National Library of Energy BETA

Sample records for rsa authentication agent

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability T-704: RSA enVision Lets Remote Users View Files and Remote...

  2. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass...

  3. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft...

  4. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

  5. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...

    Broader source: Energy.gov (indexed) [DOE]

    Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions prior to 5.3.5 RSA PAM...

  6. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematics And Statistics » USAJobs Search USAJobs SearchWater-Saving Projects1:Department

  7. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    Cross-Site Scripting Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs...

  8. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Environmental Management (EM)

    were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT ASSESSMENT: Medium DISCUSSION: A...

  9. T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID

    Broader source: Energy.gov [DOE]

    RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

  10. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsersSUSE

  11. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  12. 2012-2013 Keywords: Routing and spectrum allocation (RSA), flexible optical networks

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    , "Conserving Transmission Power in Wireless Ad Hoc Networks" #12;), flexible optical networks WDM (FWDM) . (RSA) (RWA). FWDM Matlab. 2: Keywords: Routing and spectrum allocation (RSA), flexible optical networks

  13. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions...

  14. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory...

  15. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...

    Office of Environmental Management (EM)

    EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

  16. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  17. 2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED

    E-Print Network [OSTI]

    Sumii, Eijiro

    2010/9/9 17:35-18:25RSA Conference Japan 20101 SECURITY DECODED ID: WH004 #12;2010/9/9 17:35-18:25RSA Conference Japan 20102 ­ ­ #12;2010/9/9 17:35-18:25RSA Conference Japan 20103 PC 17 20054 400 200512 ATM2 20085 15 20096 255 #12;2010/9/9 17:35-18:25RSA Conference Japan 20104

  18. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  19. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  20. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num- ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  1. Parallel FPGA Implementation of RSA with Residue Number Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Multiplication based on Residue Num­ ber Systems. Thanks to RNS, we develop a design able to perform an RSA propose a new DPA countermeasure in the framework of RNS. It is only (slightly) memory consuming (1]. That is the reason why Residue Number Systems (RNS for short) can be very useful. RNS have the main advantage of fast

  2. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting

  3. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password |

  4. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCED MANUFACTURINGEnergyPlan | Department ofSUPPLEMENTSwitzerland|of Energy

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutoryin theNuclearEnergy UtilityDepartmentV-138: Red HatLet

  6. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommandsEnergy

  7. Universal Padding Schemes for RSA Jean-S ebastien Coron, Marc Joye, David Naccache, and Pascal Paillier

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Universal Padding Schemes for RSA Jean-S#19;ebastien Coron, Marc Joye, David Naccache, and Pascal-sebastien.coron, marc.joye, david.naccache, pascal.paillierg@gemplus.com Abstract. A common practice to encrypt with RSA

  8. Generating RSA Keys on a Handheld Using an Untrusted Server Nagendra Modadugu Dan Boneh Michael Kim

    E-Print Network [OSTI]

    Boneh, Dan

    Ćciently generate RSA keys on a low power handheld device with the help of an untrusted server. Most of the key power handheld device is somewhat problematic. For example, generating a 1024 bit RSA signature life time is a concern. Consider a user who is given a new cellphone application while traveling

  9. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Broader source: Energy.gov (indexed) [DOE]

    Allows remote attackers to obtain sensitive information by sniffing the network or leveraging access to a recipient mailbox. PLATFORM: RSA enVision Version(s): 3.x, 4.x ABSTRACT:...

  10. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  11. Security analysis of RSA cryptosystem algorithm and it’s properties

    SciTech Connect (OSTI)

    Liu, Chenglian; Guo, Yongning E-mail: linjuanliucaihong@qq.com; Lin, Juan E-mail: linjuanliucaihong@qq.com

    2014-10-06

    The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

  12. V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of ElectricScripting AttacksDepartment

  13. The Security of all RSA and Discrete Log Bits JOHAN HASTAD

    E-Print Network [OSTI]

    Hĺstad, Johan

    and Phrases: Cryptography, complexity, RSA-encryption, bit-security, discrete logarithms 1. INTRODUCTION What applying a natural one-way function. In fact, any deterministic, public-key crypto system must leak some of Technology, SE-100 44 Stockholm, Sweden. Mats N¨aslund. Communicatons Security Lab, Ericsson Research, SE-164

  14. Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Arithmetic on ARM-NEON and Its Application for High-Speed RSA Implementation Hwajeong Seo-AVX, ARM-NEON) and a massive body of research on vector-parallel implementations of modular arithmetic. Keywords: Public-key cryptography, Modular arithmetic, SIMD-level parallelism, Vector instructions, ARM

  15. SPA-based attack against the modular reduction within a partially secured RSA-CRT implementation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Differential Power Analysis like in [2] and Differential Fault Analysis like in [3], in a secured RSA-CRT implementation on smartcards, p and q are multiplied by a secret random integer z. Then )(mod zpx is calculated a side channel leaks the integral quotient )( zpxs = during the reduction of x modulo zp

  16. NISTIR 7863 Cardholder Authentication for the

    E-Print Network [OSTI]

    NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk Hildegard.IR.7863 #12;NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk

  17. An Approach Towards Rebalanced RSA-CRT with Short Public Hung-Min Sun and Mu-En Wu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    An Approach Towards Rebalanced RSA-CRT with Short Public Exponent Hung-Min Sun and Mu-En Wu. It is not only built into several operating systems, like Microsoft, Apple, Sun, and Novell, but is also used

  18. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  19. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  20. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  1. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  2. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  3. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  4. Instructions for Using Two-Factor RSA Tokens with Citrix Workplace |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuelsof EnergyApril 2014 | DepartmentDepartment of Energy Two-Factor RSA

  5. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposals duenationalMeetingFAQs05-2010

  6. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  7. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  8. CLOC: Authenticated Encryption for Short Input Tetsu Iwata1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

  9. Site Sustainability Plan An Authentic Commitment

    E-Print Network [OSTI]

    #12;#12;Contents Site Sustainability Plan An Authentic Commitment Contents Acronyms and Abbreviations iv Executive Summary v Greenhouse Gas 1 Energy 6 High Performance Sustainable Buildings 9 Fleet 11 Water 13 Pollution Prevention 15 Sustainable Acquisition 19 Electronic Stewardship and Data Centers 20

  10. Massachusetts Institute of Technology Identification and Authentication

    E-Print Network [OSTI]

    Circuits Blaise Gassend, Dwaine Clarke, Daihyun Lim, Marten van Dijk, Srini Devadas To appear and Authentication of Integrated Circuits Blaise Gassend1, Dwaine Clarke1, Daihyun Lim1 Marten van Dijk2, Srinivas. VAN DIJK, S. DEVADAS However, with these techniques, the focus is simply on assigning a unique

  11. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  12. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  13. Lightweight Message Authentication for the Internet of

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Lightweight Message Authentication for the Internet of Things RIKARD HÖGLUND KTH ROYAL INSTITUTE for the Internet of Things Rikard Höglund 2014-11-24 Master's Thesis Examiner and academic adviser Professor Gerald capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario

  14. V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics of Electric SystemRemote Authenticated

  15. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  16. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  17. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  18. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  19. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  20. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method

  1. A Two-factor Authentication Mechanism Using Mobile Phones

    E-Print Network [OSTI]

    -03 Last Modification Date: 2008/08/20 Abstract Mobile devices are becoming more pervasive and more of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second

  2. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  3. Agents on the Web Agent Societies

    E-Print Network [OSTI]

    Huhns, Michael N.

    Agents on the Web Agent Societies Magnitude and Duration I f you only need agents to search the Web for cheap CDs, scalability is not an issue. The Web can support numerous agents if each acts inde- pendently and deploy such services. In this installment of "Agents on the Web," I'll take a look at the critical

  4. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  5. Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor

    E-Print Network [OSTI]

    Ning, Peng

    their battery power. This paper studies how to deal with such DoS attacks when signatures are used for broadcast types of solutions for broadcast authentication in sensor networks, µTESLA [19] and digital signature [5]. µTESLA and its variations achieve broad- cast authentication through delayed disclosure of authenti

  6. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    . Authentication tags allow to separate the secrecy Corresponding author. 1 #12;problem in message transmission

  7. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  8. Does Future Social Exclusion have an Effect on State Authenticity

    E-Print Network [OSTI]

    Wilson, Craig Frank

    2010-06-30

    Previous research on social exclusion has found that it has many social and personal consequences, such as disrupting self-regulation, and lowering well-being, self-esteem and the need to belong. However, authenticity is ...

  9. Investigating the Effect of Social Exclusion on State Authenticity 

    E-Print Network [OSTI]

    Wilson, Poppy F

    2010-05-30

    This study examines the effect of social exclusion on state authenticity, the extent to which one feels real and true to the self in different situations. In addition to this, the effect of social exclusion on basic need ...

  10. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  11. Authenticated writing assessments of agricultural education graduate students 

    E-Print Network [OSTI]

    Wright, Kimberly Dawn

    2004-11-15

    -1 AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2004 Major Subject: Agricultural Education AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to Texas A...

  12. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  13. Distributed Agent Search Efficiency 

    E-Print Network [OSTI]

    Murray, Christopher C

    2014-09-19

    Multi-agent systems where there exists a group of agents all working towards the same goal are gaining increased focus. One subset of these systems is groups of agents who have intermittent communication with one another. In an environment...

  14. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  15. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  16. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2

  17. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  18. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  19. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  20. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  1. Efficient authentication mechanisms for navigation systems a radio-navigation case

    E-Print Network [OSTI]

    Stanford University

    upon the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) algorithm. We analyze and a detailed security analysis of the needed key size, we developed adjusted TESLA, an authentication can use such a small authentication message is due to the insertion of a timestamp into the generation

  2. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  3. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  4. Artificial Intelligence Intelligent Agents

    E-Print Network [OSTI]

    Voris, Jonathan

    CS W4701 Artificial Intelligence Fall 2013 Chapter 2: Intelligent Agents Jonathan Voris (based, Environment, Actuators, Sensors) · Environment types · Agent types #12;Agents · An agent is anything that can be viewed as perceiving its environment through sensors and acting upon that environment through actuators

  5. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy| Department ofAttacks | DepartmentCode

  6. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  7. On the Authentication of RFID Systems with Bitwise Operations

    E-Print Network [OSTI]

    Poovendran, Radha

    On the Authentication of RFID Systems with Bitwise Operations Basel Alomair Network Security Lab secure authenti- cation via bitwise operations. Following each proposal, a series of papers have been. We divide bitwise operations into two main categories and address the security limitations of each

  8. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  9. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  10. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  11. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  12. KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS

    E-Print Network [OSTI]

    Pâris, Jehan-François

    consists of a Kerberos server and a ticket-granting server (TGS). Once users are authenticated by Kerberos, they receive a TGS ticket. This ticket will allow them to request from the TGS tickets for all the other servers. Kerberos keeps keys for (a) all the system users and (b) the ticket-granting server (TGS

  13. Authenticated Multicast Immune to DenialofService Shouhuai Xu

    E-Print Network [OSTI]

    Xu, Shouhuai

    using Merkle signature tree to tolerate packet loss. Although the cost for generating and verifying for each signature. Perrig et al. [13] propose a solution they call TESLA. The main idea is to let to authenticate the bu#11;ered packet. Although some of the shortcomings of TESLA are overcome in their following

  14. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  15. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  16. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probabili* *ty of the same systems is retained up top___ #G authenticated messages. In a typical state

  17. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probability of the same systems is retained up top___ #G authenticated messages. In a typical state

  18. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  19. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  20. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  1. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  2. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  3. Ninja : Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

    E-Print Network [OSTI]

    Mitchell, Chris

    authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity, Ubiquitous, Trusted Computing. 1 Introduction In the Mobile VCE1 Core 4 research programme on Ubiquitous User ? IP Backbone? Pervasive User Environment WiMAX Bluetooth Fig. 1. A Ubiquitous Computing

  4. Agents on the Web Making Agents

    E-Print Network [OSTI]

    Huhns, Michael N.

    Agents on the Web Making Agents Secure on the Semantic Web A re you one of those people who never shops on the Web for fear of fraud? Does the thought of online banking make you antsy? Do you get -- some of your concerns are indeed well founded. With the rapid development of Web technologies

  5. Designing Intelligent Agents Tutorial 1: Java Agent Package

    E-Print Network [OSTI]

    Alechina, Natasha

    G54DIA: Designing Intelligent Agents Tutorial 1: Java Agent Package Natasha Alechina School agent package(s) · agent toolkits · uk.ac.nott.cs.g54dia Java agent packages ­library package ­demo package © Brian Logan 2013 G54DIA Tutorial 1: Java Agent Package 2 #12;Implementing your agent · many

  6. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  7. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  8. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  9. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  10. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  11. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  12. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  13. The Information Agent: An Infrastructure Agent Supporting Collaborative Enterprise Architectures

    E-Print Network [OSTI]

    Fox, Mark S.

    of the Informa- tion Agent, describe an architecture based on an Agent Program and a Knowledge Management System Agents (IAs) are agentified [15] knowledge and data management systems that allow other agents from components: an Agent Program and a Knowledge Management System (fig. 1). FIGURE 1. Architecture

  14. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  15. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  16. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  17. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  18. Information Theoretic Bounds on Authentication Systems in Query Reihaneh Safavi-Naini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  19. Information Theoretic Bounds on Authentication Systems in Query Reihaneh SafaviNaini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi­Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  20. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  1. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  2. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  3. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  4. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  5. Improving Design with Agents, Improving Agents by Design

    E-Print Network [OSTI]

    Brown, David C.

    DCB 1 WPI Improving Design with Agents, or, Improving Agents by Design David C. Brown AI in Design ASSUMPTION Ă? Assume that the design environment is built using agents. i.e., situated, autonomous, flexible Ă?'s future design and synthesis environment will be built as a real multi-agent system. In what follows, we

  6. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  7. Agent Technology: Enabling Next Generation Computing

    E-Print Network [OSTI]

    Luck, Michael

    Agent Technology: Enabling Next Generation Computing A Roadmap for Agent Based Computing MichaelTechnology:ARoadmapLuck,McBurney&PreistAgentLink #12;i AgentLink Roadmap Agent Technology: Enabling Next Generation Computing A Roadmap for Agent, Peter McBurney and Chris Preist Agent Technology: Enabling Next Generation Computing A Roadmap for Agent

  8. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  9. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  10. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  11. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Herv´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined

  12. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  13. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity 

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  14. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  15. The Role of Psychological Needs for Autonomy, Competence, Relatedness and Money-luxury in State Authenticity 

    E-Print Network [OSTI]

    Renwick, Louisa Catherine

    2009-07-03

    This study aimed to determine the effects of psychological needs on states of authenticity. Self-determination theory proposes three basic psychological needs, for autonomy, competence and relatedness (Deci & Ryan, 1985). ...

  16. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  17. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  18. Authenticity as a state; its mediating relationship between mood and wellbeing, and the role of self-consciousness 

    E-Print Network [OSTI]

    Ames, Sophie

    2009-07-03

    State versus trait: the experiment explored the dichotomy in personality theory by investigating whether judgements of authenticity were susceptible to different mood conditions. Life satisfaction and self consciousness ...

  19. Flexible, secure agent development framework

    DOE Patents [OSTI]

    Goldsmith; Steven Y. (Rochester, MN)

    2009-04-07

    While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

  20. AREA OVERVIEW----Agent & Data Mining Interaction

    E-Print Network [OSTI]

    Cao, Longbing

    AREA OVERVIEW---- Agent & Data Mining Interaction (ADMI) Longbing Cao Faculty of Information in a Multiple Agent Environment", EWSL91, 1991 Agent-based data mining & knowledge discovery by Davies, W., 1994 Research topics Agent driven data mining Data mining driven agents & multi- agent systems Mutual issues

  1. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  2. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  3. 29.01.03.M1.14 Information Resources Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    Behmer, Spencer T.

    29.01.03.M1.14 Information Resources ­ Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.14 Information Resources ­ Password-based Authentication Approved July 18 authentication is a means to control who has access to an information resource system. Controlling the access

  4. Plasmids encoding therapeutic agents

    DOE Patents [OSTI]

    Keener, William K. (Idaho Falls, ID)

    2007-08-07

    Plasmids encoding anti-HIV and anti-anthrax therapeutic agents are disclosed. Plasmid pWKK-500 encodes a fusion protein containing DP178 as a targeting moiety, the ricin A chain, an HIV protease cleavable linker, and a truncated ricin B chain. N-terminal extensions of the fusion protein include the maltose binding protein and a Factor Xa protease site. C-terminal extensions include a hydrophobic linker, an L domain motif peptide, a KDEL ER retention signal, another Factor Xa protease site, an out-of-frame buforin II coding sequence, the lacZ.alpha. peptide, and a polyhistidine tag. More than twenty derivatives of plasmid pWKK-500 are described. Plasmids pWKK-700 and pWKK-800 are similar to pWKK-500 wherein the DP178-encoding sequence is substituted by RANTES- and SDF-1-encoding sequences, respectively. Plasmid pWKK-900 is similar to pWKK-500 wherein the HIV protease cleavable linker is substituted by a lethal factor (LF) peptide-cleavable linker.

  5. On Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovic

    E-Print Network [OSTI]

    Cipolla, Roberto

    . This is due to the fact that a thermal infrared sensor measures the heat energy radiation emitted by the faceOn Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovi´c Riad in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often

  6. Efficient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef- ficient than

  7. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  8. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    E-Print Network [OSTI]

    Nahrstedt, Klara

    malicious attacks. In this paper, we propose a novel signature model ­ Time Valid One-Time Signature (TVTime Valid One-Time Signature for Time-Critical Multicast Data Authentication Qiyan Wang, Himanshu-OTS) ­ to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design

  9. Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin Kupcu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential

  10. RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot

    E-Print Network [OSTI]

    Rajpoot, Nasir

    RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot Dept. of Computer Science transform. The signature is extracted from the Radon domain and entropy coded after a 1D wavelet transform- derlying Radon transform plays an essential role in provid- ing such non-separable, directional properties

  11. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  12. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  13. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  14. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  15. April 11, 2002 Computer Security Foundations Workshop 1 Security Protocol Design via Authentication Tests

    E-Print Network [OSTI]

    Guttman, Joshua

    process, and illustrate its use by creating ATSPECT, an Authentication Test-based Se- cure Protocol a basis for secure electronic commerce. It is not currently in use anywhere, presumably partly it was viewed as a high-risk un- Supported by the National Security Agency through US Army CE- COM contract DAAB

  16. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis1|francois.koeune|olivier.bonaventure|jean-jacques.quisquater}@uclouvain.be Abstract. In wireless roaming a mobile device obtains a service from some foreign network while being. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security

  17. A Lightweight Certificate-based Source Authentication Protocol for Group Communication

    E-Print Network [OSTI]

    Baras, John S.

    of lightweight, symmetric-key certificates called TESLA certificate. The certificates bind the identities and verification frequently can prevent the CPU from other functions and drain the battery quickly. Therefore resources. We propose to achieve authentication using a new class of certificates called TESLA Certificate

  18. Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location

    E-Print Network [OSTI]

    Ottawa, University of

    18 Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure

  19. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  20. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation

    E-Print Network [OSTI]

    Bicego, Manuele

    Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz (Italy) tista@uniss.it Abstract. Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure

  1. Nuclear magnetic resonance contrast agents

    DOE Patents [OSTI]

    Smith, P.H.; Brainard, J.R.; Jarvinen, G.D.; Ryan, R.R.

    1997-12-30

    A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC{sub 16}H{sub 14}N{sub 6}. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques. 10 figs.

  2. Nuclear magnetic resonance contrast agents

    DOE Patents [OSTI]

    Smith, Paul H. (Los Alamos, NM); Brainard, James R. (Los Alamos, NM); Jarvinen, Gordon D. (Los Alamos, NM); Ryan, Robert R. (Los Alamos, NM)

    1997-01-01

    A family of contrast agents for use in magnetic resonance imaging and a method of enhancing the contrast of magnetic resonance images of an object by incorporating a contrast agent of this invention into the object prior to forming the images or during formation of the images. A contrast agent of this invention is a paramagnetic lanthanide hexaazamacrocyclic molecule, where a basic example has the formula LnC.sub.16 H.sub.14 N.sub.6. Important applications of the invention are in medical diagnosis, treatment, and research, where images of portions of a human body are formed by means of magnetic resonance techniques.

  3. A preliminary version of this paper appears in Topics in Cryptology --CT-RSA '08, Lecture Notes in Computer Science Vol. ??, T. Malkin ed., Springer-Verlag, 2008. This is the full version.

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    : Standard Model Efficiency through Authenticated Symmetric Encryption Eike Kiltz1 Yevgeniy Vahlis2 1 Cryptology and Information Security Theme, CWI Amsterdam, The Netherlands kiltz@cwi.nl 2 Computer Science in the standard model, yet they offer performance competitive with all known random-oracle based schemes

  4. Triggered pore-forming agents

    DOE Patents [OSTI]

    Bayley, Hagan (Grafton, MA); Walker, Barbara J. (Auburn, MA); Chang, Chung-yu (Worcester, MA); Niblack, Brett (Nashville, TN); Panchal, Rekha (Shrewsbury, MA)

    1998-01-01

    An inactive pore-forming agent which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell.

  5. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  6. Next Generation Magnetic Resonance Imaging Contrast Agents

    E-Print Network [OSTI]

    Klemm, Piper Julia

    2012-01-01

    and environmental impact of Fe make it a promising candidate for more sustainable contrast agent development.

  7. Introductory Notes on AgentIntroductory Notes on Agent--Based Modeling,Based Modeling, AgentAgent--Oriented Programming, & AMESOriented Programming, & AMES

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    ,...) - Physical entities (weather, landscape, electric grids,...) #12;5 Partial depiction of agents

  8. Lazy Agent Replication and Asynchronous Consensus for the FaultTolerant Mobile Agent System

    E-Print Network [OSTI]

    Yeom, Heon Young

    be processed with the replica migration. The primary should wait for the replica migration only when any, a primary agent and k agent replicas are used for the alternative execution in case of the primary failure the consensus agents, execution of the primary agent and consensus with the consensus agents can asynchronously

  9. Nucleotide cleaving agents and method

    DOE Patents [OSTI]

    Que, Jr., Lawrence (Roseville, MN); Hanson, Richard S. (Falcon Heights, MN); Schnaith, Leah M. T. (Redwing, MN)

    2000-01-01

    The present invention provides a unique series of nucleotide cleaving agents and a method for cleaving a nucleotide sequence, whether single-stranded or double-stranded DNA or RNA, using and a cationic metal complex having at least one polydentate ligand to cleave the nucleotide sequence phosphate backbone to yield a hydroxyl end and a phosphate end.

  10. Triggered pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.; Chang, C.Y.; Niblack, B.; Panchal, R.

    1998-07-07

    An inactive pore-forming agent is revealed which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell. 30 figs.

  11. Travel Agent Participation in Biosecurity Awareness

    E-Print Network [OSTI]

    . The show has increased knowledge for a large proportion (75%) of travel agents and also influenced variation in mean response between 2002 and 2004. There is a tendency for agents to be less ambivalent

  12. Mobile Agent Abstractions: Formulation and Implementation

    E-Print Network [OSTI]

    Joshi, Rushikesh K.

    , Mumbai-400076, India. Email := {rkj, harikcr, ansari}@cse.iitb.ac.in Abstract We present mobile agent and behavioral properties of the agent abstractions. Guidelines for mapping the abstractions to an implementation

  13. Modeling emotion dynamics in intelligent agents 

    E-Print Network [OSTI]

    Seif El-Nasr, Magy

    1998-01-01

    Emotions were shown to have a leading role in the human decision-making process, and thus they play an important role in human intelligence. Intelligent agents' research produced many models of emotional agents. However, most of these models focused...

  14. Chelating agents for technetium-99M

    DOE Patents [OSTI]

    Fritzberg, A.R.; Kasina, S.

    1987-06-02

    The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

  15. Hydroxypyridonate chelating agents and synthesis thereof

    DOE Patents [OSTI]

    Raymond, K.N.; Scarrow, R.C.; White, D.L.

    1985-11-12

    Chelating agents having 1-hydroxy-2-pyridinone (HOPO) and related moieties incorporated within their structures, including polydentate HOPO-substituted polyamines such as spermidine and spermine, and HOPO-substituted desferrioxamine. The chelating agents are useful in selectively removing certain cations from solution, and are particularly useful as ferric ion and actinide chelators. Novel syntheses of the chelating agents are provided. 4 tabs.

  16. Normative Communication Models for Agent Error Messages

    E-Print Network [OSTI]

    Elio, Renée

    . Introduction Defining and standardizing a high level language for agent communication has been a cornerstone as ``application programs which communicate with peers by exchanging messages in an expressive agent communication (FIPA)'s ACL [17] are two proposed ACL standards that have been widely adopted in agent re- search

  17. Sex Work in Second Life: Scripts, presence, and Bounded Authenticity in a Virtual Environment

    E-Print Network [OSTI]

    Lynch, Michael J.

    2010-01-01

    from the Internet of 1994. Conclusion $V#3;ŔHGJOLQJ#3; WHFKQRORJLHV#3; RI#3; WKH#3; SDVW#3; KDYH#3; RIWHQ#3; EHHQ#3;żUVW#3; exploited for sexual purposes4, an argument could be made that 4#3;6XFK#3;DV#3;KRZ#3;WKH#3;żUVW#3;PRYLQJ#3... signal a heightened sense of intimacy and is a premium feature of virtual sex as an erotic service. These żQGLQJV#3;SURYLGH#3;IXUWKHU#3;HYLGHQFH#3;IRU#3;%HUQVWHLQ¶V#3;QRWLRQ#3;RI#3;ERXQGHG#3; authenticity, as virtual sex is a...

  18. Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining

    E-Print Network [OSTI]

    Atkinson, Katie

    Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining Santhana Chaimontree, Katie.Chaimontree, katie, Coenen}@liverpool.ac.uk Abstract. A framework for Multi Agent Data Mining (MADM) is de- scribed. The framework comprises a collection of agents cooperating to address given data mining tasks. The fundamental

  19. Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining

    E-Print Network [OSTI]

    Coenen, Frans

    Multi-Agent Based Clustering: Towards Generic Multi-Agent Data Mining Santhana Chaimontree, Katie.Chaimontree,katie,Coenen}@liverpool.ac.uk Abstract. A framework for Multi Agent Data Mining (MADM) is de- scribed. The framework comprises a collection of agents cooperating to address given data mining tasks. The fundamental concept underpinning

  20. Dynamic Economy with Heterogeneous Agents 

    E-Print Network [OSTI]

    Peng, Yulei

    2013-08-06

    [32], based on US data, show that compared with high income households, low income families use cash for a higher fraction of their total consumptions. By using the cash-in-advance model, Wen[85] shows that if the annual in ation rate is 10...%, households would like to recrease up to 15% of average con- sumption an annual year in order to obtain the Friedman rule in ation rate, which is signi cantly bigger than that of with considering homogeneous agents (Lucas [66]). Therefore, the heterogeneity...

  1. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  2. Business Models Guide: Real Estate Agent

    Broader source: Energy.gov [DOE]

    With excellent marketing skills, a keen understanding of financing options, and a broad knowledge of the industry, real estate agents are natural advocates for smart energy efficiency upgrades.

  3. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  4. INFORMATION TECHNOLOGY SERVICES CRM Agent Training

    E-Print Network [OSTI]

    McQuade, D. Tyler

    INFORMATION TECHNOLOGY SERVICES CRM Agent Training Assigning an agent to a case Service Management case, select the case number. INFORMATION TECHNOLOGY SERVICES #12;3 5. When the case page has opened TECHNOLOGY SERVICES #12;4 7. Select the appropriate provider group. INFORMATION TECHNOLOGY SERVICES #12;5 8

  5. INFORMATION TECHNOLOGY SERVICES CRM Agent Training

    E-Print Network [OSTI]

    McQuade, D. Tyler

    INFORMATION TECHNOLOGY SERVICES CRM Agent Training Creating a Case Service Management Deployment Request. An agent can change the INFORMATION TECHNOLOGY SERVICES #12;3 type to reflect the type of case of the provider group field. INFORMATION TECHNOLOGY SERVICES #12;4 Selecting the magnifying glass will open

  6. Improving Air Traffic Management through Agent Suggestions

    E-Print Network [OSTI]

    Tumer, Kagan

    air traffic flow problem (de- scribed in [4]). 2. SUGGESTION AGENTS Though the system performanceImproving Air Traffic Management through Agent Suggestions (Extended Abstract) Adrian Agogino USCS.tumer@oregonstate.edu ABSTRACT Providing intelligent automation to manage the continu- ously increasing flow of air traffic

  7. Programmable Agents for Active Distributed Monitoring

    E-Print Network [OSTI]

    Wang, Yongge

    distributed throughout the environment. This makes monitoring an intricate task and complicates the managementProgrammable Agents for Active Distributed Monitoring Ehab S. Al-Shaer Multimedia Networking and describes a programmable agents ap- proach for active monitoring as an important attribute for supporting

  8. Learning Communication for Multi-agent Systems

    E-Print Network [OSTI]

    Giles, C. Lee

    Learning Communication for Multi-agent Systems C. Lee Giles1,2 and Kam-Chuen Jim2 1 School the hard-coded predators, which indicates that the system was able to learn superior communicating. While many researchers have shown the emergence of beneficial communication in multi-agent systems, very

  9. INTELLIGENT AGENT FOR AIRCRAFT COLLISION AVOIDANCE

    E-Print Network [OSTI]

    Valasek, John

    Aerospace EngineeringShandy & Valasek PROJECT BACKGROUND agent based hierarchy Weather Agent detect Data ADS-B Ground Weather Service Other Weather Information ATC Radar Other Traffic Information #12 Full authority for the pilot Automatic Data Surveillance-Broadcast (ADS-B) as the future of traffic

  10. Intelligent agent for aircraft collision avoidance 

    E-Print Network [OSTI]

    Shandy, Surya Utama

    2002-01-01

    instrument flight rules and choose their own flight path and speed in real time. One of the requirements to make the free flight environment feasible is an aircraft collision avoidance agent, also known as a traffic agent. One widely accepted concept...

  11. Agent-Based Control of Thermostatic Joseph Engler

    E-Print Network [OSTI]

    Kusiak, Andrew

    evolutionary agents as control mechanisms as well as a case study of agent- based control of residential water water heater. The remainder of the paper is organized as follows. Section 2 describes the control agents the agents to control a residential water heater. Finally, Section 5 offers concluding remarks. 2. Agent

  12. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, E.T.

    1985-06-11

    This invention relates to the production of metal-binding compounds useful for the therapy of heavy metal poisoning, for biological mining and for decorporation of radionuclides. The present invention deals with an orderly and effective method of producing new therapeutically effective chelating agents. This method uses challenge biosynthesis for the production of chelating agents that are specific for a particular metal. In this approach, the desired chelating agents are prepared from microorganisms challenged by the metal that the chelating agent is designed to detoxify. This challenge induces the formation of specific or highly selective chelating agents. The present invention involves the use of the challenge biosynthetic method to produce new complexing/chelating agents that are therapeutically useful to detoxify uranium, plutonium, thorium and other toxic metals. The Pseudomonas aeruginosa family of organisms is the referred family of microorganisms to be used in the present invention to produce the new chelating agent because this family is known to elaborate strains resistant to toxic metals.

  13. Proactive communication in multi-agent teamwork 

    E-Print Network [OSTI]

    Zhang, Yu

    2007-04-25

    Sharing common goals and acting cooperatively are critical issues in multiagent teamwork. Traditionally, agents cooperate with each other by inferring others' actions implicitly or explicitly, based on established norms ...

  14. Compositional evaluation of asphalt binder recycling agents 

    E-Print Network [OSTI]

    Madrid, Richard Charles

    1997-01-01

    new asphalt binder. The high temperature Superpave TM Performance Grade (PG) specifications for recycled asphalt binders were found to be highly dependent on the aged asphalt. In addition, as the amount of saturates in the aromatic recycling agent...

  15. A Secure Modular Mobile Agent System

    E-Print Network [OSTI]

    Julien, Christine

    and Christine Julien The Center for Excellence in Distributed Global Environments The Department of Electrical the system will not be malicious and that any agents which are mali- cious can be identified and contained

  16. Precursors to radiopharmaceutical agents for tissue imaging

    DOE Patents [OSTI]

    Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

    1988-01-01

    A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

  17. Business Models Guide: Real Estate Agent | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Models Guide: Real Estate Agent Business Models Guide: Real Estate Agent With excellent marketing skills, a keen understanding of financing options, and a broad knowledge of the...

  18. NH Timber Yield Tax Overview (RSA 79)

    E-Print Network [OSTI]

    New Hampshire, University of

    land. The bond is usually equal to the amount of expected yield tax. When can you appeal: If a taxpayer denies the appeal then the taxpayer may appeal to the Department of Revenue within 180 days of the tax

  19. Autonomous Agents and Multi-Agent Systems manuscript No. (will be inserted by the editor)

    E-Print Network [OSTI]

    McBurney, Peter

    desirable outcomes. In many scenarios, traditional mechanism design and auction theory yield clear of designing and implementing effective trading strategies for agents participating in e-commerce market places of an e-commerce market institution, or the design of interaction protocols governing agent argumentation

  20. Agent-Case Embeddings for the Analysis of Evolved Systems

    E-Print Network [OSTI]

    Ashlock, Dan

    Agent-Case Embeddings for the Analysis of Evolved Systems Daniel Ashlock and Colin Lee Abstract--This study introduces agent-case embeddings, a general purpose tool for detecting the variety of solutions agents are attempting to solve. Agent-case embeddings permit comparison of solutions evolved

  1. An Intentional Framework for Communication in Multi-Agent Systems

    E-Print Network [OSTI]

    Idaho, University of

    An Intentional Framework for Communication in Multi-Agent Systems Kaylani Merrill, Michael O for designing communication for multi-agent systems that allows for the construction of novel messages by agents. To provide a speech-act framework for communication in multi-agent systems, we begin by giving an account

  2. Biocontrol ofAflatoxinProduction byUsingBiocompetitiveAgents

    E-Print Network [OSTI]

    Cotty, Peter J.

    Biocontrol ofAflatoxinProduction byUsingBiocompetitiveAgents Richard J. Cole and Peter J. Cotty control can be of three basic types. (1) Use of an agent that destroys the pest such as a predator or parasite, (2) an agent that secretes a toxin(s) that destroys the pest and (3) the use of an agent

  3. 1999 Singh & Huhns 1 Agents and Electronic Commerce

    E-Print Network [OSTI]

    1 © 1999 Singh & Huhns 1 Agents and Electronic Commerce Munindar P. Singh singh@ncsu.edu http://www.csc.ncsu.edu/faculty/mpsingh/ (Slides coauthored with Michael N. Huhns) © 1999 Singh & Huhns 2 Outline · Electronic commerce · Agents · Agents for electronic commerce · Electronic commerce for agents · Synthesis #12;2 © 1999 Singh & Huhns 3

  4. Detection of electrophilic and nucleophilic chemical agents

    DOE Patents [OSTI]

    McElhanon, James R.; Shepodd, Timothy J.

    2014-08-12

    A "real time" method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

  5. Security Proof for Password Authentication in TLS-Verifier-based Three-Party Group Diffie-Hellman

    SciTech Connect (OSTI)

    Chevassut, Olivier; Milner, Joseph; Pointcheval, David

    2008-04-21

    The internet has grown greatly in the past decade, by some numbers exceeding 47 million active web sites and a total aggregate exceeding100 million web sites. What is common practice today on the Internet is that servers have public keys, but clients are largely authenticated via short passwords. Protecting these passwords by not storing them in the clear on institutions's servers has become a priority. This paper develops password-based ciphersuites for the Transport Layer Security (TLS) protocol that are: (1) resistant to server compromise; (2) provably secure; (3) believed to be free from patent and licensing restrictions based on an analysis of relevant patents in the area.

  6. INFORMATION TECHNOLOGY SERVICES CRM Agent Training

    E-Print Network [OSTI]

    McQuade, D. Tyler

    INFORMATION TECHNOLOGY SERVICES CRM Agent Training Adding and Emailing a Note Service Management field INFORMATION TECHNOLOGY SERVICES #12;3 6. In the Note Information box, select from the Visibility INFORMATION TECHNOLOGY SERVICES #12;4 11. Select Save Case 12. When the Note has been saved, the following

  7. INFORMATION TECHNOLOGY SERVICES CRM Agent Training

    E-Print Network [OSTI]

    McQuade, D. Tyler

    INFORMATION TECHNOLOGY SERVICES CRM Agent Training Running Statistical Queries Service Management Center Queries, enter "fsu_" into the search field and select Search. INFORMATION TECHNOLOGY SERVICES #12. INFORMATION TECHNOLOGY SERVICES #12;4 6. Select the Query you would like to run by selecting how you would

  8. Virtual Agent Strategy Ben Beens (3035514)

    E-Print Network [OSTI]

    Dignum, Frank

    (3077195) #12;Tables of Contends TABLES OF CONTENDS sixteen rooms available. These rooms will go to the sixteen highest bids in a closed auction. The price market. When the agent bids higher then the actual selling price, he will get the tickets for the selling

  9. Propuesta de Seminario Agentes racionales y Aprendizaje

    E-Print Network [OSTI]

    Guerra Hernández, Alejandro

    Sebasti´an Camacho No 5, Xalapa, Ver., M´exico 91000 aguerra@uv.mx www.uv.mx/aguerra 9 de febrero de 2011 Logic in Multi-Agent Systems: 4th International Workshop, CLIMA IV, Fort Lauderdale, FL, USA, January 6

  10. Supercomputer Assisted Generation of Machine Learning Agents

    E-Print Network [OSTI]

    Wang, Xiaorui "Ray"

    is the Defining Challenge of Our Time · Buildings in China ­ 60% of urban building floor space in 2030 has yetSupercomputer Assisted Generation of Machine Learning Agents for the Calibration of Building Energy of Tennessee, Knoxville #12;2 Managed by UT-Battelle for the U.S. Department of Energy Sustainability

  11. AN EMBODIED CONVERSATIONAL AGENT WITH ASPERGER SYNDROME

    E-Print Network [OSTI]

    van Zijl, Lynette

    and social context. A 3D demonstration shows the typical output to conform to Asperger-like answers disorders (ASDs) display as a moderate to severe lack in language, communica- tion and social skills a major impact on the way that such agents communicate in educa- tional software developed for children

  12. AGENTS AND SOFTWARE ENGINEERING Michael Wooldridge

    E-Print Network [OSTI]

    Woolridge, Mike

    AGENTS AND SOFTWARE ENGINEERING Michael Wooldridge Queen Mary and Westfield College, University of London London E1 4NS, United Kingdom M.J.Wooldridge@qmw.ac.uk Abstract Software engineers continually-suited to the construction of certain types of software, which mainstream software engineering has had little success with

  13. AGENTS AND SOFTWARE ENGINEERING Michael Wooldridge

    E-Print Network [OSTI]

    Woolridge, Mike

    AGENTS AND SOFTWARE ENGINEERING Michael Wooldridge Queen Mary and Westfield College, University of London London E1 4NS, United Kingdom M.J.Wooldridge@qmw.ac.uk Abstract Software engineers continually­suited to the construction of certain types of software, which mainstream software engineering has had little success with

  14. Designing Adaptive Trading Agents DAVID PARDOE

    E-Print Network [OSTI]

    Stone, Peter

    should make use of this experience. Within the context of a specific market scenario, the answer depends to the first three questions depend on the particular market scenario being considered, and our work spansDesigning Adaptive Trading Agents DAVID PARDOE Yahoo! Labs and PETER STONE The University of Texas

  15. Agents on the Web The Sentient Web

    E-Print Network [OSTI]

    Huhns, Michael N.

    Agents on the Web The Sentient Web "I n a startling revelation, a team of uni- versity scientists. In spite of the ominous tone typically cho- sen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. When people find the Web frustrating, it is usual- ly not because

  16. On Coordinating Pervasive Persuasive Agents (Extended Abstract)

    E-Print Network [OSTI]

    Tan, Ah-Hwee

    behavior of the agents including the human occupant's. The framework enables flexible coordinations among the smart-home to include pervasive computing devices that unobtrusively monitor the occupants to make or behaviors through interaction or dialog that involves intentionality [1]. In this paper, we provide

  17. Software Development with Objects, Agents, and Services

    E-Print Network [OSTI]

    Huhns, Michael N.

    on the trends that are evident in software engi- neering and the impact that the trends will have on system for the methodologies and evaluates them with regard to software engineering's two major goals: reuse and robustness. 2Software Development with Objects, Agents, and Services Michael N. Huhns University of South

  18. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, Donald M. (1204 Linwood, Ann Arbor, MI 48103); Brown, Lawrence E. (523 Thomas St., Ypsilanti, MI 48197); Beierwaltes, William H. (1025 Forest Rd., Ann Arbor, MI 48105); Wu, Jiann-long (2672 Velvet Way, Walnut Creek, CA 94596)

    1986-04-22

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

  19. Agent Modeling for Integrated Power Systems

    E-Print Network [OSTI]

    effective market power mitigation rules, how to incorporate ancillary service markets, and how to properly implement a retail electricity market to encourage customer participation. Although valuable experience hasAgent Modeling for Integrated Power Systems Final Project Report Power Systems Engineering Research

  20. Imaging agent and method of use

    DOE Patents [OSTI]

    Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

    1986-04-22

    A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

  1. Agents and Electronic Commerce, Hype and Reality

    E-Print Network [OSTI]

    Dignum, Frank

    . Some good examples are Kasbah (Chavez & Maes 1996), the Fishmarket project (Rodriguez 1997) and Auction at the selling side and strike bargains with these agents. The scenario assumes that prices are fixed and can a price, but this price does not have to be the final selling price. In case of an auction model the price

  2. Coordination and sociability for intelligent virtual agents

    E-Print Network [OSTI]

    Grimaldo, Francisco

    produce low quality animations where characters do not act realistically. Moreover, virtual humans an elegant and formal framework to animate synthetic humans. When designing such agents, the main concern has that will be finally animated. Virtual actors normally operate in dynamic resource bounded contexts; thus, multi

  3. Coalition Agents Experiment: Multi-Agent Co-operation in an International Coalition Setting 

    E-Print Network [OSTI]

    Allsopp, D.N; Beautement, P; Bradshaw, J M; Durfee, E H; Kirton, M; Knoblock, C.A; Suri, N; Tate, Austin; Thompson, C W

    2002-01-01

    Military coalitions are examples of large-scale, multi-faceted, virtual organizations, which sometimes need to be rapidly created and flexibly changed as circumstances alter. The Coalition Agents Experiment (CoAX) aims to ...

  4. LIANG, WEI. Design and Analysis of Authentication Mechanisms in Single-and Multi-Hop Wireless Networks. (Under the direction of Professor Wenye Wang).

    E-Print Network [OSTI]

    Wang, Wenye

    -Hop Wireless Networks. (Under the direction of Professor Wenye Wang). The increasing demand for ubiquitous Internet services imposes more security threats to communications due to open mediums in wireless networks on the transmission. As one of most widely used security mechanisms, authentication is used to identify mobile nodes

  5. Distributed Self-triggered Control for Multi-agent Systems

    E-Print Network [OSTI]

    Dimarogonas, Dimos V.

    It is desirable to limit the amount of communication and computation generated by each agent in a large multi-agent system. Event- and self-triggered control strategies have been recently proposed as alternatives to ...

  6. Event-triggered control for multi-agent systems

    E-Print Network [OSTI]

    Johansson, Karl H.

    Event-driven strategies for multi-agent systems are motivated by the future use of embedded microprocessors with limited resources that will gather information and actuate the individual agent controller updates. The control ...

  7. Market Microstructure Patterns Powering Trading and Surveillance Agents

    E-Print Network [OSTI]

    Cao, Longbing

    Market Microstructure Patterns Powering Trading and Surveillance Agents Longbing Cao (University are then used for powering market trading and surveillance agents for automatically detecting market models. From data analysis perspective, we view it valuable for smart trading in designing legal

  8. A Java Agent-based MacroEconomic Laboratory

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    A Java Agent-based MacroEconomic Laboratory Pascal Seppecher May 2, 2012 Abstract This paper as a Java application (Jamel: Java Agent-based MacroEconomic Laboratory). This application, together

  9. Android applications are inspired by Multi-Agent Systems

    E-Print Network [OSTI]

    Torino, UniversitĂ  di

    Android applications are inspired by Multi-Agent Systems a.k.a. What does teaching technologies Android applications are inspired by Multi-Agent Systems a.k.a. What does teaching technologies

  10. A router agent for capacity assessment in packet video 

    E-Print Network [OSTI]

    Woodings, Mark Alexander

    1997-01-01

    caused by failed bandwidth-increasing decisions, a router-based agent is developed to assess traffic levels on the receiver's subnet. The agent resides on the receiver subnet's parent router and collects multicast transmission statistics, estimates...

  11. Approximate multi-agent planning in dynamic and uncertain environments

    E-Print Network [OSTI]

    Redding, Joshua David, 1978-

    2012-01-01

    Teams of autonomous mobile robotic agents will play an important role in the future of robotics. Efficient coordination of these agents within large, cooperative teams is an important characteristic of any system utilizing ...

  12. Agents of seed dispersal : animal--zoochary / Wind--anemonochory

    E-Print Network [OSTI]

    Lysakowski, Lukasz Kamil, 1974-

    2004-01-01

    Agents of seed dispersal is a project designed to address the increase of environmental degradation, which occurs as a result of the perpetual spread of the asphalt and concrete of the contemporary urban situation. Agents ...

  13. International Conference on Computer Animation and Social Agents

    E-Print Network [OSTI]

    Al Hanbali, Ahmad

    , Facial Animation; Social Agents: Social Agents and Avatars, Emotion and Personality, Virtual Humans Humans/Environments, Animation Analysis and Structuring, Anthropometric Virtual Human Models, Acquisition; Other Related Topics: Animation Compression and Transmission, Semantics and Ontologies for Virtual

  14. Natural chelating agents for radionuclide decorporation

    DOE Patents [OSTI]

    Premuzic, Eugene T. (East Moriches, NY)

    1988-01-01

    This invention relates to the preparation of new, naturally produced chelating agents as well as to the method and resulting chelates of desorbing cultures in a bioavailable form involving Pseudomonas species or other microorganisms. A preferred microorganism is Pseudomonas aeruginosa which forms multiple chelates with thorium in the range of molecular weight 100-1,000 and also forms chelates with uranium of molecular weight in the area of 100-1,000 and 1,000-2,000.

  15. Lithium based electrochemical cell systems having a degassing agent

    DOE Patents [OSTI]

    Hyung, Yoo-Eup (Naperville, IL); Vissers, Donald R. (Naperville, IL); Amine, Khalil (Downers Grove, IL)

    2012-05-01

    A lithium based electrochemical cell system includes a positive electrode; a negative electrode; an electrolyte; and a degassing agent.

  16. The 2001 Trading Agent Competition Michael P. Wellman

    E-Print Network [OSTI]

    Wellman, Michael P.

    to cooperate, by addressing their design energy to a common problem. The Trading Agent Competition (TACThe 2001 Trading Agent Competition Michael P. WellmanÂŁ University of Michigan wellman@umich.edu Amy@research.att.com Peter R. Wurman North Carolina State University wurman@csc.ncsu.edu Abstract The 2001 Trading Agent

  17. Agents in Bioinformatics, Computational and Systems Emanuela Merellia

    E-Print Network [OSTI]

    Martin, Andrew C.R.

    of agents for computational Grids. Keywords: Agents, Multiagent Systems, Data Analysis and Management communities to develop a different (agent-based) approach of computational frameworks both for data analysis and management in bioinformatics and for systems modelling and simulation in computational and systems biology

  18. Frequent Set Meta Mining: Towards Multi-Agent Data Mining

    E-Print Network [OSTI]

    Coenen, Frans

    Frequent Set Meta Mining: Towards Multi-Agent Data Mining Kamal Ali Albashiri, Frans Coenen, Rob. The typical scenario where this is desirable is in multi-agent data mining where individual agents wish to preserve the security and privacy of their raw data but are prepared to share data mining results. Four

  19. Dynamic modeling and learning user profile in personalized news agent 

    E-Print Network [OSTI]

    Widyantoro, Dwi Hendratmo

    1999-01-01

    result, many software agents have been employed to perform autonomous information gathering and altering on behalf of the user. One of the critical issues in such an agent is the capability of the agent to model its users and adapt itself over time...

  20. Jacob -An Animated Instruction Agent in Virtual Reality

    E-Print Network [OSTI]

    Nijholt, Anton

    of a 3D virtual environment where an animated human- like agent called Jacob gives instructionJacob - An Animated Instruction Agent in Virtual Reality Marc Evers1, Anton Nijholt1 1 University of virtual reality techniques and in- volves the design and construction of an animated agent in a 3

  1. Health Document Explanation by Virtual Agents Timothy W. Bickmore1

    E-Print Network [OSTI]

    Bickmore, Timothy

    Health Document Explanation by Virtual Agents Timothy W. Bickmore1 , Laura M. Pfeifer1 and Michael. We describe the design and evaluation of a virtual agent that explains health documents to patients. The prevalence and impact of low health literacy is presented as a motivation for such agents, given that face

  2. Towards an Intelligent Affective Multimodal Virtual Agent for Uncertain Environments

    E-Print Network [OSTI]

    Baldassarri, Sandra

    . It is based on the integration of Maxine, a powerful multimodal animation engine for managing virtual agents-time animation. 1. INTRODUCTION Most research on social interfaces is related to the design of virtual agents human- computer interface [1, 2]. A virtual agent must be believable: it has to move properly, paying

  3. Web Service Access Management for Integration with Agent Systems

    E-Print Network [OSTI]

    Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

  4. Trading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work A Platform for Trading Agent Competition

    E-Print Network [OSTI]

    Zhang, Dongmo

    Trading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work of Western Sydney Australia #12;Trading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work Outline 1 Trading Agent Competition 2 Market Design Game 3 Strategic Trader Game 4 Conclusion

  5. Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)

    E-Print Network [OSTI]

    Mondal, Uttam Kr

    2012-01-01

    Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

  6. Enhancing Multi-Agent Based Simulation with Human-Agents Interactive Spatial Behaviour

    E-Print Network [OSTI]

    Chen, Yee Ming; Shiu, Hung-Ming

    2009-01-01

    We are exploring the enhancement of models of agent behaviour with more "human-like" decision making strategies than are presently available. Our motivation is to developed with a view to as the decision analysis and support for electric taxi company under the mission of energy saving and reduction of CO2, in particular car-pool and car-sharing management policies. In order to achieve the object of decision analysis for user, we provide a human-agents interactive spatial behaviour to support user making decision real time. We adopt passenger average waiting time and electric taxi average idle time as the performance measures and decision support fro electric taxi company. Finally, according to the analysis result, we demonstrate that our multi-agent simulation and GUI can help users or companies quickly make a quality and accurate decision to reduce the decision-making cost and time.

  7. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, N.G.; Wai, C.M.; Lin, Y.; Kwang, Y.H.

    1998-11-24

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO{sub 2}, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO{sub 2} and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process. 1 fig.

  8. Fluid extraction using carbon dioxide and organophosphorus chelating agents

    DOE Patents [OSTI]

    Smart, Neil G. (Moscow, ID); Wai, Chien M. (Moscow, ID); Lin, Yuehe (Moscow, ID); Kwang, Yak Hwa (Moscow, ID)

    1998-01-01

    Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO.sub.2, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO.sub.2 and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process.

  9. Modular strategies for PET imaging agents

    SciTech Connect (OSTI)

    Hooker, , J.M.

    2010-03-01

    In recent years, modular and simplified chemical and biological strategies have been developed for the synthesis and implementation of positron emission tomography (PET) radiotracers. New developments in bioconjugation and synthetic methodologies, in combination with advances in macromolecular delivery systems and gene-expression imaging, reflect a need to reduce radiosynthesis burden in order to accelerate imaging agent development. These new approaches, which are often mindful of existing infrastructure and available resources, are anticipated to provide a more approachable entry point for researchers interested in using PET to translate in vitro research to in vivo imaging.

  10. Designed TPR Modules as Novel Anticancer Agents

    SciTech Connect (OSTI)

    Cortajarena,A.; Yi, F.; Regan, L.

    2008-01-01

    Molecules specifically designed to modulate protein-protein interactions have tremendous potential as novel therapeutic agents. One important anticancer target is the chaperone Hsp90, whose activity is essential for the folding of many oncogenic proteins, including HER2, IGFIR, AKT, RAF-1, and FLT-3. Here we report the design and characterization of new tetratricopeptide repeat modules, which bind to the C-terminus of Hsp90 with higher affinity and with greater specificity than natural Hsp90-binding co-chaperones. Thus, when these modules are introduced into the cell, they out-compete endogenous co-chaperones for binding, thereby inhibiting Hsp90 function. The effect of Hsp90 inhibition in this fashion is dramatic; HER2 levels are substantially decreased and BT474 HER2 positive breast cancer cells are killed. Our designs thus provide new tools with which to dissect the mechanism of Hsp90-mediated protein folding and also open the door to the development of an entirely new class of anticancer agents.

  11. Agents That Talk Back (Sometimes): Filter Programs for Affective Communication

    E-Print Network [OSTI]

    Bari, UniversitĂ  degli Studi di

    Agents That Talk Back (Sometimes): Filter Programs for Affective Communication Helmut Prendinger- action that supports basic features of affective conver- sation. As essential requirements for animated

  12. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, Hagen (Grafton, MA); Walker, Barbara J. (Auburn, MA)

    1998-01-01

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell.

  13. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-20

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 18 figs.

  14. Cell-targeted lytic pore-forming agents

    DOE Patents [OSTI]

    Bayley, H.; Walker, B.J.

    1998-10-06

    A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 21 figs.

  15. MASPA: Multi-Agent Automated Supervisory Policy Adaptation

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    in Dubai Victor Lesser Computer Science Department University of Massachusetts Amherst UMass Computer to up- date its estimates of the world states (i.e., Q-values for state-action pairs). However of the world state is calculated from agent B's estimate, which is calculated from from agent A's estimate

  16. Biosensor for Direct Determination of Organophosphate Nerve Agents Using

    E-Print Network [OSTI]

    Chen, Wilfred

    Biosensor for Direct Determination of Organophosphate Nerve Agents Using Recombinant Escherichia biosensor for the direct mea- surement of organophosphate (OP) nerve agents was developed by modifying a p these conditions, the biosensor was used to mea- sure as low as 2 µM of paraoxon, methyl parathion, and diazinon

  17. The evolution of imitation and mirror neurons in adaptive agents

    E-Print Network [OSTI]

    Borenstein, Elhanan

    The evolution of imitation and mirror neurons in adaptive agents Action editor: Luc Berthouze evolutionary adaptive agents that demonstrate imitative learn- ing, facilitating a comprehensive study The past 20 years have seen a renewed interest in imitation in various fields of research (Prinz & 1389

  18. PISA -Pooling Information from Several Agents: Multiplayer Argumentation from

    E-Print Network [OSTI]

    Coenen, Frans

    PISA - Pooling Information from Several Agents: Multiplayer Argumentation from Experience Maya Abstract In this paper a framework, PISA (Pooling Information from Several Agents), to facilitate argumentation is a form of dialogue game involving three or more players. The PISA framework is founded on a two

  19. Multi-agent smart environments Diane J. Cook

    E-Print Network [OSTI]

    Cook, Diane J.

    Multi-agent smart environments Diane J. Cook School of Electrical Engineering and Computer Science and ambient intelligence has catapulted smart environments to the forefront of many research labs. While such issue is the role of multi-agent systems in smart environments. In this article we discuss the role

  20. A Flexible Framework for Verifying Agent Programs (Short Paper)

    E-Print Network [OSTI]

    Dennis, Louise

    popular, and multi- agent systems being increasingly used for safety-critical applica- tions, the need activities to pur- sue. Rational agents make such decisions in a rational and explain- able way and, since and critical areas, there is greater need to analyse, comprehensively, the behaviour of such systems

  1. Geographical Information Systems and Dynamic Modeling via Agent Based Systems

    E-Print Network [OSTI]

    de Figueiredo, Luiz Henrique

    Geographical Information Systems and Dynamic Modeling via Agent Based Systems Cláudio Antônio da fariasol@eng.uerj.br ABSTRACT A full integration among Geographical Information Systems and Agent Based integrated with Geographical Information Systems (GIS). The first one is the movement of pedestrians

  2. Agents in Decentralised Information Ecosystems: The DIET Approach

    E-Print Network [OSTI]

    Koubarakis, Manolis

    Agents in Decentralised Information Ecosystems: The DIET Approach P. Marrow1 *, M. Koubarakis2 , R the concept of an information ecosystem. An information ecosystem is analo gous to a natural ecosystem individuals. This paper describes a multi-agent platform, DIET (Decentralised Information Ecosystem

  3. Practical Extensions in Agent Programming Languages Mehdi Dastani

    E-Print Network [OSTI]

    Dastani, Mehdi

    Practical Extensions in Agent Programming Languages Mehdi Dastani Utrecht University to improve the practi- cal application of existing BDI-based agent-oriented programming languages that have and declarative programming languages. Categories and Subject Descriptors D.3.3 [Programming Languages]: Language

  4. Trading Agents Competing: Performance, Progress, and Market Effectiveness

    E-Print Network [OSTI]

    Wellman, Michael P.

    programmed trading techniques in a challenging market scenario in competition with other design groups. AfterTrading Agents Competing: Performance, Progress, and Market EffectivenessŁ Michael P. Wellman, Shih Since the year 2000, the annual trading agent competition has provided a forum for designers to evaluate

  5. Design Tradeoffs for Autonomous Trading Agents Ioannis A. Vetsikas

    E-Print Network [OSTI]

    Rossi, Francesca

    design were tested in smaller market games that the researchers designed themselves. The Trading Agent provides a common market scenario to compare strategies and research. It is a challenging benchmark doDesign Tradeoffs for Autonomous Trading Agents Ioannis A. Vetsikas Computer Science Dept., Cornell

  6. Designing Agents for Derivatives Markets: a preliminary framework

    E-Print Network [OSTI]

    McBurney, Peter

    Designing Agents for Derivatives Markets: a preliminary framework Omar Baqueiro Espinosa, Wiebe van framework for a model of agents which are able to trade in futures and options derivatives markets. We design a basic logical model for the exchange process and extend it to depict futures and options

  7. Agents on the Web Reconciling the Semantics of

    E-Print Network [OSTI]

    Huhns, Michael N.

    Agents on the Web Consensus Ontologies Reconciling the Semantics of Web Pages andAgents 92, but the light is better here." As you build a Web site, it is worthwhile to ask a similar question: "Should you this question. ReconcilingWeb Semantics Web searches typically yield pointers to a large number of Web sites

  8. Multi-Agent Simulation of Protein Folding Luca Bortolussi1

    E-Print Network [OSTI]

    Bortolussi, Luca

    Multi-Agent Simulation of Protein Folding Luca Bortolussi1 , Agostino Dovier1 , and Federico residues) is known. The process for reaching this state is known as the protein fold- ing. This problem the feasibility and the power of the method. Keywords: Computational Biology, Agent-Based Technologies, Protein

  9. A Logic-Based Perspective on Agent Reconfiguration: Preliminary Report

    E-Print Network [OSTI]

    Meyer, Tommie

    scenario depicting a nuclear power station (Figure 1). In a particular power plant there is an atomic pile Fig. 1. The nuclear power station and its controlling agent [1]. which the pile is on and the cooling, in the event of a hazardous situation in the nuclear power plant, the agent may be forced to switch

  10. Agent-mediated Integrative Negotiation for Retail Electronic Commerce

    E-Print Network [OSTI]

    . Value-Added, Merchant Differentiation and Market Power Although cross-merchant product comparisonsAgent-mediated Integrative Negotiation for Retail Electronic Commerce Robert H. Guttman and Pattie convenience for consumers and yield more efficient markets, today's first-generation shopping agents

  11. Multi-Agent Planning and Crowd Simulation Background and Challenge

    E-Print Network [OSTI]

    Pollefeys, Marc

    collision- free paths for 1,000 agents at 22 fps. Adaptive Elastic Roadmaps We have developed a novel roadmap data structure to plan the motion of large number of agents in dynamic environments. The roadmap representation, called Adaptive Elastic Roadmap (AERO), replaces straight-line links with bands that deform based

  12. FEL3330 Networked and Multi-Agent Control Spring 2011

    E-Print Network [OSTI]

    Dimarogonas, Dimos

    FEL3330 Networked and Multi-Agent Control Systems Spring 2011 Automatic Control School of Electrical Engineering Royal Institute of Technology Lecture 1 1 March 29, 2011 #12;FEL3330 Networked Lecture 1 3 March 29, 2011 #12;FEL3330 Networked and Multi-Agent Control Systems Lecture 1: Introduction

  13. Tecnologia de Agentes na Convergncia das Telecomunicaes com a Computao

    E-Print Network [OSTI]

    da Silva, Alberto Rodrigues

    Tecnologia de Agentes na Convergência das Telecomunicações com a Computação Joaquim Croca Eng desafios considera-se o paradigma e a tecnologia dos agentes de software como uma aproximação adequada, com de recentes desenvolvimentos de tecnologias como o TINA-C, CORBA ou Web Services. Alguns

  14. Revising Knowledge in Multi-Agent System Using Preferences

    E-Print Network [OSTI]

    Pivkina, Inna

    Introduction Multi-Agents Systems (MAS) require coordination mechanisms to facilitate dynamic collaboration way of encoding policies for the integration of agent-generated knowledge (e.g., in a mediator) family of revisions. Each revision represents an updated version of the origi- nal knowledge base

  15. AgentBased Digital Libraries: Decentralization and Coordination

    E-Print Network [OSTI]

    Durfee, Edmund H.

    1 Agent­Based Digital Libraries: Decentralization and Coordination Peter C. Weinstein, William P describes agent­based systems and explains why digital libraries should be built with this type describe the approach taken by the University of Michigan Digital Library project. #12; 2 1 Introduction

  16. Evaluation of the Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Hart, Darren M.

    2008-05-01

    Sandia National Laboratories has tested and evaluated Geotech Smart24 data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of the Geotech Smart24 digitizer with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy, analog bandwidth and calibrator performance.

  17. AFECS. Multi-Agent Framework for Experiment Control Systems

    SciTech Connect (OSTI)

    Vardan Gyurjyan; David Abbott; William Heyes; Edward Jastrzembski; Carl Timmer; Elliott Wolin

    2008-01-23

    AFECS is a pure Java based software framework for designing and implementing distributed control systems. AFECS creates a control system environment as a collection of software agents behaving as finite state machines. These agents can represent real entities, such as hardware devices, software tasks, or control subsystems. A special control oriented ontology language (COOL), based on RDFS (Resource Definition Framework Schema) is provided for control system description as well as for agent communication. AFECS agents can be distributed over a variety of platforms. Agents communicate with their associated physical components using range of communication protocols, including tcl-DP, cMsg (publish-subscribe communication system developed at Jefferson Lab), SNMP (simple network management protocol), EPICS channel access protocol and JDBC.

  18. Swarming behaviors in multi-agent systems with nonlinear dynamics

    SciTech Connect (OSTI)

    Yu, Wenwu; School of Electrical and Computer Engineering, RMIT University, Melbourne VIC 3001 ; Chen, Guanrong; Cao, Ming; Lü, Jinhu; Zhang, Hai-Tao

    2013-12-15

    The dynamic analysis of a continuous-time multi-agent swarm model with nonlinear profiles is investigated in this paper. It is shown that, under mild conditions, all agents in a swarm can reach cohesion within a finite time, where the upper bounds of the cohesion are derived in terms of the parameters of the swarm model. The results are then generalized by considering stochastic noise and switching between nonlinear profiles. Furthermore, swarm models with limited sensing range inducing changing communication topologies and unbounded repulsive interactions between agents are studied by switching system and nonsmooth analysis. Here, the sensing range of each agent is limited and the possibility of collision among nearby agents is high. Finally, simulation results are presented to demonstrate the validity of the theoretical analysis.

  19. ICS 606 / EE 606 -Intelligent Autonomous Agents Catalog Description: The theory, methods, and practical applications of autonomous agent systems, including

    E-Print Network [OSTI]

    Reed, Nancy E.

    , ISBN: 0262731312. Optional text #1: Artificial Intelligence - A Modern Approach, 2nd edition, Russell of agent systems. Course Objectives: A student should understand (i) the fundamental concepts of agent, Edited by Gerhard Weiss. The MIT Press, Hardcover March 1999, ISBN: 0262731312, or Paperback July 2000

  20. Intent Recognition in Multi-Agent Systems: Collective Box Pushing and Cow Herding

    E-Print Network [OSTI]

    Ahmad, Najla

    2013-12-31

    In a multi-agent system, an idle agent may be available to assist other agents in the system. An agent architecture called intent recognition is proposed to accomplish this with minimal communication. In order to assist other agents in the system...

  1. Communication Efficiency in Multi-Agent Systems Mary Berna-Koes

    E-Print Network [OSTI]

    Communication Efficiency in Multi-Agent Systems Mary Berna-Koes Robotics Institute Carnegie Mellon. The agent communication languages proven successful in software based multi-agent systems incur overheads physical robot teams do not use the agent communication languages developed by the multi-agent systems

  2. Volttron: An Agent Platform for the Smart Grid

    SciTech Connect (OSTI)

    Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

    2013-05-06

    VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

  3. Magnetic resonance imaging contrast agents for chemical sensing

    E-Print Network [OSTI]

    Liu, Vincent Hok

    2014-01-01

    Magnetic resonance imaging (MRI) is frequently used for examining the human body. MRI contrast agents currently used in the clinic assist physicians in locating problematic areas, but other tools are needed to interrogate ...

  4. T-618: Debian update for exim4: Mail Transport Agent

    Broader source: Energy.gov [DOE]

    It was discovered that Exim, the default mail transport agent in Debian, uses DKIM data obtain from DNS directly in a format string, potentially allowing malicious mail senders to execute arbitrary code.

  5. Electronic Supermarket for Mobile Agents Chuan-Kun Wu

    E-Print Network [OSTI]

    Wu, Chuan-Kun

    Electronic Supermarket for Mobile Agents Chuan-Kun Wu Department of Computer Science, Australian National University Canberra, ACT 0200, AUSTRALIA. Email: chuan@cs.anu.edu.au Abstract. The development

  6. Measuring the Transport of Siloxane-Based Mold Release Agents...

    Office of Scientific and Technical Information (OSTI)

    Measuring the Transport of Siloxane-Based Mold Release Agents In An Encapsulation Mold. Citation Details In-Document Search Title: Measuring the Transport of Siloxane-Based Mold...

  7. Use of antimicrobial agents in a novel cattle washing system 

    E-Print Network [OSTI]

    Covington, Brian Reed

    2001-01-01

    Antimicrobial agents, 0.5% L-lactic acid and 50 ppm chlorine, along with water wash treatments (single or double) were evaluated in a cattle washing system for their effectiveness in reducing Aerobic Plate Counts (APC), coliforms, generic...

  8. Knowledge Exchange between Agents in Real-Time Environments

    E-Print Network [OSTI]

    for each simulation. One way to have agents communicate knowl- edge would be to let them communicate partic Funge gives, in [8], a good overview of the kind of AI techniques which are applicable to NPCs (Non

  9. Iron oxide nanoparticles as a contrast agent for thermoacoustic tomography 

    E-Print Network [OSTI]

    Keho, Aaron Lopez

    2009-06-02

    An exogenous contrast agent has been developed to enhance the contrast achievable in Thermoacoustic Tomography (TAT). TAT utilizes the penetration depth of microwave energy while producing high resolution images through acoustic waves. A sample...

  10. Motion planning algorithms for a group of mobile agents 

    E-Print Network [OSTI]

    Lal, Mayank

    2008-10-10

    Building autonomous mobile agents has been a major research effort for a while with cooperative mobile robotics receiving a lot of attention in recent times. Motion planning is a critical problem in deploying autonomous ...

  11. Relationship between composition and performance of asphalt recycling agents 

    E-Print Network [OSTI]

    Peterson, Gerald Dean

    1993-01-01

    This research was aimed at determining the effects of recycling agent composition on the performance of recycled asphalt with aging. To accomplish this, five experiments were performed, in which blends were produced with controlled compositions...

  12. Kit for providing a technetium medical radioimaging agent

    DOE Patents [OSTI]

    Wildung, Raymond E. (Richland, WA); Garland, Thomas R. (Greybull, WY); Li, Shu-Mei W. (Richland, WA)

    2000-01-01

    The present invention is directed toward a kit for microbial reduction of a technetium compound to form other compounds of value in medical imaging. The technetium compound is combined in a mixture with non-growing microbial cells which contain a technetium-reducing enzyme system, a stabilizing agent and an electron donor in a saline solution under anaerobic conditions. The mixture is substantially free of an inorganic technetium reducing agent and its reduction products. The resulting product is Tc of lower oxidation states, the form of which can be partially controlled by the stabilizing agent. It has been discovered that the microorganisms Shewanella alga, strain Bry and Shewanella putrifacians, strain CN-32 contain the necessary enzyme systems for technetium reduction and can form both mono nuclear and polynuclear reduced Tc species depending on the stabilizing agent.

  13. Acoustic characterisation of ultrasound contrast agents at high frequency 

    E-Print Network [OSTI]

    Sun, Chao

    2013-07-06

    This thesis aims to investigate the acoustic properties of ultrasound contrast agents (UCAs) at high ultrasound frequencies. In recent years, there has been increasing development in the use of high frequency ultrasound ...

  14. On the Evaluation of Agent Behaviors Amol Dattatraya Mali

    E-Print Network [OSTI]

    Mali, Amol D.

    1 On the Evaluation of Agent Behaviors #3; Amol Dattatraya Mali Dept. of Electrical Engg-414-229-2769, mali@miller.cs.uwm.edu This work focuses on robot behaviors which use minimal communication and rely

  15. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth (Berkeley, CA); Xu, Jide (Berkeley, CA)

    1999-01-01

    Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity.

  16. Approximate dynamic programming with applications in multi-agent systems

    E-Print Network [OSTI]

    Valenti, Mario J. (Mario James), 1976-

    2007-01-01

    This thesis presents the development and implementation of approximate dynamic programming methods used to manage multi-agent systems. The purpose of this thesis is to develop an architectural framework and theoretical ...

  17. The Envoy Framework: An Open Architecture for Agents

    E-Print Network [OSTI]

    Toronto, University of

    ( selectme dissemination of mformatzon- SDZ); H.4. 1[Information Systems Applications]: OffIce Automation; K to the wide-spread integration of agent technology with standard end-user applications. Research at IRIS has

  18. An Agent-Based Modeling for Pandemic Influenza in Egypt

    E-Print Network [OSTI]

    Khalil, Khaled M; Nazmy, Taymour T; Salem, Abdel-Badeeh M

    2010-01-01

    Pandemic influenza has great potential to cause large and rapid increases in deaths and serious illness. The objective of this paper is to develop an agent-based model to simulate the spread of pandemic influenza (novel H1N1) in Egypt. The proposed multi-agent model is based on the modeling of individuals' interactions in a space time context. The proposed model involves different types of parameters such as: social agent attributes, distribution of Egypt population, and patterns of agents' interactions. Analysis of modeling results leads to understanding the characteristics of the modeled pandemic, transmission patterns, and the conditions under which an outbreak might occur. In addition, the proposed model is used to measure the effectiveness of different control strategies to intervene the pandemic spread.

  19. Optical techniques for detecting and identifying biological-warfare agents

    E-Print Network [OSTI]

    Greenwood, Darryl P.

    Rapid and accurate detection and identification of biological agents is an objective of various national security programs. Detection in general is difficult owing to natural clutter and anticipated low concentrations of ...

  20. Open-source Software for Developing Anthropomorphic Spoken Dialog Agents 

    E-Print Network [OSTI]

    Shin-ichi, Kawamoto; Shimodaira, Hiroshi; Nitta, Tsuneo; Nishimoto, Takuya; Nakamura, Satoshi; Itou, Katsunobu; Morishima, Shigeo; Yotsukura, Tatsuo; Kai, Atsuhiko; Lee, Akinobu; Yamashita, Yoichi; Kobayashi, Takao; Tokuda, Keiichi; Hirose, Keikichi; Minematsu, Nobuaki; Yamada, Atsushi; Den, Yasuharu; Utsuro, Takehito; Sagayama, Shigeki

    2002-01-01

    An architecture for highly-interactive human-like spoken-dialog agent is discussed in this paper. In order to easily integrate the modules of different characteristics including speech recognizer, speech synthesizer, ...

  1. Software Agents as Facilitators of Coherent Coalition Operations 

    E-Print Network [OSTI]

    Allsopp, D; Beautement, P; Bradshaw, J M; Carson, J; Kirton, M; Suri, N; Tate, Austin

    Software agents can be viewed as semi-autonomous entities which help people cope with the complexities of working collaboratively in a distributed information environment. This paper describes the research that DERA is ...

  2. Detoxification of organophosphate nerve agents by bacterial phosphotriesterase

    SciTech Connect (OSTI)

    Ghanem, Eman; Raushel, Frank M. . E-mail: raushel@tamu.edu

    2005-09-01

    Organophosphates have been widely used as insecticides and chemical warfare agents. The health risks associated with these agents have necessitated the need for better detoxification and bioremediation tools. Bacterial enzymes capable of hydrolyzing the lethal organophosphate nerve agents are of special interest. Phosphotriesterase (PTE) isolated from the soil bacteria Pseudomonas diminuta displays a significant rate enhancement and substrate promiscuity for the hydrolysis of organophosphate triesters. Directed evolution and rational redesign of the active site of PTE have led to the identification of new variants with enhanced catalytic efficiency and stereoselectivity toward the hydrolysis of organophosphate neurotoxins. PTE has been utilized to protect against organophosphate poisoning in vivo. Biotechnological applications of PTE for detection and decontamination of insecticides and chemical warfare agents are developing into useful tools. In this review, the catalytic properties and potential applications of this remarkable enzyme are discussed.

  3. Crowd simulation influenced by agent's socio-psychological state

    E-Print Network [OSTI]

    Cherif, F

    2010-01-01

    The aim our work is to create virtual humans as intelligent entities, which includes approximate the maximum as possible the virtual agent animation to the natural human behavior. In order to accomplish this task, our agent must be capable to interact with the environment, interacting with objects and other agents. The virtual agent needs to act as real person, so he should be capable to extract semantic information from the geometric model of the world where he is inserted, based on his own perception, and he realizes his own decision. The movement of the individuals is representing by the combination of two approaches of movement which are, the social force model and the based-rule model. These movements are influenced by a set of socio-psychological rules to give a more realistic result.

  4. Predicting Agent Strategy Mix of Evolving Populations Sabyasachi Saha

    E-Print Network [OSTI]

    Sen, Sandip

    Predicting Agent Strategy Mix of Evolving Populations Sabyasachi Saha Department of Math & Computer Science The University of Tulsa sabyasachi-saha@utulsa.edu Sandip Sen Department of Math & Computer

  5. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, K.; Xu, J.

    1999-04-06

    Disclosed is a series of improved chelating agents and the chelates formed from these agents, which are highly effective upon both injection and oral administration. Several of the most effective are of low toxicity. These chelating agents incorporate within their structure 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy group of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity, as well as the chemical stability towards oxidation and reduction, of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with the adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provide a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. 2 figs.

  6. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

    2013-10-01

    A biosensor based detection of toxins includes enhancing a fluorescence signal by concentrating a plurality of photosynthetic organisms in a fluid into a concentrated region using biased AC electro-osmosis. A measured photosynthetic activity of the photosynthetic organisms is obtained in the concentrated region, where chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. A presence of the chemical, biological and/or radiological agents or precursors thereof, is determined in the fluid based on the measured photosynthetic activity of the concentrated plurality of photosynthetic organisms. A lab-on-a-chip system is used for the concentrating step. The presence of agents is determined from feature vectors, obtained from processing a time dependent signal using amplitude statistics and/or time-frequency analysis, relative to a control signal. A linear discriminant method including support vector machine classification (SVM) is used to identify the agents.

  7. Adaptive method with intercessory feedback control for an intelligent agent

    DOE Patents [OSTI]

    Goldsmith, Steven Y.

    2004-06-22

    An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

  8. An Autonomous Adaptive Scheduling Agent for Period Searching

    E-Print Network [OSTI]

    Eric S. Saunders; Tim Naylor; Alasdair Allan

    2008-01-24

    We describe the design and implementation of an autonomous adaptive software agent that addresses the practical problem of observing undersampled, periodic, time-varying phenomena using a network of HTN-compliant robotic telescopes. The algorithm governing the behaviour of the agent uses an optimal geometric sampling technique to cover the period range of interest, but additionally implements proactive behaviour that maximises the optimality of the dataset in the face of an uncertain and changing operating environment.

  9. Eco-Friendly Agent Based Advanced Traffic Management Techniques in a Connected Vehicle Environment

    E-Print Network [OSTI]

    Jin, Qiu

    2015-01-01

    OF CALIFORNIA RIVERSIDE Eco-Friendly Agent Based AdvancedOF THE DISSERTATION Eco-Friendly Agent Based Advancedrequired to provide an “Eco-Friendly” speed trajectory for

  10. Possible common e,ological agent for strawberry disease and red mark syndrome in

    E-Print Network [OSTI]

    Kane, Andrew S.

    1 Possible common e,ological agent for strawberry disease and red mark Schering-Plough Animal Health, UK Possible common e,ological agent for strawberry

  11. Solid-water detoxifying reagents for chemical and biological agents

    DOE Patents [OSTI]

    Hoffman, Dennis M. (Livermore, CA); Chiu, Ing Lap (Castro Valley, CA)

    2006-04-18

    Formation of solid-water detoxifying reagents for chemical and biological agents. Solutions of detoxifying reagent for chemical and biological agents are coated using small quantities of hydrophobic nanoparticles by vigorous agitation or by aerosolization of the solution in the presence of the hydrophobic nanoparticles to form a solid powder. For example, when hydrophobic fumed silica particles are shaken in the presence of IN oxone solution in approximately a 95:5-weight ratio, a dry powder results. The hydrophobic silica forms a porous coating of insoluble fine particles around the solution. Since the chemical or biological agent tends to be hydrophobic on contact with the weakly encapsulated detoxifying solution, the porous coating breaks down and the detoxifying reagent is delivered directly to the chemical or biological agent for maximum concentration at the point of need. The solid-water (coated) detoxifying solutions can be blown into contaminated ventilation ducting or other difficult to reach sites for detoxification of pools of chemical or biological agent. Once the agent has been detoxified, it can be removed by flushing the area with air or other techniques.

  12. Agent Model Development for Assessing Climate-Induced Geopolitical Instability.

    SciTech Connect (OSTI)

    Boslough, Mark B.; Backus, George A.

    2005-12-01

    We present the initial stages of development of new agent-based computational methods to generate and test hypotheses about linkages between environmental change and international instability. This report summarizes the first year's effort of an originally proposed three-year Laboratory Directed Research and Development (LDRD) project. The preliminary work focused on a set of simple agent-based models and benefited from lessons learned in previous related projects and case studies of human response to climate change and environmental scarcity. Our approach was to define a qualitative model using extremely simple cellular agent models akin to Lovelock's Daisyworld and Schelling's segregation model. Such models do not require significant computing resources, and users can modify behavior rules to gain insights. One of the difficulties in agent-based modeling is finding the right balance between model simplicity and real-world representation. Our approach was to keep agent behaviors as simple as possible during the development stage (described herein) and to ground them with a realistic geospatial Earth system model in subsequent years. This work is directed toward incorporating projected climate data--including various C02 scenarios from the Intergovernmental Panel on Climate Change (IPCC) Third Assessment Report--and ultimately toward coupling a useful agent-based model to a general circulation model.3

  13. Gallium and indium imaging agents. 2. Complexes of sulfonated catecholyamide sequestering agents

    SciTech Connect (OSTI)

    Pecoraro, V.L.; Wong, G.B.; Raymond, K.N.

    1982-06-01

    The solution equilibria for the reaction of Ga(III) and In(III) with the hexadentate ligands N, N', N''-tris(2,3-dihydroxy-5-sulfonatobenzoyl)-1,3,5-tris(aminomethyl)benzene (MECAMS) and N, N', N''-tris(2,3-dihydroxy-5-sulfonatobenzoyl)-1,5,10-triazadecane (3,4-LICAMS) and the bidentate catechol N,N-dimethyl-2,3-dihydroxy-5-sulfonatobenzamide (DMBS) have been determined on 0.1 M KNO/sub 3/ at 25/sup 0/C. Both Ga(III) and In(III) are coordinated by three catecholate groups at high pH and have formation constants of the order ..beta../sub 110/ = 10/sup 38/ M/sup -1/. As the acidity of the medium is increased, the metal complexes of the hexadentate sequestering agents undergo protonation reactions. For the determination of the nature of the protonated metal chelates, the stretching frequency of the amide carbonyl has been monitored in D/sub 2/O by Fourier transform infrared spectroscopy (FT IR). These data support a series of two one-proton steps to form a mixed salicylate-catecholate coordination about the metal ion. In the salicylate bonding mode the metal is bound through the ortho phenolic oxygen and the amide cabonyl whereas catecholate coordination is via the adjacent phenols. In contrast, protonation of the M/sup III/(DMBS)/sub 3/ complexes results in dissociation of a catechol moiety to form M/sup III/(DMBS)/sub 2/. The potential use of these compounds as tumor-imaging agents in cancer diagnosis is discussed, with specific attention to the role of the gallium transferrin complex.

  14. Agent 2003 Conference on Challenges in Social Simulation

    SciTech Connect (OSTI)

    Margaret Clemmons, ed.

    2003-01-01

    Welcome to the Proceedings of the fourth in a series of agent simulation conferences cosponsored by Argonne National Laboratory and The University of Chicago. Agent 2003 is the second conference in which three Special Interest Groups from the North American Association for Computational Social and Organizational Science (NAACSOS) have been involved in planning the program--Computational Social Theory; Simulation Applications; and Methods, Toolkits and Techniques. The theme of Agent 2003, Challenges in Social Simulation, is especially relevant, as there seems to be no shortage of such challenges. Agent simulation has been applied with increasing frequency to social domains for several decades, and its promise is clear and increasingly visible. Like any nascent scientific methodology, however, it faces a number of problems or issues that must be addressed in order to progress. These challenges include: (1) Validating models relative to the social settings they are designed to represent; (2) Developing agents and interactions simple enough to understand but sufficiently complex to do justice to the social processes of interest; (3) Bridging the gap between empirically spare artificial societies and naturally occurring social phenomena; (4) Building multi-level models that span processes across domains; (5) Promoting a dialog among theoretical, qualitative, and empirical social scientists and area experts, on the one hand, and mathematical and computational modelers and engineers, on the other; (6) Using that dialog to facilitate substantive progress in the social sciences; and (7) Fulfilling the aspirations of users in business, government, and other application areas, while recognizing and addressing the preceding challenges. Although this list hardly exhausts the challenges the field faces, it does identify topics addressed throughout the presentations of Agent 2003. Agent 2003 is part of a much larger process in which new methods and techniques are applied to difficult social issues. Among the resources that give us the prospect of success is the innovative and transdisciplinary research community being built. We believe that Agent 2003 contributes to further progress in computational modeling of social processes, and we hope that you find these Proceedings to be stimulating and rewarding. As the horizons of this transdiscipline continue to emerge and converge, we hope to provide similar forums that will promote development of agent simulation modeling in the years to come.

  15. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, Kenneth N. (Berkeley, CA); Xu, Jide (Berkeley, CA)

    1997-01-01

    Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of said chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to said 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities.

  16. 3-hydroxy-2(1H)-pyridinone chelating agents

    DOE Patents [OSTI]

    Raymond, K.N.; Xu, J.

    1997-04-29

    Disclosed is a series of improved metal chelating agents, which are highly effective upon both injection and oral administration; several of the most effective are of low toxicity. These chelating agents incorporate within their structure 1-hydroxy-2-pyridinone (1,2-HOPO) and 3-hydroxy-2-pyridinone (3,2-HOPO) moieties with a substituted carbamoyl group ortho to the hydroxy or oxo groups of the hydroxypyridinone ring. The electron-withdrawing carbamoyl group increases the acidity of the hydroxypyridinones. In the metal complexes of the chelating agents, the amide protons form very strong hydrogen bonds with its adjacent HOPO oxygen donor, making these complexes very stable at physiological conditions. The terminal N-substituents provides a certain degree of lipophilicity to the 3,2-HOPO, increasing oral activity. Also disclosed is a method of making the chelating agents and a method of producing a known compound, 3-hydroxy-1-alkyl-2(1H)pyridinone, used as a precursor to the chelating agent, safely and in large quantities. 2 figs.

  17. Intelligent Agents for the Synthetic Battlefield: A Company of Rotary Wing Aircraft

    E-Print Network [OSTI]

    Gratch, Jonathan

    agents that perform the tasks of an attack helicopter company for a synthetic battlefield environment to develop: (1) pilot agents for a company of helicopters, (2) a command agent that makes decisions and plans for the helicopter company, and (3) an approach to teamwork that enables the pilot agents to coordinate

  18. HIERARCHICAL AGENT BASED SYSTEM FOR GENERAL AVIATION CD&R UNDER

    E-Print Network [OSTI]

    Valasek, John

    Advanced Technology Project (ATP): Cockpit Data Fusion with Fixed-Base Simulation Validation for Free Data ADS-B Ground Weather Service Other Weather Info. ... ATC Radar Other Traffic Info... Overall.H) AGENT DATAOBJ WEATHER AGENT RADAR DATA (SIM) TRAFFIC AGENT ADS-B DATA (SIM) AGENT EXECUTIVE FCS COMGEN

  19. Mechanism Design for Resource Bounded International Conference on Multi-Agent Systems, ICMAS 2000

    E-Print Network [OSTI]

    Monderer, Dov

    Mechanism Design for Resource Bounded Agents International Conference on Multi-Agent Systems, ICMAS of mechanism design deals with the design of proto- cols for non-cooperative multi-agent systems. A major task of this theory is the design of protocols that will maximize the social welfare of the agents. An ideal mechanism

  20. Authorized Agent Indemnification Policy Approved by the Colorado School of Mines Board of Trustees, December

    E-Print Network [OSTI]

    against an Authorized Agent based upon sanctions imposed upon the Authorized Agent or CSM by a judicial: 3.2.1 Throughout the course of the matter that gave rise to the sanctions, the Authorized Agent of the matter that gave rise to the sanctions, the Authorized Agent was acting in good faith; and 3

  1. A low cost/high performance Scalable Topology for MultiAgent Collaboration

    E-Print Network [OSTI]

    Aguirre, Carlos

    task. We study a methodology to design di#11;erent topologies in large multi-agent networks that seek for maximum agent collaboration. In search of a maximum ow of commodities between agents, the Small-World (SW small-world (SW) de#12;ned by [21] en- hances agent collaboration by maximizing ow with similar

  2. Modeling and Control of Multi-Agent Systems 

    E-Print Network [OSTI]

    Zhao, Miaomiao

    2015-05-06

    , space crafts, unmanned aerial vehicles (UAVs), mobile robots, formation and attitude control, among others [6, 21,30]. This chapter presents an overview of the background research on multi-agent systems, about how the idea of multi-agent system developed... potential application to robots, unmanned vehicles, and computer animation [21] as shown in Figure 2.6. 15 Figure 2.6: Output regulation 2.3.5 Others Other problems such as mobile sensor networks, coupled oscillators, UAV surveil- lance [28,38] are also...

  3. Complex groundwater flow systems as traveling agent models

    E-Print Network [OSTI]

    López-Corona, Oliver; Escolero, Oscar; González, Tomás; Morales-Casique, Eric

    2014-01-01

    Analyzing field data from pumping tests, we show that as with many other natural phenomena, groundwater flow exhibits a complex dynamics described by 1/f power spectrum. This result is theoretically studied within an agent perspective. Using a traveling agent model, we prove that this statistical behavior emerges when the medium is complex. Some heuristic reasoning is provided to justify both spatial and dynamic complexity, as the result of the superposition of an infinite number of stochastic processes. Even more, we show that this implies that non-Kolmogorovian probability is needed for its study, and provide a set of new partial differential equations for groundwater flow.

  4. Method and apparatus for enhanced detection of toxic agents

    DOE Patents [OSTI]

    Greenbaum, Elias (Knoxville, TN); Rodriguez, Jr., Miguel (Oak Ridge, TN); Wu, Jie Jayne (Knoxville, TN); Qi, Hairong (Knoxville, TN)

    2012-06-12

    A water quality analyzer for real-time detection according to the invention comprises a biased AC electro-osmosis (ACEO) cell for receiving a fluid to be analyzed having a plurality photosynthetic organisms therein, and concentrating the plurality photosynthetic organisms into at least one concentrated region. A photodetector is provided for obtaining a measured photosynthetic activity of the plurality of photosynthetic organisms in the concentrated region, wherein chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. An electronics package analyzes the measured photosynthetic activity to indicate a presence of the chemical, biological or radiological agents in the fluid.

  5. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  6. Principles of Authentication

    E-Print Network [OSTI]

    Peisert, Sean; Talbot, Ed; Kroeger, Tom

    2013-01-01

    Security Engineering: A Guide to Building Dependable Distributed Systems, Second Edition, chapter 13, Nuclear

  7. ARM - Central Authentication Service

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Comments? We would love to hear from you! Send us agovInstrumentswrf-chem Comments? We wouldCampaign

  8. CERTIFICATE OF AUTHENTICITY

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann JacksonDepartment|Marketing, LLCEfficiency |CBA.PDF� MoreJune

  9. Regional Lead Agents and County Coordinators 2011 RESPONSIBILITY NAME COUNTY

    E-Print Network [OSTI]

    Bolding, M. Chad

    #12;Regional Lead Agents and County Coordinators 2011 RESPONSIBILITY NAME COUNTY REGION 1 Regional Lead Millie Davenport HGIC County Coordinator Matt Burns Pickens County Coordinator Marty Watt Anderson County Coordinator Morris Warner Oconee REGION 2 Regional Lead Danny Howard Greenville County Coordinator

  10. Network Formation and Routing by Strategic Agents using Local Contracts

    E-Print Network [OSTI]

    Anshelevich, Elliot

    Network Formation and Routing by Strategic Agents using Local Contracts Elliot Anshelevich1, Murray Hill, NJ. Abstract. The Internet consists of various independent entities that range from small their business goals. For example, customers accept contracts with ISPs to connect them to the Internet while

  11. MAGENTA Technology: MultiAgent Systems for Industrial Logistics

    E-Print Network [OSTI]

    Woolridge, Mike

    MAGENTA Technology: Multi­Agent Systems for Industrial Logistics Jon Himoff 1 Petr Skobelev 1, and illustrate its practical use by describing a field­tested application in the area of logistics for debugging systems. The application we describe is a field­ tested scheduling/logistics system for Tankers

  12. Risk management in concurrent engineering in presence of intelligent agents

    E-Print Network [OSTI]

    Fox, Mark S.

    Risk management in concurrent engineering in presence of intelligent agents Taner Bilgi describe how a specific facet of systems engineering (risks) can be managed for large, concurrent with risks. Risk management has three stages to it: 1. Risk assessment 2. Risk analysis 3. Risk handling Risk

  13. Coordination of Multiple Non-Holonomic Agents with Input Constraints

    E-Print Network [OSTI]

    Loizou, Savvas G.

    -aircraft systems modeled as hybrid systems. With the advent of powerful formal verification tools, there has been with aircraft-like kinematic constraints. A model of a system of input-constrained non- holonomic agents by Belta et al. in [10]. In this paper, a discrete model of a system with input- constrained non

  14. Biosensor for Direct Determination of Organophosphate Nerve Agents Using

    E-Print Network [OSTI]

    Chen, Wilfred

    Biosensor for Direct Determination of Organophosphate Nerve Agents Using Recombinant Escherichia coli with Surface-Expressed Organophosphorus Hydrolase. 2. Fiber-Optic Microbial Biosensor Ashok of California, Riverside, California 92521 A fiber-optic microbial biosensor suitable for direct mea- surement

  15. SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS

    E-Print Network [OSTI]

    SOFTWARE AGENTS IN HANDLING ABNORMAL SITUATIONS IN INDUSTRIAL PLANTS Sami Syrjälä and Seppo Kuikka Institute of Automation and Control Department of Automation Tampere University of Technology. The abnormal situation handling in industrial plants is a challenging application area due to the complexity

  16. Real-Time Multi-Agent Support for Decentralized Management

    E-Print Network [OSTI]

    Wedde, Horst F.

    " or deregulated markets. Our multi-agent system exhibits a very high robustness against power failures compared%. This allows for quite a stable planning of capacities, long-term pur- chases of fuel (coal, oil, nuclear reserve capacity that may never be used. In addition, market-based phenomena like after the deregulation

  17. ROBOT-DISCOVERER: A ROLE MODEL FOR ANY INTELLIGENT AGENT

    E-Print Network [OSTI]

    Ras, Zbigniew W.

    to apply knowledge in many ways. As discovery is rarely a one-time event, this process continues through way to satisfy an expanded range of goals is to implement new com- ponents of the discovery processROBOT-DISCOVERER: A ROLE MODEL FOR ANY INTELLIGENT AGENT JAN M. _ZYTKOW Department of Computer

  18. Challenge Problem: Agent-Mediated Decentralized Information Mechanisms

    E-Print Network [OSTI]

    Chen, Yiling

    , data degra- dation, and information aggregation; and (3) reputation mechanisms to address asymmetriesChallenge Problem: Agent-Mediated Decentralized Information Mechanisms David C. Parkes Division the opportunities, such as for data mining and collaborative filtering, and the dangers, such as for privacy abuse

  19. Voting in Cooperative Information Agent Scenarios: Use and Abuse

    E-Print Network [OSTI]

    Lehmann, Daniel

    with its own set of fundamental questions (both the- oretical and applied). This distinctive blurringVoting in Cooperative Information Agent Scenarios: Use and Abuse Jeffrey S. Rosenschein Ariel D}@cs.huji.ac.il Abstract. Social choice theory can serve as an appropriate foundation upon which to build cooperative

  20. Genetic Programming and Multi-Agent Layered Learning by Reinforcements

    E-Print Network [OSTI]

    Fernandez, Thomas

    , intermediate objective function for pairs of cooperating agents. We apply GP to optimize first for the intermediate, then for the team objective function, using the final population from the earlier GP, pair, and small group drills, resulting in a well- defined hierarchy of behaviors. Traditional GP

  1. Agents, Bookmarks and Clicks: A topical model of Web navigation

    E-Print Network [OSTI]

    Ramasco, José Javier

    Agents, Bookmarks and Clicks: A topical model of Web navigation Mark R. Meiss1,3 Bruno Gonçalves1 has shown that the standard Markovian model of Web navigation is a poor predictor of actual Web traffic. Using empirical data, we characterize several properties of Web traffic that cannot be reproduced

  2. Requirements for a Policy-Enforceable Agent Architecture

    E-Print Network [OSTI]

    Young, R. Michael

    . Emerging legislation that governs consumer privacy presents a de- sign challenge to multi-agent systems practices must be transparent and measurable to avoid prohibitive sanctions by regulators. Human interpret both HIPAA and the GLBA to establish guidelines or rules with specific rights and obligations

  3. Outcomes/Impacts Our Ag Agent established a monitoring system

    E-Print Network [OSTI]

    Florida, University of

    Outcomes/Impacts · Our Ag Agent established a monitoring system and educational outreach to area farms to track and manage an emerging insect threat to county berry crops. · As a result of County preservation, nutrition and wellness as well as energy and housing and specific programs to meet the needs

  4. Genetic Programming to Learn an Agent's Monitoring Strategy *

    E-Print Network [OSTI]

    of Massachusetts Amherst, MA 01003 Abstract Many tasks require an agent to monitor its environment, but little the literature on strategies for monitoring the environment is very sparse. The most common monitoring strategies state of the environment affect my monitoring strategy? etc.). We therefore use a learning algorithm

  5. Genetic Programming to Learn an Agent's Monitoring Strategy*

    E-Print Network [OSTI]

    of Massachusetts Amherst, MA 01003 Abstract Many tasks require an agent to monitor its environment, but little the literature on strategies for monitoring the environment is very sparse. The most common monitoring strategies state of the environment affect my monitoring strategy? etc.). We therefore use a learning algorithm

  6. Incremental Biomedical Ontology Change Management through Learning Agents

    E-Print Network [OSTI]

    Haarslev, Volker

    Incremental Biomedical Ontology Change Management through Learning Agents Arash Shaban change management methodologies is the over-reliance on human factors. Despite the advantages of human ontologies. This frame- work aims to assist and guide ontology engineers through the change manage- ment

  7. Time-dependent unidirectional communication in multi-agent systems

    E-Print Network [OSTI]

    Luc Moreau

    2003-06-30

    We study a simple but compelling model of $n$ interacting agents via time-dependent, unidirectional communication. The model finds wide application in a variety of fields including synchronization, swarming and distributed decision making. In the model, each agent updates his current state based upon the current information received from other agents. Necessary and/or sufficient conditions for the convergence of the individual agents' states to a common value are presented, extending recent results reported in the literature. Unlike previous, related studies, the approach of the present paper does not rely on algebraic graph theory and is of a completely nonlinear nature. It is rather surprising that with these nonlinear tools, extensions may be obtained even for the linear cases discussed in the literature. The proof technique consists of a blend of graph-theoretic and system-theoretic tools integrated within a formal framework of set-valued Lyapunov theory and may be of independent interest. Further, it is also observed that more communication does not necessarily lead to better convergence and may eventually even lead to a loss of convergence, even for the simple models discussed in the present paper.

  8. Saturday's Auctions Suburb Address Type Price Result Agent

    E-Print Network [OSTI]

    Peters, Richard

    Saturday's Auctions Suburb Address Type Price Result Agent Ascot Park 7 Joy St 2 br h N/A PN RW: 47 Number Reported Auctions: 30 Sold: 24 Withdrawn: N/A % Cleared: 80 % Total Sales: $11 Clearance Rate methodology please click here For a more comprehensive list of results covering all reported

  9. Creating an intelligent agent for StarCraft: Brood War

    E-Print Network [OSTI]

    Ernst, Damien

    Creating an intelligent agent for StarCraft: Brood War University of Ličge Faculty of Applied artificialintelligence (AI)? Video games Why real-time strategy (RTS) games? Introduction #12;StarCraft: Brood War a patrol unit #12;Implementation Chapter III #12;StarCraft is not open source! The Brood War Application

  10. Ensuring Robust Agent Control in Uncertain Environments \\Lambda

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    . Design­to­ Criteria is a soft real­time agent control process where schedules are built to meet dynamic to achieve the high­level goal is minimized. Design­to­Criteria (DTC) scheduling[13] is the soft real meets certain design criteria, such as real­time deadlines, cost limits, and quality preferences

  11. MATOURA: MULTI-AGENT TOURIST ADVISOR Constantin Halatsis1

    E-Print Network [OSTI]

    Panagiotis, Stamatopoulos

    , for an integrated and friendly access to the relevant data. Thus, tourism infor- matics as well as other of the on-line computer ser- vices in the area of tourism has contributed signif- icantly to improving, a speci c application on tourism, called MaTourA (Multi-agent Tourist Advisor) 7, 6] is presented

  12. Planning partially for situated agents Paolo Mancarella1

    E-Print Network [OSTI]

    Toni, Francesca

    Planning partially for situated agents Paolo Mancarella1 , Fariba Sadri2 , Giacomo Terreni1 the planning literature there has been a de- parture from approaches computing total plans for given goals, in favour of ap- proaches computing partial plans. Total plans can be seen as (partially ordered) sets

  13. Mobile Agents for WWW Distributed Database Access Stavros Papastavrou

    E-Print Network [OSTI]

    Pitoura, Evaggelia

    ­ based DBMS client/server applications. However, the current commercial applet­based methodologies, lightweight, flexible, independent and portable Java DBMS client programs, with maximum performance. The proposed framework, called the ''DBMS­Aglet Framework'' utilizes the newest technology of mobile agents

  14. Agents in Decentralised Information Ecosystems: The DIET Approach

    E-Print Network [OSTI]

    Tryfonopoulos, Christos

    Agents in Decentralised Information Ecosystems: The DIET Approach P. Marrow1 *, M. Koubarakis2 , R be through the concept of an information ecosystem. An information ecosystem is analogous to a natural ecosystem in which there are flows of materials and energy analogous to information flow between many

  15. Two Stock-Trading Agents: Market Making and Technical Analysis

    E-Print Network [OSTI]

    Stone, Peter

    Two Stock-Trading Agents: Market Making and Technical Analysis Yi Feng, Ronggang Yu, Peter Stone://www.cs.utexas.edu/~{fengyi,ryu,pstone} Abstract. Evolving information technologies have brought computa- tional power and real-time facilities into the stock market. Automated stock trading draws much interest from both the #12;elds of computer sci- ence

  16. The 2001 Trading Agent Competition Michael P. Wellman

    E-Print Network [OSTI]

    Stone, Peter

    in automating trading strategies. Based on a challenging market scenario in the domain of travel shopping in designing one's own, as well as in designing the market itself. Unfortunately, data about real-world trading, the competition presents agents with difficult issues in bidding strategy, market prediction, and resource

  17. Mechanism Design for Software Agents with Complete Information

    E-Print Network [OSTI]

    O'Connell, Tom

    Mechanism Design for Software Agents with Complete Information Thomas C. O'Connell a,,1 Richard EDepartment of Computer Science, University at Albany, SUNY, Albany, NY 12222 Abstract We investigate the mechanism design that arise in applying results from mechanism design to computational problems. In particular, our results

  18. Modeling civil violence: An agent-based computational approach

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    ," I do so advisedly, recognizing that no political or social order is represented in the model of revolutions properly speaking. The dynamics of decentralized upheaval, rather than its political substance Against Central Authority This model involves two categories of actors. ``Agents'' are members

  19. Relational Agents: A Model and Implementation of Building User Trust

    E-Print Network [OSTI]

    Bickmore, Timothy

    ; essentially a passive strategy for relationship building. What these systems lack are explicit behaviorsRelational Agents: A Model and Implementation of Building User Trust Timothy Bickmore, Justine}@media.mit.edu ABSTRACT Building trust with users is crucial in a wide range of applications, such as advice

  20. Role-based and agent-oriented teamwork modeling 

    E-Print Network [OSTI]

    Cao, Sen

    2005-11-01

    and for interpreting the knowledge of teamwork and then driving agents to interact with the domains. Psychological studies on teamwork have also shown that team members in an effective team often maintain shared mental models so that they can have mutual expectation...

  1. FUTURE POWER GRID INITIATIVE An Intelligent Agent Platform

    E-Print Network [OSTI]

    FUTURE POWER GRID INITIATIVE VOLTTRONTM : An Intelligent Agent Platform for the Smart Grid Two-way Power Flows n Decentralized Control To Support Micro-Grids And Islanding n Enable Load, not developed past simulation, and/or do not fit the requirements of the power grid. VOLTTRON has become

  2. Aprendizaje Incremental en Sistemas Multi-Agente BDI

    E-Print Network [OSTI]

    Guerra Hernández, Alejandro

    Aprendizaje Incremental en Sistemas Multi-Agente BDI Gustavo Ortiz Hern´andez Director de Tesis: Alejandro Guerra Hern´andez Tesis presentada para obtener el grado de Maestro en Inteligencia Artificial innumerable material de apoyo brindado, sin el cual no hubiera sido posible esta tesis. A la Dra. Cora Beatriz

  3. Agent-Based Computing Center on Social and Economic Dynamics

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    ­ `Computational economics' means numerical analysis of conventional (e.g., rational, equilibrium) models ­ `Computational finance' involves numerical solution of stochastic PDEs ­ `Computational game theory' involvesAgent-Based Computing in Economics Rob Axtell Center on Social and Economic Dynamics The Brookings

  4. W23 The Workshop on Multi-Agent Interaction Networks

    E-Print Network [OSTI]

    Swarup, Samarth

    W23 ­ The Workshop on Multi-Agent Interaction Networks (MAIN 2013) Samarth Swarup (Virginia Tech, USA) Madhav Marathe (Virginia Tech, USA) Stephen Eubank (Virginia Tech, USA) Milind Tambe (University Committee Samarth Swarup, Virginia Tech, USA Madhav Marathe, Virginia Tech, USA Stephen Eubank

  5. Organized by Academy for Global Nuclear Safety and Security Agent,

    E-Print Network [OSTI]

    Furui, Sadaoki

    Research Collaboration Center, Tokyo Tech. Fukushima Daiichi Nuclear Power Plants on March 20, 2011Organized by Academy for Global Nuclear Safety and Security Agent, Tokyo Institute of Technology Energy Agency (JAEA) Institute of Nuclear Materials Management (INMM) Japan Chapter International Nuclear

  6. Semi-Cooperative Learning in Smart Grid Agents

    E-Print Network [OSTI]

    Veloso, Manuela M.

    in an environment where customers operate in modern retail power markets and thus have a choice of intermediary brokers with whom they can contract to buy or sell power. In this setting, customers face a learning using Power TAC, an agent-based Smart Grid simulation platform and substantiate the value of autonomous

  7. Bisamide bisthiol compounds useful for making technetium radiodiagnostic renal agents

    DOE Patents [OSTI]

    Davison, Alan (Needham, MA); Brenner, David (Cambridge, MA); Lister-James, John (Cambridge, MA); Jones, Alun G. (Newton Centre, MA)

    1987-06-16

    A radiodiagnostic bisamido-bisthio ligand useful for producing Tc-labelled radiodiagnostic renal agents is described. The ligand forms a complex with the radionuclide .sup.99m Tc suitable for administration as a radiopharmaceutical to obtain images of the kidney for diagnosis of kidney disfunction.

  8. Declarative & Procedural Goals in Intelligent Agent Systems Michael Winikoff

    E-Print Network [OSTI]

    Padgham, Lin

    Science and Information Technology RMIT University Melbourne, Australia. winikoff@cs.rmit.edu.au LinDeclarative & Procedural Goals in Intelligent Agent Systems Michael Winikoff School of Computer is that of goals (Winikoff et al., 2001). Goals have two aspects: declarative, where a goal is a description

  9. Carbon nanotubes as photoacoustic molecular imaging agents in living mice

    E-Print Network [OSTI]

    Khuri-Yakub, Butrus T. "Pierre"

    Carbon nanotubes as photoacoustic molecular imaging agents in living mice ADAM DE LA ZERDA1 not shown to target a diseased site in living subjects. Here we show that single-walled carbon nanotubes were verified ex vivo using Raman microscopy. Photoacoustic imaging of targeted single-walled carbon

  10. Attention Based, Naive Strategies, for Guiding Intelligent Virtual Agents

    E-Print Network [OSTI]

    Corran, Ruth

    communication be- tween the components Several studies have demonstrated that human's feelings towards virtualAttention Based, Naive Strategies, for Guiding Intelligent Virtual Agents Damien Clauzel1 , Claudia). It is composed of speech, animations, expressions and other actions. Any action in the script may be assigned

  11. Towards Modelling the research in Green IT with Agents

    E-Print Network [OSTI]

    Lefčvre, Laurent

    ­ reliability Now: Green IT and new-Energy consumption ­ energy consumption awareness ­ interestingTowards Modelling the research in Green IT with Agents Christina Herzog, Jean-Marc Pierson, Laurent Lefevre #12;Page 2 Many questions There are many unanswered questions: · Why is Green IT important? What

  12. Modelling Electrical Car Diffusion Based on Agent Tao Zhang, 3

    E-Print Network [OSTI]

    Aickelin, Uwe

    to include things like car parking charges, price of electrical car, energy awareness and word of mouth. In this paper we present a first case study related to the introduction of a new car park charging schemeModelling Electrical Car Diffusion Based on Agent 1 Lei Yu, ,2 Tao Zhang, 3 Siebers Peer-Ola, 4

  13. Rail Sensor Testbed Program: Active Agents in Containers for

    E-Print Network [OSTI]

    Kansas, University of

    . Project Sponsor: Office of Naval Research Contract: N00014-07-1-1042 The University of Kansas Technical of the project, we have developed several data mining algorithms to enable intelligent agents to detect changes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 4. Data Mining Foundation of Anomaly Detection in Wireless Sensor Networks 10 4.1. Network

  14. Domain-dependent information gathering agent Aleksander Pivk*, Matjaz Gams

    E-Print Network [OSTI]

    Pivk, Aleksander

    . To make things worse, the Internet is poorly structured, and disorganized (Lewis, 1999, and EMA (EMployment Agent), which performs employment and job related functions over the Internet. q 2002 extraction; Inductive learning; Wrapper 1. Introduction Internet services offer several advantages over

  15. Fair Encryption of RSA Keys Guillaume Poupard and Jacques Stern

    E-Print Network [OSTI]

    Stern, Jacques

    based on verifiable encryption of secret keys using double decker exponentiation which makes the proofs

  16. A Faster Hardware Implementation of RSA Ajay C Shantilal

    E-Print Network [OSTI]

    , RNS, Chinese remainder theorem power anal- ysis, timing attacks. I. Introduction. It is widely multiplication is based on Redundant Number System (RNS). In RNS an integer is Author is a graduate student-mail: ajay@ece.orst.edu represented by set of its residues in terms of base elements of RNS, and thus

  17. A variant of Wiener's attack on RSA Andrej Dujella

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    the form p q = rpm+1 ± spm rqm+1 ± sqm (3) for some m -1 and nonnegative integers r and s such that rs

  18. Home Composting William T. Hlubik, Middlesex County Agricultural Agent; Jonathan Forsell, Former Essex County Agricultural Agent (deceased);

    E-Print Network [OSTI]

    Rainforth, Emma C.

    Home Composting William T. Hlubik, Middlesex County Agricultural Agent; Jonathan Forsell, Former; and Mark Winokur, Former Program Assistant Fact sheet FS811 www.rce.rutgers.edu H H H H What is Composting? Composting is a natural process where organic materials decompose and are recycled into a dark, crumbly

  19. Problem Structure and Subproblem Sharing in MultiAgent Systems Dorothy L. Mammen and Victor R. Lesser \\Lambda

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    , lesserg@cs.umass.edu Abstract In multi­agent problem­solving systems in which agents work asynchronously­agent problem­solving simulator. Using these tools, we offer some empirical observations of the trade­ off paradigm. 1. Introduction In multi­agent problem­solving systems in which agents work asynchronously

  20. Tissue-based standoff biosensors for detecting chemical warfare agents

    DOE Patents [OSTI]

    Greenbaum, Elias; Sanders, Charlene A.

    2003-11-18

    A tissue-based, deployable, standoff air quality sensor for detecting the presence of at least one chemical or biological warfare agent, includes: a cell containing entrapped photosynthetic tissue, the cell adapted for analyzing photosynthetic activity of the entrapped photosynthetic tissue; means for introducing an air sample into the cell and contacting the air sample with the entrapped photosynthetic tissue; a fluorometer in operable relationship with the cell for measuring photosynthetic activity of the entrapped photosynthetic tissue; and transmitting means for transmitting analytical data generated by the fluorometer relating to the presence of at least one chemical or biological warfare agent in the air sample, the sensor adapted for deployment into a selected area.

  1. Automatic generation of communication and teamwork within multi-agent teams 

    E-Print Network [OSTI]

    Biggers, Keith Edward

    2001-01-01

    Teamwork and communication are two important processes within multi-agent systems designed to act in a coherent and coordinated manner. Modeling teamwork involves interleaving steps within shared plans that will allow agents to work together towards...

  2. Design and Applications of an Intelligent Financial Reporting and Auditing Agent with Net Knowledge (FRAANK)

    E-Print Network [OSTI]

    Srivastava, Rajendra P.; Bovee, Matthew; Kogan, Alexander; Nelson, Kay; Vasarhelyi, Miklos A.

    2002-01-01

    This paper discusses the use of intelligent Internet agents as essential tools for automating financial analysis functions in the virtual world. Several important characteristic features of intelligent agents are discussed, ...

  3. Method for tracking the location of mobile agents using stand-off detection technique

    DOE Patents [OSTI]

    Schmitt, Randal L. (Tijeras, NM); Bender, Susan Fae Ann (Tijeras, NM); Rodacy, Philip J. (Albuquerque, NM); Hargis, Jr., Philip J. (Albuquerque, NM); Johnson, Mark S. (Albuquerque, NM)

    2006-12-26

    A method for tracking the movement and position of mobile agents using light detection and ranging (LIDAR) as a stand-off optical detection technique. The positions of the agents are tracked by analyzing the time-history of a series of optical measurements made over the field of view of the optical system. This provides a (time+3-D) or (time+2-D) mapping of the location of the mobile agents. Repeated pulses of a laser beam impinge on a mobile agent, such as a bee, and are backscattered from the agent into a LIDAR detection system. Alternatively, the incident laser pulses excite fluorescence or phosphorescence from the agent, which is detected using a LIDAR system. Analysis of the spatial location of signals from the agents produced by repeated pulses generates a multidimensional map of agent location.

  4. Determination of Suppression Concentration for Clean Agents Exposed to a Continuously-Energized Heated Metal Surface'

    E-Print Network [OSTI]

    Womeldorf, Carole

    Determination of Suppression Concentration for Clean Agents Exposed to a Continuously-Energized energized electrical equipment where the nonconductivity ofthe extinguishing agent is of importance. NFPA concentration under conditionswhere energized electrical equipment can not be disconnected from electrical

  5. Intelligence by design : principles of modularity and coordination for engineering complex adaptive agents

    E-Print Network [OSTI]

    Bryson, Joanna Joy, 1965-

    2001-01-01

    All intelligence relies on search - for example, the search for an intelligent agent's next action. Search is only likely to succeed in resource-bounded agents if they have already been biased towards finding the right ...

  6. Optimal Mix of Penalties in a Principal-Agent Model under Different Institutional Arrangements

    E-Print Network [OSTI]

    Earnhart, Dietrich H.

    2000-03-13

    This paper uses principal-agent theory to examine the optimal mix of monetary- and resource-based penalties in two institutional settings: a market economy and a centrally planned economy. In a centrally planned economy, an agent's wealth depends...

  7. Hierarchical decomposition of multi-agent Markov decision processes with application to health aware planning

    E-Print Network [OSTI]

    Chen, Yu Fan, S.M. Massachusetts Institute of Technology

    2014-01-01

    Multi-agent robotic systems have attracted the interests of both researchers and practitioners because they provide more capabilities and afford greater flexibility than single-agent systems. Coordination of individual ...

  8. Dynamic Agent Systems in the CoAX Binni 2002 Experiment 

    E-Print Network [OSTI]

    Wark, S; Zschorn, A; Perugini, D; Tate, Austin; Beautement, P; Bradshaw, J M; Suri, N

    The goal of the international CoAX (Coalition Agents eXperiment) program was to demonstrate how agent systems could be used to provide agile and flexible command and control systems for coalition operations, and facilitate ...

  9. Roadmap-Based Techniques for Modeling Group Behaviors in Multi-Agent Systems 

    E-Print Network [OSTI]

    Rodriguez, Samuel Oscar

    2012-07-16

    Simulating large numbers of agents, performing complex behaviors in realistic environments is a difficult problem with applications in robotics, computer graphics and animation. A multi-agent system can be a useful tool ...

  10. Social Reasoning in Multi-Agent Systems with the Expectation-Strategy-Behaviour Framework 

    E-Print Network [OSTI]

    Wallace, Iain Andrew

    2010-01-01

    Multi-agent Systems (MAS) provide an increasingly relevant field of research due to their many applications to modelling real world situations where the behaviour of many individual, self-motivated, agents must be reasoned ...

  11. General Technical Report PSW-GTR-243 Effect of Fungicides and Biocontrol Agents on

    E-Print Network [OSTI]

    General Technical Report PSW-GTR-243 166 Effect of Fungicides and Biocontrol Agents on Inoculum was to evaluate the activity of foliar applied fungicides and biocontrol agents to inhibit sporulation and reduce

  12. A Potentiometric Microbial Biosensor for Direct Determination of Organophosphate Nerve Agents

    E-Print Network [OSTI]

    Chen, Wilfred

    A Potentiometric Microbial Biosensor for Direct Determination of Organophosphate Nerve Agents Ashok microbial biosensor for the direct measurement of organophosphate (OP) nerve agents was developed stimulated the devel- opment of technologies for effective treatment (detoxification/ disposal

  13. Deactivating Chemical Agents Using Enzyme-Coated Nanofibers Formed by Electrospinning

    E-Print Network [OSTI]

    Cincinnati, University of

    Deactivating Chemical Agents Using Enzyme-Coated Nanofibers Formed by Electrospinning D. Han, S Development and Engineering Center, Natick, Massachusetts, United States ABSTRACT: The coaxial electrospinning the potential to provide enhanced protection from chemical agents. Electrospinning is a versatile technique

  14. Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing

    E-Print Network [OSTI]

    Záruba, Gergely

    devices throughout an individual's working and living environment. Mobile agents are software entities needed. Ubiquitous entities refer to small, mobile computing devices like handhelds, portable in a pervasive computing environment for ubiquitous devices. The prototype design of the mobile agent

  15. Implementation of scheduling agents for the R-shell real-time environment 

    E-Print Network [OSTI]

    Herdejurgen, Michael Seann

    1993-01-01

    resource guarantee, the scheduling agent must ensure that the resource requirements are no( exceeded. If any requirement, such as CPU time or memory used, is exceeded, then the procedure is aborted. In order to abort a procedure, the scheduling agent...

  16. Carbonyl sulfide: potential agent of atmospheric sulfur corrosion

    SciTech Connect (OSTI)

    Graedel, T.E.; Kammlott, G.W.; Franey, J.P.

    1981-05-08

    Laboratory exposure experiments demonstrate that carbonyl sulfide in wet air corrodes copper at 22/sup 0/C at a rate that is approximately linear with total exposure (the product of exposure time and carbonyl sulfide concentration). The corrosion rate is similar to that of hydrogen sulfide, a widely recognized corrodant. The much greater average atmospheric abundance of carbonyl sulfide compared with that of hydrogen sulfide or sulfur dioxide suggests that carbonyl sulfide may be a major agent of atmospheric sulfur corrosion.

  17. An Agent Based Simulation of Smart Metering Technology Adoption

    E-Print Network [OSTI]

    Zhang, Tao; Nuttall, William J.

    simultaneously), micro-hydro, micro-wind and photovoltaics. The benefits of wind, solar and hydro micro-generation are the zero fuel cost and that the technologies are carbon free. The development of micro-generation can potentially produce a third of a... /behavioural theory. The paper is comprised of six sections. The second section describes smart metering technology and its current situation of adoption. The third section describes our agent-based simulation model of smart metering technology adoption...

  18. Calibrating Building Energy Models Using Supercomputer Trained Machine Learning Agents

    SciTech Connect (OSTI)

    Sanyal, Jibonananda [ORNL] [ORNL; New, Joshua Ryan [ORNL] [ORNL; Edwards, Richard [ORNL] [ORNL; Parker, Lynne Edwards [ORNL] [ORNL

    2014-01-01

    Building Energy Modeling (BEM) is an approach to model the energy usage in buildings for design and retrofit purposes. EnergyPlus is the flagship Department of Energy software that performs BEM for different types of buildings. The input to EnergyPlus can often extend in the order of a few thousand parameters which have to be calibrated manually by an expert for realistic energy modeling. This makes it challenging and expensive thereby making building energy modeling unfeasible for smaller projects. In this paper, we describe the Autotune research which employs machine learning algorithms to generate agents for the different kinds of standard reference buildings in the U.S. building stock. The parametric space and the variety of building locations and types make this a challenging computational problem necessitating the use of supercomputers. Millions of EnergyPlus simulations are run on supercomputers which are subsequently used to train machine learning algorithms to generate agents. These agents, once created, can then run in a fraction of the time thereby allowing cost-effective calibration of building models.

  19. Mercury removal in utility wet scrubber using a chelating agent

    DOE Patents [OSTI]

    Amrhein, Gerald T. (Louisville, OH)

    2001-01-01

    A method for capturing and reducing the mercury content of an industrial flue gas such as that produced in the combustion of a fossil fuel or solid waste adds a chelating agent, such as ethylenediaminetetraacetic acid (EDTA) or other similar compounds like HEDTA, DTPA and/or NTA, to the flue gas being scrubbed in a wet scrubber used in the industrial process. The chelating agent prevents the reduction of oxidized mercury to elemental mercury, thereby increasing the mercury removal efficiency of the wet scrubber. Exemplary tests on inlet and outlet mercury concentration in an industrial flue gas were performed without and with EDTA addition. Without EDTA, mercury removal totaled 42%. With EDTA, mercury removal increased to 71%. The invention may be readily adapted to known wet scrubber systems and it specifically provides for the removal of unwanted mercury both by supplying S.sup.2- ions to convert Hg.sup.2+ ions into mercuric sulfide (HgS) and by supplying a chelating agent to sequester other ions, including but not limited to Fe.sup.2+ ions, which could otherwise induce the unwanted reduction of Hg.sup.2+ to the form, Hg.sup.0.

  20. Resilient Control System Execution Agent (ReCoSEA)

    SciTech Connect (OSTI)

    Craig G. Rieger; Kris Villez

    2012-08-01

    In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

  1. Multiple Negotiations among Agents for a Distributed Meeting Scheduler Toramatsu SHINTANI Takayuki ITO Katia SYCARA

    E-Print Network [OSTI]

    - erence of an user, we employ a decision hierarchy based on MAUT[2]. Each agent keeps an user's decision

  2. Methods to radiolabel natural organic matter by reduction with hydrogen labeled reducing agents

    DOE Patents [OSTI]

    Tinnacher, Ruth M.; Honeyman, Bruce D.

    2011-10-18

    Methods to radiolabel natural organic matter by reduction with a hydrogen labeled reducing agent, and compositions, are provided.

  3. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  4. Using Artificial Physics to Control Agents William M. Spears and Diana F. Gordon

    E-Print Network [OSTI]

    of this research is the distributed control of agents that range in scale from neurons, nanobots, or micro

  5. PagePrompter: An Intelligent Agent for Web Navigation Created Using Data Mining Techniques

    E-Print Network [OSTI]

    Regina, University of

    1 PagePrompter: An Intelligent Agent for Web Navigation Created Using Data Mining Techniques Y.Y. Yao, H.J. Hamilton, and Xuewei Wang Abstract: Creating an intelligent agent for web navigation, which is an agent that dynam- ically gives recommendations to a web site's users by learning from web usage mining

  6. Desiderata for Agent Communication Languages James May eld Yannis Labrou Tim Finin

    E-Print Network [OSTI]

    Finin, Tim

    sharing among agents. KQML is de- scribed and evaluated as an agent communication language relative, and the This work was supported in part by the Air Force O ce of Scienti c Research under contract F49620 92 J 0174. A communityof intelligent agents can address the rst two of the problems mentioned above. When we de- scribe

  7. An Agent Design for Repeated Negotiation and Information Revelation with People

    E-Print Network [OSTI]

    Kraus, Sarit

    and agents re- peatedly negotiate over scarce resources, there is incomplete information about compromising the individual gains of agents. This paper presents a novel agent design for re- peated. INTRODUCTION In many negotiation settings, participants lack informa- tion about each other's resources

  8. GIS and Spatial Agent-Based Model Simulations for Sustainable Development

    E-Print Network [OSTI]

    George Mason University

    1 GIS and Spatial Agent-Based Model Simulations for Sustainable Development Claudio Cioffi-Revilla1 and climate. This paper explains the needs and demand for GIS in these types of agent-based models with GIS for representing spatial features. Keywords: geographic information systems (GIS), spatial agent

  9. Output Synchronization of Multi-Agent Systems with Event-Driven Communication: Communication Delay and

    E-Print Network [OSTI]

    Antsaklis, Panos

    Output Synchronization of Multi-Agent Systems with Event-Driven Communication: Communication Delay-Agent Systems with Event-Driven Communication: Communication Delay and Signal Quantization Han Yu, Student is an important extension of applying event-driven communication to control of multi-agent systems, especially

  10. Evolution of the spectral properties of a visual agent receptor Achim Liese Daniel Polani

    E-Print Network [OSTI]

    Polani, Daniel

    in the simulated world, called lamps. If an agent is close enough to a lamp, its life energy is re­ plenished at a certain rate. The life energy balance of an agent and thus its life span depends on the available sensor. The present exper­ iments show that the GA is able to find a balance between sensor costs and agent per

  11. AGENT-BASED SIMULATION OF PRODUCT INNOVATION: MODULARITY, COMPLEXITY AND DIVERSITY

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 AGENT-BASED SIMULATION OF PRODUCT INNOVATION: MODULARITY, COMPLEXITY AND DIVERSITY S.H. CHEN The importance of modularity in product innovation is analyzed in this paper. Through simulations with an agent an agent-based model to simulate the evolution of product innovation by growing it from bottom up

  12. An Architecture of a Multi-Agent System for SCADA -dealing with uncertainty, plans and actions

    E-Print Network [OSTI]

    Liu, Weiru

    An Architecture of a Multi-Agent System for SCADA - dealing with uncertainty, plans and actions.loughlin@ecit.qub.ac.uk Keywords: Autonomous Agents, Multi-agent Systems, Sensors, SCADA, Uncertainty, Plans, Actions, Fusion in traditional SCADA systems deployed in critical environments such as electrical power generation, transmission

  13. A Practical Agent Programming Language Mehdi Dastani and John-Jules Ch. Meyer

    E-Print Network [OSTI]

    Dastani, Mehdi

    A Practical Agent Programming Language Mehdi Dastani and John-Jules Ch. Meyer Utrecht University-based agent- oriented programming language. It proposes an alternative by presenting the syn- tax and semantics of a programming language, called 2APL (A Practical Agent Programming Language). This programming

  14. Can You Teach an Old Dog New Tricks? How Older Adults Perceive Embodied Agents

    E-Print Network [OSTI]

    Theune, Mariët

    Can You Teach an Old Dog New Tricks? How Older Adults Perceive Embodied Agents Mariët Theune In this experiment we investigate how older adults perceive an embodied agent as compared to younger people in the context of an information giving task. Our results show that older adults found the agent less friendly

  15. Successful spread of a biocontrol agent reveals a biosecurity failure: elucidating long distance invasion pathways

    E-Print Network [OSTI]

    Hoddle, Mark S.

    Successful spread of a biocontrol agent reveals a biosecurity failure: elucidating long distance to successful invasion. In this study, the dispersal of a classical biological control agent, the mymarid egg. Survey results suggest that invasive orga- nisms, like deliberately released biological control agents

  16. ECOS Inquiries Series -University of Montana Investigating Use of Biocontrol Agents

    E-Print Network [OSTI]

    Brewer, Carol

    1 ECOS Inquiries Series - University of Montana Investigating Use of Biocontrol Agents to Control-12 PROGRAM #12;2 ECOS Inquiries Series - University of Montana Investigating Use of Biocontrol Agents OF BIOCONTROL AGENTS TO CONTROL SPOTTED KNAPWEED 3) GOALS AND OBJECTIVES: a) Inquiry Questions: i

  17. Optimal release strategies for biological control agents: an application of stochastic dynamic programming to

    E-Print Network [OSTI]

    Queensland, University of

    of releases), given constraints on time and the number of biocontrol agents available. By modelling within of pests and weeds. Biological control involves introducing natural enemies, biocontrol agents, to help decide what factors might assist the establish- ment of biocontrol agents, although some guidelines do

  18. Management of Mobile Agent Systems using Social Insect Metaphors Tony White1

    E-Print Network [OSTI]

    This paper concerns itself with the management of software agents moving throughout a network for the purposeManagement of Mobile Agent Systems using Social Insect Metaphors Tony White1 , Bernard Pagurek2@scs.carleton.ca, bernie@sce.carleton.ca, deugo@scs.carleton.ca} Abstract The management of mobile agent systems that solve

  19. IMPLEMENTING ALLIANCE IN NETWORKED ROBOTS USING MOBILE AGENTS Liam Cragg and Huosheng Hu

    E-Print Network [OSTI]

    Hu, Huosheng

    IMPLEMENTING ALLIANCE IN NETWORKED ROBOTS USING MOBILE AGENTS Liam Cragg and Huosheng Hu Department this through a mobile agent implementation of the ALLIANCE architecture in multiple networked robots. Copyright © 2004 IFAC Keywords: Networked Multi-Robots, Mobile Agents, Fault Tolerance, ALLIANCE Architecture. 1

  20. Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic

    E-Print Network [OSTI]

    Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic Department of Electrical different entities is required. In this paper, the mobile agent software is applied in the facility consuming and error-prone. The Concordia mobile agent software provides a flexible framework for mobile

  1. The EvacSim Pedestrian Evacuation Agent Model: Development and Validation Sen g Murphy12

    E-Print Network [OSTI]

    Sreenan, Cormac J.

    The EvacSim Pedestrian Evacuation Agent Model: Development and Validation Seán Óg Murphy12.brown@cs.ucc.ie, cjs@cs.ucc.ie Keywords: evacuation simulation, model evaluation, pedestrian, emergency, real time Abstract EvacSim is a multi-agent building evacuation simulation featuring pedestrian occupant agents

  2. Hierarchical Agent Interface for Animation Armin Bruderlin and Sidney Fels and Silvio Esser and Kenji Mase

    E-Print Network [OSTI]

    British Columbia, University of

    the domain of animating human- like agents in a virtual world. Keywords: intelligent agents, creative processHierarchical Agent Interface for Animation Armin Bruderlin and Sidney Fels and Silvio Esser hierarchy. In this paper, we argue that this multilevel hierarchy is a convenient way to create a human

  3. Learning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions

    E-Print Network [OSTI]

    in employing these real-time agents is understanding the costs and benefits to different agent pricingLearning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions Joan Morris, Pattie@cs.brown.edu Abstract - By employing dynamic pricing, the act of changing prices over time within a marketplace, sellers

  4. Cloud-Based Optimization: A Quasi-Decentralized Approach to Multi-Agent Coordination

    E-Print Network [OSTI]

    Egerstedt, Magnus

    Cloud-Based Optimization: A Quasi-Decentralized Approach to Multi-Agent Coordination M.T. Hale and global information that is available as multi-agent systems connect over the cloud. We present a novel architecture for multi-agent coordination where the cloud is assumed to be able to gather information from all

  5. Distributed Network Monitoring using Mobile Agents Paradigm Farhad Kamangar, David Levine, Gergely V. Zruba, and Navakiran Chitturi

    E-Print Network [OSTI]

    Záruba, Gergely

    , servers and management agents. The network management load is equally distributed between managers monitoring and management has been done using predominantly centralized techniques. Mobile agents have been, Network Management, Mobile Agent, Java, Distributed, Dynamic, Network Modeling, Fault

  6. Investigation of oil recovery improvement by coupling an interfacial tension agent and a mobility control agent in light oil reservoirs. Technical progress report, October--December 1994

    SciTech Connect (OSTI)

    Pitts, M.J.

    1994-01-01

    The study will investigate two major areas concerning co-injecting an interfacial tension reduction agent(s) and a mobility control agent into petroleum reservoirs. The first will consist of defining the mechanisms of interaction of an alkaline agent, a surfactant, and a polymer on a fluid-fluid and a fluid-rock basis. The second is the improvement of the economics of the combined technology. This report examines effect of rock type on oil recovery by an alkaline-surfactant-polymer solutions. This report also begins a series of evaluations to improve the economics of alkaline-surfactant-polymer oil recovery.

  7. EXPLORACIONES SOBRE EL SOPORTE MULTI-AGENTE BDI EN EL PROCESO DE DESCUBRIMIENTO DE CONOCIMIENTO EN BASES DE DATOS

    E-Print Network [OSTI]

    Guerra Hernández, Alejandro

    metodolog´ia, mientra que el desa- rrollo lo realizamos en el lenguaje de programaci´on de agentes Agent

  8. APHIS Plant Pathogens, HHS Select Infectious Agents, and USDA High Consequence Livestock Pathogens or Toxins 1. African horse sickness virus

    E-Print Network [OSTI]

    . Mycoplasma capricolum / M. F38 / M. mycoides capri (contagious caprine pleuropneumonia agent) u 14. Mycoplasma mycoides mycoides (contagious bovine pleuropneumonia agent) u 15. Ralstonia solanacearum race 3

  9. Towards engineering hormone-binding globulins as drug delivery agents

    E-Print Network [OSTI]

    Chan, Wee Lee; Zhou, Aiwu; Read, Randy J.

    2014-11-26

    (2014) Towards Engineering Hormone-Binding Globulins as Drug Delivery Agents. PLoS ONE 9(11): e113402. doi:10.1371/journal.pone. 0113402 Editor: Ashley M. Buckle, Monash University, Australia Received: June 10, 2014 Accepted: October 24, 2014 Published... stock solution was prepared by dissolving lyophilised cortisol (Sigma Aldrich) in 80% ethanol to make a 500 mM solution, which was then diluted with water to make solutions of 20, 40 and 80 mM, with water being used as a negative control. Aliquots...

  10. LEXSYS: Architecture and Implication for Intelligent Agent systems

    E-Print Network [OSTI]

    Robert, Charles A B

    2010-01-01

    LEXSYS, (Legume Expert System) was a project conceived at IITA (International Institute of Tropical Agriculture) Ibadan Nigeria. It was initiated by the COMBS (Collaborative Group on Maize-Based Systems Research in the 1990. It was meant for a general framework for characterizing on-farm testing for technology design for sustainable cereal-based cropping system. LEXSYS is not a true expert system as the name would imply, but simply a user-friendly information system. This work is an attempt to give a formal representation of the existing system and then present areas where intelligent agent can be applied.

  11. NISAC Agent-Based Laboratory for Economics | NISAC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration wouldMass map shines light on771/6/14 Contact: Janet Lambert4NIEHS REPORTNISACNISAC Agent-Based

  12. From HumanFrom Human--Subject Experiments ToSubject Experiments To ComputationalComputational--Agent ExperimentsAgent Experiments

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 From HumanFrom Human--Subject Experiments ToSubject Experiments To Computational: ACE Electricity Market ACE Human-Subject (HS) Experiments Proof-of-Concept Proposal (GMUComputational--Agent ExperimentsAgent Experiments (And Everything In Between)(And Everything In Between) New Directions, IESA

  13. From HumanFrom Human--Subject Experiments ToSubject Experiments To ComputationalComputational--Agent ExperimentsAgent Experiments

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    1 From HumanFrom Human--Subject Experiments ToSubject Experiments To Computational Experiments - 100% human 100% computational agents What is Agent-based Comp Econ (ACE)? - 100% computational://www.econ.iastate.edu/tesfatsi/aexper.htm #12;3 Spectrum of Possible Experiments 100% human Humans with computer access Human

  14. TAGA: Trading Agent Competition in Agentcities1 Travel Agent Game in Agentcities (TAGA) is a framework that extends and enhances the Trading

    E-Print Network [OSTI]

    Finin, Tim

    for customers. TAC trading agents operate within a travel market scenario, buying and selling goods to best serve their given travel clients. TAC is designed to promote and encourage research in markets involving) is a framework that extends and enhances the Trading Agent Competition (TAC) scenario to work in Agentcities

  15. 1. (a) Why are DNA-targeted drugs largely used as anticancer agents and not as, say, antibacterial or antifungal agents?

    E-Print Network [OSTI]

    Gates, Kent. S.

    CHEM 4170 Homework 4 1. (a) Why are DNA-targeted drugs largely used as anticancer agents and not as, say, antibacterial or antifungal agents? (b) Provide an explanation for how anticancer drugs can-damaging drugs mentioned in Question 1). (b) However, some medicinal chemists believe that these compounds

  16. Evaluation of the Geotech SMART24BH 20Vpp/5Vpp data acquisition system with active fortezza crypto card data signing and authentication.

    SciTech Connect (OSTI)

    Rembold, Randy Kai; Hart, Darren M.

    2009-09-01

    Sandia National Laboratories has tested and evaluated Geotech SMART24BH borehole data acquisition system with active Fortezza crypto card data signing and authentication. The test results included in this report were in response to static and tonal-dynamic input signals. Most test methodologies used were based on IEEE Standards 1057 for Digitizing Waveform Recorders and 1241 for Analog to Digital Converters; others were designed by Sandia specifically for infrasound application evaluation and for supplementary criteria not addressed in the IEEE standards. The objective of this work was to evaluate the overall technical performance of two Geotech SMART24BH digitizers with a Fortezza PCMCIA crypto card actively implementing the signing of data packets. The results of this evaluation were compared to relevant specifications provided within manufacturer's documentation notes. The tests performed were chosen to demonstrate different performance aspects of the digitizer under test. The performance aspects tested include determining noise floor, least significant bit (LSB), dynamic range, cross-talk, relative channel-to-channel timing, time-tag accuracy/statistics/drift, analog bandwidth.

  17. Agent Development Support for Tcl R. Scott Cost, Ian Soboro , Jeegar Lakhani, Tim Finin, Ethan Miller and Charles Nicholas

    E-Print Network [OSTI]

    Finin, Tim

    Tcl-based solutions to agent issues, such as AgentTcl 2] and Tacoma 3] have emphasized security strings which have no prede ned syntax. In Tacoma, agents must meet in order to communicate. Others- port for higher level languages. TKQML bridges this gap. The CARROT project (Co-operative Agent- based

  18. A versatile clearing agent for multi-modal brain imaging

    E-Print Network [OSTI]

    Costantini, Irene; Di Giovanna, Antonino Paolo; Mascaro, Anna Letizia Allegra; Silvestri, Ludovico; Müllenbroich, Marie Caroline; Onofri, Leonardo; Conti, Valerio; Vanzi, Francesco; Sacconi, Leonardo; Guerrini, Renzo; Markram, Henry; Iannello, Giulio; Pavone, Francesco Saverio

    2015-01-01

    Extensive mapping of neuronal connections in the central nervous system requires high-throughput um-scale imaging of large volumes. In recent years, different approaches have been developed to overcome the limitations due to tissue light scattering. These methods are generally developed to improve the performance of a specific imaging modality, thus limiting comprehensive neuroanatomical exploration by multimodal optical techniques. Here, we introduce a versatile brain clearing agent (2,2'-thiodiethanol; TDE) suitable for various applications and imaging techniques. TDE is cost-efficient, water-soluble and low-viscous and, more importantly, it preserves fluorescence, is compatible with immunostaining and does not cause deformations at sub-cellular level. We demonstrate the effectiveness of this method in different applications: in fixed samples by imaging a whole mouse hippocampus with serial two-photon tomography; in combination with CLARITY by reconstructing an entire mouse brain with light sheet microscopy...

  19. Agent-based mapping of credit risk for sustainable microfinance

    E-Print Network [OSTI]

    Lee, Joung-Hun; Podobnik, Boris; Iwasa, Yoh

    2015-01-01

    Inspired by recent ideas on how the analysis of complex financial risks can benefit from analogies with independent research areas, we propose an unorthodox framework for mapping microfinance credit risk---a major obstacle to the sustainability of lenders outreaching to the poor. Specifically, using the elements of network theory, we constructed an agent-based model that obeys the stylised rules of microfinance industry. We found that in a deteriorating economic environment confounded with adverse selection, a form of latent moral hazard may cause a regime shift from a high to a low loan repayment probability. An after-the-fact recovery, when possible, required the economic environment to improve beyond that which led to the shift in the first place. These findings suggest a small set of measurable quantities for mapping microfinance credit risk and, consequently, for balancing the requirements to reasonably price loans and to operate on a fully self-financed basis. We illustrate how the proposed mapping work...

  20. Engineered plant biomass particles coated with biological agents

    DOE Patents [OSTI]

    Dooley, James H.; Lanning, David N.

    2014-06-24

    Plant biomass particles coated with a biological agent such as a bacterium or seed, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

  1. Engineered plant biomass particles coated with bioactive agents

    DOE Patents [OSTI]

    Dooley, James H; Lanning, David N

    2013-07-30

    Plant biomass particles coated with a bioactive agent such as a fertilizer or pesticide, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

  2. Determining the role of follicular dendritic cells in TSE agent neuroinvasion 

    E-Print Network [OSTI]

    McCulloch, Laura

    2011-11-25

    Transmissible spongiform encephalopathies (TSEs), such as scrapie and variant Creutzfeldt-Jakob disease are infectious, fatal, neurodegenerative diseases. Following peripheral infection TSE agents usually accumulate in ...

  3. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  4. Imperfect Commitment and the Revelation Principle: the Multi-Agent Case with Transferable Utility

    E-Print Network [OSTI]

    Evans, Robert

    -Agent Case with Transferable Utility Robert Evans1 and Sönje Reiche2 May 30, 2007 Abstract Bester and Strausz (2000) showed that the revelation principle of Bester and Strausz (2001) does not apply in a setting of many agents and no com- mitment... (y) + t j.4 A mechanism ? speci?es a ?nite message space M = fm1; :::;mHg for 3The set-up can be extended to n agents, only one of whom has private information. 4We assume that parties? valuation of money is una¤ected by agent 1?s type...

  5. European Conference on Pattern Languages of Programming and Computing, EuroPLoP'98 The Agent Pattern for Mobile Agent Systems

    E-Print Network [OSTI]

    da Silva, Alberto Rodrigues

    policy, providing distribution, security and persistence transparency. Furthermore, this paper presents field, are mostly on knowledge representation, cooperation/collaboration definition models, and agent specifically a restricted number of application-families. On the other hand, ORBs are more flexible

  6. Impact of environmental dynamics on economic evolution: A stylized agent-based policy analysis

    E-Print Network [OSTI]

    Eiben, A.E. "Guszti"

    Impact of environmental dynamics on economic evolution: A stylized agent-based policy analysis., Impact of environmental dynamics on economic evolution: A stylized agent- based policy analysis, Technol different types of environmental dynamics call for distinct behav- ioral interaction, and how a policy maker

  7. STRIPS Planning with Modular Behavior Selection Networks for Smart Home Agents

    E-Print Network [OSTI]

    Cho, Sung-Bae

    at home such as cameras, temperature sensors and light sensors, and generate agent behaviors appropriateSTRIPS Planning with Modular Behavior Selection Networks for Smart Home Agents Kyon-Mo Yang Dept Science Yonsei University Seoul, Korea sbcho@yonsei.ac.kr Abstract--A smart home has highly advanced

  8. Harbingers and agents of global warming The rapid retreat of mountain glaciers makes them an

    E-Print Network [OSTI]

    Berthier, Etienne

    Harbingers and agents of global warming The rapid retreat of mountain glaciers makes them of the many reasons why we should keep a close eye on these harbingers and agents of global warming. Our one-third (approx. 1 mm/year) to the total rise in the global mean sea level of 3 mm/year. Locally

  9. CAMLE: A Caste-Centric Agent-Oriented Modeling Language and Environment Lijun Shan Hong Zhu

    E-Print Network [OSTI]

    Zhu, Hong

    CAMLE: A Caste-Centric Agent-Oriented Modeling Language and Environment Lijun Shan Hong Zhu specification language SLABS. It is caste-centric because the notion of caste plays the central role in its methodology. Caste is the classifier of agents in our language. It allows multiple and dynamic classifications

  10. Mobile Agent Gain Scheduler Control in Inter-Continental Intelligent Space

    E-Print Network [OSTI]

    Chow, Mo-Yuen

    other to provide intelligent services to inhabitants [1, 3]. The mobile agents have sensors andMobile Agent Gain Scheduler Control in Inter-Continental Intelligent Space Rangsarit - Intelligent Space (iSpace) is a space (room, corridor, or street), which has distributed sensory and mobile

  11. Health Monitoring in an Agent-Based Smart Home by Activity Prediction

    E-Print Network [OSTI]

    Cook, Diane J.

    Health Monitoring in an Agent-Based Smart Home by Activity Prediction Sajal K. Das and Diane J objective of this paper is to investigate techniques for using agent-based smart home technologies-based smart home project funded by NSF. 1 Introduction and Motivation We live in an increasingly connected

  12. A periphery of Pogamut: from bots to agents and back Jakub Gemrot, Cyril Brom, Toms Plch

    E-Print Network [OSTI]

    Brom, Cyril

    . This paper also reviews Pogamut, which the researcher can utilise. Keywords. videogames, agents, action (AI) for videogames seems to have caught second wind [1]. Results achieved in disciplines and approaches to known problems. Can knowledge accumulated by the multi-agent systems (MAS) community during

  13. Agent-based modeling of human decision-making behavior within Spatial Decision Support Systems

    E-Print Network [OSTI]

    Sengupta, Raja

    on modeling humans as spatial "agents" that impact the landscape in some fashion. For example, considerable characteristics of the individual, such as age and income, and spatial characteristics of their land holdings for a period of ten years. Modeling Farmers as Agents Traditionally, neoclassical economic theories and profit-maximizing

  14. Path Analysis Models of an Autonomous Agent in a Complex Environment

    E-Print Network [OSTI]

    populated by autonomous agents. It is a simulation of forest fires in Yellowstone National Park will present descriptive, predictive and causal models of the behavior of agents that fight simulated forest fires. We will describe the shortcomings of descriptive and predictive models, and summarize path

  15. On the Identification of Agents in the Design of Production Control Systems

    E-Print Network [OSTI]

    Woolridge, Mike

    possible scenarios and changes that the system will encounter: agents automatically adapt to changing production processes (such as engine assembly or car painting) will still require a major engineering effort. Such an engineering effort has to move agents out of the laboratory and into the planning teams designing

  16. Identification and characterization of agent for reductive dechlorination in mixtures of ferrous iron and Portland cement 

    E-Print Network [OSTI]

    Ko, Sae Bom

    2001-01-01

    were conducted to identify a potential active agent in a mixture of Fe(II) and Portland cement extract (PCX). Results of XRD analysis indicated that a potential active agent is likely to be green rust chloride, which is a layered Fe(II)/Fe(III...

  17. Aalborg Universitet Agent-based distributed hierarchical control of dc microgrid systems

    E-Print Network [OSTI]

    Vasquez, Juan Carlos

    Aalborg Universitet Agent-based distributed hierarchical control of dc microgrid systems Meng, J. M., & Dragicevic, T. (2014). Agent-based distributed hierarchical control of dc microgrid systems-BASED DISTRIBUTED HIERARCHICAL CONTROL OF DC MICROGRID SYSTEMS Lexuan Meng, Tomislav Dragicevic, Josep M. Guerrero

  18. Map Construction and Exploration by Mobile Agents Scattered in a Dangerous Network

    E-Print Network [OSTI]

    Santoro, Nicola

    Map Construction and Exploration by Mobile Agents Scattered in a Dangerous Network Paola Flocchini throughout the graph. The problem is further complicated by dangerous elements, nodes and links, in the graph of the network, nodes and links, are unsafe [5­8, 11­19, 23, 24]. The danger is considerable: any agent arriving

  19. Active and Passive Learning in Agent-based Financial Markets Blake LeBaron

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Active and Passive Learning in Agent-based Financial Markets Blake LeBaron International Business of learning which are present in most agent-based financial markets. First, passive learning refers to a form active and passive learning dynamics. I will define and argue that both these forms of learning

  20. Artificial Markets and Intelligent Agents S.B. Massachusetts Institute of Technology (1995)

    E-Print Network [OSTI]

    Poggio, Tomaso

    1995-01-01

    Artificial Markets and Intelligent Agents by Tung Chan S.B. Massachusetts Institute of Technology. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Departmental Committee on Graduate Students #12;#12;Artificial Markets and Intelligent Agents by Tung Chan Submitted to the Department of Electrical Engineering and Computer Science

  1. Modeling Uncertainty and its Implications to Sophisticated Control in TMS Agents

    E-Print Network [OSTI]

    Raja, Anita

    /scheduler used to control TĆMS agents is the Design-to-Criteria (DTC) agent scheduler. Design-to-Criteria that describe alternate ways to achieve tasks and subtasks. Recent advances in Design-to-Criteria control and the incorporation of uncertainty in the scheduling process. As we show, the use of uncertainty in TĆMS and Design-to-Criteria

  2. How to Make Your Planner Rude and Other Issues in MultiAgent Planning

    E-Print Network [OSTI]

    Gratch, Jonathan

    How to Make Your Planner Rude and Other Issues in Multi­Agent Planning Jonathan Gratch University@isi.edu Abstract This article presents an extension to classical planning techniques that facilitates their use in dynamic multi­agent domains. The approach augments an integrated model of plan generation, execution

  3. ARMS: An agent-based resource management system for grid computing

    E-Print Network [OSTI]

    Jarvis, Stephen

    135 ARMS: An agent-based resource management system for grid computing Junwei Caoa, Stephen A be addressed. In this work an agent-based resource management system, ARMS, is implemented for grid computing the detailed analysis of an application and also as input to resource scheduling systems; this performance data

  4. Linking agent-based models and stochastic models of financial markets

    E-Print Network [OSTI]

    Li, Baowen

    Linking agent-based models and stochastic models of financial markets Ling Fenga,b,c,1 , Baowen Lia evidence documenting the behavior of traders, we construct an agent-based model to quantitatively market data rather than from statistical fitting. complex systems power law scaling laws Modeling price

  5. A Multi-Agent-Based Collaborative Framework for a Self-Managing Structural Health Monitoring System

    E-Print Network [OSTI]

    Stanford University

    1/38 A Multi-Agent-Based Collaborative Framework for a Self-Managing Structural Health Monitoring, efficiency, fault-tolerance and robustness of the system for structural health monitoring applications. This research has demonstrated a practical adoption of a multi-agent-based structural health monitoring system

  6. Camera-based Observation of Football Games for Analyzing Multi-agent Activities

    E-Print Network [OSTI]

    Camera-based Observation of Football Games for Analyzing Multi-agent Activities Michael Beetz beetz-based observation system for foot- ball games that is used for the automatic analysis of football games and challenging domain in the multi-agent com- munity is football -- in particular in the context of the Robo

  7. An agent-based model to study market penetration of plug-in hybrid electric vehicles

    E-Print Network [OSTI]

    Vermont, University of

    An agent-based model to study market penetration of plug-in hybrid electric vehicles Margaret J 2011 Available online 29 April 2011 Keywords: Plug-in hybrid electric vehicles Market penetration Agent vehicle (PHEV) market penetration. The model accounts for spatial and social effects (including threshold

  8. Learning Curve: Analysis of an Agent Pricing Strategy Under Varying Conditions

    E-Print Network [OSTI]

    Greenwald, Amy

    . This paper addresses these issues by presenting a market simulator designed for analyzing agent pricing the Learning Curve Simulator, is designed for testing agent pricing strategies under varied market conditions], we analyzed the effectiveness of two different pricing strategies within a specific market scenario

  9. Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents

    E-Print Network [OSTI]

    Cao, Longbing

    Trading agent concept is very useful for trading strategy design and market mechanism design for trading strategy design and market mechanism design [2]. Besides that, we are also particularly interestedDetecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents

  10. Operating System Support for Mobile Agents Dag Johansen Robbert van Renesse Fred B. Schneider

    E-Print Network [OSTI]

    Schneider, Fred B.

    York Ithaca, New York Norway U.S.A. U.S.A. Abstract The TACOMA project is concerned with implementing operating system support for agents, processes that migrate through a network. Two TACOMA prototypes have on agents has focused on language design (e.g. [6]) and application issues (e.g. [4]). The TACOMA project

  11. Evolution of Driving Agent, Remotely Operating a Scale Model of a Car with Obstacle Avoidance Capabilities

    E-Print Network [OSTI]

    Fernandez, Thomas

    Evolution of Driving Agent, Remotely Operating a Scale Model of a Car with Obstacle Avoidance present an approach for evolutionary design of an agent, remotely operating a scale model of a car running to the car via standard radio control transmitter. In order to cope with the video feed latency we propose

  12. A Taxonomy of Web Agents Zhisheng Huang , Anton Eliens ;+ , Alex van Ballegooij + , and Paul de Bra ;+

    E-Print Network [OSTI]

    Huang, Zhisheng

    A Taxonomy of Web Agents Zhisheng Huang #3; , Anton EliË?ens #3;;+ , Alex van Ballegooij,eliensg@cs.vu.nl, alexb@cwi.nl, debra@win.tue.nl Abstract In this paper we propose a taxonomy of web agents, which as avatar­ embodied guides that help visitors to navigate in virtual en­ vironments. Our taxonomy must

  13. Automated Mechanism Design: Complexity Results Stemming from the Single-Agent

    E-Print Network [OSTI]

    Automated Mechanism Design: Complexity Results Stemming from the Single-Agent Setting Vincent their preferences insincerely. Mechanism design is the art of designing the rules of the game so that the agents to be solved anew each time. Hence the computational complexity of mechanism design becomes a key issue

  14. Hybrid POMDP-BDI An Agent Architecture with Online Stochastic Planning and

    E-Print Network [OSTI]

    Meyer, Tommie

    Hybrid POMDP-BDI An Agent Architecture with Online Stochastic Planning and Desires with ChangingZulu-Natal, and CSIR Meraka, South Africa. {grens, tmeyer}@csir.co.za Keywords: POMDP, BDI, Online Planning, Desire-desire-intention (BDI) framework have several complimentary strengths. We propose an agent architecture which combines

  15. Open Giant Intelligent Information Systems and Its Agent-Oriented Abstraction Mechanism

    E-Print Network [OSTI]

    Cao, Longbing

    Open Giant Intelligent Information Systems and Its Agent-Oriented Abstraction Mechanism Longbing intelligent information systems, an open giant intelligent information system is a special kind of complex information system, and then we discussed the challenges of agent-based computing for dealing with the above

  16. Modelling Business Energy Consumption using Agent-based Simulation Modelling Jason Wong and Kay Cao1

    E-Print Network [OSTI]

    to develop a prototype agent based simulation model for business energy consumption, using data from the 2008 presents a framework of the model for estimating business energy consumption. Section V discusses the dataModelling Business Energy Consumption using Agent-based Simulation Modelling Jason Wong and Kay Cao

  17. Extreme homozygosity in Southern Hemisphere populations of Deladenus siricidicola, a biological control agent of Sirex noctilio

    E-Print Network [OSTI]

    control agent of Sirex noctilio X. Osmond Mlonyeni a , Brenda D. Wingfield a , Michael J. Wingfield biological control agent against this woodwasp. Nothing is known regarding the genetic diversity of D-9644/$ - see front matter Ó 2011 Elsevier Inc. All rights reserved. doi:10.1016/j.biocontrol.2011

  18. Page 1 of 18 Agent Orientation as a Modelling Paradigm1

    E-Print Network [OSTI]

    and behaviours of software systems. It can be seen as part of an ongoing trend towards greater interactivity as for software construction. Models and languages are crucial for requirements engineering. They allow the right://www.fis.utoronto.ca/~yu ABSTRACT Agent orientation is emerging as a new paradigm for constructing software systems. Agent- oriented

  19. A Psychologically-Inspired Agent for Iterative Prisoner's Dilemma Rawad Al-Haddad and Gita Sukthankar

    E-Print Network [OSTI]

    Sukthankar, Gita Reese

    A Psychologically-Inspired Agent for Iterative Prisoner's Dilemma Rawad Al-Haddad and Gita, a psychologically-inspired model for an Iterative Prisoner's dilemma (IPD) agent is proposed. This model is inspired. cooperative behavior. Introduction The Iterated Prisoner's dilemma (IPD) has been widely used as a model

  20. The Evolution of Imitation and Mirror Neurons in Adaptive Agents Elhanan Borenstein

    E-Print Network [OSTI]

    Ruppin, Eytan

    The Evolution of Imitation and Mirror Neurons in Adaptive Agents Elhanan Borenstein School of imitative behavior. We successfully develop evolutionary adaptive agents that demonstrate imitative learning Neurons The past twenty years have seen a renewed interest in imitation in various fields of research

  1. Facilitating Navigation and Information Access with CANOES: Collaborative Agents and Natural Operations in Enhanced Spaces

    E-Print Network [OSTI]

    Cheyer, Adam

    the global system. This process is continually iterated to produce a bootstrap effect. Collaborative Agents and flexibility in the makeup of agent communities. Distinguishing features of the OAA include facilitator- based delegation of complex goals, temporal control and data management facilities that may be used consistently

  2. FEL3330/EL2910 Networked and Multi-Agent Control Systems

    E-Print Network [OSTI]

    Dimarogonas, Dimos

    FEL3330/EL2910 Networked and Multi-Agent Control Systems Spring 2013 Automatic Control School of Electrical Engineering Royal Institute of Technology Lecture 1 1 May 6, 2013 #12;FEL3330/EL2910 Networked #12;FEL3330/EL2910 Networked and Multi-Agent Control Systems Lecture 1: Introduction · Practical

  3. SmallWorld Topology for MultiAgent Collaboration Carlos Aguirre

    E-Print Network [OSTI]

    Aguirre, Carlos

    a specific methodology for the design of different topologies in multi­agent networks with the cen­ tral of a recently discov­ ered type of topology, namely ''small­world'' (SW) topol­ ogy. This topology has been power, and synchronizability. We have ex­ tended the analysis to multi­agent networks searching

  4. CP nets: representing and reasoning with preferences of multiple agents F. Rossi and K. B. Venable

    E-Print Network [OSTI]

    Walsh, Toby

    CP nets: representing and reasoning with preferences of multiple agents F. Rossi and K. B introduce ÂŁ CP nets, an extension of the CP net formal- ism to model and handle the qualitative and conditional pref- erences of multiple agents. We give a number of different semantics for reasoning with ÂŁ CP

  5. Data-Driven Agent-Based Modeling, with Application to Rooftop Solar Adoption

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    Data-Driven Agent-Based Modeling, with Application to Rooftop Solar Adoption Haifeng Zhang-driven agent-based modeling framework applied to forecasting individual and aggregate residential rooftop solar forecasts solar adoption trends and provides a meaningful quantifi- cation of uncertainty about its

  6. On the Use of Agent-Based Simulation for Efficiency Analysis of Domestic

    E-Print Network [OSTI]

    Treur, Jan

    Photovoltaic Solar Energy Production Combined with a Heatpump Jan Treur Abstract In this paper agent with photovoltaic (PV) solar energy production. A simulation model for the cost (in terms of required kWh per day of a PV production agent estimating the produced solar energy (in kWh per day). In particular

  7. Agent-based Control for Material Handling Systems in In-House Logistics

    E-Print Network [OSTI]

    Agent-based Control for Material Handling Systems in In-House Logistics Towards Cyber-Physical Systems in In-House-Logistics Utilizing Realsize Evaluation of Agent-based Material Handling Technology Werthmann Intelligent Production and Logistics Systems BIBA ­ Bremer Institut für Produktion und Logistik

  8. ACE: A Platform for the Real Time Simulation of Virtual Human Agents

    E-Print Network [OSTI]

    Kallmann, Marcelo

    . Keywords: Agents, Virtual Humans, Virtual Environments, Behavioral Animation, Object Interaction, Script. Nowadays many systems are available to animate virtual humans. Such systems encompass several differentACE: A Platform for the Real Time Simulation of Virtual Human Agents Marcelo Kallmann, Jean

  9. An Autonomous Agent Application for Product Pricing Nikolaos Spanoudakis1,2

    E-Print Network [OSTI]

    Moraitis, Pavlos

    An Autonomous Agent Application for Product Pricing Nikolaos Spanoudakis1,2 , Pavlos Moraitis2 1-based approach for automating the decision making process of an autonomous agent for pricing products. Product pricing usually involves different decision makers with different - possibly conflicting - points of view

  10. Bifunctional chelating agent for the design and development of site specific radiopharmaceuticals and biomolecule conjugation strategy

    DOE Patents [OSTI]

    Katti, Kattesh V.; Prabhu, Kandikere R.; Gali, Hariprasad; Pillarsetty, Nagavara Kishore; Volkert, Wynn A.

    2003-10-21

    There is provided a method of labeling a biomolecule with a transition metal or radiometal in a site specific manner to produce a diagnostic or therapeutic pharmaceutical compound by synthesizing a P.sub.2 N.sub.2 -bifunctional chelating agent intermediate, complexing the intermediate with a radio metal or a transition metal, and covalently linking the resulting metal-complexed bifunctional chelating agent with a biomolecule in a site specific manner. Also provided is a method of synthesizing the --PR.sub.2 containing biomolecules by synthesizing a P.sub.2 N.sub.2 -bifunctional chelating agent intermediate, complexing the intermediate with a radiometal or a transition metal, and covalently linking the resulting radio metal-complexed bifunctional chelating agent with a biomolecule in a site specific manner. There is provided a therapeutic or diagnostic agent comprising a --PR.sub.2 containing biomolecule.

  11. Method for distributed agent-based non-expert simulation of manufacturing process behavior

    DOE Patents [OSTI]

    Ivezic, Nenad; Potok, Thomas E.

    2004-11-30

    A method for distributed agent based non-expert simulation of manufacturing process behavior on a single-processor computer comprises the steps of: object modeling a manufacturing technique having a plurality of processes; associating a distributed agent with each the process; and, programming each the agent to respond to discrete events corresponding to the manufacturing technique, wherein each discrete event triggers a programmed response. The method can further comprise the step of transmitting the discrete events to each agent in a message loop. In addition, the programming step comprises the step of conditioning each agent to respond to a discrete event selected from the group consisting of a clock tick message, a resources received message, and a request for output production message.

  12. Actinide-specific complexing agents: their structural and solution chemistry

    SciTech Connect (OSTI)

    Raymond, K.N.; Freeman, G.E.; Kappel, M.J.

    1983-07-01

    The synthesis of a series of tetracatecholate ligands designed to be specific for Pu(IV) and other actinide(IV) ions has been achieved. Although these compounds are very effective as in vivo plutonium removal agents, potentiometric and voltammetric data indicate that at neutral pH full complexation of the Pu(IV) ion by all four catecholate groups does not occur. Spectroscopic results indicate that the tetracatecholates, 3,4,3-LICAMS and 3,4,3-LICAMC, complex Am(III). The Am(IV)/(III)-catecholate couple (where catecholate = 3,4,3-LICAMS or 3,4,3-LICAMC) is not observed, but may not be observable due to the large currents associated with ligand oxidation. However, within the potential range where ligand oxidation does not occur, these experiments indicate that the reduction potential of free Am(IV)/(III) is probably greater than or equal to + 2.6 V vs NHE or higher. Proof of the complexation of americium in the trivalent oxidation state by 3,4,3-LICAMS and 3,4,3-LICAMC elimates the possibility of tetracatholates stabilizing Am(IV) in vivo.

  13. Protein interaction reporter agents and methods for using same

    DOE Patents [OSTI]

    Bruce, James E. (Colfax, WA); Tang, Xiaoting (Pullman, WA); Munske,Gerhard (Pullman, WA)

    2009-04-28

    Particular aspects provide novel protein interaction reporter (PIR) compounds (e.g., formulas I and II), comprising at least two protein reactive moieties (e.g., N-hydroxysuccinamide), each linked to a reporter moiety (e.g., mass reporter) by a covalent labile bond that is differentially cleavable with respect to peptide bonds (e.g., by a method such as collisional activation in a mass spectrometer, activation by electron capture dissociation (ECD), photoactivation, etc.), wherein the reporter moiety is operatively releasable from the PIR agent upon cleavage of the labile bonds, the released reporter moiety having a characteristic identifying property or label (e.g., m/z value). Particular PIRs comprise a mass reporter moiety, and further comprise an affinity group, (e.g., biotin), linked to the PIR (e.g., to the mass reporter moiety) by a selectively cleavable bone (e.g. photo-labile bond)). Additional aspects provide methods for characterizing intermolecular or intramolecular protein interactions using one or more inventive PIR compounds.

  14. Bioforensics: Characterization of biological weapons agents by NanoSIMS

    SciTech Connect (OSTI)

    Weber, P K; Ghosal, S; Leighton, T J; Wheeler, K E; Hutcheon, I D

    2007-02-26

    The anthrax attacks of Fall 2001 highlight the need to develop forensic methods based on multiple identifiers to determine the origin of biological weapons agents. Genetic typing methods (i.e., DNA and RNA-based) provide one attribution technology, but genetic information alone is not usually sufficient to determine the provenance of the material. Non-genetic identifiers, including elemental and isotopic signatures, provide complementary information that can be used to identify the means, geographic location and date of production. Under LDRD funding, we have successfully developed the techniques necessary to perform bioforensic characterization with the NanoSIMS at the individual spore level. We have developed methods for elemental and isotopic characterization at the single spore scale. We have developed methods for analyzing spore sections to map elemental abundance within spores. We have developed rapid focused ion beam (FIB) sectioning techniques for spores to preserve elemental and structural integrity. And we have developed a high-resolution depth profiling method to characterize the elemental distribution in individual spores without sectioning. We used these newly developed methods to study the controls on elemental abundances in spores, characterize the elemental distribution of in spores, and to study elemental uptake by spores. Our work under this LDRD project attracted FBI and DHS funding for applied purposes.

  15. Mercury Control with Calcium-Based Sorbents and Oxidizing Agents

    SciTech Connect (OSTI)

    Thomas K. Gale

    2005-07-01

    This Final Report contains the test descriptions, results, analysis, correlations, theoretical descriptions, and model derivations produced from many different investigations performed on a project funded by the U.S. Department of Energy, to investigate calcium-based sorbents and injection of oxidizing agents for the removal of mercury. Among the technologies were (a) calcium-based sorbents in general, (b) oxidant-additive sorbents developed originally at the EPA, and (c) optimized calcium/carbon synergism for mercury-removal enhancement. In addition, (d) sodium-tetrasulfide injection was found to effectively capture both forms of mercury across baghouses and ESPs, and has since been demonstrated at a slipstream treating PRB coal. It has been shown that sodium-tetrasulfide had little impact on the foam index of PRB flyash, which may indicate that sodium-tetrasulfide injection could be used at power plants without affecting flyash sales. Another technology, (e) coal blending, was shown to be an effective means of increasing mercury removal, by optimizing the concentration of calcium and carbon in the flyash. In addition to the investigation and validation of multiple mercury-control technologies (a through e above), important fundamental mechanism governing mercury kinetics in flue gas were elucidated. For example, it was shown, for the range of chlorine and unburned-carbon (UBC) concentrations in coal-fired utilities, that chlorine has much less effect on mercury oxidation and removal than UBC in the flyash. Unburned carbon enhances mercury oxidation in the flue gas by reacting with HCl to form chlorinated-carbon sites, which then react with elemental mercury to form mercuric chloride, which subsequently desorbs back into the flue gas. Calcium was found to enhance mercury removal by stabilizing the oxidized mercury formed on carbon surfaces. Finally, a model was developed to describe these mercury adsorption, desorption, oxidation, and removal mechanisms, including the synergistic enhancement of mercury removal by calcium.

  16. Methods for improved selectivity in photo-activation and detection of molecular diagnostic agents

    DOE Patents [OSTI]

    Wachter, Eric A. (Oak Ridge, TN); Fisher, Walter G. (Knoxville, TN); Dees, H. Craig (Knoxville, TN)

    2008-03-18

    A method for the imaging of a particular volume of plant or animal tissue, wherein the plant or animal tissue contains at least one photo-active molecular agent. The method comprises the steps of treating the particular volume of the plant or animal tissue with light sufficient to promote a simultaneous two-photon excitation of the photo-active molecular agent contained in the particular volume of the plant or animal tissue, photo-activating at least one of the at least one photo-active molecular agent in the particular volume of the plant or animal tissue, thereby producing at least one photo-activated molecular agent, wherein the at least one photo-activated molecular agent emits energy, detecting the energy emitted by the at least one photo-activated molecular agent, and producing a detected energy signal which is characteristic of the particular volume of plant or animal tissue. The present invention also provides a method for the imaging of a particular volume of material, wherein the material contains at least one photo-active molecular agent.

  17. Method for improved selectivity in photo-activation and detection of molecular diagnostic agents

    DOE Patents [OSTI]

    Wachter, Eric A. (Oak Ridge, TN); Fisher, Walter G. (Knoxville, TN); Dees, H. Craig (Knoxville, TN)

    1998-01-01

    A method for the imaging of a particular volume of plant or animal tissue, wherein the plant or animal tissue contains at least one photo-active molecular agent. The method includes the steps of treating the particular volume of the plant or animal tissue with light sufficient to promote a simultaneous two-photon excitation of the photo-active molecular agent contained in the particular volume of the plant or animal tissue, photo-activating at least one of the at least one photo-active molecular agent in the particular volume of the plant or animal tissue, thereby producing at least one photo-activated molecular agent, wherein the at least one photo-activated molecular agent emits energy, detecting the energy emitted by the at least one photo-activated molecular agent, and producing a detected energy signal which is characteristic of the particular volume of plant or animal tissue. The present invention is also a method for the imaging of a particular volume of material, wherein the material contains at least one photo-active molecular agent.

  18. Method for improved selectivity in photo-activation and detection of molecular diagnostic agents

    DOE Patents [OSTI]

    Wachter, E.A.; Fisher, W.G.; Dees, H.C.

    1998-11-10

    A method for the imaging of a particular volume of plant or animal tissue, wherein the plant or animal tissue contains at least one photo-active molecular agent. The method includes the steps of treating the particular volume of the plant or animal tissue with light sufficient to promote a simultaneous two-photon excitation of the photo-active molecular agent contained in the particular volume of the plant or animal tissue, photo-activating at least one of the at least one photo-active molecular agent in the particular volume of the plant or animal tissue, thereby producing at least one photo-activated molecular agent, wherein the at least one photo-activated molecular agent emits energy, detecting the energy emitted by the at least one photo-activated molecular agent, and producing a detected energy signal which is characteristic of the particular volume of plant or animal tissue. The present invention is also a method for the imaging of a particular volume of material, wherein the material contains at least one photo-active molecular agent. 13 figs.

  19. Multirate delivery of multiple therapeutic agents from metal-organic frameworks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    McKinlay, Alistair C.; Allan, Phoebe K.; Renouf, Catherine L.; Duncan, Morven J.; Wheatley, Paul S.; Warrender, Stewart J.; Dawson, Daniel; Ashbrook, Sharon E.; Gil, Barbara; Marszalek, Bartosz; et al

    2014-12-01

    The highly porous nature of metal-organic frameworks (MOFs) offers great potential for the delivery of therapeutic agents. Here, we show that highly porous metal-organic frameworks can be used to deliver multiple therapeutic agents—a biologically active gas, an antibiotic drug molecule, and an active metal ion—simultaneously but at different rates. The possibilities offered by delivery of multiple agents with different mechanisms of action and, in particular, variable timescales may allow new therapy approaches. Here, we show that the loaded MOFs are highly active against various strains of bacteria.

  20. Methods, microfluidic devices, and systems for detection of an active enzymatic agent

    DOE Patents [OSTI]

    Sommer, Gregory J; Hatch, Anson V; Singh, Anup K; Wang, Ying-Chih

    2014-10-28

    Embodiments of the present invention provide methods, microfluidic devices, and systems for the detection of an active target agent in a fluid sample. A substrate molecule is used that contains a sequence which may cleave in the presence of an active target agent. A SNAP25 sequence is described, for example, that may be cleaved in the presence of Botulinum Neurotoxin. The substrate molecule includes a reporter moiety. The substrate molecule is exposed to the sample, and resulting reaction products separated using electrophoretic separation. The elution time of the reporter moiety may be utilized to identify the presence or absence of the active target agent.