov (indexed) [DOE]

    Temporary Bridging Agents for Use in Drilling and Completions of EGS Principal Investigator - Larry Watters Presenter - Jeff Watters CSI Technologies LLC Track Name May 18, 2010...

  16. agents affect morphophysiological: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    animated pedagogical agents 19 may provide Lester, James C. 11 From Gretas mind to her face: Modelling the dynamics of affective states in a conversational embodied...

  17. agent technology iat: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 69 Technologies Technologies Mathematics Websites Summary: UFR Sciences et...

  18. agent based simulation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    an agent-based model to simulate the diffusion of smart metering technology in the electricity market. We simulate the emergent adoption of smart metering... Zhang, Tao;...

  19. Surface Modification Agents for Lithium-Ion Batteries | Argonne...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surface Modification Agents for Lithium-Ion Batteries Technology available for licensing: A process to modify the surface of the active material used in an electrochemical device...

  20. Agents That Talk Back (Sometimes): Filter Programs for Affective Communication

    E-Print Network [OSTI]

    Bari, Università degli Studi di

    Agents That Talk Back (Sometimes): Filter Programs for Affective Communication Helmut Prendinger- action that supports basic features of affective conver- sation. As essential requirements for animated

  1. 1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1

    E-Print Network [OSTI]

    Lester, James C.

    Contents 1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Natural

  2. agents mobilize blood: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and driver comfort. Kumar, Rakesh 2011-01-01 159 A Sanctuary for Mobile Agents Bennet S. Yee Computer Technologies and Information Sciences Websites Summary: is perhaps...

  3. agents polymer modified: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ben O'Shaughnessy; Dimitrios Vavylonis 2002-09-20 200 A Sanctuary for Mobile Agents Bennet S. Yee Computer Technologies and Information Sciences Websites Summary: is perhaps...

  4. agent management system: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Data Physics Websites Summary: , and the relations between hypotheses present and past. Such hypotheses are managed with a multi-agent sys- tem that plausible hypotheses...

  5. COAL (Coalition Organization with Agent Leadership) 1. INTRODUCTION

    E-Print Network [OSTI]

    Allan, Vicki H.

    1 COAL (Coalition Organization with Agent Leadership) 1. INTRODUCTION A coalition is an alliance, "individuals, rather than government, make the majority of decisions regarding economic activities

  6. agent oriented software: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    21 22 23 24 25 Next Page Last Page Topic Index 1 Agent Oriented Software Engineering Computer Technologies and Information Sciences Websites Summary: - velopment. Specifically,...

  7. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-06T23:59:59.000Z

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 21 figs.

  8. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-20T23:59:59.000Z

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 18 figs.

  9. Business Models Guide: Real Estate Agent | Department of Energy

    Energy Savers [EERE]

    and a broad knowledge of the industry, real estate agents are natural advocates for smart energy efficiency upgrades. realestateagent.pdf More Documents & Publications...

  10. antitumor agents mechanistic: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Yes No Partly No Episodic?? Static?? Discrete?? Single-agent?? Chapter 2 13 Environment types Solitaire Backgammon Internet shopping Taxi Observable?? Yes Yes Liu, Yanhong...

  11. The Agent's Policy in an Asset Pricing Model Andrew Culham

    E-Print Network [OSTI]

    they use when taking expectations of future prices. Under such assumptions, asset pric- ing models remain is perishable and thus must be consumed or in- vested in the stock each period. Note that with this set up we t is agent i's stock holdings in period t, wi t is agent i's exogenous endowment in period t (could

  12. AgentBased Digital Libraries: Decentralization and Coordination

    E-Print Network [OSTI]

    Durfee, Edmund H.

    1 Agent­Based Digital Libraries: Decentralization and Coordination Peter C. Weinstein, William P describes agent­based systems and explains why digital libraries should be built with this type describe the approach taken by the University of Michigan Digital Library project. #12; 2 1 Introduction

  13. Abduction with Negation as Failure for Active Databases and Agents

    E-Print Network [OSTI]

    Toni, Francesca

    Abduction with Negation as Failure for Active Databases and Agents Fariba Sadri and Francesca Toni suggested abductive logic programming as a suitable formalism to represent active databases and intelligent agents. In particular, abducibles and integrity constaints in abductive logic pro- grams can be used

  14. EXPRESSING COLLABORATION AND COMPETITION AMONG ABDUCTIVE LOGIC AGENTS

    E-Print Network [OSTI]

    Torroni, Paolo

    EXPRESSING COLLABORATION AND COMPETITION AMONG ABDUCTIVE LOGIC AGENTS Anna Ciampolini, Evelina a language for coordinating several logic­based agents capable of abductive reasoning. The system to guess the causes of some symptoms. In his respect, some form of open or abductive reasoning has

  15. Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer

    E-Print Network [OSTI]

    Beer, Randall D.

    1 Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer Cognitive Science Program School: Randall D. Beer Phone: (812) 856-0873 Cognitive Science Program Fax: (812) 855-1086 1910 E. 10th St. ­ 840 of an evolutionary search (Mathayomchan & Beer, 2002). Examples of the dynamical analysis of evolved agents include

  16. Organizational Design Principles and Techniques for Decision-Theoretic Agents

    E-Print Network [OSTI]

    Durfee, Edmund H.

    Organizational Design Principles and Techniques for Decision-Theoretic Agents Jason Sleight precisely into exactly which parts of an agent's model should be organizationally influenced, and asserts be sanctioned to influence. We present a formal framework for specifying factored organizational influences

  17. Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance

    E-Print Network [OSTI]

    Hanson, Floyd B.

    Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

  18. Dynamic Adaptation of Mobile Agents in Heterogenous Environments

    E-Print Network [OSTI]

    of network management where mobile agents seem to be a promising technology [BPW98,FKK99]. Java programs can, there are scenarios like IT-management, where mobile agents are forced to contain environment dependent technologies, design paradigms and applications of mobile code. Code mobility can also be de- scribed as motion

  19. Computation Migration based on Mobile IP and Intelligent Agent Techniques

    E-Print Network [OSTI]

    Zhang, Runtong

    Page 1 Computation Migration based on Mobile IP and Intelligent Agent Techniques Runtong Zhang, Dongmei Zhang, Zhigang Kan and Jian Ma Advanced Internet Technology, Nokia (China) R&D Center No. 11, He is to investigate the use of mobile agents in the platform of mobile IPv6, to provide adapted services to mobile

  20. Computing Environment-Aware Agent Behaviours with Logic Program Updates

    E-Print Network [OSTI]

    Brogi, Antonio

    Computing Environment-Aware Agent Behaviours with Logic Program Updates Jos´e J. Alferes1 , Antonio Pisa, Italy, brogi@di.unipi.it Abstract. The ability of reacting to changes in the external environ behaviours of environment-aware agents can be naturally specified and computed in terms of logic program

  1. Supporting Air Traffic Flow Management with Agents Shawn R. Wolfe

    E-Print Network [OSTI]

    Yorke-Smith, Neil

    Supporting Air Traffic Flow Management with Agents Shawn R. Wolfe Intelligent Systems Division NASA Ames Research Center Moffett Field, CA 94035-1000 Shawn.R.Wolfe@nasa.gov Abstract Air traffic flow an agent-based system to facilitate mutually beneficial air traffic management decisions, and identify

  2. Multi-Agent Simulation of Protein Folding Luca Bortolussi1

    E-Print Network [OSTI]

    Bortolussi, Luca

    Multi-Agent Simulation of Protein Folding Luca Bortolussi1 , Agostino Dovier1 , and Federico residues) is known. The process for reaching this state is known as the protein fold- ing. This problem the feasibility and the power of the method. Keywords: Computational Biology, Agent-Based Technologies, Protein

  3. FEL3330 Networked and Multi-Agent Control Spring 2011

    E-Print Network [OSTI]

    Dimarogonas, Dimos

    FEL3330 Networked and Multi-Agent Control Systems Spring 2011 Automatic Control School of Electrical Engineering Royal Institute of Technology Lecture 1 1 March 29, 2011 #12;FEL3330 Networked Lecture 1 3 March 29, 2011 #12;FEL3330 Networked and Multi-Agent Control Systems Lecture 1: Introduction

  4. Decontamination of Hypercubes by Mobile Agents Paola Flocchini

    E-Print Network [OSTI]

    Flocchini, Paola

    Decontamination of Hypercubes by Mobile Agents Paola Flocchini Miao Jun Huang Flaminia L. Luccio Abstract In this paper we consider the decontamination problem in a hypercube network of size n. The nodes of the network are assumed to be contaminated and they have to be decontaminated by a sufficient number of agents

  5. NARCSim An Agent-Based Illegal Drug Market Daniela Romano

    E-Print Network [OSTI]

    Romano, Daniela

    NARCSim An Agent-Based Illegal Drug Market Simulation Daniela Romano Computer Science University.Richmond@sheffield.ac.uk Abstract-- Combined forces interventions in the UK's illegal drug market can be designed and evaluated using a serious game, where the illegal drug market can be simulated using an Agent- Based Model

  6. Validating agent based models through virtual worlds.

    SciTech Connect (OSTI)

    Lakkaraju, Kiran; Whetzel, Jonathan H.; Lee, Jina [Sandia National Laboratories, Livermore, CA; Bier, Asmeret Brooke; Cardona-Rivera, Rogelio E. [North Carolina State University, Raleigh, NC; Bernstein, Jeremy Ray Rhythm [Gaikai, Inc., Aliso Viejo, CA

    2014-01-01T23:59:59.000Z

    As the US continues its vigilance against distributed, embedded threats, understanding the political and social structure of these groups becomes paramount for predicting and dis- rupting their attacks. Agent-based models (ABMs) serve as a powerful tool to study these groups. While the popularity of social network tools (e.g., Facebook, Twitter) has provided extensive communication data, there is a lack of ne-grained behavioral data with which to inform and validate existing ABMs. Virtual worlds, in particular massively multiplayer online games (MMOG), where large numbers of people interact within a complex environ- ment for long periods of time provide an alternative source of data. These environments provide a rich social environment where players engage in a variety of activities observed between real-world groups: collaborating and/or competing with other groups, conducting battles for scarce resources, and trading in a market economy. Strategies employed by player groups surprisingly re ect those seen in present-day con icts, where players use diplomacy or espionage as their means for accomplishing their goals. In this project, we propose to address the need for ne-grained behavioral data by acquiring and analyzing game data a commercial MMOG, referred to within this report as Game X. The goals of this research were: (1) devising toolsets for analyzing virtual world data to better inform the rules that govern a social ABM and (2) exploring how virtual worlds could serve as a source of data to validate ABMs established for analogous real-world phenomena. During this research, we studied certain patterns of group behavior to compliment social modeling e orts where a signi cant lack of detailed examples of observed phenomena exists. This report outlines our work examining group behaviors that underly what we have termed the Expression-To-Action (E2A) problem: determining the changes in social contact that lead individuals/groups to engage in a particular behavior. Results from our work indicate that virtual worlds have the potential for serving as a proxy in allocating and populating behaviors that would be used within further agent-based modeling studies.

  7. Autonomous Traffic Control System Using Agent Based Technology

    E-Print Network [OSTI]

    M, Venkatesh; V, Srinivas

    2011-01-01T23:59:59.000Z

    The way of analyzing, designing and building of real-time projects has been changed due to the rapid growth of internet, mobile technologies and intelligent applications. Most of these applications are intelligent, tiny and distributed components called as agent. Agent works like it takes the input from numerous real-time sources and gives back the real-time response. In this paper how these agents can be implemented in vehicle traffic management especially in large cities and identifying various challenges when there is a rapid growth of population and vehicles. In this paper our proposal gives a solution for using autonomous or agent based technology. These autonomous or intelligent agents have the capability to observe, act and learn from their past experience. This system uses the knowledge flow of precedent signal or data to identify the incoming flow of forthcoming signal. Our architecture involves the video analysis and exploration using some Intelligence learning algorithm to estimate and identify the...

  8. Oxidizer gels for detoxification of chemical and biological agents

    DOE Patents [OSTI]

    Hoffman, Dennis M. (Livermore, CA); McGuire, Raymond R. (Brentwood, CA)

    2002-01-01T23:59:59.000Z

    A gel composition containing oxidizing agents and thickening or gelling agents is used to detoxify chemical and biological agents by application directly to a contaminated area. The gelling agent is a colloidal material, such as silica, alumina, or alumino-silicate clays, which forms a viscous gel that does not flow when applied to tilted or contoured surfaces. Aqueous or organic solutions of oxidizing agents can be readily gelled with less than about 30% colloidal material. Gel preparation is simple and suitable for field implementation, as the gels can be prepared at the site of decontamination and applied quickly and uniformly over an area by a sprayer. After decontamination, the residue can be washed away or vacuumed up for disposal.

  9. Human factors engineers as change agents

    SciTech Connect (OSTI)

    Hallbert, B.P.; Harbour, G.L.; Caccamise, D.J.; Francis, L.C.

    1992-01-01T23:59:59.000Z

    This presentation describes a case study and the lessons learned when a Human Factors Engineering (HFE) Department was enlisted as technical experts but gradually assumed a much larger role as change agents in transforming outdated job practices into streamlined processes that promoted a safety culture. At Rocky Flats Nuclear Weapons processing plant in Colorado, a workforce of over 7000 people support or directly operate a myriad of processes that range from laboratory analysis to typical foundry activities, greatly complicated by the presence of fissile, radioactive materials. Safe handling of these materials was governed by detailed discussions contained in Nuclear Material Safety limits (NMSLs). In spite of this rather extensive documentation, operators were committing an unacceptable number of safety infractions. Analysis revealed NMSLs were difficult to comprehend and not practical for use in operational settings. New job performance aids, called Criticality Safety Operating Limits (CSOLs) were developed to solve these problems. However, the solution involved more than applying good human factors principles to this job-aid. Following the classic Lewin Force Field Model of Change, safety infractions made change imperative; the forces operating against it were tradition, and perceived irrelevance of new expertise. Historically, Criticality Engineering dictated safety limits to Operations. In the course of Human Factoring'' the CSOLs, the HFE, through an iterative process, became the team integrator of this development process. Using Quality concepts such as buy-in, empowerment, and ownership, HFE was able to instantiate and receive enthusiastic acceptance of their products.

  10. Manipulating decision making of typical agents

    E-Print Network [OSTI]

    V. I. Yukalov; D. Sornette

    2014-09-02T23:59:59.000Z

    We investigate how the choice of decision makers can be varied under the presence of risk and uncertainty. Our analysis is based on the approach we have previously applied to individual decision makers, which we now generalize to the case of decision makers that are members of a society. The approach employs the mathematical techniques that are common in quantum theory, justifying our naming as Quantum Decision Theory. However, we do not assume that decision makers are quantum objects. The techniques of quantum theory are needed only for defining the prospect probabilities taking into account such hidden variables as behavioral biases and other subconscious feelings. The approach describes an agent's choice as a probabilistic event occurring with a probability that is the sum of a utility factor and of an attraction factor. The attraction factor embodies subjective and unconscious dimensions in the mind of the decision maker. We show that the typical aggregate amplitude of the attraction factor is $1/4$, and it can be either positive or negative depending on the relative attraction of the competing choices. The most efficient way of varying the decision makers choice is realized by influencing the attraction factor. This can be done in two ways. One method is to arrange in a special manner the payoff weights, which induces the required changes of the values of attraction factors. We show that a slight variation of the payoff weights can invert the sign of the attraction factors and reverse the decision preferences, even when the prospect utilities remain unchanged. The second method of influencing the decision makers choice is by providing information to decision makers. The methods of influencing decision making are illustrated by several experiments, whose outcomes are compared quantitatively with the predictions of our approach.

  11. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06T23:59:59.000Z

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  12. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

    2013-10-01T23:59:59.000Z

    A biosensor based detection of toxins includes enhancing a fluorescence signal by concentrating a plurality of photosynthetic organisms in a fluid into a concentrated region using biased AC electro-osmosis. A measured photosynthetic activity of the photosynthetic organisms is obtained in the concentrated region, where chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. A presence of the chemical, biological and/or radiological agents or precursors thereof, is determined in the fluid based on the measured photosynthetic activity of the concentrated plurality of photosynthetic organisms. A lab-on-a-chip system is used for the concentrating step. The presence of agents is determined from feature vectors, obtained from processing a time dependent signal using amplitude statistics and/or time-frequency analysis, relative to a control signal. A linear discriminant method including support vector machine classification (SVM) is used to identify the agents.

  13. Agent Interaction and State Determination in SCADA Systems

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    Agent Interaction and State Determination in SCADA Systems Thomas Richard McEvoy2 and Stephen D to continue to operate in a compromised state. Finally, the scale and complex- ity of SCADA systems makes

  14. Approximate dynamic programming with applications in multi-agent systems

    E-Print Network [OSTI]

    Valenti, Mario J. (Mario James), 1976-

    2007-01-01T23:59:59.000Z

    This thesis presents the development and implementation of approximate dynamic programming methods used to manage multi-agent systems. The purpose of this thesis is to develop an architectural framework and theoretical ...

  15. An agent system for collaborative version control in engineering

    E-Print Network [OSTI]

    Cheng, Eugenia

    University, Newcastle, UK 1. Introduction The adoption of concurrent engineering principles in the production increasingly realistic but total concurrent engineering activity, supported by computer aided design (CADAn agent system for collaborative version control in engineering Barry Florida-James Newcastle

  16. agent application prognosebeurteilung: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    there being a bomb the robot sends a message to the specialised bomb-disarming team Zachmann, Gabriel 45 Agent Warp Engine: Formula Based Shape Warping for Networked Applications...

  17. agentes aislados durante: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20...

  18. Formation Stabilization of Multiple Agents Using Decentralized Navigation Functions

    E-Print Network [OSTI]

    Tanner, Herbert G.

    . Tanner and Amit Kumar Mechanical Engineering Department University of New Mexico Albuquerque, NM 87131 of the environment and the degree of the interconnection network. Feedback controllers steer the agents away from

  19. The utilization of oilseed proteins as encapsulation agents

    E-Print Network [OSTI]

    Baker, Grey Wayne

    1979-01-01T23:59:59.000Z

    -release drugs, dye markers for air-sea rescue, bonding agents for aircraft rivets, artificial kidneys and pesticides (Fanger, 1974) . The food industry quickly developed applications of this new technology. Polak's Frutal Works, Incorporated, a major flavor...

  20. Circulation of autonomous agents in production and service networks

    E-Print Network [OSTI]

    Floreano, Dario

    Circulation of autonomous agents in production and service networks Olivier Gallay Ã, Max author. Tel.: +41216935817; fax: +41216933891. E-mail address: olivier.gallay@epfl.ch (O. Gallay). Int. J

  1. Iron oxide nanoparticles as a contrast agent for thermoacoustic tomography 

    E-Print Network [OSTI]

    Keho, Aaron Lopez

    2009-06-02T23:59:59.000Z

    An exogenous contrast agent has been developed to enhance the contrast achievable in Thermoacoustic Tomography (TAT). TAT utilizes the penetration depth of microwave energy while producing high resolution images through acoustic waves. A sample...

  2. Crowd simulation influenced by agent's socio-psychological state

    E-Print Network [OSTI]

    Cherif, F

    2010-01-01T23:59:59.000Z

    The aim our work is to create virtual humans as intelligent entities, which includes approximate the maximum as possible the virtual agent animation to the natural human behavior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the social force model and the based-rule model. These movements are influenced by a set of socio-psychological rules to give a more realistic result.

  3. Scaling reinforcement learning to the unconstrained multi-agent domain

    E-Print Network [OSTI]

    Palmer, Victor

    2009-06-02T23:59:59.000Z

    situations it is desirable to use this technique to train systems of agents (for example, to train robots to play RoboCup soccer in a coordinated fashion). Unfortunately, several significant computational issues occur when using this technique to train...

  4. albilineans agente causal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    severe economic losses in the main apple producing areas of East Asia. The causal Biggs, Alan R. 4 Knowing Who Dunnit: Infants Identify the Causal Agent in an Unseen Causal...

  5. agente causal da: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    severe economic losses in the main apple producing areas of East Asia. The causal Biggs, Alan R. 4 Knowing Who Dunnit: Infants Identify the Causal Agent in an Unseen Causal...

  6. acutatum agente causal: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    severe economic losses in the main apple producing areas of East Asia. The causal Biggs, Alan R. 4 Knowing Who Dunnit: Infants Identify the Causal Agent in an Unseen Causal...

  7. Woodstein : a Web interface agent for debugging e-commerce

    E-Print Network [OSTI]

    Wagner, Earl Joseph, 1977-

    2003-01-01T23:59:59.000Z

    Woodstein is a software agent that works with a user's web browser to explain and help diagnose problems in web processes, such as purchases. It enables the user to inspect data items in ordinary web pages, revealing the ...

  8. Intelligent energy management agent for a parallel hybrid vehicle 

    E-Print Network [OSTI]

    Won, Jong-Seob

    2004-09-30T23:59:59.000Z

    This dissertation proposes an Intelligent Energy Management Agent (IEMA) for parallel hybrid vehicles. A key concept adopted in the development of an IEMA is based on the premise that driving environment would affect fuel ...

  9. Predicting Agent Strategy Mix of Evolving Populations Sabyasachi Saha

    E-Print Network [OSTI]

    Sen, Sandip

    Predicting Agent Strategy Mix of Evolving Populations Sabyasachi Saha Department of Math & Computer Science The University of Tulsa sabyasachi-saha@utulsa.edu Sandip Sen Department of Math & Computer

  10. Distributed multi-agent optimization with state-dependent communication

    E-Print Network [OSTI]

    Lobel, Ilan

    We study distributed algorithms for solving global optimization problems in which the objective function is the sum of local objective functions of agents and the constraint set is given by the intersection of local ...

  11. Autonomous Environment and Task Adaptation for Robotic Agents

    E-Print Network [OSTI]

    Cremers, Daniel

    Autonomous Environment and Task Adaptation for Robotic Agents Michael Beetz and Thorsten Belker of Bonn, Dept. of Computer Science III, Roemerstr. 164, D- 53117 Bonn, Germany, email: ¢ beetz,belker£ @cs

  12. Agent-Based Modeling and Simulation for Hydrogen Transition Analysis

    Broader source: Energy.gov [DOE]

    Presentation on Agent-Based Modeling and Simulation for Hydrogen Transition Analysis given by Marianne Mintz of ANL during the DOE Hydrogen Transition Analysis Workshop on January 26, 2006.

  13. agent sabarubicin men10755: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  14. antitreponemal agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  15. anti-ulcer agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  16. antitussive agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  17. agent pseudozyma flocculosa: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  18. abortifacient agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  19. antilipemic agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  20. antimycobacterial agent tetrahydrolipstatin: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

  1. Risk Allocation for Multi-agent Systems using Tatonnement

    E-Print Network [OSTI]

    Williams, Brian C.

    2009-04-22T23:59:59.000Z

    This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...

  2. Agents in Bioinformatics, Computational and Systems Emanuela Merellia

    E-Print Network [OSTI]

    Luck, Michael

    Agents in Bioinformatics, Computational and Systems Biology Emanuela Merellia , Giuliano Armanob and management in bioinformatics and for systems modelling and simulation in computational and systems biology, Biological Systems Modelling and Simulation, Grid Computing, Semantic Web, Web Services, LIMS, Bioinformatics

  3. agent-based national radioactive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

  4. agent-based sinkhole attack: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

  5. agent-based tumor model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

  6. agent-based national scale: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

  7. agent-based demand model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

  8. agent-based model supported: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  9. agent-based market model: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  10. agent-based model contrasts: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  11. agent-based biological simulation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  12. agent-based models analytical: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  13. agent-based market models: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  14. agent-based modeling methods: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

  15. agente compatibilizante pe-g-ma: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 128 Agent Communication and Cooperative Information Frank Dignum Computer...

  16. afecs multi-agent framework: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 35 Decisiones sociales en Sistemas Multi-Agente Computer Technologies and...

  17. anti-actin agent dihydrohalichondramide: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

  18. albumin-binding paracest agents: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  19. agents n-nitroso-n-ethylurea benzoapyrene: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

  20. anti-angiogenic agents tnp-470: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 140 Agent Communication and Cooperative Information Frank Dignum Computer...

  1. agent tm208 4-methyl-piperazine-1-carbodithioc: Topics by E-print...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 125 Agent Communication and Cooperative Information Frank Dignum Computer...

  2. anti-tumor agent tm208: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

  3. alumino-silicatos como agentes: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 136 Agent Communication and Cooperative Information Frank Dignum Computer...

  4. agent-oriented software engineering: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    P. Ciancarini 1999-01-01 2 Agent-Oriented Software Engineering Report on the 4th Computer Technologies and Information Sciences Websites Summary: Agent-Oriented Software...

  5. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22T23:59:59.000Z

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  6. Solid-water detoxifying reagents for chemical and biological agents

    DOE Patents [OSTI]

    Hoffman, Dennis M. (Livermore, CA); Chiu, Ing Lap (Castro Valley, CA)

    2006-04-18T23:59:59.000Z

    Formation of solid-water detoxifying reagents for chemical and biological agents. Solutions of detoxifying reagent for chemical and biological agents are coated using small quantities of hydrophobic nanoparticles by vigorous agitation or by aerosolization of the solution in the presence of the hydrophobic nanoparticles to form a solid powder. For example, when hydrophobic fumed silica particles are shaken in the presence of IN oxone solution in approximately a 95:5-weight ratio, a dry powder results. The hydrophobic silica forms a porous coating of insoluble fine particles around the solution. Since the chemical or biological agent tends to be hydrophobic on contact with the weakly encapsulated detoxifying solution, the porous coating breaks down and the detoxifying reagent is delivered directly to the chemical or biological agent for maximum concentration at the point of need. The solid-water (coated) detoxifying solutions can be blown into contaminated ventilation ducting or other difficult to reach sites for detoxification of pools of chemical or biological agent. Once the agent has been detoxified, it can be removed by flushing the area with air or other techniques.

  7. Energy conservation technology selection: An agent-based approach

    SciTech Connect (OSTI)

    DeBaillie, L.P.; Nemeth, R.J.; Case, M.P.

    1994-12-31T23:59:59.000Z

    This chapter presents an automation model designed to manage the required data and the calculation of technology ranking criteria such as investment payback, energy savings, and pollution abatement on a national level. The model is under development at the United States Army Construction Engineering Research Laboratories (USACERL) in MicroSoft Windows 3.1 on a personal computer using Designer Software, an agent-based and object-oriented modeling environment. Small rule-based systems called agents evaluate each technology based upon information contained in a shared database called a blackboard. The blackboard contains data such as installation fuel prices, building data, and weather information. Each agent represents a particular energy conservation technology and evaluates the potential of that technology based upon this shared data. The model is constructed in a modular fashion to facilitate the modification and addition of new technologies by adding or modifying agents. A rule-based system applies each agent`s heuristics (rules-of-thumb) and algorithms to produce analysis results. A spreadsheet data link has been implemented to input external data or to output analysis results.

  8. Synthesis and evaluation of modified oximidine analogues as anticancer agents and of terephthalaldehyde-bis-guanylhydrazones as endotoxin sequestering agents

    E-Print Network [OSTI]

    Khownium, Kriangsak

    2009-12-15T23:59:59.000Z

    of the enamide moiety with a stable warhead will allow the discovery of novel anticancer agents with improved pharmacokinetics. We selected three different warheads that are likely to be stable under physiological conditions and that could undergo nucleophilic...

  9. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  10. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01T23:59:59.000Z

    All The Way Down: A Clean-Slate, Ground-Up, First-Principlesintegrity using clean-slate, ground-up techniques involvingsensor results, such as the clean slate solution referred to

  11. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492air Comments? We would love to heargovInstrumentstdma Comments?History Organization Participants Facility

  12. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding Removal OngoingCERCLA Sites Quality Assurance Project

  13. Agent 2003 Conference on Challenges in Social Simulation

    SciTech Connect (OSTI)

    Margaret Clemmons, ed.

    2003-01-01T23:59:59.000Z

    Welcome to the Proceedings of the fourth in a series of agent simulation conferences cosponsored by Argonne National Laboratory and The University of Chicago. Agent 2003 is the second conference in which three Special Interest Groups from the North American Association for Computational Social and Organizational Science (NAACSOS) have been involved in planning the program--Computational Social Theory; Simulation Applications; and Methods, Toolkits and Techniques. The theme of Agent 2003, Challenges in Social Simulation, is especially relevant, as there seems to be no shortage of such challenges. Agent simulation has been applied with increasing frequency to social domains for several decades, and its promise is clear and increasingly visible. Like any nascent scientific methodology, however, it faces a number of problems or issues that must be addressed in order to progress. These challenges include: (1) Validating models relative to the social settings they are designed to represent; (2) Developing agents and interactions simple enough to understand but sufficiently complex to do justice to the social processes of interest; (3) Bridging the gap between empirically spare artificial societies and naturally occurring social phenomena; (4) Building multi-level models that span processes across domains; (5) Promoting a dialog among theoretical, qualitative, and empirical social scientists and area experts, on the one hand, and mathematical and computational modelers and engineers, on the other; (6) Using that dialog to facilitate substantive progress in the social sciences; and (7) Fulfilling the aspirations of users in business, government, and other application areas, while recognizing and addressing the preceding challenges. Although this list hardly exhausts the challenges the field faces, it does identify topics addressed throughout the presentations of Agent 2003. Agent 2003 is part of a much larger process in which new methods and techniques are applied to difficult social issues. Among the resources that give us the prospect of success is the innovative and transdisciplinary research community being built. We believe that Agent 2003 contributes to further progress in computational modeling of social processes, and we hope that you find these Proceedings to be stimulating and rewarding. As the horizons of this transdiscipline continue to emerge and converge, we hope to provide similar forums that will promote development of agent simulation modeling in the years to come.

  14. Intent Recognition in Multi-Agent Systems: Collective Box Pushing and Cow Herding

    E-Print Network [OSTI]

    Ahmad, Najla

    2013-12-31T23:59:59.000Z

    , an agent performing recognition observes the tasks other agents are performing. Unlike the much studied field of plan recognition, the overall intent of an agent is recognized instead of a specific plan. The observing agent may use capabilities that it has...

  15. Active Learning Agents with Artificial Neural Brains Byoung-Tak Zhang

    E-Print Network [OSTI]

    studies on active learning agents are described. In the first case, the agent is a robot arm whose task agents. Here the agent is a robot arm and its brain is a neural network (Zhang 1993]. The objective is to learn to position the joint angles of the robot arm so that its hand reaches the target object. Instead

  16. A Formal Approach for Modeling Software Agents Coordination Lily Chang1

    E-Print Network [OSTI]

    Shatz, Sol M.

    Petri net approach to model the coordination of multi-agent systems. A higher level net (called host net) defines the movements and coordination mechanism of agents, while lower level nets (called agent nets that are tokens of the host net) model the behavior of individual agents. A dynamic channel concept

  17. 4-haloethenylphenyl tropane:serotonin transporter imaging agents

    DOE Patents [OSTI]

    Goodman, Mark M.; Martarello, Laurent

    2005-01-18T23:59:59.000Z

    A series of compounds in the 4-fluoroalkyl-3-halophenyl nortropanes and 4-haloethenylphenyl tropane families are described as diagnostic and therapeutic agents for diseases associated with serotonin transporter dysfunction. These compounds bind to serotonin transporter protein with high affinity and selectivity. The invention provides methods of synthesis which incorporate radioisotopic halogens at a last step which permit high radiochemical yield and maximum usable product life. The radiolabeled compounds of the invention are useful as imaging agents for visualizing the location and density of serotonin transporter by PET and SPECT imaging.

  18. Iron oxide nanoparticles as a contrast agent for thermoacoustic tomography

    E-Print Network [OSTI]

    Keho, Aaron Lopez

    2009-06-02T23:59:59.000Z

    bright region in the image. For PET, contrast agents are a requirement for imaging. Radionucleides, such as gallium 67, mercury 197, and cesium 137, are injected into a subject [43,44]. The contrast agents quickly decay and positrons are emitted...;#1; is the coefficient of volume thermal expansion. This can be rewritten in terms of ()trH , : () () #0;#3;#0;#3;#0;#3; #0;#4;#0;#1; #0;#1; = ' '',' 4 , rr dr t trH C v trp s #0;#2; #0;#5; (2) ()trH , can be further rewritten as the product of a purely...

  19. Intelligent energy management agent for a parallel hybrid vehicle

    E-Print Network [OSTI]

    Won, Jong-Seob

    2004-09-30T23:59:59.000Z

    INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR OF PHILOSOPHY May... 2003 Major Subject: Mechanical Engineering INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR...

  20. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias (Knoxville, TN); Rodriguez, Jr., Miguel (Oak Ridge, TN); Wu, Jie Jayne (Knoxville, TN); Qi, Hairong (Knoxville, TN)

    2012-06-12T23:59:59.000Z

    A water quality analyzer for real-time detection according to the invention comprises a biased AC electro-osmosis (ACEO) cell for receiving a fluid to be analyzed having a plurality photosynthetic organisms therein, and concentrating the plurality photosynthetic organisms into at least one concentrated region. A photodetector is provided for obtaining a measured photosynthetic activity of the plurality of photosynthetic organisms in the concentrated region, wherein chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. An electronics package analyzes the measured photosynthetic activity to indicate a presence of the chemical, biological or radiological agents in the fluid.

  1. Majority-vote model with heterogeneous agents on square lattice

    E-Print Network [OSTI]

    Lima, F W S

    2013-01-01T23:59:59.000Z

    We study a nonequilibrium model with up-down symmetry and a noise parameter $q$ known as majority-vote model of M.J. Oliveira 1992 with heterogeneous agents on square lattice. By Monte Carlo simulations and finite-size scaling relations the critical exponents $\\beta/\

  2. Reasoning about Plan Revision in Agent Programs Natasha Alechina

    E-Print Network [OSTI]

    Fisher, Michael

    and executing a plan a b p Plan(a;b) Natasha Alechina Reasoning about plan revision TIME 2012 5 / 46 #12;WhatReasoning about Plan Revision in Agent Programs Natasha Alechina University of Nottingham, UK TIME 2012, Leicester 14 September 2012 Natasha Alechina Reasoning about plan revision TIME 2012 1 / 46 #12

  3. A Logic of Emotions for Intelligent Agents Bas R. Steunebrink

    E-Print Network [OSTI]

    Dastani, Mehdi

    A Logic of Emotions for Intelligent Agents Bas R. Steunebrink Department of ICS Utrecht University Utrecht, The Netherlands bass@cs.uu.nl Mehdi Dastani Department of ICS Utrecht University Utrecht, The Netherlands mehdi@cs.uu.nl John-Jules Ch. Meyer Department of ICS Utrecht University Utrecht, The Netherlands

  4. W23 The Workshop on Multi-Agent Interaction Networks

    E-Print Network [OSTI]

    Swarup, Samarth

    W23 ­ The Workshop on Multi-Agent Interaction Networks (MAIN 2013) Samarth Swarup (Virginia Tech, USA) Madhav Marathe (Virginia Tech, USA) Stephen Eubank (Virginia Tech, USA) Milind Tambe (University Committee Samarth Swarup, Virginia Tech, USA Madhav Marathe, Virginia Tech, USA Stephen Eubank

  5. Towards Modelling the research in Green IT with Agents

    E-Print Network [OSTI]

    Lefèvre, Laurent

    ­ reliability Now: Green IT and new-Energy consumption ­ energy consumption awareness ­ interestingTowards Modelling the research in Green IT with Agents Christina Herzog, Jean-Marc Pierson, Laurent Lefevre #12;Page 2 Many questions There are many unanswered questions: · Why is Green IT important? What

  6. Soda-anthraquinone lignin sacrificial agents in oil recovery

    SciTech Connect (OSTI)

    Dardis, R. E.

    1985-04-09T23:59:59.000Z

    A supplemental oil recovery method comprising injecting into a subterranean formation a fluid containing soda-anthraquinone lignin which is adsorbed by adsorptive sites therein and functions as a sacrificial agent and thereafter injecting a micellar dispersion containing a surfactant into the subterranean formation to displace the oil contained therein.

  7. Risk management in concurrent engineering in presence of intelligent agents

    E-Print Network [OSTI]

    Fox, Mark S.

    Risk management in concurrent engineering in presence of intelligent agents Taner Bilgi describe how a specific facet of systems engineering (risks) can be managed for large, concurrent with risks. Risk management has three stages to it: 1. Risk assessment 2. Risk analysis 3. Risk handling Risk

  8. Complexity of Equivalence Problems for Concurrent Systems of Finite Agents

    E-Print Network [OSTI]

    Rabinovich, Alexander

    Complexity of Equivalence Problems for Concurrent Systems of Finite Agents Alexander Rabinovich@math.tau.ac.il 1 #12; Running head: Equivalence of Concurrent Systems Mailing address: Alexander Rabinovich that one wants to check whether p ¸ q for one of the commonly used equivalence ¸. We show that this ques

  9. Aspects in Agent-Oriented Software Engineering: Lessons Learned

    E-Print Network [OSTI]

    Aspects in Agent-Oriented Software Engineering: Lessons Learned Alessandro Garcia1 , Uirá Kulesza2 of the crosscutting concerns relative to MASs. This paper reports some lessons learned based on our experience lessons learned based on our experience in applying both aspect-oriented techniques and methods

  10. Peptide functionalized superparamagnetic iron oxide nanoparticles as MRI contrast agents

    E-Print Network [OSTI]

    Atalar, Ergin

    of water molecules in different tissues create distinct signal intensities that enable detection of abnormal tissues.2 MRI uses radiofrequency in a magnetic field as source of radiation which has no harmful contrast. There are numerous types of contrast agents on the market and gadolinium (Gd3+ ) based CAs

  11. Genetic Network Programming based Rule Accumulation for Agent Control

    E-Print Network [OSTI]

    Fernandez, Thomas

    1 Genetic Network Programming based Rule Accumulation for Agent Control Lutao WANG 2013, THEN Genetic Network Programming with Rule Accumulation(GNP-RA)GNP GNP-RA GNP GNP-RAGNP-RA GNP with Multi-Order Rule Accumulation(GNP-MRA), GNP with Rule Accumulation and Pruning(GNP-RAP), GNP

  12. adaptive agent architecture: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    adaptive agent architecture First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 An Adaptive Plan-Based...

  13. An Intelligent Software Agent Framework for Decision Support Systems Development

    E-Print Network [OSTI]

    Moraitis, Pavlos

    specialists and the mediation between users and artificial agents, in order to allow users to control of a complex system through multiple layers proposed in control theory Mesarovic et al. (1970). Therefore a methodological point of view, we believe that this consideration facilitates the conception and the design

  14. Dimensions of Usability: Cougaar, Aglets and Adaptive Agent Architecture (AAA)

    SciTech Connect (OSTI)

    Haack, Jereme N.; Cowell, Andrew J.; Gorton, Ian

    2004-06-20T23:59:59.000Z

    Research and development organizations are constantly evaluating new technologies in order to implement the next generation of advanced applications. At Pacific Northwest National Laboratory, agent technologies are perceived as an approach that can provide a competitive advantage in the construction of highly sophisticated software systems in a range of application areas. An important factor in selecting a successful agent architecture is the level of support it provides the developer in respect to developer support, examples of use, integration into current workflow and community support. Without such assistance, the developer must invest more effort into learning instead of applying the technology. Like many other applied research organizations, our staff are not dedicated to a single project and must acquire new skills as required, underlining the importance of being able to quickly become proficient. A project was instigated to evaluate three candidate agent toolkits across the dimensions of support they provide. This paper reports on the outcomes of this evaluation and provides insights into the agent technologies evaluated.

  15. Review Article Polymers and Gels as Molecular Recognition Agents

    E-Print Network [OSTI]

    Peppas, Nicholas A.

    -responsive hydrogels (10). These hydro- gels are semi-interpenetrating polymer networks with complementary antibodyReview Article Polymers and Gels as Molecular Recognition Agents Nicholas A. Peppas1,2,3 and Yanbin Huang1 Received December 7, 2001; accepted February 6, 2002 Synthetic polymers and gels capable

  16. Ubiquitous Media Agents for Managing Personal Multimedia Files

    E-Print Network [OSTI]

    Liu, Wenyin

    1 Ubiquitous Media Agents for Managing Personal Multimedia Files Liu Wenyin, Zheng Chen, Fan Lin personalized semantic indices of multimedia data on behalf of the user whenever and wherever he/she accesses/uses these multimedia data. The sources of these semantic descriptions are the textual context of the same documents

  17. Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution

    E-Print Network [OSTI]

    Security Patterns Meet Agent Oriented Software Engineering: A Complementary Solution for Developing Secure Information Systems Haralambos Mouratidis1 , Michael Weiss2 , and Paolo Giorgini3 1 School Software Engineering and security patterns have been proposed as suitable paradigms for the development

  18. Creating an intelligent agent for StarCraft: Brood War

    E-Print Network [OSTI]

    Ernst, Damien

    Creating an intelligent agent for StarCraft: Brood War University of Liège Faculty of Applied artificialintelligence (AI)? Video games Why real-time strategy (RTS) games? Introduction #12;StarCraft: Brood War a patrol unit #12;Implementation Chapter III #12;StarCraft is not open source! The Brood War Application

  19. Designing Human Benchmark Experiments for Testing Software Agents

    E-Print Network [OSTI]

    Perry, Dewayne E.

    Designing Human Benchmark Experiments for Testing Software Agents Robert D. Grant, David De quizzes and tests and qualitative data through observation. Results: Though we collect quantitative data" curricula in controlled experi- ments. We aimed to produce lessons and tests on which human students who

  20. Outcomes/Impacts Our Ag Agent established a monitoring system

    E-Print Network [OSTI]

    Florida, University of

    Outcomes/Impacts · Our Ag Agent established a monitoring system and educational outreach to area farms to track and manage an emerging insect threat to county berry crops. · As a result of County preservation, nutrition and wellness as well as energy and housing and specific programs to meet the needs