Powered by Deep Web Technologies
Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

2

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key...  

Broader source: Energy.gov (indexed) [DOE]

Key to Local Users PLATFORM: RSA Authentication API versions prior to 8.1 SP1 RSA Web Agent for Apache Web Server versions prior to 5.3.5 RSA Web Agent for IIS versions...

3

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

4

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

5

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

6

U-212: RSA Authentication Manager Flaws Permit Cross-Site and...  

Energy Savers [EERE]

Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

7

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

8

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...  

Energy Savers [EERE]

5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

9

T-582: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID  

Broader source: Energy.gov [DOE]

RSA investigation has revealed that the attack resulted in certain information being extracted from RSA's systems. Some of that information is related to RSA's SecurID two-factor authentication products.

10

T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

11

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discoveredSUSE

12

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

13

Another Generalization of Wiener's Attack on RSA  

E-Print Network [OSTI]

Another Generalization of Wiener's Attack on RSA Abderrahmane NITAJ Universit´e de Caen, France Casablanca, June 12, 2008 Abderrahmane NITAJ Another Generalization of Wiener's Attack on RSA #12;RSA and Wiener The new attack Conclusion RSA setting Wiener's attack Generalizations Colour conventions Red

Nitaj, Abderrahmane

14

T-582: RSA systems has resulted in certain information being...  

Broader source: Energy.gov (indexed) [DOE]

2: RSA systems has resulted in certain information being extracted from RSA systems that relates to RSA SecurID T-582: RSA systems has resulted in certain information being...

15

A Proposed Algorithm to improve security & Efficiency of SSL-TLS servers using Batch RSA decryption  

E-Print Network [OSTI]

Today, Internet becomes the essential part of our lives. Over 90 percent of the ecommerce is developed on the Internet. A security algorithm became very necessary for producer client transactions assurance and the financial applications safety. The rsa algorithm applicability derives from algorithm properties like confidentiality, safe authentication, data safety and integrity on the internet. Thus, this kind of networks can have a more easy utilization by practical accessing from short, medium, even long distance and from different public places. Rsa encryption in the client side is relatively cheap, whereas, the corresponding decryption in the server side is expensive because its private exponent is much larger. Thus ssl tls servers become swamped to perform public key decryption operations when the simultaneous requests increase quickly .The batch rsa method is useful for such highly loaded web server .In our proposed algorithm by reducing the response time and clients tolerable waiting time an improvement...

Pateriya, R K; Shrivastava, S C; Patel, Jaideep

2009-01-01T23:59:59.000Z

16

Identity-Based Mediated RSA , Xuhua Ding2  

E-Print Network [OSTI]

certificates. Mediated RSA (mRSA) [4] is a simple and practical method of splitting RSA private keys between signature or decryption must in- volve both parties. mRSA allows fast and fine-grained control (revocation) over users' security privileges. However, mRSA still relies on public key certificates to derive public

Ding, Xuhua

17

A new attack on RSA and CRT-RSA Abderrahmane Nitaj  

E-Print Network [OSTI]

A new attack on RSA and CRT-RSA Abderrahmane Nitaj Laboratoire de Math´ematiques Nicolas Oresme an attack on CRT-RSA when the CRT-exponents dp and dq are both suitably small. In this paper, we show and ex+y 0 (mod N). As an application of our new attack, we present the cryptanalysis of CRT-RSA if one

Nitaj, Abderrahmane

18

An Attack on RSA Using LSBs of Multiples of the Prime Factors  

E-Print Network [OSTI]

An Attack on RSA Using LSBs of Multiples of the Prime Factors Abderrahmane Nitaj Laboratoire de attack on RSA with d in polynomial time under special conditions. For example, various partial key exposure attacks on RSA and some

Nitaj, Abderrahmane

19

U-063: RSA SecurID Software Token for Windows DLL Loading Error...  

Broader source: Energy.gov (indexed) [DOE]

Secunia Advisory: SA45665 Securityfocus Advisory CVE-2011-4141 RSA Online Fraud Resource Center IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in RSA...

20

V-234: EMC RSA Archer GRC Open Redirection Weakness and Security...  

Energy Savers [EERE]

4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

MOTOR VEHICLE (Pursuant to RSA 260:14)  

E-Print Network [OSTI]

permitted pursuant to RSA 260:14, V (a ), other than for bulk distribution for surveys, marketing/I.D. #: _________________________________ Vehicle Identification #: _________________________________ Last Known Address/Town _______________________________ Other Identification Information: ________________________ ***Reverse Side Must Be Completed Before

New Hampshire, University of

22

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection...  

Energy Savers [EERE]

129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and...

23

V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain...  

Broader source: Energy.gov (indexed) [DOE]

Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue U-129: RSA...

24

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers [EERE]

in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613...

25

T-640: RSA Access Manager Server CVE-2011-0322 Update | Department...  

Broader source: Energy.gov (indexed) [DOE]

7, 2011 - 5:18pm Addthis PROBLEM: ESA-2011-009 (revised): RSA, The Security Division of EMC, announces new fix for potential security vulnerability in RSA Access Manager Server....

26

U-027: RSA Key Manager Appliance Session Logout Bug Fails to...  

Broader source: Energy.gov (indexed) [DOE]

the 2.7.1.6 hotfix, since this hotfix addresses security related fixes, hot fix roll ups, and bug fixes. To obtain the latest RSA product downloads, log on at RSA SecurCare....

27

U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System  

Broader source: Energy.gov [DOE]

A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

28

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

29

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

30

A Faster Hardware Implementation of RSA Ajay C Shantilal  

E-Print Network [OSTI]

1 A Faster Hardware Implementation of RSA Algorithm Ajay C Shantilal Department of Electrical- cation systems. Central tools for achieving system security are cryptographic algorithms. For performance at the Department of Electrical & Computer Engineering, Oregon State University, Corvallis, Oregon 97331. E

31

Fault-Based Attack of RSA Authentication Andrea Pellegrini, Valeria Bertacco and Todd Austin  

E-Print Network [OSTI]

a straightforward design architecture that en- tails a small silicon footprint and low-power profile. Our research enviromental manipulations. Our fault-based attack can be succ

Austin, Todd M.

32

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple

33

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

34

V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere is a command

35

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

36

U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6Scripting

37

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

38

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

39

Course: Math 311w-01 Laboratory 6: The RSA cipher and public-key cryptography, part 2  

E-Print Network [OSTI]

, change to the Desktop directory if you aren't already there, and start ipython. Type ]: from RSA import

Reluga, Tim

40

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public?  

E-Print Network [OSTI]

Combined Attack on CRT-RSA Why Public Verification Must Not Be Public? Guillaume Barbu1 , Alberto introduces a new Combined Attack on a CRT- RSA implementation resistant against Side-Channel Analysis and Fault Injection attacks. Such implementations prevent the attacker from ob- taining the signature when

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

A New Attack on RSA with Two or Three Decryption Exponents  

E-Print Network [OSTI]

A New Attack on RSA with Two or Three Decryption Exponents Abderrahmane Nitaj Laboratoire de Math-size. In this paper, we describe an attack on RSA in the presence of two or three exponents ei with the same modulus N. The new attack is an extension of Guo's continued fraction attack as well as the Bl¨omer and May lattice

Nitaj, Abderrahmane

42

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes  

E-Print Network [OSTI]

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt. Odlyzko AT&T Bell Laboratories Murray Hill, NJ 07974, USA ABSTRACT A new attack on the RSA cryptosystem is presented. This attack assumes less than previous chosen ciphertext attacks, since the cryptanalyst has

Odlyzko, Andrew M.

43

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma  

E-Print Network [OSTI]

Attacking RSA-based Sessions in SSL/TLS* Vlastimil Klma , Ondej Pokorn1 and Toms Rosa2, 1 ICZ on RSA-based sessions in SSL/TLS protocols. These protocols incorporate the PKCS#1 (v. 1.5) encoding- secret can decrypt the whole captured SSL/TLS session. We show that incorporating a version number check

44

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

45

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

46

U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...  

Office of Environmental Management (EM)

1027513 CVE-2011-3389 CVE-2012-2110 CVE-2012-2131 IMPACT ASSESSMENT: High Discussion: EMC has acknowledged a weakness and a vulnerability in RSA BSAFE, which can be exploited by...

47

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra  

E-Print Network [OSTI]

Cryptanalysis of Dual CRT-RSA Santanu Sarkar and Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India sarkar.santanu.bir@gmail.com, subho

Paris-Sud XI, Université de

48

Security analysis of RSA cryptosystem algorithm and its properties  

SciTech Connect (OSTI)

The information technology rapidly development and dramatically changed the life style people, in addition to shortening the distance of communication, but also promote the smooth exchange of information flows. However, derivatives to facilitate the relative safety of these issues, since into the digital information age, the majority of the practitioners of engineering and technical personnel and technical workers in terms of technology, information security is increasingly becoming an important issue. The RSA algorithm was published in 1978. It is a kind of very popular and widely application modem cryptosystem in the world. Even though there are lots of articles to discuss about how to break the RSA, but it is still secure today. In this paper, the authors would like to introduce a variant attack to RSA.

Liu, Chenglian [School of Mathematics and Computer Science, Long Yan university, Lonyan 364012 (China); Guo, Yongning, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com; Lin, Juan, E-mail: guoyn@163.com, E-mail: linjuanliucaihong@qq.com [Department of Mathematics and Computer Science, Fuqing Branch of Fujian Normal University, Fuqing 350300 (China)

2014-10-06T23:59:59.000Z

49

V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | DepartmentDepartment ofUsers

50

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack  

E-Print Network [OSTI]

Estimating the Prime-Factors of an RSA Modulus and an Extension of the Wiener Attack Hung-Min Sun- Factorization is difficult, p and q are simply estimated as N. In the Wiener attack, 2 N is adopted of the Wiener attack can be considered to be brute-guessing for the MSBs of p + q. Comparing with their work

Chen, Sheng-Wei

51

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

52

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

53

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

54

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

55

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

56

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

57

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

58

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

59

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

60

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

62

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

63

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

64

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

65

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

66

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

67

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

68

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

69

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

70

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

71

VOLTTRON: An Agent Execution Platform for the Electric Power System  

SciTech Connect (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

72

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

73

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

74

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

75

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

76

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

77

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

78

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

79

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 1632 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

80

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

82

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how ones cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

83

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

84

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

85

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

86

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

87

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

88

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

89

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

90

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

91

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

92

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

93

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

94

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

95

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

96

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

97

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

98

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

99

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

100

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their nontamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

102

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

103

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

104

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

105

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

106

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

107

U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment of

108

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

109

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

110

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

111

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

112

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

113

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

114

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

115

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

116

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

117

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

118

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

119

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

120

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

122

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

123

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

124

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

125

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

126

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

127

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

128

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

129

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

130

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

131

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

132

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

133

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

134

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

135

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents!  

E-Print Network [OSTI]

IM Free Agent Sign Up 1 Wanted! Intramurals Free Agents! Individuals who do not have a full team a "Free Agent". Within the UNLV Intramural Sports program there are multiple ways to improve a Free Agent will not force any team to accept a Free Agent participant. History and research has shown that Free Agents

Hemmers, Oliver

136

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

137

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

138

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

139

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

140

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operators and the IAEAs interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using joint use equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEAs ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

142

Computing with strategic agents  

E-Print Network [OSTI]

This dissertation studies mechanism design for various combinatorial problems in the presence of strategic agents. A mechanism is an algorithm for allocating a resource among a group of participants, each of which has a ...

Immorlica, Nicole, 1978-

2005-01-01T23:59:59.000Z

143

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

144

Improving Design with Agents, Improving Agents by Design  

E-Print Network [OSTI]

DCB 1 WPI Improving Design with Agents, or, Improving Agents by Design David C. Brown AI in Design ASSUMPTION ? Assume that the design environment is built using agents. i.e., situated, autonomous, flexible ?'s future design and synthesis environment will be built as a real multi-agent system. In what follows, we

Brown, David C.

145

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

146

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Zurich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

147

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

148

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

149

U-044: HP Operations Agent and Performance Agent Lets Local Users...  

Broader source: Energy.gov (indexed) [DOE]

4: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted Directory U-044: HP Operations Agent and Performance Agent Lets Local Users Access a Restricted...

150

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

151

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Universit de

152

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

153

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

154

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

155

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two IDbased password authen tication schemes for logging onto a remote network server using smart

156

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

157

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

158

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

159

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

160

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Flexible, secure agent development framework  

DOE Patents [OSTI]

While an agent generator is generating an intelligent agent, it can also evaluate the data processing platform on which it is executing, in order to assess a risk factor associated with operation of the agent generator on the data processing platform. The agent generator can retrieve from a location external to the data processing platform an open site that is configurable by the user, and load the open site into an agent substrate, thereby creating a development agent with code development capabilities. While an intelligent agent is executing a functional program on a data processing platform, it can also evaluate the data processing platform to assess a risk factor associated with performing the data processing function on the data processing platform.

Goldsmith; Steven Y. (Rochester, MN)

2009-04-07T23:59:59.000Z

162

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

163

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

164

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

165

Plasmids encoding therapeutic agents  

SciTech Connect (OSTI)

Plasmids encoding anti-HIV and anti-anthrax therapeutic agents are disclosed. Plasmid pWKK-500 encodes a fusion protein containing DP178 as a targeting moiety, the ricin A chain, an HIV protease cleavable linker, and a truncated ricin B chain. N-terminal extensions of the fusion protein include the maltose binding protein and a Factor Xa protease site. C-terminal extensions include a hydrophobic linker, an L domain motif peptide, a KDEL ER retention signal, another Factor Xa protease site, an out-of-frame buforin II coding sequence, the lacZ.alpha. peptide, and a polyhistidine tag. More than twenty derivatives of plasmid pWKK-500 are described. Plasmids pWKK-700 and pWKK-800 are similar to pWKK-500 wherein the DP178-encoding sequence is substituted by RANTES- and SDF-1-encoding sequences, respectively. Plasmid pWKK-900 is similar to pWKK-500 wherein the HIV protease cleavable linker is substituted by a lethal factor (LF) peptide-cleavable linker.

Keener, William K. (Idaho Falls, ID)

2007-08-07T23:59:59.000Z

166

Agent-Based Alerting for Forecasters  

E-Print Network [OSTI]

­ Temperature ­ Pressure ­ Wind direction ­ Wind speed ­ ... #12;Titan Radar System Provides current;Agents · Agent: software that is autonomous, situated in an environment · An intelligent agent is proactive, reactive, social · Also flexible, robust, rational #12;Agents vs. Objects · Agents are autonomous

Dance, Sandy

167

Triggered pore-forming agents  

DOE Patents [OSTI]

An inactive pore-forming agent which is activated to lytic function by a condition such as pH, light, heat, reducing potential, or metal ion concentration, or substance such as a protease, at the surface of a cell.

Bayley, Hagan (Grafton, MA); Walker, Barbara J. (Auburn, MA); Chang, Chung-yu (Worcester, MA); Niblack, Brett (Nashville, TN); Panchal, Rekha (Shrewsbury, MA)

1998-01-01T23:59:59.000Z

168

A amphoteric copolymer profile modification agent  

SciTech Connect (OSTI)

This report provides a new gel profile modification agent prepared by an amphoteric copolymer (FT-213) and a novel crosslinking agent (BY), and introduces the preparations of the amphoteric polymer, the crosslinking agent and the profile modification agent, the action mechanism, the test conditions and the evaluations of the performance of the agent. The 45 well treatments in oilfields demonstrate that the agent can be prepared conveniently, the agent has better compatibility and application performances, and the treatment life is longer with the use of the agent. 80,000 tons incremental oil and 60,000 m{sup 3} decreasing water production have been achieved.

Wang HongGuan; Yu LianCheng; Tian HongKun [Scientific Research Inst. of Petroleum Exploration and Development, Beijing (China)

1995-11-01T23:59:59.000Z

169

Heterogeneous Temporal Probabilistic Agents JURGEN DIX  

E-Print Network [OSTI]

and software modules. We will define the concept of a heterogeneous temporal probabilistic (HTP) agent). Intuitively, an FTPSI specifies what all an HTP agent is permitted/forbidden/obliged to do at various times t. As changes occur in the environment, the HTP agent must compute a new FTPSI. HTP agents continuously compute

Kraus, Sarit

170

Agent review phase one report.  

SciTech Connect (OSTI)

This report summarizes the findings for phase one of the agent review and discusses the review methods and results. The phase one review identified a short list of agent systems that would prove most useful in the service architecture of an information management, analysis, and retrieval system. Reviewers evaluated open-source and commercial multi-agent systems and scored them based upon viability, uniqueness, ease of development, ease of deployment, and ease of integration with other products. Based on these criteria, reviewers identified the ten most appropriate systems. The report also mentions several systems that reviewers deemed noteworthy for the ideas they implement, even if those systems are not the best choices for information management purposes.

Zubelewicz, Alex Tadeusz; Davis, Christopher Edward; Bauer, Travis LaDell

2009-12-01T23:59:59.000Z

171

Limonene and tetrahydrofurfurly alcohol cleaning agent  

DOE Patents [OSTI]

The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, George W. (Harrisonville, MO); Carter, Richard D. (Lee's Summit, MO); Hand, Thomas E. (Lee's Summit, MO); Powers, Michael T. (Santa Rosa, CA)

1997-10-21T23:59:59.000Z

172

Limonene and tetrahydrofurfuryl alcohol cleaning agent  

DOE Patents [OSTI]

The present invention is a tetrahydrofurfuryl alcohol and limonene or terpineol cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

1996-05-07T23:59:59.000Z

173

Limonene and tetrahydrofurfuryl alcohol cleaning agent  

DOE Patents [OSTI]

The present invention is a tetrahydrofurfuryl alcohol and limonene cleaning agent and method for formulating and/or using the cleaning agent. This cleaning agent effectively removes both polar and nonpolar contaminants from various electrical and mechanical parts and is readily used without surfactants, thereby reducing the need for additional cleaning operations. The cleaning agent is warm water rinsable without the use of surfactants. The cleaning agent can be azeotropic, enhancing ease of use in cleaning operations and ease of recycling.

Bohnert, G.W.; Carter, R.D.; Hand, T.E.; Powers, M.T.

1997-10-21T23:59:59.000Z

174

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

175

Animated agents in K-12 engineering outreach: Preferred agent characteristics across age levels  

E-Print Network [OSTI]

agent characteristics were assessed using survey methodology: agent gender, age, real- ism, clothing; Perez & Solomon, 2005; Wang et al., 2008). The current study investigates learner preferences

Reisslein, Martin

176

Approximation algorithms for distributed and selfish agents  

E-Print Network [OSTI]

Many real-world systems involve distributed and selfish agents who optimize their own objective function. In these systems, we need to design efficient mechanisms so that system-wide objective is optimized despite agents ...

Mirrokni, Vahab S

2005-01-01T23:59:59.000Z

177

How Minds Work Minds, Agents, Senses, Actions  

E-Print Network [OSTI]

· Some mobile robots · Autonomous software agents · Some organizations #12;HMW: Minds, Agents, Senses of the senses tell us the truth about perception For a website devoted to this proposition, go to http://www.michaelbach.de/ot

Memphis, University of

178

Adding structure to agent programming languages  

E-Print Network [OSTI]

Zachmann (Computer Graphics) #12;Adding structure to agent programming languages Peter Novák, Jürgen Dix

Zachmann, Gabriel

179

Agents on the Web Supply Chains  

E-Print Network [OSTI]

Agents on the Web Automating Supply Chains 90 JULY · AUGUST 2001 http://computer.org/internet/ 1089

Almor, Amit

180

Chelating agents for technetium-99M  

DOE Patents [OSTI]

The present invention relates to a novel family of Technetium chelating agents (ligands) based upon amide and mercaptide donor groups.

Fritzberg, A.R.; Kasina, S.

1987-06-02T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

MOBILE AGENT MANAGEMENT Patricia Cuesta Rivalta  

E-Print Network [OSTI]

MOBILE AGENT MANAGEMENT By Patricia Cuesta Rivalta A Thesis Submitted to the Faculty of Graduate to Faculty of Graduate Studies and Research acceptance of this thesis MOBILE AGENT MANAGEMENT Submitted with the mobile agent technology. This thesis extends the Mobile Code Toolkit of the Perpetuum Mobile Procura

182

Mobile Agents: An Introduction Gian Pietro Picco  

E-Print Network [OSTI]

1 Mobile Agents: An Introduction Gian Pietro Picco Dipartimento di Elettronica e Informazione, Politecnico di Milano, Italy picco@elet.polimi.it Abstract| Mobile agents are enjoying a lot of popularity to the related research #12;eld by showing evidence of the bene#12;ts mobile agents can potentially achieve

Picco, Gian Pietro

183

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

184

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Agent-Based Modeling and Simulation for Hydrogen Transition Analysis Agent-Based Modeling and Simulation for Hydrogen Transition Analysis Presentation on Agent-Based Modeling and...

185

Intelligent Agents An agent perceives its environment through sensors and acts on this  

E-Print Network [OSTI]

Intelligent Agents An agent perceives its environment through sensors and acts on this environment environment through sensors and acting upon that environment through actuators Human agent: eyes, ears far 3) knowledge about environment 4) action agent performs What is the difference between omniscience

Imberman, Susan

186

MDE and Mobile agents: another reflection on the agent migration Tahar GHERBI  

E-Print Network [OSTI]

MDE and Mobile agents: another reflection on the agent migration Tahar GHERBI Computer science code. Mobile agents are a very interesting technology to develop applications for mobile and distributed environments. A mobile agent is essentially a computer program that acts autonomously on behalf

Paris-Sud XI, Université de

187

Agent-based health care management An Agent-based Approach to Health Care Management  

E-Print Network [OSTI]

Agent-based health care management 1 An Agent-based Approach to Health Care Management Jun Huang1, London WC2A 3PX, UK. Abbreviated title: Agent-based health care management Complete Mailing Address. London E1 4NS UK #12;Agent-based health care management 2 Abstract The provision of medical care

Mascardi, Viviana

188

161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at  

E-Print Network [OSTI]

hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

Boyer, Edmond

189

Dynamic Economy with Heterogeneous Agents  

E-Print Network [OSTI]

be written as: Hh;t+1 = ( HHt Hht ) G( h; xht; y H ht) + (1 H)Hht; (2.3) here, > 0, xht denotes the low ability people?s physical capital input, yHht is the e ective labor input. In period t, the agent i?s productive function of nal goods is: Yi.... It is easy to solve the problem (2.7) under the constraints of (2.8) (2.9) (2.10), and get the rst order conditions as follows: As for the consumptions in each period, @U(cHt; LHt) @LHt = @U(cht; Lht) @Lht (2.11) Here, t = 1; 2; 3. If UcL = 0...

Peng, Yulei

2013-08-06T23:59:59.000Z

190

Macro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Infrastructure Concept  

E-Print Network [OSTI]

for the safe management of mobile agents they deploy onto the Internet. Our in- frastructural approach is basedMacro-level Attention to Mobile Agent Security: Introducing the Mobile Agent Secure Hub Security Research Centre Queensland University of Technology Brisbane, Queensland, Australia and Dept

Roth, Volker

191

Posted 3/22/13 PURCHASING AGENT  

E-Print Network [OSTI]

Posted 3/22/13 PURCHASING AGENT Our Chicago-based Food Service Company is seeking an experienced Comparison, Food Service/Food Wholesale experience · Proficient computer skills in MS Word, Excel and Outlook Purchasing Agent who will be responsible for the following: · Buying a large range of food items, including

Heller, Barbara

192

Validating Complex Agent Behavior Scott A. Wallace  

E-Print Network [OSTI]

Behavior by Scott A. Wallace Chair: John E. Laird Developing software agents that replicate human behaviorValidating Complex Agent Behavior by Scott A. Wallace A dissertation submitted in partial) in The University of Michigan 2003 Doctoral Committee: Professor John E. Laird, Chair Associate Professor William P

Wallace, Scott

193

Path Analysis Models of an Autonomous Agent  

E-Print Network [OSTI]

Path Analysis Models of an Autonomous Agent in a Complex Environment Paul R. Cohen, David M. Hart AFOSR-91-0067. #12;1 Phoenix Phoenix is a simulated environment populated by autonomous agents) the e orts of all, a reboss. Fires burn in unpredictable ways due to wind speed and direction, terrain

194

Natural chelating agents for radionuclide decorporation  

DOE Patents [OSTI]

This invention relates to the production of metal-binding compounds useful for the therapy of heavy metal poisoning, for biological mining and for decorporation of radionuclides. The present invention deals with an orderly and effective method of producing new therapeutically effective chelating agents. This method uses challenge biosynthesis for the production of chelating agents that are specific for a particular metal. In this approach, the desired chelating agents are prepared from microorganisms challenged by the metal that the chelating agent is designed to detoxify. This challenge induces the formation of specific or highly selective chelating agents. The present invention involves the use of the challenge biosynthetic method to produce new complexing/chelating agents that are therapeutically useful to detoxify uranium, plutonium, thorium and other toxic metals. The Pseudomonas aeruginosa family of organisms is the referred family of microorganisms to be used in the present invention to produce the new chelating agent because this family is known to elaborate strains resistant to toxic metals.

Premuzic, E.T.

1985-06-11T23:59:59.000Z

195

Collaborative Virtual Training with Physical and Communicative Autonomous Agents.  

E-Print Network [OSTI]

Collaborative Virtual Training with Physical and Communicative Autonomous Agents. Thomas Lopez1, Conversational Agents, Autonomous Actors, Avatars, Virtual Reality Introduction The use of virtual reality Environments for Train- ing (CVETs) where real users and autonomous agents efficiently collaborate toward

196

For whom will the Bayesian agents vote?  

E-Print Network [OSTI]

Within an agent-based model where moral classifications are socially learned, we ask if a population of agents behaves in a way that may be compared with conservative or liberal positions in the real political spectrum. We assume that agents first experience a formative period, in which they adjust their learning style acting as supervised Bayesian adaptive learners. The formative phase is followed by a period of social influence by reinforcement learning. By comparing data generated by the agents with data from a sample of 15000 Moral Foundation questionnaires we found the following. 1. The number of information exchanges in the formative phase correlates positively with statistics identifying liberals in the social influence phase. This is consistent with recent evidence that connects the dopamine receptor D4-7R gene, political orientation and early age social clique size. 2. The learning algorithms that result from the formative phase vary in the way they treat novelty and corroborative information with mo...

Caticha, Nestor; Vicente, Renato

2015-01-01T23:59:59.000Z

197

Compositional evaluation of asphalt binder recycling agents  

E-Print Network [OSTI]

Several experiments were performed to determine how recycling agent composition affects the high, intermediate, and low temperature properties as well as long term oxidative aging characteristics of recycled asphalt blends. Specifically, several...

Madrid, Richard Charles

1997-01-01T23:59:59.000Z

198

Agent Program Planning Information Money Smart  

E-Print Network [OSTI]

Agent Program Planning Information Money Smart http participated in Money Smart classes: Habitat for Humanity, Head Start, workforce center clients, adult Planning Model plans have been developed for a Money Smart outcome plan and a Money Smart output plan

199

Precursors to radiopharmaceutical agents for tissue imaging  

DOE Patents [OSTI]

A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

1988-01-01T23:59:59.000Z

200

Single-Machine Two-Agent Scheduling Problems with ...  

E-Print Network [OSTI]

Jan 24, 2014 ... Abstract: We address a class of deterministic scheduling problems in which two agents compete for the usage of a single machine. The agents...

Gaia Nicosia

2014-01-24T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Temporary Bridging Agents for Use in Drilling and Completions...  

Broader source: Energy.gov (indexed) [DOE]

Temporary Bridging Agents for Use in Drilling and Completions of EGS Temporary Bridging Agents for Use in Drilling and Completions of EGS DOE Geothermal Peer Review 2010 -...

202

agent myrica rubra: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 138 Agent Communication and Cooperative Information Frank Dignum Computer...

203

agentes ligantes para: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 134 Agent Communication and Cooperative Information Frank Dignum Computer...

204

agente seletivo alternativos: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

205

antifouling agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

206

agentes infecciosos relacionados: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

207

antiparasitic agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

208

agente solidificante para: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 131 Agent Communication and Cooperative Information Frank Dignum Computer...

209

agentes quimicos para: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 133 Agent Communication and Cooperative Information Frank Dignum Computer...

210

1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1  

E-Print Network [OSTI]

Contents 1 Introduction 1 1.1 Mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Historical perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Applications of mobile agents . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.4 Drawbacks

Tripathi, Anand

211

agent based model: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

212

agent based models: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

213

agent based modeling: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Laboratories Example: AMES Wholesale,...) - Physical entities (weather, landscape, electric grids,...) 12;5 Partial depiction of agents Tesfatsion, Leigh 60 Agent-based...

214

agents statutaires sur: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(Jennings et al., 1995) and Carnot (Huhns et al., 1992)). Broadly speaking Woolridge, Mike 50 Unknown Agent(s) (starting material) Biology and Medicine Websites Summary:...

215

abortifacient agents nonsteroidal: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

efficacyeffectiveness or in safety between agents. 2. Colchicine is the only agent for gout and Famalial Mediterranean Fever. 3. Febuxostat reduces serum urate below 6mgdl in a...

216

Scheduling of Two Agents Task Chains with a Central Selection ...  

E-Print Network [OSTI]

each task belongs to one agent, and each agent is only interested in optimizing his/her own performance index. Although these problems can be viewed as a...

2014-06-13T23:59:59.000Z

217

E-Print Network 3.0 - acutatum agente causal Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

218

E-Print Network 3.0 - anti-infective agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

219

E-Print Network 3.0 - agents tiamulin olanquindox Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

220

E-Print Network 3.0 - agentes microbianos reportados Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

E-Print Network 3.0 - antirheumatic agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

222

E-Print Network 3.0 - agents gadopentetate dimeglumine Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

223

E-Print Network 3.0 - agent targeting vesicular Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

224

E-Print Network 3.0 - antithyroid agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

225

E-Print Network 3.0 - adrenergics-blocking agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

226

E-Print Network 3.0 - agente tensioactivo pulmonar Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

227

E-Print Network 3.0 - albilineans agente causal Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

228

E-Print Network 3.0 - agent marcaje indirecto Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

229

E-Print Network 3.0 - agente antimicrobiano phmb Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

230

E-Print Network 3.0 - anti-anxiety agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

231

E-Print Network 3.0 - agentes antimicrobianos diante Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

232

E-Print Network 3.0 - antiprotozoal agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

233

E-Print Network 3.0 - antiparkinson agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

234

E-Print Network 3.0 - agent diorhabda elongata Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

235

E-Print Network 3.0 - agentes antitumorais inibidores Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular agents may use all of the...

236

authentic food -simply prepared add green bean fair trade organic coffee or fair trade tea to your meal for $1.5  

E-Print Network [OSTI]

brunch authentic food - simply prepared #12;BREAKFAST add green bean fair trade organic coffee or fair trade tea to your meal for $1.5 BUILD YOUR OWN BREAKFAST 7 served with toast (rye or harvest grain · house cured back bacon · house smoked tofu · grilled tomatoes and onions · wilted greens · breakfast

Martin, Jeff

237

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

238

Making Products Active with Intelligent Agents for Supporting PLM Making Products Active with Intelligent Agents for  

E-Print Network [OSTI]

Making Products Active with Intelligent Agents for Supporting PLM Making Products Active with Intelligent Agents for Supporting Product Lifecycle Management Martin G. Marchetta1 , Frdrique Mayer2, in order for enterprises to increase their productivity and be more competitive in front of shorter due

Paris-Sud XI, Universit de

239

Integrating Mobile Agent Technology into an e-Marketplace Solution  

E-Print Network [OSTI]

Integrating Mobile Agent Technology into an e-Marketplace Solution - The InterMarket Marketplace. The mobile agent technology might take e-commerce trading to the next phase. Mobile agents are intelligent technology. A feasibility study, made for two existing software applications, the mobile-agent system Tracy

240

Agents, Beliefs, and Plausible Behavior in a Temporal Setting  

E-Print Network [OSTI]

Zachmann (Computer Graphics) #12;Agents, Beliefs, and Plausible Behavior in a Temporal Setting Nils Bulling

Zachmann, Gabriel

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Normative Agents in Health Care: Uses and Challenges  

E-Print Network [OSTI]

Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda institute;Normative Agents in Health Care: Uses and Challenges Javier V´azquez-Salceda 1 Abstract. The use of Multi-Agent Systems (MAS) in health-care domains is increasing. Such Agent-mediated Medical Systems are designed

Utrecht, Universiteit

242

Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-Stages (MDAC)  

E-Print Network [OSTI]

Providing security to audio songs for maintaining its intellectual property right (IPR) is one of chanllenging fields in commercial world especially in creative industry. In this paper, an effective approach has been incorporated to fabricate authentication of audio song through application of message digest method with alternation of coefficients of harmonics in multi-stages of higher frequency domain without affecting its audible quality. Decomposing constituent frequency components of song signal using Fourier transform with generating secret code via applying message digest followed by alternating coefficients of specific harmonics in multi-stages generates a secret code and this unique code is utilized to detect the originality of the song. A comparative study has been made with similar existing techniques and experimental results are also supported with mathematical formula based on Microsoft WAVE (".wav") stereo sound file.

Mondal, Uttam Kr

2012-01-01T23:59:59.000Z

243

Intelligent Software Agents: Sensor Integration and Response  

SciTech Connect (OSTI)

Abstract In a post Macondo world the buzzwords are Integrity Management and Incident Response Management. The twin processes are not new but the opportunity to link the two is novel. Intelligent software agents can be used with sensor networks in distributed and centralized computing systems to enhance real-time monitoring of system integrity as well as manage the follow-on incident response to changing, and potentially hazardous, environmental conditions. The software components are embedded at the sensor network nodes in surveillance systems used for monitoring unusual events. When an event occurs, the software agents establish a new concept of operation at the sensing node, post the event status to a blackboard for software agents at other nodes to see , and then react quickly and efficiently to monitor the scale of the event. The technology addresses a current challenge in sensor networks that prevents a rapid and efficient response when a sensor measurement indicates that an event has occurred. By using intelligent software agents - which can be stationary or mobile, interact socially, and adapt to changing situations - the technology offers features that are particularly important when systems need to adapt to active circumstances. For example, when a release is detected, the local software agent collaborates with other agents at the node to exercise the appropriate operation, such as: targeted detection, increased detection frequency, decreased detection frequency for other non-alarming sensors, and determination of environmental conditions so that adjacent nodes can be informed that an event is occurring and when it will arrive. The software agents at the nodes can also post the data in a targeted manner, so that agents at other nodes and the command center can exercise appropriate operations to recalibrate the overall sensor network and associated intelligence systems. The paper describes the concepts and provides examples of real-world implementations including the Threat Detection and Analysis System (TDAS) at the International Port of Memphis and the Biological Warning and Incident Characterization System (BWIC) Environmental Monitoring (EM) Component. Technologies developed for these 24/7 operational systems have applications for improved real-time system integrity awareness as well as provide incident response (as needed) for production and field applications.

Kulesz, James J [ORNL; Lee, Ronald W [ORNL

2013-01-01T23:59:59.000Z

244

Detection of electrophilic and nucleophilic chemical agents  

DOE Patents [OSTI]

A "real time" method for detecting chemical agents generally and particularly electrophilic and nucleophilic species by employing tunable, precursor sensor materials that mimic the physiological interaction of these agents to form highly florescent berberine-type alkaloids that can be easily and rapidly detected. These novel precursor sensor materials can be tuned for reaction with both electrophilic (chemical species, toxins) and nucleophilic (proteins and other biological molecules) species. By bonding or otherwise attaching these precursor molecules to a surface or substrate they can be used in numerous applications.

McElhanon, James R.; Shepodd, Timothy J.

2014-08-12T23:59:59.000Z

245

Otvoren implementcia architektry Agent-Space  

E-Print Network [OSTI]

prejavy sú dané aktivovaním správnej sady agentov v správnom case image ball left/right Turn left direction ball interpolated ball recognizer interpolator left/right left/right #12;8 agent agent space blok zábran pridáva a odobera agentov, i takých ktorí ovládajú tie isté aktuátory robota. bumper right wheel

Lucny, Andrej

246

ANIMATION OF TALKING AGENTS Jonas Beskow  

E-Print Network [OSTI]

. Animation issues Animation of human, or humanoid, faces is a key technology in this context. There existANIMATION OF TALKING AGENTS Jonas Beskow Centre for Speech Technology KTH 10044 Stockholm, Sweden screen. This paper describes an architecture that can be used to design and animate characters capable

Beskow, Jonas

247

ETH Sustainability Educating Change Agents for  

E-Print Network [OSTI]

: ETHiopia Summer School in Addis Ababa sustainable solutions in architecture, water & sanitationETH Sustainability Educating Change Agents for Sustainability The ETH Sustainability Summer School for Sustainability» first results: summer schools 2009-2012 lessons learned 2ETH Sustainability content #12;VPPR

Richner, Heinz

248

Agent Notes Day 4 ~ Health Training  

E-Print Network [OSTI]

Agent Notes Day 4 ~ Health Training In preparation for the Health Day, you could order the National Institute on Aging, National Institutes of Health. To order these free booklets, go to www in the afternoon, and edit your agenda to reflect your choices. Several HealthHints newsletters are referenced

249

BEHAVIORAL BUILDING BLOCKS FOR AUTONOMOUS AGENTS  

E-Print Network [OSTI]

BEHAVIORAL BUILDING BLOCKS FOR AUTONOMOUS AGENTS: DESCRIPTION, IDENTIFICATION, AND LEARNING of Computer Science #12;c Copyright by ?zgür imek 2008 All Rights Reserved #12;BEHAVIORAL BUILDING BLOCKS Mahadevan, Member Andrea R. Nahmod, Member Andrew G. Barto, Department Chair Department of Computer Science

Massachusetts at Amherst, University of

250

Imaging agent and method of use  

DOE Patents [OSTI]

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla. No Drawings

Wieland, D.M.; Brown, L.E.; Beierwaltes, W.H.; Wu, J.L.

1986-04-22T23:59:59.000Z

251

Imaging agent and method of use  

DOE Patents [OSTI]

A new radiopharmaceutical composition for use in nuclear medicine comprises a radioiodinated meta-iodobenzylguanidine. The composition is used as an imaging agent for the heart, adrenal medulla, and tumors of the adrenal medulla and can be used for treatment of tumors of the adrenal medulla.

Wieland, Donald M. (1204 Linwood, Ann Arbor, MI 48103); Brown, Lawrence E. (523 Thomas St., Ypsilanti, MI 48197); Beierwaltes, William H. (1025 Forest Rd., Ann Arbor, MI 48105); Wu, Jiann-long (2672 Velvet Way, Walnut Creek, CA 94596)

1986-04-22T23:59:59.000Z

252

Agents on the Web The Sentient Web  

E-Print Network [OSTI]

Agents on the Web The Sentient Web "I n a startling revelation, a team of uni- versity scientists. In spite of the ominous tone typically cho- sen for dramatic effect, a sentient Web would be more helpful and much easier for people to use. When people find the Web frustrating, it is usual- ly not because

Huhns, Michael N.

253

Quantum speedup for active learning agents  

E-Print Network [OSTI]

Can quantum mechanics help us in building intelligent robots and agents? One of the defining characteristics of intelligent behavior is the capacity to learn from experience. However, a major bottleneck for agents to learn in any real-life situation is the size and complexity of the corresponding task environment. Owing to, e.g., a large space of possible strategies, learning is typically slow. Even for a moderate task environment, it may simply take too long to rationally respond to a given situation. If the environment is impatient, allowing only a certain time for a response, an agent may then be unable to cope with the situation and to learn at all. Here we show that quantum physics can help and provide a significant speed-up for active learning as a genuine problem of artificial intelligence. We introduce a large class of quantum learning agents for which we show a quadratic boost in their active learning efficiency over their classical analogues. This result will be particularly relevant for applications involving complex task environments.

Giuseppe Davide Paparo; Vedran Dunjko; Adi Makmal; Miguel Angel Martin-Delgado; Hans J. Briegel

2014-07-14T23:59:59.000Z

254

Formal Transition in Agent Organizations Eric Matson  

E-Print Network [OSTI]

, the company's management must understand the methodology and process of transition, or more generally termedFormal Transition in Agent Organizations Eric Matson Department of Computer Science and Engineering define organization transition. Specifically, we describe a formal process of organi- zation transition

Deloach, Scott A.

255

Automated Information Management via Abductive Logic Agents  

E-Print Network [OSTI]

Automated Information Management via Abductive Logic Agents F.Toni 1 Imperial College of Science representation of networks and meta-data via abductive logic programs and make use of the reasoning engine abductive logic pro- grams are equipped with for checking as well as enforcing the properties represented

Toni, Francesca

256

Multiscale Agent-Based Consumer Market Modeling  

E-Print Network [OSTI]

, and Visualization Group; and 3 Center for Energy, Environmental, and Economic Systems Analysis, Argonne NationalMultiscale Agent-Based Consumer Market Modeling MICHAEL J. NORTH,1 CHARLES M. MACAL,1 JAMES ST 8, 2009; revised August 19, 2009; accepted September 8, 2009 Consumer markets have been studied

Kemner, Ken

257

Device Selection by a Personal Proxy Agent  

E-Print Network [OSTI]

Device Selection by a Personal Proxy Agent N. Hadibi, K. El-khatib, Eric Z. Zhang, Ken Chan, G. v user to access communication devices currently present in his Personal Area Network (PAN) Performs PreferencesDevice Capability An example Scenario: Connecting Alice and Bob w/o a Personal Proxy Internet Home

von Bochmann, Gregor

258

Natural chelating agents for radionuclide decorporation  

DOE Patents [OSTI]

This invention relates to the preparation of new, naturally produced chelating agents as well as to the method and resulting chelates of desorbing cultures in a bioavailable form involving Pseudomonas species or other microorganisms. A preferred microorganism is Pseudomonas aeruginosa which forms multiple chelates with thorium in the range of molecular weight 100-1,000 and also forms chelates with uranium of molecular weight in the area of 100-1,000 and 1,000-2,000.

Premuzic, Eugene T. (East Moriches, NY)

1988-01-01T23:59:59.000Z

259

Agent Technology to Improve Building Energy Efficiency and Occupant Comfort  

E-Print Network [OSTI]

, can further reduce energy consumption of buildings. This paper reviews Multi-Agent Intelligent Internet-mediated control strategies and combines the most useful insights into a new technology called Forgiving Agent Comfort Technology (FACT...

Zeiler, W.; van Houten, R.; Kamphuis, R.; Hommelberg, M.

2006-01-01T23:59:59.000Z

260

Scheduling the Tasks of Two Agents with a Central Selection ...  

E-Print Network [OSTI]

by a single agent turns out to be a different kettle of fish, since any strategy adopted by one agent may suffer from a completely erratic behavior of the opponent.

2014-06-16T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Intelligent weather agent for aircraft severe weather avoidance  

E-Print Network [OSTI]

avoidance capability has increased. In this thesis, an intelligent weather agent is developed for general aviation aircraft. Using a radar image from an onboard weather radar, the intelligent weather agent determines the safest path around severe weather...

Bokadia, Sangeeta

2002-01-01T23:59:59.000Z

262

Agents of seed dispersal : animal--zoochary / Wind--anemonochory  

E-Print Network [OSTI]

Agents of seed dispersal is a project designed to address the increase of environmental degradation, which occurs as a result of the perpetual spread of the asphalt and concrete of the contemporary urban situation. Agents ...

Lysakowski, Lukasz Kamil, 1974-

2004-01-01T23:59:59.000Z

263

A router agent for capacity assessment in packet video  

E-Print Network [OSTI]

available multicast bandwidth on the subnet and reports this information to receivers upon request. Prior to joining the enhancement layer, the receiver checks with the agent and video source to ensure that sufficient bandwidth is available. The agent...

Woodings, Mark Alexander

1997-01-01T23:59:59.000Z

264

Chemical kinetics of cetane number improving agents  

SciTech Connect (OSTI)

The increasing demand for diesel fuels has resulted in the use of greater percentage of cracked distillates having poor ignition properties. The ignition properties of diesel fuels can be rated in terms of their cetane number and diesel fuels having low cetane number may have poor ignition properties such as diesel knock, difficulties to start engines in the cold weather and so on. Such diesel fuels need cetane number improving agents. In the 1940s and 1950s alkyl nitrates, alkyl nitrites and organic peroxides were found to be effective cetane number improving additives. Our recent study suggests that free radicals produced from thermal decomposition just before ignition should have an important role to improve their ignition properties. However no studies on the reaction mechanism for improving effect of these additives have been attempted because of complex nature of spontaneous ignition reaction of hydrocarbons. In order to clarify the reaction mechanism for improving effects of cetane number improving agents. We here have attempted to simulate the spontaneous ignition of n-butane as a model compound in the presence of alkyl nitrites as cetane number improving agents.

Hashimoto, K.; Akutsu, Y.; Arai, M.; Tamura, M. [Univ. of Tokyo (Japan)

1996-12-31T23:59:59.000Z

265

Lithium based electrochemical cell systems having a degassing agent  

DOE Patents [OSTI]

A lithium based electrochemical cell system includes a positive electrode; a negative electrode; an electrolyte; and a degassing agent.

Hyung, Yoo-Eup (Naperville, IL); Vissers, Donald R. (Naperville, IL); Amine, Khalil (Downers Grove, IL)

2012-05-01T23:59:59.000Z

266

Original article Effects of gelling agents on growth,  

E-Print Network [OSTI]

Original article Effects of gelling agents on growth, mineral composition and naphthoquinone May 1992; accepted 22 October 1992) Summary Gelling agents affect growth of walnut in vitro, induced mature leaf formation and necroses. The 2 gelling agents differed significantly in mineral content

Paris-Sud XI, Université de

267

Contract-related Agents John Knottenbelt and Keith Clark  

E-Print Network [OSTI]

Contract-related Agents John Knottenbelt and Keith Clark Dept of Computing, Imperial College London the monitoring and execution of contract terms and conditions. We use the event calculus to deduce current- tracts, the agent is able to select which of its contracts with other agents are relevant to solving its

Clark, Keith L.

268

Mobile Agents: Ten Reasons For Failure Giovanni Vigna  

E-Print Network [OSTI]

Mobile Agents: Ten Reasons For Failure Giovanni Vigna Reliable Software Group Department of Computer Science University of California, Santa Barbara vigna@cs.ucsb.edu Abstract Mobile agents have applications in a dynamic environment. Mobile agents pro- vide a very appealing, intuitive, and apparently

California at Santa Barbara, University of

269

Mobile agents for e-commerce Roll No. : 99329011  

E-Print Network [OSTI]

Mobile agents for e-commerce By Rahul Jha Roll No. : 99329011 Guided By Prof. Sridhar Iyer KR years, mobile agent (MA) paradigm has received a great deal of attention. While MAs have generated the effectiveness of mobile agents versus traditional approaches. This project contributes towards

Iyer, Sridhar

270

Managing a Relational Database with Intelligent Agents Ira Rudowsky1  

E-Print Network [OSTI]

Managing a Relational Database with Intelligent Agents Ira Rudowsky1 , Olga Kulyba1 , Mikhail Kunin quality for search and retrieval. An intelligent agent was designed using JACKTM (Agent Oriented Software in genomic studies, which could impact data analysis and further research [9, 10]. A number of software tools

Rudowsky, Ira

271

Enhancing Autonomous Agents Evolution with Learning by Imitation Elhanan Borenstein  

E-Print Network [OSTI]

Enhancing Autonomous Agents Evolution with Learning by Imitation Elhanan Borenstein School@post.tau.ac.il Abstract This paper presents a new mechanism to enhance the evolutionary process of autonomous agents of autonomous agents, when other forms of learning are not possible. 1 Introduction A large body of work

Borenstein, Elhanan

272

Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci  

E-Print Network [OSTI]

Smart Meter Aware Domestic Energy Trading Agents Nicola Capodieci University of Modena and RE illustrate an implementation includ- ing the interfacing with a physical Smart Meter and provide initial--Intelligent agents, Multiagent systems General Terms Design, Economy Keywords Energy trade, agents, smart meter 1

Aiello, Marco

273

Web Service Access Management for Integration with Agent Systems  

E-Print Network [OSTI]

Web Service Access Management for Integration with Agent Systems B.J. Overeinder, P.D. Verkaik, from the perspective of agent systems (and not as is gen- erally the case by web service providers). Mediating between web service requests from (virtual) organizations of agents, the web ser- vice gateway

274

An abductive logic programming architecture for negotiating agents  

E-Print Network [OSTI]

An abductive logic programming architecture for negotiating agents Fariba Sadri1 , Francesca Toni1@deis.unibo.it Abstract. In this paper, we present a framework for agent negotiation based on abductive logic programming and dialogue cycle, and in the results that apply in the gen- eral case of abductive agents and in the specific

Torroni, Paolo

275

E-Print Network 3.0 - agent based classification Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Su-Chong Joo... of software architecture supporting for healthcare context information service platform based on multi agent... of multi agent software platform and multi agent ......

276

E-Print Network 3.0 - alternate antifoam agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

as the emulsifying agent... cultures in which the plant oil is emulsified using a chemical emulsifying agent. These emulsified oil... agents, and nitrogen sources were added to...

277

E-Print Network 3.0 - agent management system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES find local failures... agents will multiply. These irregular ... Source: Siegelmann ,...

278

Fluid extraction using carbon dioxide and organophosphorus chelating agents  

DOE Patents [OSTI]

Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO{sub 2}, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO{sub 2} and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process. 1 fig.

Smart, N.G.; Wai, C.M.; Lin, Y.; Kwang, Y.H.

1998-11-24T23:59:59.000Z

279

Fluid extraction using carbon dioxide and organophosphorus chelating agents  

DOE Patents [OSTI]

Methods for extracting metalloid and metal species from a solid or liquid material by exposing the material to a fluid solvent, particularly supercritical CO.sub.2, and a chelating agent are described. The chelating agent forms a chelate with the species, the chelate being soluble in the fluid to allow removal of the species from the material. In preferred embodiments the extraction solvent is supercritical CO.sub.2 and the chelating agent comprises an organophosphorous chelating agent, particularly sulfur-containing organophosphorous chelating agents, including mixtures of chelating agents. Examples of chelating agents include monothiophosphinic acid, di-thiophosphinic acid, phosphine sulfite, phosphorothioic acid, and mixtures thereof. The method provides an environmentally benign process for removing metal and metalloids from industrial waste solutions, particularly acidic solutions. Both the chelate and the supercritical fluid can be regenerated and the contaminant species recovered to provide an economic, efficient process.

Smart, Neil G. (Moscow, ID); Wai, Chien M. (Moscow, ID); Lin, Yuehe (Moscow, ID); Kwang, Yak Hwa (Moscow, ID)

1998-01-01T23:59:59.000Z

280

Distributed coordination of autonomous agents by communicating on a need-to-know basis  

E-Print Network [OSTI]

Intelligent autonomous agents working cooperatively accomplish tasks more efficiently than single agents, as well as tasks that were infeasible for the single agent. For example, a single agent transporting a ton of blocks ...

Chen, Judy Y. (Judy Yann-Yun), 1980-

2004-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Mnemonic Structure and Sociality: A Computational Agent-Based Simulation Model  

E-Print Network [OSTI]

Mnemonic Structure and Sociality: A Computational Agent-Based Simulation Model Claudio Cioffi-agent social simulation models are designed with agents lacking explicit internal information transformations affect human and social dynamics? Most computational multi-agent social simulation models

George Mason University

282

Designed TPR Modules as Novel Anticancer Agents  

SciTech Connect (OSTI)

Molecules specifically designed to modulate protein-protein interactions have tremendous potential as novel therapeutic agents. One important anticancer target is the chaperone Hsp90, whose activity is essential for the folding of many oncogenic proteins, including HER2, IGFIR, AKT, RAF-1, and FLT-3. Here we report the design and characterization of new tetratricopeptide repeat modules, which bind to the C-terminus of Hsp90 with higher affinity and with greater specificity than natural Hsp90-binding co-chaperones. Thus, when these modules are introduced into the cell, they out-compete endogenous co-chaperones for binding, thereby inhibiting Hsp90 function. The effect of Hsp90 inhibition in this fashion is dramatic; HER2 levels are substantially decreased and BT474 HER2 positive breast cancer cells are killed. Our designs thus provide new tools with which to dissect the mechanism of Hsp90-mediated protein folding and also open the door to the development of an entirely new class of anticancer agents.

Cortajarena,A.; Yi, F.; Regan, L.

2008-01-01T23:59:59.000Z

283

E-Print Network 3.0 - agent structure characterization Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on Web Intelligence Intelligent Agent Technology, Summary: -configurable architecture is based on hierarchical architecture, and characterized with mediator agents and...

284

Quantum-enhanced deliberation of learning agents using trapped ions  

E-Print Network [OSTI]

A scheme that successfully employs quantum mechanics in the design of autonomous learning agents has recently been reported in the context of the projective simulation (PS) model for artificial intelligence. In that approach, the key feature of a PS agent, a specific type of memory which is explored via random walks, was shown to be amenable to quantization. In particular, classical random walks were substituted by Szegedy-type quantum walks, allowing for a speed-up. In this work we propose how such classical and quantum agents can be implemented in systems of trapped ions. We employ a generic construction by which the classical agents are `upgraded' to their quantum counterparts by nested coherent controlization, and we outline how this construction can be realized in ion traps. Our results provide a flexible modular architecture for the design of PS agents. Furthermore, we present numerical simulations of simple PS agents which analyze the robustness of our proposal under certain noise models.

Vedran Dunjko; Nicolai Friis; Hans J. Briegel

2015-01-31T23:59:59.000Z

285

Cell-targeted lytic pore-forming agents  

DOE Patents [OSTI]

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 18 figs.

Bayley, H.; Walker, B.J.

1998-10-20T23:59:59.000Z

286

Cell-targeted lytic pore-forming agents  

DOE Patents [OSTI]

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell.

Bayley, Hagen (Grafton, MA); Walker, Barbara J. (Auburn, MA)

1998-01-01T23:59:59.000Z

287

Cell-targeted lytic pore-forming agents  

DOE Patents [OSTI]

A chimeric compound that contains a cell-specific ligand linked to a pore-forming agent capable of lysing a cell. 21 figs.

Bayley, H.; Walker, B.J.

1998-10-06T23:59:59.000Z

288

agent technology iat: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent Systems Summer School (Durham 2007) 2253 Pointers to Other Courses John Zachmann, Gabriel 69 Technologies Technologies Mathematics Websites Summary: UFR Sciences et...

289

1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1  

E-Print Network [OSTI]

Contents 1 Conversational Agents 1 1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.3.1 Natural

Lester, James C.

290

E-Print Network 3.0 - antimycobacterial agent tetrahydrolipstatin...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

biosynthesis evaluated by activity-based protein profiling Summary: by two small-molecule agents, RHC80267 and tetrahydrolipstatin (THL)2,4 (Fig. 1), which have been...

291

Business Models Guide: Real Estate Agent | Department of Energy  

Energy Savers [EERE]

and a broad knowledge of the industry, real estate agents are natural advocates for smart energy efficiency upgrades. realestateagent.pdf More Documents & Publications...

292

agent initial experience: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and Applications of Artificial Intelligence, pp. 265-278, 2005. 4 I. Moura, "A model System Initiative Dialogue of Mixed Initiative Conversational Agent using Global*** . , . . ....

293

agent concise communication: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Er D. Korzyk 2000-01-01 32 Semantics of Communicating Agents Based on Deduction and Abduction Computer Technologies and Information Sciences Websites Summary: Semantics of...

294

agentes coagulantes para: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- Comrcio Electrnico de Livros na Internet da Silva, Alberto Rodrigues 2 ARQUITECTURA BASADA EN AGENTES INTELIGENTES Y SERVICIOS WEB PARA LA ADAPTACIN DE CONTENIDOS...

295

antitumor agents mechanistic: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Yes No Partly No Episodic?? Static?? Discrete?? Single-agent?? Chapter 2 13 Environment types Solitaire Backgammon Internet shopping Taxi Observable?? Yes Yes Liu, Yanhong...

296

Validating agent based models through virtual worlds.  

SciTech Connect (OSTI)

As the US continues its vigilance against distributed, embedded threats, understanding the political and social structure of these groups becomes paramount for predicting and dis- rupting their attacks. Agent-based models (ABMs) serve as a powerful tool to study these groups. While the popularity of social network tools (e.g., Facebook, Twitter) has provided extensive communication data, there is a lack of ne-grained behavioral data with which to inform and validate existing ABMs. Virtual worlds, in particular massively multiplayer online games (MMOG), where large numbers of people interact within a complex environ- ment for long periods of time provide an alternative source of data. These environments provide a rich social environment where players engage in a variety of activities observed between real-world groups: collaborating and/or competing with other groups, conducting battles for scarce resources, and trading in a market economy. Strategies employed by player groups surprisingly re ect those seen in present-day con icts, where players use diplomacy or espionage as their means for accomplishing their goals. In this project, we propose to address the need for ne-grained behavioral data by acquiring and analyzing game data a commercial MMOG, referred to within this report as Game X. The goals of this research were: (1) devising toolsets for analyzing virtual world data to better inform the rules that govern a social ABM and (2) exploring how virtual worlds could serve as a source of data to validate ABMs established for analogous real-world phenomena. During this research, we studied certain patterns of group behavior to compliment social modeling e orts where a signi cant lack of detailed examples of observed phenomena exists. This report outlines our work examining group behaviors that underly what we have termed the Expression-To-Action (E2A) problem: determining the changes in social contact that lead individuals/groups to engage in a particular behavior. Results from our work indicate that virtual worlds have the potential for serving as a proxy in allocating and populating behaviors that would be used within further agent-based modeling studies.

Lakkaraju, Kiran; Whetzel, Jonathan H.; Lee, Jina [Sandia National Laboratories, Livermore, CA; Bier, Asmeret Brooke; Cardona-Rivera, Rogelio E. [North Carolina State University, Raleigh, NC; Bernstein, Jeremy Ray Rhythm [Gaikai, Inc., Aliso Viejo, CA

2014-01-01T23:59:59.000Z

297

CARVE: A Cognitive Agent for Resource Value Estimation Jonathan Wildstrom  

E-Print Network [OSTI]

In ICAC, June 2008. CARVE: A Cognitive Agent for Resource Value Estimation Jonathan Wildstrom computational resources (processing, memory and I/O) are availably on demand at a market cost. On-demand access and accurately estimate the value of the resource. This paper introduces CARVE: a Cognitive Agent for Resource

Witchel, Emmett

298

Role-based and agent-oriented teamwork modeling  

E-Print Network [OSTI]

needs and proactively exchange information with them. Through RoB-PHB, agents can identify other agents?? help needs and proactively initialize actions to help them. Our experiments have shown that RoB-MALLET is flexible in specifying reusable plans, Ro...

Cao, Sen

2005-11-01T23:59:59.000Z

299

The Task Agent Resource Function application in UAV domain  

E-Print Network [OSTI]

The Task Agent Resource Function application in UAV domain Tan Viet Anh Truong Ecole National is to present an application of TARF (Task Agent Resource Function) in UAV domain. This TARF is used to optimize of a generic mission planner for cross domain such as UAV, maritime, automotive and manned aerial vehicle (MAV

Paris-Sud XI, Université de

300

Dynamic Adaptation of Mobile Agents in Heterogenous Environments  

E-Print Network [OSTI]

of network management where mobile agents seem to be a promising technology [BPW98,FKK99]. Java programs can, there are scenarios like IT-management, where mobile agents are forced to contain environment dependent technologies, design paradigms and applications of mobile code. Code mobility can also be de- scribed as motion

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Computation Migration based on Mobile IP and Intelligent Agent Techniques  

E-Print Network [OSTI]

Page 1 Computation Migration based on Mobile IP and Intelligent Agent Techniques Runtong Zhang, Dongmei Zhang, Zhigang Kan and Jian Ma Advanced Internet Technology, Nokia (China) R&D Center No. 11, He is to investigate the use of mobile agents in the platform of mobile IPv6, to provide adapted services to mobile

Zhang, Runtong

302

Supporting Air Traffic Flow Management with Agents Shawn R. Wolfe  

E-Print Network [OSTI]

Supporting Air Traffic Flow Management with Agents Shawn R. Wolfe Intelligent Systems Division NASA Ames Research Center Moffett Field, CA 94035-1000 Shawn.R.Wolfe@nasa.gov Abstract Air traffic flow an agent-based system to facilitate mutually beneficial air traffic management decisions, and identify

Yorke-Smith, Neil

303

Intelligent Mobile Agents for Information Retrieval and Knowledge Discovery from  

E-Print Network [OSTI]

or software agents for intelligent, selective, and context­sensitive data gathering and data assimilation assimilation, and knowl­ edge discovery using heterogeneous, distributed data and knowledge sources. (See [1Intelligent Mobile Agents for Information Retrieval and Knowledge Discovery from Distributed Data

Honavar, Vasant

304

Computing Environment-Aware Agent Behaviours with Logic Program Updates  

E-Print Network [OSTI]

Computing Environment-Aware Agent Behaviours with Logic Program Updates Jose J. Alferes1 , Antonio Pisa, Italy, brogi@di.unipi.it Abstract. The ability of reacting to changes in the external environ behaviours of environment-aware agents can be naturally specified and computed in terms of logic program

Brogi, Antonio

305

Wood-Fiber/High-Density-Polyethylene Composites: Coupling Agent Performance  

E-Print Network [OSTI]

Wood-Fiber/High-Density-Polyethylene Composites: Coupling Agent Performance John Z. Lu,1 Qinglin Wu structure. As a coupling agent, mal- eated polyethylene (MAPE) had a better performance in WPC than oxidized polyethylene (OPE) and pure polyeth- ylene (PPE) because of its stronger interfacial bonding. A combination

306

Utility theory front to back inferring utility from agents' choices  

E-Print Network [OSTI]

Utility theory front to back ­ inferring utility from agents' choices A. M. G. Cox Dept to utility theory and consumption & investment problems. Instead of specifying an agent's utility function) and ask if it is possible to derive a utility function for which the observed behaviour is optimal. We

307

Multi-Agent Simulation of Protein Folding Luca Bortolussi1  

E-Print Network [OSTI]

Multi-Agent Simulation of Protein Folding Luca Bortolussi1 , Agostino Dovier1 , and Federico residues) is known. The process for reaching this state is known as the protein fold- ing. This problem the feasibility and the power of the method. Keywords: Computational Biology, Agent-Based Technologies, Protein

Bortolussi, Luca

308

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Nelson Minar  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS by Nelson Minar B.A. Mathematics (1994) Reed College, Departmental Committee on Graduate Students Program in Media Arts and Sciences #12; #12; DESIGNING AN ECOLOGY is an organizing principle for documents. This thesis introduces the idea of an ecology of distributed agents

309

The Agent's Policy in an Asset Pricing Model Andrew Culham  

E-Print Network [OSTI]

they use when taking expectations of future prices. Under such assumptions, asset pric- ing models remain is perishable and thus must be consumed or in- vested in the stock each period. Note that with this set up we t is agent i's stock holdings in period t, wi t is agent i's exogenous endowment in period t (could

310

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance  

E-Print Network [OSTI]

Cancer Treatment Using Multiple Chemotheraputic Agents Subject to Drug Resistance J. J. Westman-7045 USA Abstract A compartment model for the evolution of cancer subject to multiple chemotherapeutic agents is presented. The formulation accounts for the heterogeneous nature of cancer and drug resistance

Hanson, Floyd B.

311

Coordination Assistance for Mixed Human and Computational Agent Systems 1  

E-Print Network [OSTI]

will discuss the design of a set of distributed autonomous computer programs (``agents'') that assist peopleCoordination Assistance for Mixed Human and Computational Agent Systems 1 Keith S. Decker Commander) and his staff (intelligence, operations, logistics, weather, etc.). As the human planner makes

Massachusetts at Amherst, University of

312

Coordination Assistance for Mixed Human and Computational Agent Systems 1  

E-Print Network [OSTI]

will discuss the design of a set of distributed autonomous computer programs ("agents") that assist peopleCoordination Assistance for Mixed Human and Computational Agent Systems 1 Keith S. Decker Commander) and his staff (intelligence, operations, logistics, weather, etc.). As the human planner makes

Massachusetts at Amherst, University of

313

Abduction with Negation as Failure for Active Databases and Agents  

E-Print Network [OSTI]

Abduction with Negation as Failure for Active Databases and Agents Fariba Sadri and Francesca Toni suggested abductive logic programming as a suitable formalism to represent active databases and intelligent agents. In particular, abducibles and integrity constaints in abductive logic pro- grams can be used

Toni, Francesca

314

EXPRESSING COLLABORATION AND COMPETITION AMONG ABDUCTIVE LOGIC AGENTS  

E-Print Network [OSTI]

EXPRESSING COLLABORATION AND COMPETITION AMONG ABDUCTIVE LOGIC AGENTS Anna Ciampolini, Evelina a language for coordinating several logic­based agents capable of abductive reasoning. The system to guess the causes of some symptoms. In his respect, some form of open or abductive reasoning has

Torroni, Paolo

315

Autonomous Traffic Control System Using Agent Based Technology  

E-Print Network [OSTI]

The way of analyzing, designing and building of real-time projects has been changed due to the rapid growth of internet, mobile technologies and intelligent applications. Most of these applications are intelligent, tiny and distributed components called as agent. Agent works like it takes the input from numerous real-time sources and gives back the real-time response. In this paper how these agents can be implemented in vehicle traffic management especially in large cities and identifying various challenges when there is a rapid growth of population and vehicles. In this paper our proposal gives a solution for using autonomous or agent based technology. These autonomous or intelligent agents have the capability to observe, act and learn from their past experience. This system uses the knowledge flow of precedent signal or data to identify the incoming flow of forthcoming signal. Our architecture involves the video analysis and exploration using some Intelligence learning algorithm to estimate and identify the...

M, Venkatesh; V, Srinivas

2011-01-01T23:59:59.000Z

316

Oxidizer gels for detoxification of chemical and biological agents  

DOE Patents [OSTI]

A gel composition containing oxidizing agents and thickening or gelling agents is used to detoxify chemical and biological agents by application directly to a contaminated area. The gelling agent is a colloidal material, such as silica, alumina, or alumino-silicate clays, which forms a viscous gel that does not flow when applied to tilted or contoured surfaces. Aqueous or organic solutions of oxidizing agents can be readily gelled with less than about 30% colloidal material. Gel preparation is simple and suitable for field implementation, as the gels can be prepared at the site of decontamination and applied quickly and uniformly over an area by a sprayer. After decontamination, the residue can be washed away or vacuumed up for disposal.

Hoffman, Dennis M. (Livermore, CA); McGuire, Raymond R. (Brentwood, CA)

2002-01-01T23:59:59.000Z

317

U-090: RSA enVision Discloses Environment Variable Information...  

Broader source: Energy.gov (indexed) [DOE]

CVE-2011-4143 SecurityTracker Alert ID: 1026591 Secunia Advisory IMPACT ASSESSMENT: Medium Discussion: The security issue is caused due to the application disclosing certain...

318

Exploratory Group Problem: RSA Encryption November 5, 2008  

E-Print Network [OSTI]

result and you shouldn't use any more advanced functions). To do this, you will need to develop some. (b) How many invertible elements are there in ZN where N = pq is a product of two primes? Explain why of multiplicatively invertible elements of ZN , and the size of the subgroup generated by x. 1 #12;(c) Calculate

Stange, Katherine E.

319

User Guide Remote Access to VDI/Workplace Using RSA  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access to VDI/Workplace Using PIV

320

Modeling Mobile Agent Systems with High Level Petri Nets Dianxiang Xu and Yi Deng  

E-Print Network [OSTI]

Modeling Mobile Agent Systems with High Level Petri Nets Dianxiang Xu and Yi Deng School-based approach for architectural modeling of mobile agent systems. Agent template (net) is proposed to model as a component, consisting of mobility environment (system net), agent templates (agent nets), and internal

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

ARM - Central Authentication Service  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformationbudapest Comments? We would love to heartotdngovInstrumentswrf-chemHistory Organization

322

CERTIFICATE OF AUTHENTICITY  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energyon ArmedWaste andAccess toSustainableClimateSealingColdEnergyClimateC C

323

Volttron: An Agent Platform for the Smart Grid  

SciTech Connect (OSTI)

VOLLTRON platform enables the deployment of intelligent sensors and controllers in the smart grid and provides a stable, secure and flexible framework that expands the sensing and control capabilities. VOLTTRON platform provides services fulfilling the essential requirements of resource management and security for agent operation in the power grid. The facilities provided by the platform allow agent developers to focus on the implementation of their agent system and not on the necessary "plumbing' code. For example, a simple collaborative demand response application was written in less than 200 lines of Python.

Haack, Jereme N.; Akyol, Bora A.; Carpenter, Brandon J.; Tews, Cody W.; Foglesong, Lance W.

2013-05-06T23:59:59.000Z

324

Agents, Believabilityand Embodiment in Advanced Learning Environments Introduction to a Panel Discussion  

E-Print Network [OSTI]

Agents, Believabilityand Embodiment in Advanced Learning Environments Introduction to a Panel to ediicatiorial or en- tertuinnierit systenis, iriterjiaces to professional environ- merits, etc., where cin the issues that underlie the introduction of embodied agents in learning environments. Embodied agents appear

Nijholt, Anton

325

Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer  

E-Print Network [OSTI]

1 Dynamical Analysis of Evolved Agents: A Primer Randall D. Beer Cognitive Science Program School: Randall D. Beer Phone: (812) 856-0873 Cognitive Science Program Fax: (812) 855-1086 1910 E. 10th St. ­ 840

Beer, Randall D.

326

Iron oxide nanoparticles as a contrast agent for thermoacoustic tomography  

E-Print Network [OSTI]

radiation. The addition of an exogenous contrast agent improves image quality by more effectively converting microwave energy to heat. The use of iron oxide nanoparticles in MRI applications has been explored but super paramagnetic iron oxide nanoparticles...

Keho, Aaron Lopez

2009-06-02T23:59:59.000Z

327

Woodstein : a Web interface agent for debugging e-commerce  

E-Print Network [OSTI]

Woodstein is a software agent that works with a user's web browser to explain and help diagnose problems in web processes, such as purchases. It enables the user to inspect data items in ordinary web pages, revealing the ...

Wagner, Earl Joseph, 1977-

2003-01-01T23:59:59.000Z

328

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard  

E-Print Network [OSTI]

Evolving Protocols and Agents in Multiagent Systems Scott N. Gerard Department of Computer Science (AA- MAS 2013), Ito, Jonker, Gini, and Shehory (eds.), May, 6­10, 2013, Saint Paul, Minnesota, USA

329

agentes aislados durante: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel First Page Previous Page 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20...

330

agente causal da: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

severe economic losses in the main apple producing areas of East Asia. The causal Biggs, Alan R. 4 Knowing Who Dunnit: Infants Identify the Causal Agent in an Unseen Causal...

331

Coordinated Searching and Target Identification Using Teams of Autonomous Agents  

E-Print Network [OSTI]

Coordinated Searching and Target Identification Using Teams of Autonomous Agents Christopher Lum;#12;University of Washington Abstract Coordinated Searching and Target Identification Using Teams of Autonomous & Astronautics Many modern autonomous systems actually require significant human involvement. Often, the amount

Washington at Seattle, University of

332

Distributed multi-agent optimization with state-dependent communication  

E-Print Network [OSTI]

We study distributed algorithms for solving global optimization problems in which the objective function is the sum of local objective functions of agents and the constraint set is given by the intersection of local ...

Lobel, Ilan

333

Chemical Agent Induced Reduction of Skin Light Scattering  

E-Print Network [OSTI]

scattering with the potential to increase the efficacy of light based imaging and therapeutic applications. Three hypotheses have been suggested for the clearing mechanism: index of refraction matching between clearing agent and collagen, tissue dehydration...

Hirshburg, Jason M.

2011-02-22T23:59:59.000Z

334

Method and apparatus for enhanced detection of toxic agents  

DOE Patents [OSTI]

A biosensor based detection of toxins includes enhancing a fluorescence signal by concentrating a plurality of photosynthetic organisms in a fluid into a concentrated region using biased AC electro-osmosis. A measured photosynthetic activity of the photosynthetic organisms is obtained in the concentrated region, where chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. A presence of the chemical, biological and/or radiological agents or precursors thereof, is determined in the fluid based on the measured photosynthetic activity of the concentrated plurality of photosynthetic organisms. A lab-on-a-chip system is used for the concentrating step. The presence of agents is determined from feature vectors, obtained from processing a time dependent signal using amplitude statistics and/or time-frequency analysis, relative to a control signal. A linear discriminant method including support vector machine classification (SVM) is used to identify the agents.

Greenbaum, Elias; Rodriguez, Jr., Miguel; Wu, Jie Jayne; Qi, Hairong

2013-10-01T23:59:59.000Z

335

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Master's Thesis Proposal  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS Master's Thesis Proposal November 5, 1997 Revised Lab #12; #12; Contents 1 Introduction 1 1.1 Ecologies of Programs of Computational Ecologies . . . . . . . . . . . . . . . . . . . 7 1.5 Summary of Expected Contributions

336

Approximate dynamic programming with applications in multi-agent systems  

E-Print Network [OSTI]

This thesis presents the development and implementation of approximate dynamic programming methods used to manage multi-agent systems. The purpose of this thesis is to develop an architectural framework and theoretical ...

Valenti, Mario J. (Mario James), 1976-

2007-01-01T23:59:59.000Z

337

agent sabarubicin men10755: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

338

antitreponemal agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

339

anti-ulcer agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

340

antitussive agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

agent pseudozyma flocculosa: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

342

abortifacient agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

343

antilipemic agents: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

McGill UniversityMcGill University MontrMontral, Canadaal, Canada 12;An ISI Web of Science SearchAn ISI Web of Science Search (Topic Intelligent Agent* OR Software...

344

Risk Allocation for Multi-agent Systems using Tatonnement  

E-Print Network [OSTI]

This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty, called MIRA (Market-based Iterative Risk Allocation). In large coordination problems, from power grid management ...

Williams, Brian C.

2009-04-22T23:59:59.000Z

345

An Autonomous Adaptive Scheduling Agent for Period Searching  

E-Print Network [OSTI]

We describe the design and implementation of an autonomous adaptive software agent that addresses the practical problem of observing undersampled, periodic, time-varying phenomena using a network of HTN-compliant robotic telescopes. The algorithm governing the behaviour of the agent uses an optimal geometric sampling technique to cover the period range of interest, but additionally implements proactive behaviour that maximises the optimality of the dataset in the face of an uncertain and changing operating environment.

Eric S. Saunders; Tim Naylor; Alasdair Allan

2008-01-24T23:59:59.000Z

346

Adaptive method with intercessory feedback control for an intelligent agent  

DOE Patents [OSTI]

An adaptive architecture method with feedback control for an intelligent agent provides for adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. An adaptive architecture method with feedback control for multiple intelligent agents provides for coordinating and adaptively integrating reflexive and deliberative responses to a stimulus according to a goal. Re-programming of the adaptive architecture is through a nexus which coordinates reflexive and deliberator components.

Goldsmith, Steven Y.

2004-06-22T23:59:59.000Z

347

Use of antimicrobial agents in a novel cattle washing system  

E-Print Network [OSTI]

USE OF ANTIMICROBIAL AGENTS IN A NOVEL CATTLE WASHING SYSTEM A Thesis by BRIAN REED COVINGTON Submitted to thc Office of Graduate Studies of Texas ARM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE... August 2001 Major Subject: Animal Science USE OF ANTIMICROBIAL AGENTS IN A NOVEL CATTLE WASHING SYSTEM A Thesis by BRIAN REED COVINGTON Submitted to Texas A&M University in partial fulfillment of the requtrements for the degree of MASTER...

Covington, Brian Reed

2012-06-07T23:59:59.000Z

348

E-Print Network 3.0 - agent system solution Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in a mobile agent... agent server. In: Fifth ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 31 Management of...

349

E-Print Network 3.0 - agent guidelines table Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent platforms... and agent platform owners) to the ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 8 UNSW Websites:...

350

E-Print Network 3.0 - agents identify distinctly Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

platform to target agent platforms. 6. Agents... ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 4 Supporting...

351

E-Print Network 3.0 - additive emulsifying agent Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agents... additives is confusing. It is often assumed that any material that lowers the surface tension of water... : wetting agents, penetrants, spreaders, ......

352

Understanding the Role of Negotiation in Distributed Search Among Heterogeneous Agents  

E-Print Network [OSTI]

of a seven­agent steam condenser de­ sign system and discuss how different operator/agent assignments within

Massachusetts at Amherst, University of

353

E-Print Network 3.0 - adventitious agent safety Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent safety Search Powered by Explorit Topic List Advanced Search Sample search results for: adventitious agent safety Page: << < 1 2 3 4 5 > >> 1 Reproduction in Flowering Plants...

354

E-Print Network 3.0 - adaptive agent architecture Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Aspects Alessandro Garcia Carlos Lucena Summary: Enforcement (a) aspect-oriented architecture of an user agent Behavior Adaptation Kernel Services Knowledge... -oriented agent...

355

agent-based model supported: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

356

agent-based market model: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

357

agent-based models analytical: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

358

agent-based market models: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agent-Based Model to analyze the climate change impacts on the Andorra winter tourism CERN Preprints Summary: This study presents a georeferenced agent-based model to...

359

afecs multi-agent framework: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 35 Decisiones sociales en Sistemas Multi-Agente Computer Technologies and...

360

anti-actin agent dihydrohalichondramide: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 126 Agent Communication and Cooperative Information Frank Dignum Computer...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

agents n-nitroso-n-ethylurea benzoapyrene: Topics by E-print...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 132 Agent Communication and Cooperative Information Frank Dignum Computer...

362

anti-angiogenic agents tnp-470: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 140 Agent Communication and Cooperative Information Frank Dignum Computer...

363

alumino-silicatos como agentes: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Computer Science) 12;Multi-Agent Programming Contest 2011 Edition Evaluation Zachmann, Gabriel 136 Agent Communication and Cooperative Information Frank Dignum Computer...

364

E-Print Network 3.0 - agent tzt-1027 enhances Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

tumor vasculature... in these studies may be ideally suited for these particular activities, since a structurally related agent, TZT... the antitubulin agent monomethyl...

365

E-Print Network 3.0 - agent causing occupational Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

pathology andor an occupational exposure defined by noxious agent, profession... as shown in fig. 1D. D) The tripartite network: disease-noxious agent-occupation is the...

366

E-Print Network 3.0 - atosibano como agente Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Collection: Mathematics 17 Agentes Inteligentes Prof. Luiz Chaimowicz Captulo 5 CSP (Overview) Summary: 1 Agentes Inteligentes Prof. Luiz Chaimowicz Captulo 5 - CSP...

367

agent-based sinkhole attack: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

368

agent-based tumor model: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

369

agent-based national scale: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

focuses on proposing methodologies for agent systems, i.e., on identifying the guidelines to drive the various phases of agent-based software development and the abstractions...

370

E-Print Network 3.0 - agents designed exclusively Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: agents designed exclusively Page: << < 1 2 3 4 5 > >> 1 Multi-agent System Architecture for Collaborative E-Commerce Xiaojun Shen, Shervin Shirmohammadi, Chris Desmarais...

371

E-Print Network 3.0 - adaptive multi-agent architecture Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent architecture Search Powered by Explorit Topic List Advanced Search Sample search results for: adaptive multi-agent architecture Page: << < 1 2 3 4 5 > >> 1 Presented at:...

372

E-Print Network 3.0 - agente oxidante uma Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Aumentar a quantidade do agente oxidante ou modificar o agente oxidante Canal... RESUMO Neste artigo apresentamos ... Source: Cengarle, Mara Victoria - Institut fr Informatik,...

373

E-Print Network 3.0 - alguns procariotas agentes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

da Computao n 3509 Um Agente Especialista em... -9741 Editor: Prof. Carlos Jos Pereira de Lucena Novembro, 2009 Um Agente Especialista em Recomendao de... presents a...

374

E-Print Network 3.0 - alguns agentes lixiviantes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

da Computao n 3509 Um Agente Especialista em... -9741 Editor: Prof. Carlos Jos Pereira de Lucena Novembro, 2009 Um Agente Especialista em Recomendao de... presents a...

375

E-Print Network 3.0 - agentes virtuales inteligentes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Agentes Inteligentes Prof. Luiz Chaimowicz -DCC -UFMG Lgica Nebulosa Fuzzy Logic Summary: 1 Agentes Inteligentes Prof. Luiz Chaimowicz - DCC - UFMG Lgica Nebulosa -...

376

E-Print Network 3.0 - agents morphological study Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

377

E-Print Network 3.0 - agente quelatante del Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

378

E-Print Network 3.0 - agentes del bioterrorismo Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

379

E-Print Network 3.0 - agente protector del Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

T... cooperative multi-agent system simulation with local monitoring. When agents of HADES ... Source: Siegelmann , Hava T - Department of Computer Science, University of...

380

Synthesis and evaluation of modified oximidine analogues as anticancer agents and of terephthalaldehyde-bis-guanylhydrazones as endotoxin sequestering agents  

E-Print Network [OSTI]

of the enamide moiety with a stable warhead will allow the discovery of novel anticancer agents with improved pharmacokinetics. We selected three different warheads that are likely to be stable under physiological conditions and that could undergo nucleophilic...

Khownium, Kriangsak

2009-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

facets and dispatches a system mobile agent to carry them with it and extract the user agents at idle servers.  

E-Print Network [OSTI]

at idle servers. 6 Conclusions In this paper we have focused on small scale inter­cluster job coordination­ dination work and upgrade the features of remote clusters using mobile agents. We have implemented

Fukuda, Munehiro

382

Contract Signature Using Quantum Information  

E-Print Network [OSTI]

This paper describes how to perform contract signature in a fair way using quantum information. The protocol proposed permits two partners, users of a communication network, to perform a contract signature based on the RSA security. The authentication of the signers is based on the use of a non-local XOR function of two classical bits.

Paulo Benicio Melo de Sousa; Rubens Viana Ramos

2007-11-08T23:59:59.000Z

383

Agent 2003 Conference on Challenges in Social Simulation  

SciTech Connect (OSTI)

Welcome to the Proceedings of the fourth in a series of agent simulation conferences cosponsored by Argonne National Laboratory and The University of Chicago. Agent 2003 is the second conference in which three Special Interest Groups from the North American Association for Computational Social and Organizational Science (NAACSOS) have been involved in planning the program--Computational Social Theory; Simulation Applications; and Methods, Toolkits and Techniques. The theme of Agent 2003, Challenges in Social Simulation, is especially relevant, as there seems to be no shortage of such challenges. Agent simulation has been applied with increasing frequency to social domains for several decades, and its promise is clear and increasingly visible. Like any nascent scientific methodology, however, it faces a number of problems or issues that must be addressed in order to progress. These challenges include: (1) Validating models relative to the social settings they are designed to represent; (2) Developing agents and interactions simple enough to understand but sufficiently complex to do justice to the social processes of interest; (3) Bridging the gap between empirically spare artificial societies and naturally occurring social phenomena; (4) Building multi-level models that span processes across domains; (5) Promoting a dialog among theoretical, qualitative, and empirical social scientists and area experts, on the one hand, and mathematical and computational modelers and engineers, on the other; (6) Using that dialog to facilitate substantive progress in the social sciences; and (7) Fulfilling the aspirations of users in business, government, and other application areas, while recognizing and addressing the preceding challenges. Although this list hardly exhausts the challenges the field faces, it does identify topics addressed throughout the presentations of Agent 2003. Agent 2003 is part of a much larger process in which new methods and techniques are applied to difficult social issues. Among the resources that give us the prospect of success is the innovative and transdisciplinary research community being built. We believe that Agent 2003 contributes to further progress in computational modeling of social processes, and we hope that you find these Proceedings to be stimulating and rewarding. As the horizons of this transdiscipline continue to emerge and converge, we hope to provide similar forums that will promote development of agent simulation modeling in the years to come.

Margaret Clemmons, ed.

2003-01-01T23:59:59.000Z

384

Mobile Agents Based Collective Communication: An Application to a Parallel Plasma Simulation  

E-Print Network [OSTI]

Mobile Agents Based Collective Communication: An Application to a Parallel Plasma Simulation lack in Mobile Agents systems even if mes- sage passing is always supported to grant communication benefit social ability and interactions of collaborative agents. Mobile Agents technology has been widely

Vlad, Gregorio

385

E-Print Network 3.0 - agent theories architectures Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Dynamic Modular Runtime Summary: agent architectures. Finally, the platform's service-oriented architecture greatly facilitates... . . . . . . . . . . . . . . . . . . . . . . . ....

386

Vicarious learning in mobile neurally controlled agents: The VMAXSON architecture. \\Lambda  

E-Print Network [OSTI]

where there are objects in the environment to be approached and avoided (called food, water, and poison). To survive, the agents need to eat the food, drink the water, and avoid the poison. V­MAXSON agents learn. As an agent's store of food and water goes down, its hunger and thirst rises. When the agent eats a poison

Crabbe, Frederick

387

Intent Recognition in Multi-Agent Systems: Collective Box Pushing and Cow Herding  

E-Print Network [OSTI]

, an agent performing recognition observes the tasks other agents are performing. Unlike the much studied field of plan recognition, the overall intent of an agent is recognized instead of a specific plan. The observing agent may use capabilities that it has...

Ahmad, Najla

2013-12-31T23:59:59.000Z

388

ACTINIDE-SPECIFIC SEQUESTERING AGENTS AND DECONTAMINATION APPLICATIONS  

SciTech Connect (OSTI)

We have briefly reviewed the biological hazards associated with the actinide elements. The most abundant transuranium element produced by both industrial nuclear power plants and nuclear weapons programs is plutonium. It is also potentially the most toxic - particularly due to its long-term hazard as a carcinogen if it is introduced into the body. This toxicity is due in large part to the chemical and biochemical similarities of Pu(IV) and Fe(III). Thus in mammals plutonium is transported and stored by the transport and storage systems for iron. This results in the concentration and long-term retention of an alpha-emitting radionuclide ({sup 239}Pu) at sites such as the bone marrow where cell division occurs at a high rate. The earliest attempts at removal of actinide contamination by chelation therapy were essentially heuristic in that sequestering agents known to be effective at binding other elements were tried with plutonium. The research described here is intended to be a rational approach that begins with the observation that since Fe(III) and Pu(IV) are so similar, and since microbes produce agents called siderophores that are extremely effective and selective sequestering agents for Fe(III), the construction of similar chelating agents for the actinides should be possible using the same chelating groups found in the siderophores. The incorporation of four such groups (primarily catechol and hydroxamic acid) results in multidentate chelating agents that can completely encapsulate the central actinide(IV) ion and achieve the eight-coordinate environment most favored by such ions. The continuing development and improvement of such sequestering agents has produced compounds which remove significant amounts of plutonium deposited in bone and which remove a greater fraction of the total body burden than any other chelation therapy developed to date.

Smith, William L.; Raymond, Kenneth N.

1980-07-01T23:59:59.000Z

389

4-haloethenylphenyl tropane:serotonin transporter imaging agents  

DOE Patents [OSTI]

A series of compounds in the 4-fluoroalkyl-3-halophenyl nortropanes and 4-haloethenylphenyl tropane families are described as diagnostic and therapeutic agents for diseases associated with serotonin transporter dysfunction. These compounds bind to serotonin transporter protein with high affinity and selectivity. The invention provides methods of synthesis which incorporate radioisotopic halogens at a last step which permit high radiochemical yield and maximum usable product life. The radiolabeled compounds of the invention are useful as imaging agents for visualizing the location and density of serotonin transporter by PET and SPECT imaging.

Goodman, Mark M.; Martarello, Laurent

2005-01-18T23:59:59.000Z

390

Intelligent energy management agent for a parallel hybrid vehicle  

E-Print Network [OSTI]

INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR OF PHILOSOPHY May... 2003 Major Subject: Mechanical Engineering INTELLIGENT ENERGY MANAGEMENT AGENT FOR A PARALLEL HYBRID VEHICLE A Dissertation by JONG-SEOB WON Submitted to Texas A&M University in partial ful llment of the requirements for the degree of DOCTOR...

Won, Jong-Seob

2004-09-30T23:59:59.000Z

391

Method and apparatus for enhanced detection of toxic agents  

DOE Patents [OSTI]

A water quality analyzer for real-time detection according to the invention comprises a biased AC electro-osmosis (ACEO) cell for receiving a fluid to be analyzed having a plurality photosynthetic organisms therein, and concentrating the plurality photosynthetic organisms into at least one concentrated region. A photodetector is provided for obtaining a measured photosynthetic activity of the plurality of photosynthetic organisms in the concentrated region, wherein chemical, biological or radiological agents reduce a nominal photosynthetic activity of the photosynthetic organisms. An electronics package analyzes the measured photosynthetic activity to indicate a presence of the chemical, biological or radiological agents in the fluid.

Greenbaum, Elias (Knoxville, TN); Rodriguez, Jr., Miguel (Oak Ridge, TN); Wu, Jie Jayne (Knoxville, TN); Qi, Hairong (Knoxville, TN)

2012-06-12T23:59:59.000Z

392

Dimensions of Usability: Cougaar, Aglets and Adaptive Agent Architecture (AAA)  

SciTech Connect (OSTI)

Research and development organizations are constantly evaluating new technologies in order to implement the next generation of advanced applications. At Pacific Northwest National Laboratory, agent technologies are perceived as an approach that can provide a competitive advantage in the construction of highly sophisticated software systems in a range of application areas. An important factor in selecting a successful agent architecture is the level of support it provides the developer in respect to developer support, examples of use, integration into current workflow and community support. Without such assistance, the developer must invest more effort into learning instead of applying the technology. Like many other applied research organizations, our staff are not dedicated to a single project and must acquire new skills as required, underlining the importance of being able to quickly become proficient. A project was instigated to evaluate three candidate agent toolkits across the dimensions of support they provide. This paper reports on the outcomes of this evaluation and provides insights into the agent technologies evaluated.

Haack, Jereme N.; Cowell, Andrew J.; Gorton, Ian

2004-06-20T23:59:59.000Z

393

Review Article Polymers and Gels as Molecular Recognition Agents  

E-Print Network [OSTI]

-responsive hydrogels (10). These hydro- gels are semi-interpenetrating polymer networks with complementary antibodyReview Article Polymers and Gels as Molecular Recognition Agents Nicholas A. Peppas1,2,3 and Yanbin Huang1 Received December 7, 2001; accepted February 6, 2002 Synthetic polymers and gels capable

Peppas, Nicholas A.

394

Carbon nanotubes as photoacoustic molecular imaging agents in living mice  

E-Print Network [OSTI]

Carbon nanotubes as photoacoustic molecular imaging agents in living mice ADAM DE LA ZERDA1 not shown to target a diseased site in living subjects. Here we show that single-walled carbon nanotubes of tumours. Intravenous administration of these targeted nanotubes to mice bearing tumours showed eight times

Khuri-Yakub, Butrus T. "Pierre"

395

Intgration oriente service des modles Grid et Multi-Agents  

E-Print Network [OSTI]

/Grid service, Service-oriented architecture, STROBE model, Software engineering, Mixed systems. JFSMA 2006 of a service-oriented approach. The concept of service is clearly at the intersection of GRID and MAS, Interaction, Grid, Intégration agent-Grid, Web/Grid service, Architecture orientée service, modèle STROBE

Paris-Sud XI, Université de

396

Creating an intelligent agent for StarCraft: Brood War  

E-Print Network [OSTI]

Creating an intelligent agent for StarCraft: Brood War University of Lige Faculty of Applied artificialintelligence (AI)? Video games Why real-time strategy (RTS) games? Introduction #12;StarCraft: Brood War a patrol unit #12;Implementation Chapter III #12;StarCraft is not open source! The Brood War Application

Ernst, Damien

397

Modelling Electrical Car Diffusion Based on Agent Tao Zhang, 3  

E-Print Network [OSTI]

the UK government's 2020 target of cutting emission. Figure 1. city energy consumption in UK, 2009 government announced a project that anyone who buys an electric plug-in car from 2011 will get a 25% discountModelling Electrical Car Diffusion Based on Agent 1 Lei Yu, ,2 Tao Zhang, 3 Siebers Peer-Ola, 4

Aickelin, Uwe

398

Software Agent Architecture for Consistency Management in Distributed Documents  

E-Print Network [OSTI]

Software Agent Architecture for Consistency Management in Distributed Documents Anthony Finkelstein an account of an architecture for management of consistency relations between distributed documents. We of use of this system in a domain of software engineering documents. Keywords Consistency management, XML

Finkelstein, Anthony

399

Algorithms for Selfish Agents Mechanism Design for Distributed Computation  

E-Print Network [OSTI]

Algorithms for Selfish Agents Mechanism Design for Distributed Computation Noam Nisan \\Lambda mechanism design in our distributed computation setting. We do not intend here to give a balanced Abstract This paper considers algorithmic problems in a distributed setting where the participants cannot

Chen, Yiling

400

Reasoning about Plan Revision in Agent Programs Natasha Alechina  

E-Print Network [OSTI]

and executing a plan a b p Plan(a;b) Natasha Alechina Reasoning about plan revision TIME 2012 5 / 46 #12;WhatReasoning about Plan Revision in Agent Programs Natasha Alechina University of Nottingham, UK TIME 2012, Leicester 14 September 2012 Natasha Alechina Reasoning about plan revision TIME 2012 1 / 46 #12

Fisher, Michael

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

A Logic of Emotions for Intelligent Agents Bas R. Steunebrink  

E-Print Network [OSTI]

A Logic of Emotions for Intelligent Agents Bas R. Steunebrink Department of ICS Utrecht University Utrecht, The Netherlands bass@cs.uu.nl Mehdi Dastani Department of ICS Utrecht University Utrecht, The Netherlands mehdi@cs.uu.nl John-Jules Ch. Meyer Department of ICS Utrecht University Utrecht, The Netherlands

Dastani, Mehdi

402

Aspects in Agent-Oriented Software Engineering: Lessons Learned  

E-Print Network [OSTI]

Aspects in Agent-Oriented Software Engineering: Lessons Learned Alessandro Garcia1 , Uirá Kulesza2 of the crosscutting concerns relative to MASs. This paper reports some lessons learned based on our experience lessons learned based on our experience in applying both aspect-oriented techniques and methods

403

Towards Modelling the research in Green IT with Agents  

E-Print Network [OSTI]

­ reliability Now: Green IT and new-Energy consumption ­ energy consumption awareness ­ interestingTowards Modelling the research in Green IT with Agents Christina Herzog, Jean-Marc Pierson, Laurent Lefevre #12;Page 2 Many questions There are many unanswered questions: · Why is Green IT important? What

Lefèvre, Laurent

404

Biologically Inspired Coalition Formation of Multi-Agent Systems  

E-Print Network [OSTI]

Georgia Institute of Technology Atlanta, Georgia musad.haque@gatech.edu Amir Rahmani Georgia Institute of Technology Atlanta, Georgia arahmani@gatech.edu Magnus Egerstedt Georgia Institute of Technology Atlanta. Unfortunately, the failure of such an agent will render the entire network useless. On the other hand, our

Egerstedt, Magnus

405

Grid Load Balancing Using Intelligent Agents Junwei Cao1  

E-Print Network [OSTI]

- 1 - Grid Load Balancing Using Intelligent Agents Junwei Cao1 , Daniel P. Spooner* , Stephen A for grid computing. The management and scheduling of dynamic grid resources in a scalable way requires new technologies to implement a next generation intelligent grid environment. This work demonstrates that AI

Jarvis, Stephen

406

Gd-HOPO Based High Relaxivity MRI Contrast Agents  

SciTech Connect (OSTI)

Tris-bidentate HOPO-based ligands developed in our laboratory were designed to complement the coordination preferences of Gd{sup 3+}, especially its oxophilicity. The HOPO ligands provide a hexadentate coordination environment for Gd{sup 3+} in which all he donor atoms are oxygen. Because Gd{sup 3+} favors eight or nine coordination, this design provides two to three open sites for inner-sphere water molecules. These water molecules rapidly exchange with bulk solution, hence affecting the relaxation rates of bulk water olecules. The parameters affecting the efficiency of these contrast agents have been tuned to improve contrast while still maintaining a high thermodynamic stability for Gd{sup 3+} binding. The Gd- HOPO-based contrast agents surpass current commercially available agents ecause of a higher number of inner-sphere water molecules, rapid exchange of inner-sphere water molecules via an associative mechanism, and a long electronic relaxation time. The contrast enhancement provided by these agents is at least twice that of commercial contrast gents, which are based on polyaminocarboxylate ligands.

Datta, Ankona; Raymond, Kenneth

2008-11-06T23:59:59.000Z

407

Potentials for developing an intake protein conserving agent for ruminants  

E-Print Network [OSTI]

in this work, did not overcome the inhibitory effect of DIC on deamination. Results of this study indicate that the microbial protease inhibitors E-64 and leupeptin and the deaminase inhibitor DIC may be potentially useful as an intake protein conserving agent...

Ramirez Pineres, Maria Alejandra

1993-01-01T23:59:59.000Z

408

Intelligent Command and Control Agent in Electronic Warfare Settings  

E-Print Network [OSTI]

Intelligent Command and Control Agent in Electronic Warfare Settings Sanguk Noh,1, Unseob Jeong2, 1?cation, and the selection of alternative countermeasures against threats in electronic warfare settings. We introduce in simulated electronic warfare settings. C 2010 Wiley Periodicals, Inc. 1. INTRODUCTION To counter

Noh, Sanguk

409

From Abstract to Concrete Norms in Agent Institutions  

E-Print Network [OSTI]

From Abstract to Concrete Norms in Agent Institutions Davide Grossi and Frank Dignum Utrecht accounts for how (abstract) norms can be incorporated in the (concrete) procedures constituting. This abstract is organized as follows. In Section 2 we make the problem we are focusing on concrete by means

Dignum, Frank

410

Soda-anthraquinone lignin sacrificial agents in oil recovery  

SciTech Connect (OSTI)

A supplemental oil recovery method comprising injecting into a subterranean formation a fluid containing soda-anthraquinone lignin which is adsorbed by adsorptive sites therein and functions as a sacrificial agent and thereafter injecting a micellar dispersion containing a surfactant into the subterranean formation to displace the oil contained therein.

Dardis, R. E.

1985-04-09T23:59:59.000Z

411

Learning Organizational Roles in a Heterogeneous Multi-agent System  

E-Print Network [OSTI]

presented in this paper repre- sents one of the few attempts at demonstrating the viability and utility not necessarily reflect the position or the policy of the Government and no official endorsement should of the agents has its own local state information, a local database with static and dynamic constraints on its

Massachusetts at Amherst, University of

412

Integrative Negotiation In Complex Organizational Agent Xiaoqin Zhang  

E-Print Network [OSTI]

their own local utility; in cooperative ne- gotiation, agents work to find a solution that increases own utility though contracting, bidding and decommiting. In the cooperative negotiation class Contract F30602-99-2-0525. The U.S. Government is authorized to reproduce and distribute reprints

Massachusetts at Amherst, University of

413

Multi-Agent Autonomous Pilot for Motorcycles Dana Vrajitoru  

E-Print Network [OSTI]

Multi-Agent Autonomous Pilot for Motorcycles Dana Vrajitoru Intelligent Systems Laboratory Indiana with an automatic pilot. The application is written in OpenGL and includes a model of a vehicle (a motorcycle) based (Mourant & Marangos 2003). Our approach targets motorcycles which have not yet been studied as extensively

Vrajitoru, Dana

414

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

415

Home Composting William T. Hlubik, Middlesex County Agricultural Agent; Jonathan Forsell, Former Essex County Agricultural Agent (deceased);  

E-Print Network [OSTI]

Home Composting William T. Hlubik, Middlesex County Agricultural Agent; Jonathan Forsell, Former; and Mark Winokur, Former Program Assistant Fact sheet FS811 www.rce.rutgers.edu H H H H What is Composting? Composting is a natural process where organic materials decompose and are recycled into a dark, crumbly

Rainforth, Emma C.

416

The effect of alkaline agents on retention of EOR chemicals  

SciTech Connect (OSTI)

This report summarizes a literature survey on how alkaline agents reduce losses of surfactants and polymers in oil recovery by chemical injection. Data are reviewed for crude sulfonates, clean anionic surfactants, nonionic surfactants, and anionic and nonionic polymers. The role of mineral chemistry is briefly described. Specific effects of various alkaline anions are discussed. Investigations needed to improve the design of alkaline-surfactant-polymer floods are suggested. 62 refs., 28 figs., 6 tabs.

Lorenz, P.B.

1991-07-01T23:59:59.000Z

417

Motion planning algorithms for a group of mobile agents  

E-Print Network [OSTI]

sampling, like the probabilis- tic roadmap (PRM) planners [46, 47] have gained popularity due to their eciency 5 and simplicity. Centralized methods using PRM have been developed for solving the motion planning problem for multiple agents [48, 49...]. The no- tion of coordination diagram was used in [57] and later analyzed for manipulators in [60, 61]. On similar lines roadmap coordination [62, 63] was used to plan the motion of multiple robots. The problem with decoupled approaches is that despite...

Lal, Mayank

2008-10-10T23:59:59.000Z

418

Air Traffic Control and Alert Agent Henry Hexmoor and Tim Heng  

E-Print Network [OSTI]

Air Traffic Control and Alert Agent Henry Hexmoor and Tim Heng University of North Dakota Grand Forks, North Dakota, USA {hexmoor,heng}@cs.und.edu ABSTRACT This paper presents an agent program

Hexmoor, Henry

419

Texas Extension Agents' Perceptions of Organic Agriculture and Its Implications for Training  

E-Print Network [OSTI]

counties. Agents were most interested in training on organic soil fertility, insect, weed, and disease management and least interested in training on organic certification and transitioning to OA. Agents indicated traditional information resources would...

Lillard, Patrick

2012-10-19T23:59:59.000Z

420

Molecular Dynamics of Neutral Polymer Bonding Agent (NPBA) as Revealed by Solid-State NMR Spectroscopy  

E-Print Network [OSTI]

Neutral polymer bonding agent (NPBA) is one of the most promising polymeric materials, widely used in nitrate ester plasticized polyether (NEPE) propellant as bonding agent. The structure and dynamics of NPBA under different ...

Hu, Wei

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Design and Applications of an Intelligent Financial Reporting and Auditing Agent with Net Knowledge (FRAANK)  

E-Print Network [OSTI]

This paper discusses the use of intelligent Internet agents as essential tools for automating financial analysis functions in the virtual world. Several important characteristic features of intelligent agents are discussed, ...

Srivastava, Rajendra P.; Bovee, Matthew; Kogan, Alexander; Nelson, Kay; Vasarhelyi, Miklos A.

2002-01-01T23:59:59.000Z

422

Hierarchical decomposition of multi-agent Markov decision processes with application to health aware planning  

E-Print Network [OSTI]

Multi-agent robotic systems have attracted the interests of both researchers and practitioners because they provide more capabilities and afford greater flexibility than single-agent systems. Coordination of individual ...

Chen, Yu Fan, S.M. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

423

E-Print Network 3.0 - avec des agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agents Search Powered by Explorit Topic List Advanced Search Sample search results for: avec des agents Page: << < 1 2 3 4 5 > >> 1 Direction des Ressources Humaines Service des...

424

E-Print Network 3.0 - agent research tool Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

search results for: agent research tool Page: << < 1 2 3 4 5 > >> 1 Lecture Notes in Computer Science 1 Internet Agents for Effective Collaboration Summary: we present WAPM, a Web...

425

E-Print Network 3.0 - agent transport modeling Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

results for: agent transport modeling Page: << < 1 2 3 4 5 > >> 1 Lecture Notes in Computer Science 1 Internet Agents for Effective Collaboration Summary: we present WAPM, a Web...

426

Metal-substituted protein MRI contrast agents engineered for enhanced relaxivity and ligand sensitivity  

E-Print Network [OSTI]

Engineered metalloproteins constitute a flexible new class of analyte-sensitive molecular imaging agents detectable by magnetic resonance imaging (MRI), but their contrast effects are generally weaker than synthetic agents. ...

Lelyveld, Victor S.

427

E-Print Network 3.0 - agents cell survival Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the agent's chances of long-term survival. The paper also shows that portions... are food, water, and poison. To survive, the agent needs to eat the food, drink the water, and...

428

Leader election in distributed networks using agent based self-stabilizing technique  

E-Print Network [OSTI]

There are many variants of leader election algorithm in distributed networks. In this research, an agent based approach to leader election in distributed networks is investigated. Agents have shown to be useful in several ways. In the theoretical...

Tandon, Raghav

2004-09-30T23:59:59.000Z

429

Method for tracking the location of mobile agents using stand-off detection technique  

DOE Patents [OSTI]

A method for tracking the movement and position of mobile agents using light detection and ranging (LIDAR) as a stand-off optical detection technique. The positions of the agents are tracked by analyzing the time-history of a series of optical measurements made over the field of view of the optical system. This provides a (time+3-D) or (time+2-D) mapping of the location of the mobile agents. Repeated pulses of a laser beam impinge on a mobile agent, such as a bee, and are backscattered from the agent into a LIDAR detection system. Alternatively, the incident laser pulses excite fluorescence or phosphorescence from the agent, which is detected using a LIDAR system. Analysis of the spatial location of signals from the agents produced by repeated pulses generates a multidimensional map of agent location.

Schmitt, Randal L. (Tijeras, NM); Bender, Susan Fae Ann (Tijeras, NM); Rodacy, Philip J. (Albuquerque, NM); Hargis, Jr., Philip J. (Albuquerque, NM); Johnson, Mark S. (Albuquerque, NM)

2006-12-26T23:59:59.000Z

430

E-Print Network 3.0 - autonomic agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Franklin Summary: Systems The University of Memphis 12;October 35, 2004 Control of Autonomous Agents 2 IDA... Internet ID A 12;October 35, 2004 Control of Autonomous Agents 3...

431

Agent Decision-Making in Open Mixed Networks Ya'akov Gala,b  

E-Print Network [OSTI]

conditions, such as wind speed and traffic. In turn, computer agents might depend on people to provide up mean that the autonomous agents in the network may be designed by or represent different individuals

Kraus, Sarit

432

Agent-Based Simulation of an Automatic Mitigation Procedure Robert Entriken and Steve Wan  

E-Print Network [OSTI]

Agent-Based Simulation of an Automatic Mitigation Procedure Robert Entriken and Steve Wan EPRI rentrike@epri.com, swan@epri.com Abstract This paper describes experiments using computer- based agents

Tesfatsion, Leigh

433

E-Print Network 3.0 - agents removal consideration Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

loss to the best agent, taking into consideration... @cs.wayne.edu, vipin@wayne.edu Abstract Previous work on task scheduling mechanisms assumed that the agent's goal... is...

434

E-Print Network 3.0 - agentes clareadores ativados Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

L. Furtado Departamento de... .ciarlini@uniriotec.br PUC-RioInf.MCC3903 Outubro, 2003 Abstract: This work presents a general survey on agent and multi-agent... of stories...

435

E-Print Network 3.0 - anti-breast cancer agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

breast cancer agents Search Powered by Explorit Topic List Advanced Search Sample search results for: anti-breast cancer agents Page: << < 1 2 3 4 5 > >> 1 THE PUBLIC HEALTH...

436

A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit  

E-Print Network [OSTI]

A Java Reinforcement Learning Module for the Recursive Porous Agent Simulation Toolkit: facilitating study and experimentation with reinforcement learning in social science multi-agent simulations-implemented reinforcement learning algorithms . . . . . 34 4.1 The Roth-Erev algorithm . . . . . . . . . . . . . . . . .

Tesfatsion, Leigh

437

Agent-based modeling: Methods and techniques for simulating human systems  

E-Print Network [OSTI]

as a collection of autonomous decision-making entities called agents. Each agent individually assesses its, a traffic jam, which results from the behavior of and interactions between individual vehicle drivers, may

Tesfatsion, Leigh

438

E-Print Network 3.0 - agent deferoxamine induced Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

www.elsevier.comlocateartint Summary: to entice neighboring agents to die as well. HADES studies the ability to induce self-death on an agent... or inducing self-death if they...

439

Agent-based Transaction management for Mobile Multidatabase  

SciTech Connect (OSTI)

The requirements to access and manipulate data across multiple heterogeneous existing databases and the proliferation of mobile technologies have propelled the development of mobile multidatabase system (MDBS). In that environment, transaction management is not a trivial task due to the technological constraints. Agent technology is an evolving research area, which has been applied to several application domains. This paper proposes an Agent-based Transaction Management for Mobile Multidatabase (AT3M) system. AT3M applies static and mobile agents to manage the transaction processing in mobile multidatabase system. It enables a fully distributed transaction management, accommodates mobility of the mobile clients, and allows global subtransactions to process in parallel. The proposed algorithm utilizes the hierarchical meta data structure of Summary Schema Model (SSM) which captures semantic information of data objects in the underlying local databases at different levels of abstractions. It is shown by simulation that AT3M suits well in mobile multidatabase environment and outperforms the existing V-Locking algorithm designed for the same environment in many aspects.

Ongtang, Machigar [Pennsylvania State University] [Pennsylvania State University; Hurson, Ali R. [Pennsylvania State University] [Pennsylvania State University; Jiao, Yu [ORNL] [ORNL; Potok, Thomas E [ORNL] [ORNL

2007-01-01T23:59:59.000Z

440

Resilient Control System Execution Agent (ReCoSEA)  

SciTech Connect (OSTI)

In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

Craig G. Rieger; Kris Villez

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Mercury removal in utility wet scrubber using a chelating agent  

DOE Patents [OSTI]

A method for capturing and reducing the mercury content of an industrial flue gas such as that produced in the combustion of a fossil fuel or solid waste adds a chelating agent, such as ethylenediaminetetraacetic acid (EDTA) or other similar compounds like HEDTA, DTPA and/or NTA, to the flue gas being scrubbed in a wet scrubber used in the industrial process. The chelating agent prevents the reduction of oxidized mercury to elemental mercury, thereby increasing the mercury removal efficiency of the wet scrubber. Exemplary tests on inlet and outlet mercury concentration in an industrial flue gas were performed without and with EDTA addition. Without EDTA, mercury removal totaled 42%. With EDTA, mercury removal increased to 71%. The invention may be readily adapted to known wet scrubber systems and it specifically provides for the removal of unwanted mercury both by supplying S.sup.2- ions to convert Hg.sup.2+ ions into mercuric sulfide (HgS) and by supplying a chelating agent to sequester other ions, including but not limited to Fe.sup.2+ ions, which could otherwise induce the unwanted reduction of Hg.sup.2+ to the form, Hg.sup.0.

Amrhein, Gerald T. (Louisville, OH)

2001-01-01T23:59:59.000Z

442

Calibrating Building Energy Models Using Supercomputer Trained Machine Learning Agents  

SciTech Connect (OSTI)

Building Energy Modeling (BEM) is an approach to model the energy usage in buildings for design and retrofit purposes. EnergyPlus is the flagship Department of Energy software that performs BEM for different types of buildings. The input to EnergyPlus can often extend in the order of a few thousand parameters which have to be calibrated manually by an expert for realistic energy modeling. This makes it challenging and expensive thereby making building energy modeling unfeasible for smaller projects. In this paper, we describe the Autotune research which employs machine learning algorithms to generate agents for the different kinds of standard reference buildings in the U.S. building stock. The parametric space and the variety of building locations and types make this a challenging computational problem necessitating the use of supercomputers. Millions of EnergyPlus simulations are run on supercomputers which are subsequently used to train machine learning algorithms to generate agents. These agents, once created, can then run in a fraction of the time thereby allowing cost-effective calibration of building models.

Sanyal, Jibonananda [ORNL] [ORNL; New, Joshua Ryan [ORNL] [ORNL; Edwards, Richard [ORNL] [ORNL; Parker, Lynne Edwards [ORNL] [ORNL

2014-01-01T23:59:59.000Z

443

Robust Agent Communities Sandip Sen, Sabyasachi Saha, Stephane Airiau, Teddy Candale,  

E-Print Network [OSTI]

opportunities as well as challenges that can be best addressed by robust, self-sustaining agent communi- ties

Sen, Sandip

444

Distributed Communication for Highly Mobile Agents Mohammad Samarah and Philip Chan  

E-Print Network [OSTI]

are autonomous and self sustained. In order for mobile agents to flourish they need a software environment

Chan, Philip K.

445

E-Print Network 3.0 - agents offered cash Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Technologies and Information Sciences 59 Carrie Takeyasu Executive Director Summary: Purchasing Agent Lyn Jose Administrative Support Marion Eastman Administrative Assistant...

446

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

447

Methods to radiolabel natural organic matter by reduction with hydrogen labeled reducing agents  

DOE Patents [OSTI]

Methods to radiolabel natural organic matter by reduction with a hydrogen labeled reducing agent, and compositions, are provided.

Tinnacher, Ruth M.; Honeyman, Bruce D.

2011-10-18T23:59:59.000Z

448

E-Print Network 3.0 - agent-based model contrasts Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

University of Warwick Collection: Mathematics 2 Symposium: Understanding exurban landscape change processes: Human preferences, agent behaviors and ecological effects Summary:...

449

Communications Systems Driven by Software Agent Technology Communications Systems Driven by  

E-Print Network [OSTI]

@nortelnetworks.com Abstract The application of software agent technology to the management of communications' infrastructures describe how agent technology has been used for network management, legacy telecommunications systems in an applied situation of providing a virtual private network. Latter sections describe mobile agent technology

Poslad, Stefan

450

A General Approach to Environment Design with One Agent Haoqi Zhang, Yiling Chen, David Parkes  

E-Print Network [OSTI]

A General Approach to Environment Design with One Agent Haoqi Zhang, Yiling Chen, David Parkes}@eecs.harvard.edu Abstract The problem of environment design considers a set- ting in which an interested party aims to influence an agent's decisions by making limited changes to the agent's environment. Zhang and Parkes [2008

Chen, Yiling

451

Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic  

E-Print Network [OSTI]

Mobile Agent Software Applied in Maintenance Scheduling X. Xu M. Kezunovic Department of Electrical different entities is required. In this paper, the mobile agent software is applied in the facility and the ISO respectively, and the mobile agent takes care of the communication and coordination between

452

Mobile Agent Rendezvous in a Ring Evangelos Kranakis Danny Krizanc y Nicola Santoro Cindy Sawchuk  

E-Print Network [OSTI]

Mobile Agent Rendezvous in a Ring Evangelos Kranakis #3; Danny Krizanc y Nicola Santoro #3; Cindy Sawchuk #3; Abstract In the rendezvous search problem, two mobile agents must move along the n nodes of a network so as to minimize the time required to meet or rendezvous. When the mobile agents are identical

Devoto, Stephen H.

453

MOBILE AGENTS | | | |DS HOME ARCHIVES ABOUT US SUBSCRIBE |SEARCH CART August 2002  

E-Print Network [OSTI]

MOBILE AGENTS | | | |DS HOME ARCHIVES ABOUT US SUBSCRIBE |SEARCH CART August 2002 Back to Article Future Directions for Mobile Agent Research David Kotz, Robert Gray, and Daniela Rus Dartmouth College· he field of mobile agents should shift its emphasis toward mobile code, in all its forms, rather than

Kotz, David

454

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing  

E-Print Network [OSTI]

Mobile Agents for Pervasive Computing Using a Novel Method of Message Passing David Levine, Renjith devices throughout an individual's working and living environment. Mobile agents are software entities that can migrate between servers or mobile agent environments of the network accomplishing various tasks

Záruba, Gergely

455

PagePrompter: An Intelligent Agent for Web Navigation Created Using Data Mining Techniques  

E-Print Network [OSTI]

1 PagePrompter: An Intelligent Agent for Web Navigation Created Using Data Mining Techniques Y.Y. Yao, H.J. Hamilton, and Xuewei Wang Abstract: Creating an intelligent agent for web navigation, which is an agent that dynam- ically gives recommendations to a web site's users by learning from web usage mining

Regina, University of

456

pahwa@ksu.edu Holonic Multi-agent Control of Power Distribution Systems of the Future  

E-Print Network [OSTI]

pahwa@ksu.edu Holonic Multi-agent Control of Power Distribution Systems of the Future A. PAHWA, S number of these devices. In this paper, we present a Holonic Multi-agent System Architecture capable, extensible, and secure cyber architecture based on holonic multi-agent principles to support adaptive PDS

Singh, Gurdip

457

Service Contract Negotiation AgentBased Support for Open Service Environments  

E-Print Network [OSTI]

1 1 1 Service Contract Negotiation ­ Agent­Based Support for Open Service Environments Annika Waern Programming. It is useful to describe the collaboration between agents in terms of Service Contracts, that agents can form dynamically through negotiation. The negotiation of Service Contracts poses different

Waern, Annika

458

Belief Revision through the Belief Function Formalism in a MultiAgent Environment  

E-Print Network [OSTI]

Belief Revision through the Belief Function Formalism in a Multi­Agent Environment Aldo Franco, Ancona, Abstract. To perform ``belief revision'' in a multi­agent environment, we followed two main, suggesting ways to overcome the mentioned limitations. Content Areas: belief revision, multi­agent systems

459

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS EXTENDED ABSTRACT FOR MASTER'S THESIS PROPOSAL  

E-Print Network [OSTI]

DESIGNING AN ECOLOGY OF DISTRIBUTED AGENTS EXTENDED ABSTRACT FOR MASTER'S THESIS PROPOSAL December will explore possibilities for Internet applications by creating an ecology of distributed agents, a new will build a system that represents peoples' pres­ ence by creating an ecology of agents. The applica­ tion

460

ECMI2008 Abstract Agent-Based Simulation as a Novel Decision Support Tool for Retail Managers  

E-Print Network [OSTI]

ECMI2008 Abstract Agent-Based Simulation as a Novel Decision Support Tool for Retail Managers Dr Strategy, Learning & Change (LUBS), Leeds, LS2 9JT, UK Abstract: Intelligent agents offer a new and exciting way of understanding the world of work. We apply agent-based simulation to investigate a set

Aickelin, Uwe

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Agent-Grid Integration Ontology Frederic Duvert, Clement Jonquet, Pascal Dugenie, and Stefano A. Cerri  

E-Print Network [OSTI]

Agent-Grid Integration Ontology Frederic Duvert, Clement Jonquet, Pascal Dugenie, and Stefano A, jonquet, dugenie, cerri}@lirmm.fr Abstract. The integration of GRID and MAS (Multi-Agents Systems) is an active research topic. We have recently proposed the Agent-Grid Integration Lan- guage, to describe

Paris-Sud XI, Universit de

462

Parallelisation of Wave Propagation Algorithms for Odour Propagation in Multi-Agent Systems  

E-Print Network [OSTI]

Parallelisation of Wave Propagation Algorithms for Odour Propagation in Multi-Agent Systems Eugen-agent systems is based on the wave propagation model. This article discusses some sequential (recursive is introduced. Keywords: parallel algorithms, wave propagation model, multi-agent systems. 1 Introduction

Vialle, Stéphane

463

This is MoFo. Scientific/Technical Patent Analysts/Agents  

E-Print Network [OSTI]

This is MoFo. Scientific/Technical Patent Analysts/Agents (Los Angeles, CA; McLean, VA; Palo Alto level patent analysts/agents for our Los Angeles, Palo Alto, San Diego and San Francisco offices of business strategies. Patent analysts/agents participate in domestic and foreign patent prosecution

Straight, Aaron

464

Rambling Abductive Agents in ALIAS A. Ciampolini, E. Lamma, P. Mello and P. Torroni  

E-Print Network [OSTI]

Rambling Abductive Agents in ALIAS A. Ciampolini, E. Lamma, P. Mello and P. Torroni DEIS, Universit,elamma,pmello,ptorronig@deis.unibo.it Abstract. This paper presents the Abductive LogIc Agent System (ALIAS, for short), a multi capabilities, performed by means of abduction: if the knowledge available to an agent is insufficient to solve

Torroni, Paolo

465

Universit a degli Studi di Bologna Using Abductive Logic Agents for  

E-Print Network [OSTI]

Universit#18;a degli Studi di Bologna DEIS Using Abductive Logic Agents for Legal Justi#12;cation A Abductive Logic Agents for Legal Justi#12;cation A. Ciampolini P. Torroni DEIS, Universit#18;a di Bologna. In this paper we present a novel approach for legal justi#12;cation based on an abductive multi-agent system

Torroni, Paolo

466

Formal Modeling of Communication Decisions in Cooperative Multi-agent Systems  

E-Print Network [OSTI]

-interested agents where each agent maximizes its own (local) utility. In our model, a local Markov process can, which is evaluated through a global utility function. We develop a multi- agent extension to Markov-9523419. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purposes

Massachusetts at Amherst, University of

467

Multi-Agent System that Attains Longevity via Death Megan Olsen, Hava Siegelmann  

E-Print Network [OSTI]

surveillance. For that aim we in- troduce HADES, a self-regenerating cooperative multi-agent system with local monitoring. When agents of HADES find local failures they repair them. However, in extreme cases repair may their robustness with this system, called HADES (Healing and Agent Death Encouraging Stability). The purpose

Siegelmann , Hava T

468

Commercial Buildings Sector Agent-Based Model | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of InspectorConcentrating SolarElectricEnergyCTBarreisVolcanicPowerRaftColumbia RuralCommercial AlgaeAgent-Based

469

A Multi-Agent System for Intelligent Environment Control Victor Lesser, Michael Atighetchi, Brett Benyo, Bryan Horling,  

E-Print Network [OSTI]

: IHome Agents in Action 2 #12;includes agents like an intelligent WaterHeater, Co eeMaker, Heater, A's preferences and the availability of resources. For example, if hot water is scarce, the DishWasher agent may elect to wait until hot water becomes available. Agents coordinate over shared resources like noise

Massachusetts at Amherst, University of

470

Flocking of Multi-agent Dynamical Systems Based on Pseudo-leader Mechanism  

E-Print Network [OSTI]

Flocking behavior of multiple agents can be widely observed in nature such as schooling fish and flocking birds. Recent literature has proposed the possibility that flocking is possible even only a small fraction of agents are informed of the desired position and velocity. However, it is still a challenging problem to determine which agents should be informed or have the ability to detect the desired information. This paper aims to address this problem. By combining the ideas of virtual force and pseudo-leader mechanism, where a pseudo-leader represents an agent who can detect the desired information, we propose a scheme for choosing pseudo-leaders in a multi-agent group. The presented scheme can be applied to a multi-agent group even with an unconnected or switching neighbor graph. Experiments are given to show that the methods presented in this paper are of high accuracy and perform well.

Jin Zhou; Wenwu Yu; Xiaoqun Wu; Michael Small; Jun-an Lu

2009-05-07T23:59:59.000Z

471

Engineered plant biomass particles coated with bioactive agents  

DOE Patents [OSTI]

Plant biomass particles coated with a bioactive agent such as a fertilizer or pesticide, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

Dooley, James H; Lanning, David N

2013-07-30T23:59:59.000Z

472

Engineered plant biomass particles coated with biological agents  

DOE Patents [OSTI]

Plant biomass particles coated with a biological agent such as a bacterium or seed, characterized by a length dimension (L) aligned substantially parallel to a grain direction and defining a substantially uniform distance along the grain, a width dimension (W) normal to L and aligned cross grain, and a height dimension (H) normal to W and L. In particular, the L.times.H dimensions define a pair of substantially parallel side surfaces characterized by substantially intact longitudinally arrayed fibers, the W.times.H dimensions define a pair of substantially parallel end surfaces characterized by crosscut fibers and end checking between fibers, and the L.times.W dimensions define a pair of substantially parallel top and bottom surfaces.

Dooley, James H.; Lanning, David N.

2014-06-24T23:59:59.000Z

473

Multi-agent cooperative systems applied to precision applications  

SciTech Connect (OSTI)

Regulatory agencies are imposing limits and constraints to protect the operator and/or the environment. While generally necessary, these controls also tend to increase cost and decrease efficiency and productivity. Intelligent computer systems can be made to perform these hazardous tasks with greater efficiency and precision without danger to the operators. The Idaho national Engineering and Environmental Laboratory and the Center for Self-Organizing and Intelligent Systems at Utah State University have developed a series of autonomous all-terrain multi-agent systems capable of performing automated tasks within hazardous environments. This paper discusses the development and application of cooperative small-scale and large-scale robots for use in various activities associated with radiologically contaminated areas, prescription farming, and unexploded ordinances.

McKay, M.D.; Anderson, M.O. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States); Gunderson, R.W.; Flann, N.; Abbott, B. [Utah State Univ., Logan, UT (United States)

1998-03-01T23:59:59.000Z

474

Evaluating Government's Policies on Promoting Smart Metering in Retail Electricity Markets via Agent Based Simulation  

E-Print Network [OSTI]

towards choosing option ? can be formulated as follows: ( )1 ?? EiPi PWA *= Where: = residential consumer agent is attitude towards choosing option ? ?iA = residential consumer agent is personality trait price sensitivity iPW Secondly... ) and perceived behavioural control (equation 3) towards choosing option ?, residential consumer agent is intention to choose option ? can be expressed as follows: ( )4???? EiP n j m k kiikjiiji PWCPCInfWI *)*()*( 1 1 ++=? ? = = Where: = residential...

Zhang, Tao; Nuttall, William J

475

The robustness of agent-based models of electricity wholesale markets  

E-Print Network [OSTI]

The robustness of agent-based models of electricity wholesale markets David Newberry May 2012 CWPE 1228 & EPRG 1213 The robustness of agent-based model of electricity wholesale markets... David Newberry May 2012 CWPE 1228 & EPRG 1213 www.eprg.group.cam.ac.uk E P R G W O R K IN G P A P E R Abstract The robustness of agent-based models of electricity wholesale markets EPRG Working Paper 1213 Cambridge...

Newberry, David

2012-05-28T23:59:59.000Z

476

Optimisation de Smart Grid: d'un modle intgratif vers une simulation multi-agents autonomique  

E-Print Network [OSTI]

Optimisation de Smart Grid: d'un modèle intégratif vers une simulation multi-agents autonomique-agents intégrative de Smart Grid pour répondre aux besoins de simulation, d'analyse et d'optimisa- tion de tels systèmes. Mots-clés : Modélisation, simulation, multi- agents, smart grid Abstract Multi

Boyer, Edmond

477

E-Print Network 3.0 - agent detection system Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent system stakeholder relationships, and the ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences Page: << < 1 2 3...

478

E-Print Network 3.0 - agent based dynamic Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Messaging... dynamic routing for mobile agents ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 23 A Secure...

479

E-Print Network 3.0 - agente quelante sulfoxina Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 34 Intelligent...

480

E-Print Network 3.0 - agent detection strategies Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

engineered or analysed by agent platforms co-operating ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 9 Helping...

Note: This page contains sample records for the topic "rsa authentication agent" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

E-Print Network 3.0 - agent initial results Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

needed so mobile agent users can confidently assume ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences Page: << < 1 2 3...

482

E-Print Network 3.0 - agent based approaches Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

(for... work on without such a higher-level, forward ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 29 Agent-Oriented...

483

E-Print Network 3.0 - antitrichomonal agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 35 Intelligent...

484

E-Print Network 3.0 - agent bac1829 produced Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 18 Helping Based...

485

E-Print Network 3.0 - agent tm208 4-methyl-piperazine-1-carbodithioc...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 31 Intelligent...

486

E-Print Network 3.0 - anticestodal agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 31 Intelligent...

487

E-Print Network 3.0 - agent based simulation Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

agent user's mission protection request to the MASH. ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 45 Using Jason to...

488

E-Print Network 3.0 - agents effectively reduce Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

reduced significantly. We... agent callback mobile ... Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 10 Distributed...

489

E-Print Network 3.0 - anticholesteremic agents Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 33 Intelligent...

490

E-Print Network 3.0 - agent dihydrohalichondramide reveals Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 3 Trust...

491

E-Print Network 3.0 - anti-arrhythmia agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

mercy of ill-intending agent platforms. We have devised Source: Roth, Volker - FX Palo Alto Laboratory Collection: Computer Technologies and Information Sciences 36 Intelligent...

492

E-Print Network 3.0 - anesthetic agent propofol Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

postop- erative pain andor opioid consumption. These agents be- ... Source: Messersmith, Phillip B.- Department of Materials Science and Engineering, Northwestern University...

493

The Emergence of Trade Associations as Agents of Environmental Performance Improvement  

E-Print Network [OSTI]

This paper explores a surprising phenomenon: the emergence of trade associations as agents of environmental performance improvement. Trade associations in the United States have historically fought environmental regulation, ...

Nash, Jennifer

2002-08-26T23:59:59.000Z

494

E-Print Network 3.0 - agents design preparation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Tools... Management: Software development General Terms Design, Security, Standardization Keywords Mobile Agents 1... . SMASH is also designed to address 12;context-based...

495

E-Print Network 3.0 - agents cooperation learning Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Recording of Itineraries through Co-operating Agents Volker Roth vroth@igd.fhg.de Fraunhofer... "provided a solution for a special case", though. Nevertheless we believe...

496

E-Print Network 3.0 - anti-infective agents local Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Secure Recording of Itineraries through Co-operating Agents Volker Roth vroth@igd.fhg.de Fraunhofer... Abstract Security is a fundamental precondition for the acceptance of mobile...

497

E-Print Network 3.0 - alkylating agent consolidation Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Natural Product Leinamycin Summary: , the antitumor natural product leina- mycin (LM) (1, 2) is converted to a potent DNA-alkylating agent via... the sequence specificity...

498

E-Print Network 3.0 - alkylating agents synthesis Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Natural Product Leinamycin Summary: , the antitumor natural product leina- mycin (LM) (1, 2) is converted to a potent DNA-alkylating agent via... the sequence specificity...

499

E-Print Network 3.0 - alkylating agents Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Natural Product Leinamycin Summary: , the antitumor natural product leina- mycin (LM) (1, 2) is converted to a potent DNA-alkylating agent via... the sequence specificity...

500

E-Print Network 3.0 - alkylating agents evaluacion Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Natural Product Leinamycin Summary: , the antitumor natural product leina- mycin (LM) (1, 2) is converted to a potent DNA-alkylating agent via... the sequence specificity...