Powered by Deep Web Technologies
Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-703: Cisco Unified Communications Manager Open Query Interface...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets...

2

T-703: Cisco Unified Communications Manager Open Query Interface Lets  

NLE Websites -- All DOE Office Websites (Extended Search)

703: Cisco Unified Communications Manager Open Query Interface 703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents August 26, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents PLATFORM: Cisco Unified Communications Manager 6.x, 7.x, 8.0, 8.5 ABSTRACT: A remote user can obtain database contents, including authentication credentials. reference LINKS: SecurityTracker Alert ID: 1025971 Cisco Document ID: 113190 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Cisco Unified Communications Manager. A remote user can obtain database contents. A remote user can access an open

3

U-021: Cisco Unified Communications Manager Directory Traversal...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Information U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

4

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-725: Cisco Unified Service Monitor and Cisco Unified Operations T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code September 23, 2011 - 9:00am Addthis PROBLEM: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code. PLATFORM: Cisco Unified Service Monitor prior to version 8.6 Cisco Unified Operations Manager prior to version 8.6 CiscoWorks LAN Management Solution software releases 3.1, 3.2, and 4.0. ABSTRACT: Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. reference LINKS: Cisco Security Advisory 113173

5

U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Unified Communications Manager Directory Traversal 1: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files U-021: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files October 27, 2011 - 7:45am Addthis PROBLEM: Cisco Unified Communications Manager Directory Traversal Flaw Lets Remote Users Obtain Files. PLATFORM: Cisco Unified Communications Manager 6.x, 7.x and 8.x ABSTRACT: A vulnerability was reported in Cisco Unified Communications Manager. reference LINKS: Cisco Advisory ID: cisco-sa-20111026-cucm Cisco Security Advisories and Response SecurityTracker Alert ID: 1026243 CVE-2011-3315 IMPACT ASSESSMENT: Medium Discussion: A remote user can view files on the target system. The software does not properly validate user-supplied input. A remote user can supply a specially

6

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Unified Customer Voice Portal (CVP) Multiple 2: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities May 9, 2013 - 6:00am Addthis PROBLEM: Multiple vulnerabilities have been reported in Cisco Unified Customer Voice Portal (CVP) PLATFORM: The vulnerabilities are reported in versions prior to 9.0.1 ES 11 ABSTRACT: Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could be exploited on the same device. REFERENCE LINKS: Secunia Advisory SA53306 Cisco Advisory ID cisco-sa-20130508-cvp Cisco Applied Mitigation Bulletin CVE-2013-1220 CVE-2013-1221 CVE-2013-1222 CVE-2013-1223 CVE-2013-1224 CVE-2013-1225 IMPACT ASSESSMENT: Medium DISCUSSION:

7

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents...

8

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

9

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

10

T-544: Cisco Security Advisory: Cisco Content Services Gateway  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Security Advisory: Cisco Content Services Gateway 4: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities January 27, 2011 - 2:04pm Addthis PROBLEM: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities PLATFORM: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 ABSTRACT: Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these

11

U-011: Cisco Security Response: Cisco TelePresence Video Communication...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication...

12

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Advisory: Cisco Content Services Gateway Vulnerabilities V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands...

13

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless...

14

T-560: Cisco Security Advisory: Management Center for Cisco Security Agent  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Cisco Security Advisory: Management Center for Cisco 0: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability February 18, 2011 - 7:00am Addthis PROBLEM: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability. PLATFORM: Cisco Security Agent software releases 5.1, 5.2, and 6.0 are affected by this vulnerability. Note: Only the Management Center for Cisco Security Agent is affected by this vulnerability. Cisco Security Agent installations on end-point workstations or servers are not affected by this vulnerability. ABSTRACT: The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote

15

U-011: Cisco Security Response: Cisco TelePresence Video Communication  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Security Response: Cisco TelePresence Video 1: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability U-011: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability October 14, 2011 - 12:30pm Addthis PROBLEM: Cisco Security Response: Cisco TelePresence Video Communication Server Cross-Site Scripting Vulnerability PLATFORM: Version(s): VCS prior to 7.0 ABSTRACT: A vulnerability was reported in Cisco TelePresence Video Communication Server. A remote user can conduct cross-site scripting attacks. reference LINKS: Cisco Document ID: 113264 SecurityTracker Alert ID: 1026186 CVE-2011-3294 IMPACT ASSESSMENT: Medium Discussion: A vulnerability exists in Cisco TelePresence Video Communication Server (VCS) due to improper validation of user-controlled input to the web-based

16

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Routers (ISRs) Cisco NM-AIR-WLC Module for Integrated Services Routers (ISRs) Cisco Catalyst 3750G Integrated WLCs Cisco Flex 7500 Series Cloud Controller Cisco Virtual Wireless...

17

Corporate Headquarters Cisco Systems, Inc.  

E-Print Network (OSTI)

radiate radio-frequency energy and, if not installed and used in accordance with the instruction manual: The equipment described in this manual generates and may radiate radio-frequency energy. If it is not installed. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University

Westall, James M.

18

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

19

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

20

U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability |  

NLE Websites -- All DOE Office Websites (Extended Search)

97: Cisco Adaptive Security Appliances Denial of Service 97: Cisco Adaptive Security Appliances Denial of Service Vulnerability U-197: Cisco Adaptive Security Appliances Denial of Service Vulnerability June 22, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco Adaptive Security Appliances (ASA), which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: The vulnerability is caused due to an unspecified error when handling IPv6 transit traffic and can be exploited to cause a reload of the affected device. reference LINKS: Vendor Advisory Secunia ID 49647 CVE-2012-3058 IMPACT ASSESSMENT: High Discussion: Cisco ASA 5500 Series Adaptive Security Appliances (Cisco ASA) and Cisco

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

22

V-125: Cisco Connected Grid Network Management System Multiple  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Connected Grid Network Management System Multiple 5: Cisco Connected Grid Network Management System Multiple Vulnerabilities V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities April 3, 2013 - 1:44am Addthis PROBLEM: Cisco Connected Grid Network Management System Multiple Vulnerabilities PLATFORM: Cisco Connected Grid Network Management System 2.x ABSTRACT: Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. REFERENCE LINKS: Cisco Security Notice CVE-2013-1163 Cisco Security Notice CVE-2013-1171 Secunia Advisory SA52834 SecurityTracker Alert ID: 1028374 SecurityTracker Alert ID: 1028373 CVE-2013-1163 CVE-2013-1171 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Certain input related to the element list component is not properly sanitised before being returned to the user. This can be exploited to

23

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

24

V-231: Cisco Identity Services Engine Discloses Authentication Credentials  

NLE Websites -- All DOE Office Websites (Extended Search)

1: Cisco Identity Services Engine Discloses Authentication 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services Engine REFERENCE LINKS: SecurityTracker Alert ID: 1028965 CVE-2013-3471 IMPACT ASSESSMENT: Meduim DISCUSSION: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials.The system stores the username and password of an authenticated user within hidden HTML form fields. A

25

T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication, user and administrator device access control, and policy control into a centralized identity networking solution.

26

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco AnyConnect VPN Client Two Vulnerabilities 6: Cisco AnyConnect VPN Client Two Vulnerabilities U-196: Cisco AnyConnect VPN Client Two Vulnerabilities June 21, 2012 - 7:00am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco AnyConnect VPN Client, which can be exploited by malicious people to compromise a user's system. PLATFORM: Cisco AnyConnect VPN Client 2.x Cisco AnyConnect VPN Client 3.x ABSTRACT: The Cisco AnyConnect Secure Mobility Client is affected by the following vulnerabilities: Cisco AnyConnect Secure Mobility Client VPN Downloader Arbitrary Code Execution Vulnerability Cisco AnyConnect Secure Mobility Client VPN Downloader Software Downgrade Vulnerability Cisco AnyConnect Secure Mobility Client and Cisco Secure Desktop HostScan Downloader Software Downgrade Vulnerability Cisco AnyConnect Secure Mobility Client 64-bit Java VPN Downloader

27

T-614: Cisco Unified Communications Manager Database Security Vulnerability  

Energy.gov (U.S. Department of Energy (DOE))

The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated, remote attacker could inject arbitrary SQL code on the system, allowing the attacker to take unauthorized actions.

28

U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Deny Service PLATFORM: Cisco ASA 5500 Series Adaptive Security Appliances and Cisco Catalyst 6500 Series ASA Services Module ABSTRACT: Several vulnerabilities were reported in...

29

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let...

30

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...  

NLE Websites -- All DOE Office Websites (Extended Search)

Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by...

31

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer...

32

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

33

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Cisco IronPort Web / Email Security Appliance Sophos 21: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

34

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

35

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web / Email Security Appliance Sophos 1: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities November 12, 2012 - 6:00am Addthis PROBLEM: Cisco IronPort Web / Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities PLATFORM: Cisco IronPort Email Security Appliances (C-Series and X-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. Cisco IronPort Web Security Appliances (S-Series) running Sophos Engine versions 3.2.07.352_4.80 and prior. ABSTRACT: Cisco Ironport Appliances Sophos Anti-Virus Vulnerabilities. REFERENCE LINKS: Cisco Security Advisory ID: cisco-sa-20121108-sophos Secunia Advisory SA51197 IMPACT ASSESSMENT: High DISCUSSION: Cisco has acknowledged some vulnerabilities in Cisco IronPort Web Security

36

V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets 4: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges April 15, 2013 - 1:30am Addthis PROBLEM: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges PLATFORM: Cisco AnyConnect Secure Mobility Client Cisco Secure Desktop ABSTRACT: Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. REFERENCE LINKS: Cisco Security Notice CVE-2013-1172 Cisco Security Notice CVE-2013-1173 SecurityTracker Alert ID: 1028425 CVE-2013-1172 CVE-2013-1173 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can trigger a heap overflow in the Cisco Host Scan component to execute arbitrary code on the target system with System privileges

37

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service  

NLE Websites -- All DOE Office Websites (Extended Search)

2: Cisco ASA Software TFTP Protocol Inspection Denial of 2: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability V-232: Cisco ASA Software TFTP Protocol Inspection Denial of Service Vulnerability August 31, 2013 - 4:00am Addthis PROBLEM: A vulnerability has been reported in Cisco ASA Software, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco Adaptive Security Appliance (ASA) 8.x, Cisco Adaptive Security Appliance (ASA) 9.x, Cisco ASA 5500-X Series Adaptive Security Appliances ABSTRACT: The vulnerability is reported in versions 8.4(5.7), 8.4(6), 9.0(2.3), 9.1(1.5), and 9.1(2.1). Other versions may also be affected. REFERENCE LINKS: Secunia Advisory SA54699 CVE-2013-3463 Cisco (CSCuh13899) IMPACT ASSESSMENT: Low DISCUSSION: A vulnerability has been reported in Cisco ASA Software, which can be

38

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco AnyConnect Secure Mobility Client Lets Remote Users 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and devices that are running Cisco IOS Software. PLATFORM: Cisco AnyConnect Secure Mobility Client Platform & Affected Versions ABSTRACT: Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a

39

V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Network Admission Control Input Validation Flaw Lets 9: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands V-139: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands April 21, 2013 - 11:50pm Addthis PROBLEM: Cisco Network Admission Control Input Validation Flaw Lets Remote Users Inject SQL Commands PLATFORM: Cisco NAC Manager versions prior to 4.8.3.1 and 4.9.2 ABSTRACT: A vulnerability was reported in Cisco Network Admission Control. REFERENCE LINKS: SecurityTracker Alert ID: 1028451 Cisco Advisory ID: cisco-sa-20130417-nac CVE-2013-1177 IMPACT ASSESSMENT: High DISCUSSION: The Cisco Network Admission Control (NAC) Manager does not properly validate user-supplied input. A remote user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

40

U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco IOS IPSec IKE Unspecified Denial of Service 8: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability April 2, 2012 - 7:00am Addthis PROBLEM: A vulnerability has been reported in Cisco IOS, which can be exploited by malicious people to cause a DoS (Denial of Service). PLATFORM: Cisco IOS XE 2.1.x Cisco IOS XE 2.2.x Cisco IOS XE 2.3.x Cisco IOS XE 2.4.x Cisco IOS XE 2.5.x Cisco IOS XE 2.6.x Cisco IOS XE 3.1.x Cisco IOS XE 3.3.x ABSTRACT: The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. REFERENCE LINKS: Vendor Advisory Secunia Advisory SA48607 CVE-2012-0381 iMPACT ASSESSMENT: High discussion: The March 28, 2012, Cisco IOS Software Security Advisory bundled

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Cisco Wind Energy Wind Farm | Open Energy Information  

Open Energy Info (EERE)

Cisco Wind Energy Wind Farm Cisco Wind Energy Wind Farm Jump to: navigation, search Name Cisco Wind Energy Wind Farm Facility Cisco Wind Energy Sector Wind energy Facility Type Commercial Scale Wind Facility Status In Service Owner John Deere Wind Energy Developer Community Energy Purchaser Northern States Power Location Brewster MN Coordinates 43.696164°, -95.467078° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":43.696164,"lon":-95.467078,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

42

V-139: Cisco Network Admission Control Input Validation Flaw...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sensitive Information U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands U-015: CiscoWorks Common Services Home...

43

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco Intrusion Prevention System SSP Fragmented Traffic 1: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic Denial of Service Vulnerability July 19, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Intrusion Prevention System PLATFORM: Cisco ASA 5500-X Series Adaptive Security Appliances Cisco Intrusion Prevention System (IPS) 7.1 ABSTRACT: A vulnerability in the implementation of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the affected system to reload. REFERENCE LINKS: Secunia Advisory SA54246 SecurityTracker ID: 1028806 Cisco Advisory ID: cisco-sa-20130717-ips CVE-2013-1218

44

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

15: CiscoWorks Common Services Home Page Input Validation Flaw 15: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

45

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

46

V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14: Cisco Prime Data Center Network Manager JBoss RMI Services 14: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands V-014: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands November 1, 2012 - 6:00am Addthis PROBLEM: Cisco Prime Data Center Network Manager JBoss RMI Services Let Remote Users Execute Arbitrary Commands PLATFORM: All Cisco Prime Data Center Network Manager releases prior to release 6.1(1), for both the Microsoft Windows and Linux platforms, are affected by this vulnerability. ABSTRACT: A vulnerability was reported in Cisco Prime Data Center Network Manager. REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20121031-dcnm SecurityTracker Alert ID: 1027712 CVE-2012-5417 IMPACT ASSESSMENT: High DISCUSSION: The vulnerability exists because JBoss Application Server Remote Method

47

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: Cisco Adaptive Security Appliances Port Forwarder ActiveX 26: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability March 16, 2012 - 7:00am Addthis PROBLEM: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability PLATFORM: Cisco Adaptive Security Appliance (ASA) 7.x, Cisco Adaptive Security Appliance (ASA) 8.x, Cisco ASA 5500 Series Adaptive Security Appliances ABSTRACT: A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. reference LINKS: Secunia Advisory SA48422 SecurityTracker Alert ID: 1026799 CVE-2012-0358 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted HTML that, when loaded by the

48

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

NLE Websites -- All DOE Office Websites (Extended Search)

36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on the specific vulnerability. Cisco ASA 5500 Series Adaptive Security Appliances may experience a TCP connection exhaustion condition (no new TCP connections are accepted) that can be triggered through the receipt of specific TCP segments during the

49

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

50

V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco Unity Express Input Validation Hole Permits Cross-Site 5: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks February 6, 2013 - 1:06am Addthis PROBLEM: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks PLATFORM: Cisco Unity Express prior to 8.0 ABSTRACT: A vulnerability was reported in Cisco Unity Express. REFERENCE LINKS: Cisco Security Notice SecurityTracker Alert ID: 1028075 CVE-2013-1120 IMPACT ASSESSMENT: Medium DISCUSSION: Cisco Unity Express software prior to version 8.0 contains vulnerabilities that could allow an unauthenticated, remote attacker to conduct cross site request forgery attacks. The vulnerabilities are due to insufficient input validation. An attacker could exploit these vulnerabilities by

51

U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: CiscoWorks Common Services Home Page Input Validation Flaw 5: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands October 20, 2011 - 7:30am Addthis PROBLEM: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands. PLATFORM: CiscoWorks Common Services-based products prior to version 4.1 running on Microsoft Windows ABSTRACT: Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. reference LINKS: Cisco Security Advisory ID: cisco-sa-20111019-cs Cisco Security Advisories and Responses

52

U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability 18: Cisco Linksys WMB54G TFTP Command Injection Vulnerability U-218: Cisco Linksys WMB54G TFTP Command Injection Vulnerability July 23, 2012 - 6:49am Addthis PROBLEM: Cisco Linksys WMB54G TFTP Command Injection Vulnerability PLATFORM: Cisco Linksys WMB54G 1.x ABSTRACT: System access from local network reference LINKS: Bugtraq ID: 54615 Original Advisory Secunia Advisory SA49868 Cisco Advisory ID: cisco-sa-20111019-cs IMPACT ASSESSMENT: Medium Discussion: A vulnerability in Cisco Linksys WMB54G was reported, which can be exploited by malicious people to compromise a vulnerable device. The vulnerability is caused due to missing input validation in the TFTP service when running the firmware update functionality and can be exploited to inject and execute arbitrary shell commands. Additionally, it may be

53

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

54

T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco Content Services Gateway ICMP Processing Flaw Lets 3: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service July 7, 2011 - 12:41pm Addthis PROBLEM: A denial of service (DoS) vulnerability exists in the Cisco Content Services Gateway - Second Generation, that runs on the Cisco Service and Application Module for IP (SAMI). An unauthenticated, remote attacker could exploit this vulnerability by sending a series of crafted ICMP packets to an affected device. Exploitation could cause the device to reload. There are no workarounds available to mitigate exploitation of this vulnerability other than blocking ICMP traffic destined to the affected device. PLATFORM: Second Generation only Cisco IOS 12.4(24)MDA3,Cisco IOS 12.4(24)MDA3,Cisco

55

T-685: Cisco Warranty CD May Load Malware From a Remote Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

85: Cisco Warranty CD May Load Malware From a Remote Site T-685: Cisco Warranty CD May Load Malware From a Remote Site August 5, 2011 - 3:26pm Addthis PROBLEM: A vulnerability was...

56

V-021: Cisco IronPort Web / Email Security Appliance Sophos Anti...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple Vulnerabilities V-021: Cisco IronPort Web Email Security Appliance Sophos Anti-Virus Multiple...

57

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

58

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011...

59

Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity  

Science Conference Proceedings (OSTI)

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes ... Keywords: Networking, Security

Dale Liu

2009-05-01T23:59:59.000Z

60

T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52: Cisco Nexus 1000V VEM updates address denial of service in 52: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi T-552: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi February 8, 2011 - 7:49am Addthis PROBLEM: Cisco Nexus 1000V VEM updates address denial of service in VMware ESX/ESXi. PLATFORM: ESXi 4.1, ESXi 4.0, ESX 4.1, ESX 4.0 The following Cisco products have the vulnerability: - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3b) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3a) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(3) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(2) - Cisco Nexus 1000V Virtual Ethernet Module Release 4.0(4) SV1(1) ABSTRACT: The Cisco Nexus 1000V Virtual Ethernet Module (VEM) is a virtual switch for

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

62

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

84: Cisco Digital Media Manager Lets Remote Authenticated Users 84: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

63

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Cisco Digital Media Manager Lets Remote Authenticated Users 4: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges January 19, 2012 - 9:00am Addthis PROBLEM: A remote authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not properly validate unreferenced URLs. REFERENCE LINKS: Vendor Advisory SecurityTracker Alert ID: 1026541 CVE-2012-0329 IMPACT ASSESSMENT: medium Discussion: Cisco Show and Share is not directly affected by this vulnerability, but a user can exploit the Cisco Digital Media Manager to gain full access to Cisco Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port

64

U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6:Cisco Network Admission Control Manager Directory Traversal 6:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information October 7, 2011 - 8:45am Addthis PROBLEM: Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information PLATFORM: Cisco NAC Manager software versions 4.8.X Cisco NAC Manager software versions 4.7.X and earlier are not affected ABSTRACT: An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks. reference LINKS: Cisco Security Advisory Document ID: 113189

65

U-016: Cisco IOS Software HTTP Service Loading Denial of Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16: Cisco IOS Software HTTP Service Loading Denial of Service 16: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability October 21, 2011 - 9:00am Addthis PROBLEM: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability . PLATFORM: Cisco IOS Software ABSTRACT: An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition. reference LINKS: CISCO Security Intelligence Operations IntelliShield ID: 24436 CVE-2011-2586 IMPACT ASSESSMENT: Medium Discussion: Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The vulnerability is due to improper

66

U-180: Cisco IOS XR Packet Processing Flaw | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

80: Cisco IOS XR Packet Processing Flaw 80: Cisco IOS XR Packet Processing Flaw U-180: Cisco IOS XR Packet Processing Flaw May 31, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR. PLATFORM: Version(s): XR 4.0.3, 4.0.4, 4.1.0, 4.1.1, 4.1.2, and 4.2.0 ABSTRACT: A remote user can cause denial of service conditions. Reference Links: Security Tracker ID 1027104 CVE-2012-2488 Vendor Advisory IMPACT ASSESSMENT: High Discussion: A remote user can send a specially crafted packet to the target device to cause the route processor to be unable to transmit route processor-based protocol packets to the fabric. IP traffic transiting the device cannot trigger the flaw. Cisco IOS XR is affected on the Cisco 9000 Series Aggregation Services Routers (ASR) Route Switch Processor (RSP440) and the Cisco Carrier Routing

67

V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Cisco Wireless Lan Controller Cross-Site Request Forgery 8: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability V-048: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability December 17, 2012 - 1:00am Addthis PROBLEM: Cisco Wireless Lan Controller Cross-Site Request Forgery Vulnerability PLATFORM: Cisco Wireless LAN Controller (WLC) ABSTRACT: A vulnerability was reported in Cisco Wireless LAN Controller. REFERENCE LINKS: SecurityTracker Alert ID: 1027886 Secunia Advisory SA51546 CVE-2012-5991 CVE-2012-5992 CVE-2012-6007 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability was reported in Cisco Wireless LAN Controller. A remote user can conduct cross-site request forgery attacks. A remote user can create specially crafted HTML that, when loaded by a target user, will cause arbitrary scripting code to be executed by the

68

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

69

T-611: Cisco IOS OCSP Revoked Certificate Security Issue | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco IOS OCSP Revoked Certificate Security Issue 1: Cisco IOS OCSP Revoked Certificate Security Issue T-611: Cisco IOS OCSP Revoked Certificate Security Issue April 27, 2011 - 2:07am Addthis PROBLEM: A security issue has been reported in Cisco IOS, which can be exploited by malicious people to bypass certain security restrictions. The security issue is caused due to an error in the OCSP functionality and can lead to a revoked certificate being successfully authenticated. PLATFORM: Cisco IOS 15.0, 15.1 Operating System ABSTRACT: The PKI functionality in Cisco IOS 15.0 and 15.1 does not prevent permanent caching of certain public keys, which allows remote attackers to bypass authentication and have unspecified other impact by leveraging an IKE peer relationship in which a key was previously valid but later revoked, aka Bug

70

U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco Advisory SecurityTracker Alert ID:1026692 CVE-2012-0352 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. A remote user can send a specially crafted IP packet to cause the target device to reload. The vulnerability occurs when the device attepts to obtain Layer 4 (e.g.,

71

V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Cisco Mobility Services Engine Configuration Error Lets 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an unauthenticated, remote attacker to connect to a database replication port anonymously via Secure Sockets Layer (SSL). REFERENCE LINKS: SecurityTracker Alert ID: 1028972 CVE-2013-3469 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to the misconfiguration of the Oracle SSL service. An attacker could exploit this vulnerability by connecting to an

72

U-016: Cisco IOS Software HTTP Service Loading Denial of Service...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted device. The...

73

V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS: Cisco SecurityTracker Alert ID: 1028592 Secunia Advisory SA51412 CVE-2012-6399 IMPACT ASSESSMENT: Medium DISCUSSION: A security issue in Cisco WebEx for iOS can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the application not properly verifying the server SSL certificate. This can be exploited to e.g. spoof the server

74

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

75

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-531: The WebVPN implementation on Cisco Adaptive Security T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 January 10, 2011 - 8:33pm Addthis PROBLEM: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) PLATFORM: Listed Vunerable Platform Details ABSTRACT: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. reference LINKS: CVE Vulnerability Details: CVE-2010-4680 NIST Vulnerability Summary for CVE-2010-4680

76

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

NLE Websites -- All DOE Office Websites (Extended Search)

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities August 2, 2013 - 2:25am Addthis PROBLEM: Two vulnerabilities have been reported in Cisco WAAS (Wide Area Application Services), which can be exploited by malicious users and malicious people to compromise a vulnerable system. PLATFORM: Versions 5.0.x, 5.1.x, and 5.2.x. ABSTRACT: Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system. REFERENCE LINKS: Secunia Advisory SA54372 CVE-2013-3443 CVE-2013-3444 IMPACT ASSESSMENT: High

77

T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Cisco XR 12000 Series Shared Port Adapters Interface 1: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability May 26, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR 12000. A remote user can cause denial of service conditions. PLATFORM: This vulnerability affects any device that is running Cisco IOS XR Software Releases 3.9.0, 3.9.1, 3.9.2, 4.0.0, 4.0.1, 4.0.2, or 4.1.0 and has a SPA interface processor installed. Vulnerability affects all Engine 5 Line Cards on the Cisco XR 12000 Series Routers. The engine 5 line cards are the SIP-600, SIP-601, SIP-501, and SIP-401. ABSTRACT: This vulnerability affects any device that is running affected releases of Cisco IOS XR Software and has an IPv4 address configured on any of the SPA

78

T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco XR 12000 Series Shared Port Adapters Interface 31: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability T-631: Cisco XR 12000 Series Shared Port Adapters Interface Processor Vulnerability May 26, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in Cisco IOS XR 12000. A remote user can cause denial of service conditions. PLATFORM: This vulnerability affects any device that is running Cisco IOS XR Software Releases 3.9.0, 3.9.1, 3.9.2, 4.0.0, 4.0.1, 4.0.2, or 4.1.0 and has a SPA interface processor installed. Vulnerability affects all Engine 5 Line Cards on the Cisco XR 12000 Series Routers. The engine 5 line cards are the SIP-600, SIP-601, SIP-501, and SIP-401. ABSTRACT: This vulnerability affects any device that is running affected releases of Cisco IOS XR Software and has an IPv4 address configured on any of the SPA

79

U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco IronPort Encryption Appliance Input Validation Flaw 2: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks U-102: Cisco IronPort Encryption Appliance Input Validation Flaw Permits Cross-Site Scripting Attacks February 14, 2012 - 8:00am Addthis PROBLEM: A vulnerability was reported in Cisco IronPort Encryption Appliance. PLATFORM: Version(s): prior to 6.5.3 ABSTRACT: A remote user can conduct cross-site scripting reference LINKS: Vendor URL CVE-2012-0340 Security Tracker ID:1026669 IMPACT ASSESSMENT: Medium Discussion: The interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from

80

T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the actual Cisco AnyConnect Secure Mobility Client. The helper application is a Java applet on the Linux and MacOS X platforms, and either a Java applet on the Windows...

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Grand Unified Theory  

NLE Websites -- All DOE Office Websites (Extended Search)

Grand Unified Theory Ungelste Rtsel Grand Unified Theory Heute besteht eines der Hauptziele der Teilchenphysik darin, die verschiedenen fundamentalen Krfte in einer Grossen...

82

Cisco Systems Funds "Whisker" Growth Research at the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

Cisco Systems Funds "Whisker" Growth Cisco Systems Funds "Whisker" Growth Research at the ALS Cisco Systems Funds "Whisker" Growth Research at the ALS Print Friday, 09 November 2012 10:06 Lead-free components have been increasingly used in electronics manufacturing since the European Union passed its 2003 Restriction of Hazardous Substances Directive (RoHS), which banned the use of certain hazardous materials in electrical and electronic equipment. To ensure the long-term reliability of mission-critical equipment such as networking hardware, a significant amount of research and development must be undertaken by the industry to ensure lead-free (Pb-free) metallurgies are sufficiently reliable. One of the unique reliability issues associated with electroplated Pb-free lead finishes [typically pure tin (Sn) or high-Sn alloys] is the growth of "whiskers," which is the spontaneous growth of long filament-like grains on the leads, or "legs," of electronic components. If the growth of these whiskers is not controlled, shorting between the lead can occur and thus cause system failures.

83

Los Angeles Unified School District  

Science Conference Proceedings (OSTI)

Los Angeles Unified School District. NVLAP Lab Code: 101505-0. Address and Contact Information: BSC Annex, Facility Services Div. Lab. 1449 So ...

2013-12-06T23:59:59.000Z

84

The Particle Adventure | Unsolved Mysteries | Grand Unified Theory  

NLE Websites -- All DOE Office Websites (Extended Search)

Unsolved Mysteries - Grand Unified Theory Grand Unified Theory Today, one of the major goals of particle physics is to unify the various fundamental forces in a Grand Unified...

85

Unified phantom cosmologies  

E-Print Network (OSTI)

We present a general algorithm based on the concept of form-invariance which can be used for generating phantom cosmologies. It involves linear transformations between the kinetic energy and the potential of the scalar field, and transforms solutions of the Einstein-Klein-Gordon equations which preserve the weak energy condition into others which violate it, while keeping the energy density of the field positive. All known solutions representing phantom cosmologies are unified by this procedure. Using the general algorithm we obtain those solutions and show the relations between them. In addition, the scale factors of the product and seed solutions are related by a generalization of the well-known $a\\to a^{-1}$ duality.

Luis P. Chimento; Ruth Lazkoz

2004-05-26T23:59:59.000Z

86

Hardware/Software Solution Unifying DALI, IBECS,  

NLE Websites -- All DOE Office Websites (Extended Search)

Hardware/Software Solution Unifying DALI, IBECS, Hardware/Software Solution Unifying DALI, IBECS, and BACnet Final Report Contributors: Ed Koch (Akua Controls) Francis Rubinstein Sila Kiliccote Report on Hardware/Software Solution Unifying DALI, IBECS, and BACnet 1 Table of Contents Executive Summary................................................................................................................................3 Introduction.............................................................................................................................................4 Context....................................................................................................................................................4 Control Strategies ..............................................................................................................................................

87

DOE Solar Decathlon: Cisco  

NLE Websites -- All DOE Office Websites (Extended Search)

same critical goals and missions with fewer resources. As agency officials look to adopt new and innovative solutions to transform their organizations, many are working to...

88

RFI Comments - Cisco  

Science Conference Proceedings (OSTI)

... Our business resiliency program includes incident management ... interoperability, scalability, stability and resilience. ... missions and business functions ...

2013-04-09T23:59:59.000Z

89

Cisco Systems Inc.  

E-Print Network (OSTI)

draft-ietf-eman-applicability-statement-03 The objective of Energy Management (EMAN) is to provide an energy management framework for networked devices. This document presents the applicability of the EMAN framework to a variety of scenarios. This document lists use cases and target devices that can potentially implement the EMAN framework and associated SNMP MIB modules. These use cases are useful for identifying requirements for the framework and MIBs. Further, we describe the relationship of the EMAN framework to relevant other energy monitoring standards and architectures. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at

Mouli Chandramouli; Bruce Nordman

2013-01-01T23:59:59.000Z

90

A unified theory of superconductivity  

E-Print Network (OSTI)

In this paper, we study the reliability of BCS theory as a scientific explanation of the mystery of superconductivity. It is shown clearly that the phonon-mediated BCS theory is fundamentally incorrect. Two kinds of glues, pairing (pseudogap) glue and superconducting glue, are suggested based on a real space Coulomb confinement effect. The scenarios provide a unified explanation of the pairing symmetry, pseudogap and superconducting states, charge stripe order, spin density wave (SDW), checkerboard-type charge-ordered phase, magic doping fractions and vortex structures in conventional and unconventional (the high-Tc cuprates and MgB2) superconductors. The theory agrees with the existence of a pseudogap in high-temperature superconductors, while no pseudogap feature could be observed in MgB2 and most of the conventional superconductors. Our results indicate that the superconducting phase can coexist with a inclined hexagonal vortex lattice in pure MgB2 single crystal with a charge carrier density ps=1.49*10^{22}/cm^{3}. Finally, the physical reasons why the good conductors (for example, Ag, Au, and Cu) and the overdoped high-Tc superconductors are non-superconducting are also explored.

Xiuqing Huang

2008-04-10T23:59:59.000Z

91

A Unified Analysis-Initialization Technique  

Science Conference Proceedings (OSTI)

A unified analysis-initialization technique is introduced and tested in the framework of the shallow water equations. It consists of iterating multivariate optimal interpolation and nonlinear normal mode initialization. For extratropical regions, ...

David L. Williamson; Roger Daley

1983-08-01T23:59:59.000Z

92

Unifying Execution of Imperative and Declarative Code  

E-Print Network (OSTI)

We present a unified environment for running declarative specifications in the context of an imperative object-Oriented programming language. Specifications are Alloy-like, written in first-order relational logic with ...

Milicevic, Aleksandar

93

A Unified Monsoon Index for South China  

Science Conference Proceedings (OSTI)

A unified index for both the summer and winter monsoons over south China (SC) is proposed for the purpose of studying their interannual variability. By examining the monthly distribution of the meridional flow ? over the AsiaPacific region from ...

Er Lu; Johnny C. L. Chan

1999-08-01T23:59:59.000Z

94

The Particle Adventure | Unsolved Mysteries | Forces and the Grand Unified  

NLE Websites -- All DOE Office Websites (Extended Search)

Unsolved Mysteries - Forces and the Grand Unified Theory Unsolved Mysteries - Forces and the Grand Unified Theory Forces and the Grand Unified Theory Physicists hope that a Grand Unified Theory will unify the strong, weak, and electromagnetic interactions. There have been several proposed Unified Theories, but we need data to pick which, if any, of these theories describes nature. If a Grand Unification of all the interactions is possible, then all the interactions we observe are all different aspects of the same, unified interaction. However, how can this be the case if strong and weak and electromagnetic interactions are so different in strength and effect? Strangely enough, current data and theory suggests that these varied forces merge into one force when the particles being affected are at a high enough energy.

95

Unified Graphical Summary of Neutrino Mixing Parameters  

E-Print Network (OSTI)

The neutrino mixing parameters are presented in a number of different ways by the various experiments, e.g. SuperKamiokande, K2K, SNO, KamLAND and Chooz and also by the Particle Data Group. In this paper, we argue that presenting the data in terms of $\\sin^2 \\theta$, where $\\theta$ is the mixing angle appropriate for a given experiment has a direct physical interpretation. For current atmospheric, solar and reactor neutrino experiments, the $\\sin^2 \\theta$'s are effectively the probability of finding a given flavor in a particular neutrino mass eigenstate. The given flavor and particular mass eigenstate varies from experiment to experiment, however, the use of $\\sin^2 \\theta$ provides a unified picture of all the data. Using this unified picture we present a graphical way to represent these neutrino mixing parameters which includes the uncertainties. All of this is performed in the context of the present experimental status of three neutrino oscillations.

Olga Mena; Stephen Parke

2003-12-10T23:59:59.000Z

96

Unified power quality conditioner for grid integration of wind generators.  

E-Print Network (OSTI)

?? A Unified Power Quality Conditioner (UPQC) is relatively a new member of the custom power device family. It is a comprehensive custom power device, (more)

Ganesh, Jayanti Navilgone, (Thesis)

2008-01-01T23:59:59.000Z

97

Unified Procedures Applicable to Major Federal Actions Relating to Nuclear  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Unified Procedures Applicable to Major Federal Actions Relating to Unified Procedures Applicable to Major Federal Actions Relating to Nuclear Activities Subject to Executive Order 12114 (State Department, 44 Fed Reg 65560) Unified Procedures Applicable to Major Federal Actions Relating to Nuclear Activities Subject to Executive Order 12114 (State Department, 44 Fed Reg 65560) The following unified procedures issued by the State Department are established to satisfy the requirement of the Executive Order for implementing procedures concerning nuclear export activities of Federal agencies. 44 Fed Reg 65560: Department of State: Unified Procedures Applicable to Major Federal Actions Relating to Nuclear Activities Subject to Executive Order 12114 More Documents & Publications Environmental Effects Abroad of Major Federal Actions

98

Economic analysis of the unified heliostat array  

DOE Green Energy (OSTI)

The Unified Heliostat Array (UHA) is comprised of conventional two-axis heliostats mounted on a terraced south-facing wall of a single structure. The arrangement of heliostats on the array is chosen to eliminate or control the degree of inter-heliostat shading and blocking. The UHA was investifated as to cost and optical performance. Two heliostats, the Veda Industrial Heliostat (VIH) and the Repowering Heliostat were investigated in conjunction with the UHA. The UHA was found to be a viable candidate for solar thermal central receiver applications. The UHA-VIH combination was shown to provide very high flux densities and to be suitable for high temperature applications in the 1000/sup 0/K to 2000/sup 0/K range. These temperatures were shown to be achievable even with very small (1 MWt) collector fields.

Not Available

1980-11-07T23:59:59.000Z

99

Cisco 1841 and Cisco 2801 Integrated Services Router FIPS ...  

Science Conference Proceedings (OSTI)

... Off Inverter booting Inverter ready No inverter power Table A1 L-3 GCS SDN-L BBM Front Panel Indicators Page 33. Copyright ...

2011-06-07T23:59:59.000Z

100

Cisco 5915 Embedded Services Routers  

Science Conference Proceedings (OSTI)

... keys stored in Dynamic Random Access ... health, temperature, memory status, voltage, packet statistics ... user rights, and restore router configurations. ...

2013-04-12T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

HIggs Boson Mass in the Minimal Unified Subquark Model  

E-Print Network (OSTI)

In the original paper entitled, "Masses of Fundamental Particles", not only the masses of fundamental particles including the weak bosons, Higgs scalar, quarks, and leptons, but also the mixing angles of quarks and those of neutrinos are all explained and/or predicted in the unified composite model of quarks and leptons successfully. In this addendum entitled, "Higgs Boson Mass in the Minimal Unified Subquark Model", it is emphasized that the Higgs boson mass is predicted to be about 130Gev in the minimal unified subquark model, which agrees well with the experimental values of 125-126GeV recently found by the ATLAS and CMS Collaborations at the LHC.

Hidezumi Terazawa

2011-09-17T23:59:59.000Z

102

A framework for Unified Communication and Collaboration strategy for telcos  

E-Print Network (OSTI)

Unified Communication and Collaboration (UCC) is a product offer that is the result of fixed and mobile networks convergence and the possibility of development of applications which are interoperable. Currently there are ...

Wahid, Bilal

2008-01-01T23:59:59.000Z

103

HIggs Boson Mass in the Minimal Unified Subquark Model  

E-Print Network (OSTI)

In the original paper entitled, "Masses of Fundamental Particles"(arXiv:1109.3705v5, 10 Feb 2012), not only the masses of fundamental particles including the weak bosons, Higgs boson, quarks, and leptons, but also the mixing angles of quarks and those of neutrinos are all explained and/or predicted in the unified composite models of quarks and leptons successfully. In this addendum entitled, "Higgs Boson Mass in the Minimal Unified Subquark Model", it is emphasized that the Higgs boson mass is predicted to be about 130Gev in the minimal unified subquark model, which agrees well with the experimental values of 125-126GeV recently found by the ATLAS and CMS Collaborations at the LHC.

Hidezumi Terazawa

2011-09-17T23:59:59.000Z

104

Unified communications : convergence of platforms and strategies of two software vendors  

E-Print Network (OSTI)

Unified Communications: Convergence of Platforms and Strategies of Two Software Vendors by Muhammad Zia Hydari ABSTRACT Unified communication (UC) is the convergence of various modes of communication - voice telephony, ...

Hydari, Muhammad Zia

2008-01-01T23:59:59.000Z

105

Design of a Dynamical Core Based on the Nonhydrostatic Unified System of Equations  

Science Conference Proceedings (OSTI)

This paper presents the design of a dry dynamical core based on the nonhydrostatic unified system of equations. The unified system filters vertically propagating acoustic waves. The dynamical core predicts the potential temperature and ...

Celal S. Konor

106

Unified Access to Heterogeneous Data in Cultural Heritage  

E-Print Network (OSTI)

. This approach raises the following two main questions: 1. Is a full-text IR solution suitable for unified access the combined data of a large museum. As a first step, we modified a typical full-text IR system and loaded up heterogeneous collections of the Gemeentemuseum. But how can we compare the retrieval effectiveness of a full-text

Kamps, Jaap

107

A unified approach to nonlinear buckling optimization of composite structures  

Science Conference Proceedings (OSTI)

A unified approach to nonlinear buckling fiber angle optimization of laminated composite shell structures is presented. The method includes loss of stability due to bifurcation and limiting behaviour. The optimization formulation is formulated as a mathematical ... Keywords: Bifurcation buckling, Composite laminate optimization, Composite structures, Design sensitivity analysis, Limit point buckling, Nonlinear buckling

Esben Lindgaard; Erik Lund

2011-02-01T23:59:59.000Z

108

A unified approach to SIC-POVMs and MUBs  

E-Print Network (OSTI)

A unified approach to (symmetric informationally complete) positive operator valued measures and mutually unbiased bases is developed in this article. The approach is based on the use of operator equivalents expanded in the enveloping algebra of SU(2). Emphasis is put on similarities and differences between SIC-POVMs and MUBs.

Albouy, O

2007-01-01T23:59:59.000Z

109

A unified approach to SIC-POVMs and MUBs  

E-Print Network (OSTI)

A unified approach to (symmetric informationally complete) positive operator valued measures and mutually unbiased bases is developed in this article. The approach is based on the use of operator equivalents expanded in the enveloping algebra of SU(2). Emphasis is put on similarities and differences between SIC-POVMs and MUBs.

O. Albouy; M. R. Kibler

2007-04-04T23:59:59.000Z

110

GUPFS: The Global Unified Parallel File System Project at NERSC  

E-Print Network (OSTI)

The Global Unified Parallel File System (GUPFS) project is a five-year project to provide a scalable, high-performance, high-bandwidth, shared file system for the National Energy Research Scientific Computing Center (NERS C). This paper presents the GUPFS testbed configuration, our benchmarking methodology, and some preliminary results.

Greg Butler Rei; Greg Butler; Rei Lee; Mike Welcome

2004-01-01T23:59:59.000Z

111

A unified optimization framework for equalization filter synthesis  

Science Conference Proceedings (OSTI)

We present a novel method for jointly optimizing FIR filters for pre-equalization, decision feedback equalization, and near-end crosstalk cancellation. The unified optimization problem is a linear program, and we describe sparse matrix techniques for ... Keywords: crosstalk, equalizing filters, linear programming, optimal synthesis

Jihong Ren; Mark Greenstreet

2005-06-01T23:59:59.000Z

112

Probing EWSB Naturalness in Unified SUSY Models with Dark Matter  

E-Print Network (OSTI)

We have studied Electroweak Symmetry Breaking (EWSB) fine-tuning in the context of two unified Supersymmetry scenarios: the Constrained Minimal Supersymmetric Model (CMSSM) and models with Non-Universal Higgs Masses (NUHM), in light of current and upcoming direct detection dark matter experiments. We consider both those models that satisfy a one-sided bound on the relic density of neutralinos, $\\Omega_{\

Amsel, Stephen; Sandick, Pearl

2011-01-01T23:59:59.000Z

113

Connecting learners with content: a unified content strategy for learning materials  

Science Conference Proceedings (OSTI)

A unified content strategy is a repeatable method of creating content for reuse, managing content in a definitive source, and assembling it to meet diverse needs. This paper describes:A unified content strategy and its benefitsApplying ... Keywords: RLO, adaptive learning materials, content management, enterprise content management, reusable learning object, unified content strategy

Pamela Kostur

2002-10-01T23:59:59.000Z

114

Systematic search within an optimisation space based on Unified Transformation Framework  

Science Conference Proceedings (OSTI)

Modern compilers have limited ability to exploit the performance improvement potential of complex transformation compositions due to their ad-hoc nature. Unified Transformation Framework (Kelly and Pugh, 1993a) provides a unified representation ... Keywords: Java, UTF, adaptive optimisation, heuristic search, iteration reordering transformations, iterative compilation, optimisation space, unified transformation framework

Shun Long; Grigori Fursin

2009-07-01T23:59:59.000Z

115

Thermodynamics of nano-cluster phases: a unifying theory  

E-Print Network (OSTI)

We propose a unifying, analytical theory accounting for the self-organization of colloidal systems in nano- or micro-cluster phases. We predict the distribution of cluter sizes with respect to interaction parameters and colloid concentration. In particular, we anticipate a proportionality regime where the mean cluster size grows proportionally to the concentration, as observed in several experiments. We emphasize the interest of a predictive theory in soft matter, nano-technologies and biophysics.

Nicolas Destainville; Lionel Foret

2008-04-04T23:59:59.000Z

116

Gravitational Collapse and Radiation of Grand Unified Theory  

E-Print Network (OSTI)

The infinite gravitational collapse of any supermassive stars should pass through an energy scale of the grand unified theory (GUT). After nucleon-decays, the supermassive star will convert nearly all its mass into energy, and produce the radiation of GUT. It may probably explain some ultrahigh energy puzzles in astrophysics, for example, quasars and gamma-ray bursts (GRB), etc. This is similar with a process of the Big Bang Universe with a time-reversal evolution in much smaller space scale and mass scale. In this process the star seems be a true white hole.

Yi-Fang Chang

2007-10-02T23:59:59.000Z

117

UNIFYING DARK ENERGY AND DARK MATTER WITH A SCALAR FIELD  

E-Print Network (OSTI)

Abstract. The standard model of cosmology considers the existence of two components of unknown nature, dark matter and dark energy, which determine the cosmological evolution. Their nature remains unknown, and other models can also be considered. In particular, it may be possible to reinterpret the recent cosmological observations so that the Universe does not contain two fluids of unknown natures, but only one fluid with particular properties. After a brief review of constraints on this unifying dark fluid, we will discuss a specific model of dark fluid based on a complex scalar fluid. 1

G. Mamon; F. Combes; C. Deffayet; B. Fort (eds; Arbey A

2005-01-01T23:59:59.000Z

118

Unified Model for the Heat Transfer Processes that Occur During  

E-Print Network (OSTI)

A unified general model for the heat transfer processes that occur within a food product subjected to canning or aseptic thermal treatment, is presented. Two principles are extensively used in the model building process: system segregation and energy balancing. The model is summarized in an algorithm, whose specification is showed for different combinations of processing system type (PST) and product formulation (PF) with a single particle type. A discussion on the practical relevance of proper product identification in the case of aseptic processing, is included. Finally, an illustration is given on the results that can be obtained from the model algorithm application, in a comparative study of different PST-PF combinations.

Jose F. Pastrana; Harvey J. Gold; Kenneth R. Swanzel; Pastrana Gold; Jose F. Pastrana; Harvey J. Gold; Kenneth R. Swartzel

1992-01-01T23:59:59.000Z

119

Projective Synchronization and Control of Unified Chaotic System  

E-Print Network (OSTI)

The problem of projective synchronization(ps) and control are studied in modified unified chaotic system which possess partially linearity property. The desired ratio factor of corresponding subsystem variable could be obtained by state feedback control. Theoretical analysis and numerical simulations are provided to illustrate the projective synchronization and the feasibility of the proposed control method. The effect on projective synchronization caused by channel noise and parameter mismatch are investigated in detail, the results showed that parameter mismatch has more effect on projective synchronization than channel noise does, which may be applied to chaotic secure communications.

Liang Feng; Xiang Jinglin; Chen Shaohua; Shi Jie

2005-05-01T23:59:59.000Z

120

Sheldon Glashow, the Electroweak Theory, and the Grand Unified Theory  

Office of Scientific and Technical Information (OSTI)

Sheldon Glashow and the Electroweak Theory Sheldon Glashow and the Electroweak Theory Resources with Additional Information Sheldon Glashow Courtesy AIP Emilio Segrè Visual Archives, Segrè Collection [Sheldon] 'Glashow shared the 1979 Nobel Prize for physics with Steven Weinberg and Abdus Salam for unifying the theories of weak and electromagnetic forces. The new "electroweak" theory underlies all of particle physics and provides a framework for understanding how the early universe evolved and how the chemical elements were created. ... "Glashow's work has been instrumental in our understanding of how our universe came into being," says Lawrence R. Sulak, chairman of the Boston University physics department. "In the years since winning the prize, Glashow has helped develop the Grand Unified Theory of all particles and all forces. Its predictions led to the construction of massive underground detectors, the refinement of the unification models, the first observation of neutrinos from a supernova, and the recent discovery that neutrinos have mass. Glashow has fueled an ongoing search for rare events and exotic effects that may shed further light on the evolution of the early universe."1

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Modeling with Plato: the unified modeling language in a cultural context  

Science Conference Proceedings (OSTI)

In this paper we present our experience in building and lecturing an interdisciplinary CS course aimed at teaching the Unified Modeling Language (UML) in a cultural context. Combining modeling concepts and ideas brought from philosophy and history of ... Keywords: humanistic informatics, modeling, unified modeling language (UML)

Luis de-Marcos; Fernando Flores; Jos-Javier Martnez

2010-06-01T23:59:59.000Z

122

A unified moving grid gas-kinetic method in Eulerian space for viscous flow computation  

Science Conference Proceedings (OSTI)

Under a generalized coordinate transformation with arbitrary grid velocity, the gas-kinetic BGK equation is reformulated in a moving frame of reference. Then, a unified conservative gas-kinetic scheme is developed for the viscous flow computation in ... Keywords: 65M06, 76P05, 76T05, Gas-kinetic scheme, Moving grid, Navier-Stokes equations, Unified coordinate system

Changqiu Jin; Kun Xu

2007-03-01T23:59:59.000Z

123

The Unified First law in "Cosmic Triad" Vector Field Scenario  

E-Print Network (OSTI)

In this letter, we try to apply the unified first law to the "cosmic triad" vector field scenario both in the minimal coupling case and in the non-minimalcoupling case. After transferring the non-minimally coupling action in Jordan frame to Einstein frame, the correct dynamical equation (Friedmann equation) is gotten in a thermal equilibrium process by using the already existing entropy while the entropy in the non-minimal coupled "cosmic triad" scenario has not been derived. And after transferring the variables back to Jordan frame, the corresponding Friedmann equation is demonstrated to be correct. For complete arguments, we also calculate the related Misner-Sharp energy in Jordan and Einstein frames.

Yi Zhang; Yungui Gong; Zong-Hong Zhu

2011-08-04T23:59:59.000Z

124

Unified Fractional Kinetic Equation and a Fractional Diffusion Equation  

E-Print Network (OSTI)

In earlier papers Saxena et al. (2002, 2003) derived the solutions of a number of fractional kinetic equations in terms of generalized Mittag-Leffler functions which extended the work of Haubold and Mathai (2000). The object of the present paper is to investigate the solution of a unified form of fractional kinetic equation in which the free term contains any integrable function f(t), which provides the unification and extension of the results given earlier recently by Saxena et al. (2002, 2003). The solution has been developed in terms of the Wright function in a closed form by the method of Laplace transform. Further we derive a closed-form solution of a fractional diffusion equation. The asymptotic expansion of the derived solution with respect to the space variable is also discussed. The results obtained are in a form suitable for numerical computation.

R. K. Saxena; A. M. Mathai; H. J. Haubold

2004-06-22T23:59:59.000Z

125

Higgs-boson effects in grand unified theories  

DOE Green Energy (OSTI)

It is argued that fine tuning of a minimal set of parameters, needed to fix the hierarchy of gauge-boson masses and a knowledge of intermediate symmetry groups, leads to ''natural'' mass scales for physical Higgs bosons in grand unified theories. This is applied to ..delta..B = 2 transitions in models based on SU(5), SO(10), SU(16), and (SU(2N))/sup 4/. It turns out that the Higgs bosons which mediate ..delta..B = 2 neutron-antineutron and hydrogen-antihydrogen oscillations become superheavy, and so such transitions can be observable only in theories with low unification scales, such as SU(16) and (SU(8))/sup 4/, if we adhere to the hypothesis of minimal fine tuning.

Mohapatra, R.N.; Senjanovic, G.

1983-04-01T23:59:59.000Z

126

Unified Performance and Power Modeling of Scientific Workloads  

SciTech Connect

It is expected that scientific applications executing on future large-scale HPC must be optimized not only in terms of performance, but also in terms of power consumption. As power and energy become increasingly constrained resources, researchers and developers must have access to tools that will allow for accurate prediction of both performance and power consumption. Reasoning about performance and power consumption in concert will be critical for achieving maximum utilization of limited resources on future HPC systems. To this end, we present a unified performance and power model for the Nek-Bone mini-application developed as part of the DOE's CESAR Exascale Co-Design Center. Our models consider the impact of computation, point-to-point communication, and collective communication

Song, Shuaiwen; Barker, Kevin J.; Kerbyson, Darren J.

2013-11-17T23:59:59.000Z

127

Unified architecture for large-scale attested metering  

E-Print Network (OSTI)

We introduce a secure architecture called an attested meter for advanced metering that supports large-scale deployments, flexible configurations, and enhanced protection for consumer privacy and metering integrity. Our study starts with a threat analysis for advanced metering networks and formulates protection requirements for those threats. The attested meter satisfies these through a unified set of system interfaces based on virtual machines and attestation for the software agents of various parties that use the meter. We argue that this combination provides a well-adapted architecture for advanced metering and we take a step towards demonstrating its feasibility with a prototype implementation based on the Trusted Platform Module (TPM) and Xen Virtual Machine Monitor (VMM). This is the first effort use virtual machines and attestation in an advanced meter. 1.

Michael Lemay; George Gross; Carl A. Gunter; Sanjam Garg

2007-01-01T23:59:59.000Z

128

Incorporating Rigorous Height Determination into Unified Fracture Design  

E-Print Network (OSTI)

Hydraulic fracturing plays an important role in increasing production rate in tight reservoirs. The performance of the reservoir after fracturing can be observed from the productivity index. This parameter is dependent on the fracture geometry; height, length and width. Unified fracture design (UFD) offers a method to determine the fracture dimensions providing the maximum productivity index for a specific proppant amount. Then, in order to achieve the maximum productivity index, the treatment schedules including the amount of liquid and proppant used for each stage must be determined according to the fracture dimensions obtained from the UFD. The proppant number is necessary for determining the fracture geometry using the UFD. This number is used to find the maximum productivity index for a given proppant amount. Then, the dimensionless fracture conductivity index corresponding to the maximum productivity index can be computed. The penetration ration, the fracture length, and the propped fracture width can be computed from the dimensionless fracture conductivity. However, calculating the proppant number used in UFD requires the fracture height as an input. The most convenient way to estimate fracture height to input to the UFD is to assume that the fracture height is restricted by stress contrast between the pay zone and over and under-lying layers. In other words, the fracture height is assumed to be constant, independent of net pressure and equal to the thickness of the layer which has the least minimum principal stress. However, in reality, the fracture may grow out from the target formation and the height of fracture is dependent on the net pressure during the treatment. Therefore, it is necessary to couple determination of the fracture height with determination of the other fracture parameters. In this research, equilibrium height theory is applied to rigorously determine the height of fracture. Solving the problem iteratively, it is possible to incorporate the rigorous fracture height determination into the unified fracture design.

Pitakbunkate, Termpan

2010-08-01T23:59:59.000Z

129

Configuring VRF Support  

E-Print Network (OSTI)

Virtual Route Forwarding (VRF) divides a physical router into multiple logical routers, each having its own set of interfaces and routing and forwarding tables. VRF support in voice networks can be used to split Cisco Unified Communications Manager Express (Cisco Unified CME) into multiple virtual systems for SIP and SCCP endpoints and TAPI-based client applications and softphones on your PC. Finding Feature Information Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information for VRF Support section on page 1569. Use Cisco Feature Navigator to find information about platform support and Cisco IOS and Catalyst OS software image support. To access Cisco Feature Navigator, go to

unknown authors

2008-01-01T23:59:59.000Z

130

Towards A Unified HFE Process For The Nuclear Industry  

SciTech Connect

As nuclear power utilities embark on projects to upgrade and modernize power plants, they are likely to discover that traditional engineering methods do not typically make provision for the integration of human considerations. In addition, human factors professionals will find that traditional human performance methods such as function allocation, task analysis, human reliability analysis and human-machine interface design do not scale well to the complexity of a large-scale nuclear power upgrade project. Up-to-date human factors engineering processes, methods, techniques and tools are required to perform these kinds of analyses. This need is recognized widely in industry and an important part of the Department of Energys Light Water Reactor Sustainability Program deals with identifying potential impacts of emerging technologies on human performance and the technical bases needed to address them. However, so far no formal initiative has been launched to deal with the lack of integrated processes. Although human factors integration frameworks do exist in industries such as aviation or defense, no formal integrated human factors process exists in the nuclear industry. As a first step towards creating such a process, a unified human factors engineering process is proposed as a framework within which engineering organizations, human factors practitioners and regulatory bodies can ensure that human factors requirements are embedded in engineering activities throughout the upgrade project life cycle.

Jacques Hugo

2012-07-01T23:59:59.000Z

131

Producing EGS4 shower displays with the Unified Graphics System  

Science Conference Proceedings (OSTI)

The EGS4 Code System has been coupled with the SLAC Unified Graphics System in such a manner as to provide a means for displaying showers on UGS77-supported devices. This is most easily accomplished by attaching an auxiliary subprogram package (SHOWGRAF) to existing EGS4 User Codes and making use of a graphics display or a post-processor code called EGS4PL. SHOWGRAF may be used to create shower displays directly on interactive IBM 5080 color display devices, supporting three-dimensional rotations, translations, and zoom features, and providing illustration of particle types and energies by color and/or intensity. Alternatively, SHOWGRAF may be used to record a two-dimensional projection of the shower in a device-independent graphics file. The EGS4PL post-processor may then be used to convert this file into device-dependent graphics code for any UGS77-supported device. Options exist within EGS4PL that allow for two-dimensional translations and zoom, for creating line structure to indicate particle types and energies, and for optional display of particles by type. All of this is facilitated by means of the command processor EGS4PL EXEC together with new options (5080 and PDEV) with the standard EGS4IN EXEC routine for running EGS4 interactively under VM/SP. 6 refs.

Cowan, R.F. (Massachusetts Inst. of Tech., Cambridge, MA (USA). Lab. for Nuclear Science); Nelson, W.R. (Stanford Linear Accelerator Center, Menlo Park, CA (USA))

1990-08-16T23:59:59.000Z

132

HUDU: The Hanford Unified Dose Utility computer code  

Science Conference Proceedings (OSTI)

The Hanford Unified Dose Utility (HUDU) computer program was developed to provide rapid initial assessment of radiological emergency situations. The HUDU code uses a straight-line Gaussian atmospheric dispersion model to estimate the transport of radionuclides released from an accident site. For dose points on the plume centerline, it calculates internal doses due to inhalation and external doses due to exposure to the plume. The program incorporates a number of features unique to the Hanford Site (operated by the US Department of Energy), including a library of source terms derived from various facilities' safety analysis reports. The HUDU code was designed to run on an IBM-PC or compatible personal computer. The user interface was designed for fast and easy operation with minimal user training. The theoretical basis and mathematical models used in the HUDU computer code are described, as are the computer code itself and the data libraries used. Detailed instructions for operating the code are also included. Appendices to the report contain descriptions of the program modules, listings of HUDU's data library, and descriptions of the verification tests that were run as part of the code development. 14 refs., 19 figs., 2 tabs.

Scherpelz, R.I.

1991-02-01T23:59:59.000Z

133

Dark matter and EWSB naturalness in unified SUSY models  

SciTech Connect

The relationship between the degree of fine-tuning in Electroweak Symmetry Breaking (EWSB) and the discoverability of dark matter in current and next generation direct detection experiments is investigated in the context of two unified Supersymmetry scenarios: the Constrained Minimal Supersymmetric Standard Model (CMSSM) and models with Non-Universal Higgs Masses (NUHM). Attention is drawn to the mechanism(s) by which the relic abundance of neutralino dark matter is suppressed to cosmologically viable values. After a summary of Amsel, Freese, and Sandick (2011), results are updated to reflect current constraints, including the discovery of a new particle consistent with a Standard Model-like Higgs boson. We find that a Higgs mass of {approx} 125 GeV excludes the least fine-tuned CMSSM points in our parameter space and that remaining viable models may be difficult to probe with next generation direct dark matter searches. Relatively low fine-tuning and good direct detection prospects are still possible in NUHM scenarios.

Sandick, Pearl [University of Utah, Dept. of Physics, Salt Lake City, UT 84112 (United States)

2013-05-23T23:59:59.000Z

134

Dynamics and constraints of the unified dark matter flat cosmologies  

SciTech Connect

We study the dynamics of the scalar field Friedmann-Lemaitre-Robertson-Walker flat cosmological models within the framework of the unified dark matter (UDM) scenario. In this model we find that the main cosmological functions such as the scale factor of the Universe, the scalar field, the Hubble flow, and the equation of state parameter are defined in terms of hyperbolic functions. These analytical solutions can accommodate an accelerated expansion, equivalent to either the dark energy or the standard {lambda} models. Performing a joint likelihood analysis of the recent supernovae type Ia data and the baryonic acoustic oscillations traced by the Sloan Digital Sky Survey galaxies, we place tight constraints on the main cosmological parameters of the UDM cosmological scenario. Finally, we compare the UDM scenario with various dark energy models namely {lambda} cosmology, parametric dark energy model and variable Chaplygin gas. We find that the UDM scalar field model provides a large and small scale dynamics which are in fair agreement with the predictions by the above dark energy models although there are some differences especially at high redshifts.

Basilakos, Spyros [Academy of Athens, Research Center for Astronomy and Applied Mathematics, Soranou Efesiou 4, GR-11527, Athens (Greece); Lukes-Gerakopoulos, Georgios [Academy of Athens, Research Center for Astronomy and Applied Mathematics, Soranou Efesiou 4, GR-11527, Athens (Greece); University of Athens, Department of Physics, Section of Astrophysics, Astronomy and Mechanics (Greece)

2008-10-15T23:59:59.000Z

135

Observed Atmospheric Responses to Global SST Variability Modes: A Unified Assessment Using GEFA  

Science Conference Proceedings (OSTI)

The authors present a comprehensive assessment of the observed atmospheric response to SST variability modes in a unified approach using the Generalized Equilibrium Feedback Analysis (GEFA). This study confirms a dominant atmospheric response to ...

Na Wen; Zhengyu Liu; Qinyu Liu; Claude Frankignoul

2010-04-01T23:59:59.000Z

136

Opportunities and challenges to unify workload, power, and cooling management in data centers  

Science Conference Proceedings (OSTI)

Independent optimization for workload and power management, and active cooling control have been studied extensively to improve data center energy efficiency. Recently, proposals have started to advocate unified workload, power, and cooling management ...

Zhikui Wang; Niraj Tolia; Cullen Bash

2010-08-01T23:59:59.000Z

137

Einstein's Dream of Unified Forces - principles | U.S. DOE Office of  

Office of Science (SC) Website

Einstein's Dream of Unified Forces Einstein's Dream of Unified Forces High Energy Physics (HEP) HEP Home About Research Snowmass / P5 Planning Process Intensity Frontier Cosmic Frontier Theoretical Physics Advanced Technology R&D Accelerator R&D Stewardship Research Highlights .pdf file (13.1MB) Questions for the Universe Einstein's Dream of Unified Forces The Particle World The Birth of the Universe Accomplishments Facilities Science Highlights Benefits of HEP Funding Opportunities Advisory Committees News & Resources Contact Information High Energy Physics U.S. Department of Energy SC-25/Germantown Building 1000 Independence Ave., SW Washington, DC 20585 P: (301) 903-3624 F: (301) 903-2597 E: sc.hep@science.doe.gov More Information » Questions for the Universe Einstein's Dream of Unified Forces

138

Pattern driven lazy reduction: A unifying evaluation mechanism for functional and logic programs  

Science Conference Proceedings (OSTI)

A novel lazy evaluation mechanism, pattern-driven lazy reduction, is developed that serves as a unifying evaluation mechanism for both functional and logic programs. The reduction of a function call can be viewed as semantically ...

P. A. Subrahmanyam; J-H. You

1984-01-01T23:59:59.000Z

139

A unified optimization framework for robust pseudo-relevance feedback algorithms  

Science Conference Proceedings (OSTI)

We present a flexible new optimization framework for finding effective, reliable pseudo-relevance feedback models that unifies existing complementary approaches in a principled way. The result is an algorithmic approach that not only brings together ... Keywords: optimization, query expansion

Joshua V. Dillon; Kevyn Collins-Thompson

2010-10-01T23:59:59.000Z

140

A Unified Perspective on the Dynamics of Axisymmetric Hurricanes and Monsoons  

Science Conference Proceedings (OSTI)

This paper provides a unified perspective on the dynamics of hurricane- and monsoonlike vortices by identifying them as specific limiting cases of a more general flow system. This more general system is defined as stationary axisymmetric balanced ...

Volkmar Wirth; Timothy J. Dunkerton

2006-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Intercalibrated Passive Microwave Rain Products from the Unified Microwave Ocean Retrieval Algorithm (UMORA)  

Science Conference Proceedings (OSTI)

The Unified Microwave Ocean Retrieval Algorithm (UMORA) simultaneously retrieves sea surface temperature, surface wind speed, columnar water vapor, columnar cloud water, and surface rain rate from a variety of passive microwave radiometers ...

K. A. Hilburn; F. J. Wentz

2008-03-01T23:59:59.000Z

142

Unified formalism for calculating polarization, magnetization, and more in a periodic insulator  

E-Print Network (OSTI)

In this paper, we propose a unified formalism, using Green's functions, to integrate out the electrons in an insulator under uniform electromagnetic fields. We derive a perturbative formula for the Green's function in the ...

Chen, Kuang-Ting

143

A Unified Technique for Dynamic Modeling and Stability Analysis of Microgrid Systems.  

E-Print Network (OSTI)

??This work presents a unified method for dynamic modeling and stability analysis of microgrid power systems. Using the automated state-model generation algorithm, a state-space model (more)

Johnson, Brian B.

2010-01-01T23:59:59.000Z

144

Filtering of Parameterized Nonorographic Gravity Waves in the Met Office Unified Model  

Science Conference Proceedings (OSTI)

This paper investigates the vertical filtering of parameterized gravity wave pseudomomentum flux in the tropospherestratosphere version of the Met Office Unified Model. Gravity wave forcing is parameterized using the Warner and McIntyre spectral ...

Christopher D. Warner; Adam A. Scaife; Neal Butchart

2005-06-01T23:59:59.000Z

145

Impact of a Spectral Gravity Wave Parameterization on the Stratosphere in the Met Office Unified Model  

Science Conference Proceedings (OSTI)

The impact of a parameterized spectrum of gravity waves on the simulation of the stratosphere in the Met Office Unified Model (UM) is investigated. In the extratropical mesosphere, the gravity wave forcing acts against the mean zonal wind and it ...

A. A. Scaife; N. Butchart; C. D. Warner; R. Swinbank

2002-05-01T23:59:59.000Z

146

Access to A-G curriculum at San Jose Unified School District  

E-Print Network (OSTI)

Issue 1 Access to A-G curriculum at San Jose Unified Schoolhigh school enrollment curriculum for all California publicwith a college-bound curriculum is to increase the A-G

Lin, Barbara

2006-01-01T23:59:59.000Z

147

An Updated Climatology of the TroposphereStratosphere Configuration of the Met Office's Unified Model  

Science Conference Proceedings (OSTI)

In this paper results are presented from an improved version of the tropospherestratosphere configuration of the Met Office Unified Model (UM). The new version incorporates a number of changes, including new radiation and orographic gravity wave ...

D. R. Jackson; J. Austin; N. Butchart

2001-07-01T23:59:59.000Z

148

Strategic Plan for Sustainable Energy Management and Environmental Stewardship for Los Angeles Unified School District  

SciTech Connect

This Strategic Plan for Sustainable Energy Management and Environmental Stewardship states goals, measures progress toward goals and how actions are monitored to achieve continuous improvement for the Los Angeles Unified School District.

Walker, A.; Beattie, D.; Thomas, K.; Davis, K.; Sim, M.; Jhaveri, A.

2007-11-01T23:59:59.000Z

149

16.01-04 Unified Engineering I, II, III, & IV, Fall 2003-Spring 2004  

E-Print Network (OSTI)

The basic objective of Unified is to give a solid understanding of the fundamental disciplines of aerospace engineering, as well as their interrelationships and applications. These disciplines are Materials and Structures ...

Hall, Steven Ray

150

Initial Tendencies of Cloud Regimes in the Met Office Unified Model  

Science Conference Proceedings (OSTI)

The Met Office unified forecastclimate model is used to compare the properties of simulated climatological cloud regimes with those produced in short-range forecasts initialized from operational analyses. The regimes are defined as principal ...

K. D. Williams; M. E. Brooks

2008-02-01T23:59:59.000Z

151

The Rise and Fall of the Dream Schools: Equity and Local Politics in the San Francisco Unified School District  

E-Print Network (OSTI)

2000). The Rs of School Reform and the Politics Replacing Public Schools. Journal of Educational vs. San Francisco Unified School District, et al.

Livingston, Matthew Merritt

2011-01-01T23:59:59.000Z

152

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to obtain potentially sensitive information about the database structure via an id- query to a .cfm file. Successful exploitation of the vulnerabilities described in this...

153

INEEL/EXT-04-02506 2 Decision-Makers' Forum on a Unified Strategy for Nuclear Energy  

E-Print Network (OSTI)

.S. leadership in nuclear energy affords considerable benefits to our national security, economic competitivenessINEEL/EXT-04-02506 #12;2 Decision-Makers' Forum on a Unified Strategy for Nuclear Energy The Need for a Unified Strategy vitality of the nuclear science and engineering institutions, took steps to stabilize

154

Development of a Unified Land Model for Prediction of Surface Hydrology and LandAtmosphere Interactions  

Science Conference Proceedings (OSTI)

A unified land model (ULM) is described that combines the surface flux parameterizations in the Noah land surface model (used in most of NOAAs coupled weather and climate models) with the Sacramento Soil Moisture Accounting model (Sac; used for ...

Ben Livneh; Pedro J. Restrepo; Dennis P. Lettenmaier

2011-12-01T23:59:59.000Z

155

Parallel data mining techniques on Graphics Processing Unit with Compute Unified Device Architecture (CUDA)  

Science Conference Proceedings (OSTI)

Recent development in Graphics Processing Units (GPUs) has enabled inexpensive high performance computing for general-purpose applications. Compute Unified Device Architecture (CUDA) programming model provides the programmers adequate C language like ... Keywords: Association rules mining, CUDA, Classification, Clustering, Data mining, Parallel computing

Liheng Jian; Cheng Wang; Ying Liu; Shenshen Liang; Weidong Yi; Yong Shi

2013-06-01T23:59:59.000Z

156

Integration of Distributed Resources in Electric Utility Systems: Current Interconnection Practice and Unified Approach  

Science Conference Proceedings (OSTI)

Accelerating commercialization of distributed resources (DR) has created the need for improved practices for interconnecting them with electric utility distribution systems. An assessment of current practice is provided, and a unified approach is recommended to achieve greater consistency. This report is a tool that readers can use to simplify their efforts in resolving DR interconnection problems.

1999-03-11T23:59:59.000Z

157

Spatial transfer functions: a unified approach to specifying deformation in volume modeling and animation  

Science Conference Proceedings (OSTI)

In this paper, we introduce the concept of spatial transfer functions as a unified approach to volume modeling and animation. A spatial transfer function is a function that defines the geometrical transformation of a scalar field in space, and is a generalization ...

M. Chen; D. Silver; A. S. Winter; V. Singh; N. Cornea

2003-07-01T23:59:59.000Z

158

A brief note on how to unify dark matter, dark energy, and inflation  

E-Print Network (OSTI)

A scenario in which inflation, dark energy and dark matter can be unified into a single scalar field, the inflaton field $\\phi$, is studied. The inflaton is identified with the sneutrino, the scalar partner of the heavy neutrino. We determine the conditions needed for avoiding the gravitino problem and not having negligible plasma effects and we obtain the allowed range for the sneutrino coupling.

Grigoris Panotopoulos

2007-06-15T23:59:59.000Z

159

A unified theory of zero power and power reactor noise via backward master equations  

E-Print Network (OSTI)

A unified theory of zero power and power reactor noise via backward master equations I. Pa´ zsit a, *, Z.F. Kuang a,b , A.K. Prinja c a Department of Reactor Physics, Chalmers University of Technology Department of Chemical and Nuclear Engineering, University of New Mexico, Albuquerque, NM 87131, USA Received

Pázsit, Imre

160

A unified model for detecting efficient and inefficient outliers in data envelopment analysis  

Science Conference Proceedings (OSTI)

Data envelopment analysis (DEA) uses extreme observations to identify superior performance, making it vulnerable to outliers. This paper develops a unified model to identify both efficient and inefficient outliers in DEA. Finding both types is important ... Keywords: Data envelopment analysis, Outlier, Post analysis

Wen-Chih Chen; Andrew L. Johnson

2010-02-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Unified methodology of neural analysis in decision support systems built for pharmaceutical technology  

Science Conference Proceedings (OSTI)

The objective of this study was to create universal methodology of artificial neural networks (ANNs) application in construction of decision support systems designed for various dosage forms. Two different dosage forms (solid dispersions and microemulsions) ... Keywords: Artificial neural networks, Decision support systems, Microemulsions, Pharmaceutical technology, Solid dispersions, Unified methodology

Aleksander Mendyk; Renata Jachowicz

2007-05-01T23:59:59.000Z

162

Geomagnetic imprinting: A unifying hypothesis of long-distance natal homing in salmon and sea turtles  

E-Print Network (OSTI)

Geomagnetic imprinting: A unifying hypothesis of long-distance natal homing in salmon and sea geomagnetic polarity reversals, may affect ecological processes by disrupting natal homing, resulting the globe before reentering the planet in the northern hemisphere. Several geomagnetic elements vary pre

Lohmann, Kenneth J.

163

Middle Atmosphere Climatologies from the TroposphereStratosphere Configuration of the UKMOs Unified Model  

Science Conference Proceedings (OSTI)

A climatology of the middle atmosphere is determined from 11-yr integrations of the U.K. Meteorological Office Unified Model and compared with 18 years of satellite observations and 5 years of data assimilation fields. The model has an upper ...

Neal Butchart; John Austin

1998-09-01T23:59:59.000Z

164

Toward a Unified Formulation of the Kessler-Type Autoconversion Parameterizations  

NLE Websites -- All DOE Office Websites (Extended Search)

a Unified Formulation of the Kessler-Type a Unified Formulation of the Kessler-Type Autoconversion Parameterizations Y. Liu and P. H. Daum Brookhaven National Laboratory Upton, New York Introduction Rain is initiated in liquid water clouds by collision and coalescence of cloud droplets wherein larger droplets with higher settling velocities collect smaller droplets and become embryonic raindrops. Kessler (1969) proposed a simple parameterization that linearly relates the autoconversion rate to the cloud liquid water content, and this parameterization has been widely used in cloud-related modeling studies because of its simplicity. However, this simple parameterization leaves much to be desired, because it is well known that the autoconversion rate is a function of not only the liquid water content

165

Einstein's Dream of Unified Forces | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

Since Einstein, physicists have sought a unified theory to explain all the fundamental forces and particles in the universe. The result is a stunningly successful theory that reduces the complexity of microscopic physics to a set of concise laws. But these same quantum ideas fail when applied to cosmic physics. Some fundamental piece is missing; gravity, dark matter and dark energy must have quantum explanations. A new theoretical vision is required, one that embraces the Standard Model and general relativity, while resolving the mystery of dark energy. Particle accelerators provide the means to reach a unified theoretical perspective in experiments characterized by four well-defined intellectual thrusts Are there undiscovered principles of nature: new symmetries, new

166

A unified construction of generalised classical polynomials associated with operators of Calogero-Sutherland type  

E-Print Network (OSTI)

In this paper we consider a large class of many-variable polynomials which contains generalisations of the classical Hermite, Laguerre, Jacobi and Bessel polynomials as special cases, and which occur as the polynomial part in the eigenfunctions of Calogero-Sutherland type operators and their deformations recently found and studied by Chalykh, Feigin, Sergeev, and Veselov. We present a unified and explicit construction of all these polynomials.

Martin Hallns; Edwin Langmann

2007-03-30T23:59:59.000Z

167

The Higgs portal and an unified model for dark energy and dark matter  

E-Print Network (OSTI)

We examine a scenario where the Higgs boson is coupled to an additional singlet scalar field which we identify with a quintessence field. We show that this results in an unified picture of dark matter and dark energy, where dark energy is the zero-mode classical field rolling the usual quintessence potential and the dark matter candidate is the quantum excitation (particle) of the field, which is produced in the universe due to its coupling to the Higgs boson.

O. Bertolami; R. Rosenfeld

2007-08-13T23:59:59.000Z

168

Prototyping a Generic, Unified Land Surface Classification and Screening Methodology for GPM-Era Microwave Land Precipitation Retrieval Algorithms  

Science Conference Proceedings (OSTI)

A prototype generic, unified land surface classification and screening methodology for Global Precipitation Measurement (GPM)-era microwave land precipitation retrieval algorithms by using ancillary datasets is developed. As an alternative to the ...

Arief Sudradjat; Nai-Yu Wang; Kaushik Gopalan; Ralph R. Ferraro

2011-06-01T23:59:59.000Z

169

Making schools the centers of communities : moving the Los Angeles Unified School District from policy to practice  

E-Print Network (OSTI)

Schools often represent the largest, single community public infrastructure investment. In light of this, California's Los Angeles Unified School District (LAUSD) is in a unique and critical position as it attempts to ...

Rodriguez, Miguel A. (Miguel Angel), M.C.P. Massachusetts Institute of Technology

2006-01-01T23:59:59.000Z

170

Characteristics of High-Resolution Versions of the Met Office Unified Model for Forecasting Convection over the United Kingdom  

Science Conference Proceedings (OSTI)

With many operational centers moving toward order 1-km-gridlength models for routine weather forecasting, this paper presents a systematic investigation of the properties of high-resolution versions of the Met Office Unified Model for short-range ...

Humphrey W. Lean; Peter A. Clark; Mark Dixon; Nigel M. Roberts; Anna Fitch; Richard Forbes; Carol Halliwell

2008-09-01T23:59:59.000Z

171

A Unifying Approach to Quaternion Adaptive Filtering: Addressing the Gradient and Convergence  

E-Print Network (OSTI)

A novel framework for a unifying treatment of quaternion valued adaptive filtering algorithms is introduced. This is achieved based on a rigorous account of quaternion differentiability, the proposed I-gradient, and the use of augmented quaternion statistics to account for real world data with noncircular probability distributions. We first provide an elegant solution for the calculation of the gradient of real functions of quaternion variables (typical cost function), an issue that has so far prevented systematic development of quaternion adaptive filters. This makes it possible to unify the class of existing and proposed quaternion least mean square (QLMS) algorithms, and to illuminate their structural similarity. Next, in order to cater for both circular and noncircular data, the class of widely linear QLMS (WL-QLMS) algorithms is introduced and the subsequent convergence analysis unifies the treatment of strictly linear and widely linear filters, for both proper and improper sources. It is also shown that the proposed class of HR gradients allows us to resolve the uncertainty owing to the noncommutativity of quaternion products, while the involution gradient (I-gradient) provides generic extensions of the corresponding real- and complex-valued adaptive algorithms, at a reduced computational cost. Simulations in both the strictly linear and widely linear setting support the approach.

Cyrus Jahanchahi; Danilo P. Mandic

2013-10-17T23:59:59.000Z

172

...Unified Theories  

NLE Websites -- All DOE Office Websites (Extended Search)

teorías unificadas teorías unificadas Volver Principal ESTOY PERDIDO!!! Durante años, los físicos han buscado y han encontrado teorías unificadas. 1861-1865 James Maxwell, en una serie de páginas, describe la interrelación de los campos eléctricos y magnéticos, unificándolos en el electromagnetismo. Este proceso condujo a las ahora famosas ecuaciones de Maxwell. 1881-1884 Hertz demostró la existencia de las ondas de radio y estableció que, tanto las ondas de radio como la luz, son ondas electromagnéticas de distinta frecuencia, tal como lo predijo la teoría de Maxwell. 1967-1970 Glashow, Salam, y Weinberg propusieron una teoría que unifica las interacciones electromagnéticas y débiles. Ellos predijeron la masa de los bosones W, intermediarios de los procesos débiles, tales como el decaimiento beta; y predijeron un nuevo tipo de

173

General heart construction on a triangulated category (I): unifying t-structures and tilting subcategories  

E-Print Network (OSTI)

In 2008, Koenig and Zhu revealed that the quotient of a triangulated category by a tilting subcategory (= maximal 1-orthogonal subcategory) becomes an abelian category. On the other hand, as is well known since 1980s, the heart of any $t$-structure is abelian. We unify these two important notion to define a {\\it dividing pair}. To any dividing pair in a triangulated category, we can naturally associate an abelian category, which gives back each of the above two abelian categories when the dividing pair is a tilting subcategory, or respectively a $t$-structure.

Nakaoka, Hiroyuki

2009-01-01T23:59:59.000Z

174

Higgs and Sparticle Masses from Yukawa Unified SO(10): A Snowmass White Paper  

E-Print Network (OSTI)

We discuss ways to probe t-b-tau Yukawa coupling unification condition at the Energy and Intensity frontiers. We consider non-universal soft supersymmetry breaking mass terms for gauginos related by the SO(10) grand unified theory (GUT). We have previously shown that t-b-tau Yukawa coupling unification prefers a mass of around 125 GeV for the Standard Model-like Higgs boson with all colored sparticle masses above 3 TeV. The well-known MSSM parameter tan(beta) is about 47-48 and neutralino-stau coannihilation yields the desired relic dark matter density.

M. Adeel Ajaib; Ilia Gogoladze; Qaisar Shafi; Cem Salih Un

2013-08-21T23:59:59.000Z

175

Multiplicative scale uncertainties in the unified approach for constructing confidence intervals  

E-Print Network (OSTI)

We have investigated how uncertainties in the estimation of the detection efficiency affect the 90% confidence intervals in the unified approach for constructing confidence intervals. The study has been conducted for experiments where the number of detected events is large and can be described by a Gaussian probability density function. We also assume the detection efficiency has a Gaussian probability density and study the range of the relative uncertainties $\\sigma_\\epsilon$ between 0 and 30%. We find that the confidence intervals provide proper coverage and increase smoothly and continuously from the intervals that ignore scale uncertainties with a quadratic dependence on $\\sigma_\\epsilon$.

Smith, E S

2008-01-01T23:59:59.000Z

176

Unified Representation of Quantum Mechanics on One-dimensional Harmonic Oscillator  

E-Print Network (OSTI)

A quantum state corresponds to a specific wave function. We adopt a new mathematical method [1] to improve Dirac's ladder operator method. A set of orthonormal wave functions will be used to associate the operator with the square matrix corresponding to it. These allow us to determine the matrix elements by using the operator relations without having to know the specific wave functions. As a result, we can get the direct results of matrix mechanics and wave mechanics on one-dimensional Harmonic oscillator and their descriptions will be also unified.

Yongqin Wang

2013-03-07T23:59:59.000Z

177

New Type of Soliton Equation Described Some Statistical Distributions and Nonlinear Equations Unified Quantum Statistics  

E-Print Network (OSTI)

We proposed a new type of soliton equation, whose solutions may describe some statistical distributions, for example, Cauchy distribution, normal distribution and student distribution, etc. The equation possesses two characters. Further, from an extension of this type of equation we may obtain the exponential distribution, and the Fermi-Dirac distribution in quantum statistics. Moreover, by using the method of the soliton-solution, the nonlinear Klein-Gordon equation and nonlinear Dirac equations may derive Bose-Einstein and Fermi-Dirac distributions, respectively, and both distributions may be unified by the nonlinear equation.

Yi-Fang Chang

2009-02-02T23:59:59.000Z

178

The Unified Equation of State for Dark Matter and Dark Energy  

E-Print Network (OSTI)

We assume that dark matter and dark energy satisfy the unified equation of state: p = B(z)?, with p = pdE, ? = ?dm + ?dE, where the pressure of dark matter pdm = 0 has been taken into account. A special function B = ? A (1+z) ? is presented, which can well describe the evolution of the universe. In this model, the universe will end up with a Big Rip. By further simple analysis, we know other choices of the function B can also describe the universe but lead to a different doomsday.

Wei Wang; Yuanxing Gui; Suhong Zhang; Guanghai Guo; Ying Shao

2005-01-01T23:59:59.000Z

179

Skinner-Rusk Unified Formalism for Optimal Control Systems and Applications  

E-Print Network (OSTI)

A geometric approach to time-dependent optimal control problems is proposed. This formulation is based on the Skinner and Rusk formalism for Lagrangian and Hamiltonian systems. The corresponding unified formalism developed for optimal control systems allows us to formulate geometrically the necessary conditions given by Pontryagin's Maximum Principle, provided that the differentiability with respect to controls is assumed and the space of controls is open. Furthermore, our method is also valid for implicit optimal control systems and, in particular, for the so-called descriptor systems (optimal control problems including both differential and algebraic equations).

M. Barbero-Lian; A. Echeverria-Enriquez; D. Martin de Diego; M. C. Muoz-Lecanda; N. Roman-Roy

2007-05-15T23:59:59.000Z

180

The global unified parallel file system (GUPFS) project: FY 2002 activities and results  

Science Conference Proceedings (OSTI)

The Global Unified Parallel File System (GUPFS) project is a multiple-phase, five-year project at the National Energy Research Scientific Computing (NERSC) Center to provide a scalable, high performance, high bandwidth, shared file system for all the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make it easier to conduct advanced scientific research using the NERSC systems. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is directly accessed by all the NERSC production computing and support systems. During its first year, FY 2002, the GUPFS project focused on identifying, testing, and evaluating existing and emerging shared/cluster file system, SAN fabric, and storage technologies; identifying NERSC user input/output (I/O) requirements, methods, and mechanisms; and developing appropriate benchmarking methodologies and benchmark codes for a parallel environment. This report presents the activities and progress of the GUPFS project during its first year, the results of the evaluations conducted, and plans for near-term and longer-term investigations.

Butler, Gregory F.; Lee, Rei Chi; Welcome, Michael L.

2003-04-07T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Twistor transform in d dimensions and a unifying role for twistors  

SciTech Connect

Twistors in four dimensions d=4 have provided a convenient description of massless particles with any spin, and this led to remarkable computational techniques in Yang-Mills field theory. Recently it was shown that the same d=4 twistor provides also a unified description of an assortment of other particle dynamical systems, including special examples of massless or massive particles, relativistic or nonrelativistic, interacting or noninteracting, in flat space or curved spaces. In this paper, using 2T-physics as the primary theory, we derive the general twistor transform in d-dimensions that applies to all cases, and show that these more general twistor transforms provide d dimensional holographic images of an underlying phase space in flat spacetime in d+2 dimensions. Certain parameters, such as mass, parameters of spacetime metric, and some coupling constants, appear as moduli in the holographic image while projecting from d+2 dimensions to (d-1)+1 dimensions or to twistors. We also extend the concept of twistors to include the phase space of D-branes, and give the corresponding twistor transform. The unifying role for the same twistor that describes an assortment of dynamical systems persists in general, including D-branes. Except for a few special cases in low dimensions that exist in the literature, our twistors are new.

Bars, Itzhak [Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089-0484 (United States); Picon, Moises [Department of Physics and Astronomy, University of Southern California, Los Angeles, California 90089-0484 (United States); Departamento de Fisica Teorica, University of Valencia and IFIC (CSIC-UVEG), 46100-Burjasot (Valencia) (Spain)

2006-03-15T23:59:59.000Z

182

PageRank, HITS and a unified framework for link analysis  

SciTech Connect

Two popular webpage ranking algorithms are HITS and PageRank. HITS emphasizes mutual reinforcement between authority and hub webpages, while PageRank emphasizes hyperlink weight normalization and web surfing based on random walk models. We systematically generalize/combine these concepts into a unified framework. The ranking framework contains a large algorithm space; HITS and PageRank are two extreme ends in this space. We study several normalized ranking algorithms which are intermediate between HITS and PageRank, and obtain closed-form solutions. We show that, to first order approximation, all ranking algorithms in this framework, including PageRank and HITS, lead to same ranking which is highly correlated with ranking by indegree. These results support the notion that in web resource ranking indegree and outdegree are of fundamental importance. Rankings of webgraphs of different sizes and queries are presented to illustrate our analysis.

Ding, Chris; He, Xiaofeng; Husbands, Parry; Zha, Hongyuan; Simon, Horst

2001-10-01T23:59:59.000Z

183

Einstein's Dream of Unified Forces - forces | U.S. DOE Office of Science  

Office of Science (SC) Website

Do all the forces become one? Do all the forces become one? The International Linear Collider The U.S. is pushing superconducting technology forward for use in future accelerators like the proposed International Linear Collider. (Credit: Fermilab) At the most fundamental level, particles and forces may converge, either through hidden principles like grand unification, or through radical physics like superstring. We already know that remarkably similar mathematical laws and principles describe all the known forces except gravity. Perhaps all forces are different manifestations of a single grand unified force, a force that would relate quarks to leptons and predict new ways of converting one kind of particle into another. Such a force might eventually make protons decay, rendering ordinary matter unstable.

184

Einstein's Dream of Unified Forces - extra dimensions | U.S. DOE Office  

Office of Science (SC) Website

Are there extra dimensions of space? Are there extra dimensions of space? The Tevatron .jpg file (220KB) At Fermilab's Tevatron, physicists study such exotic phenomena as extra dimensions, paving the way for scientific discoveries. The revolutionary concept of string theory is a bold realization of Einstein's dream of an ultimate explanation for everything from the tiniest quanta of particle physics to the cosmos itself. String theory unifies physics by producing all known forces and particles as different vibrations of a single substance called superstrings. String theory brings quantum consistency to physics with an elegant mathematical construct that appears to be unique. Do superstrings exist? The strings themselves are probably too tiny to observe directly, but string theory makes a number of testable predictions.

185

Supersymmetric Yang Mills Fields and Black Holes ; In Ten Dimensional Unified Field Theory  

E-Print Network (OSTI)

The Ten dimensional Unified field theory has a 4 dimensional Riemannian spacetime and six dimensional Calabi Yau space structure. The supersymmetric Yang Mills fields and black holes are solutions in these theories. The formation of primordial black holes in early universe, the collapse to singularity of stellar black holes, the Hawking evaporation of microscopic black holes in LHC are topics of observational and theoretical interest. The observation of gamma ray bursts and creation of spectrum of particles and radiation of dark and normal matter occur due to primordial and microscopic black holes. The approach to singularity in black hole interior solutions, require the Bogoliubov transforms of SUSY YM fields in black hole geometries; both during formation and in evaporation. The Hawking effect of radiating black holes is applicable for all the fields. Invariants can be defined to give the conditions for these processes.

Ajay Patwardhan

2007-05-17T23:59:59.000Z

186

Unifying disc-jet behaviour in X-ray binaries: an optical/IR approach  

E-Print Network (OSTI)

Synchrotron emission from jets produced by X-ray binaries can be detected at optical and infrared (IR) frequencies. I show that optical/IR colour-magnitude diagrams of the outbursts of nine X-ray binaries successfully separate thermal disc emission from non-thermal jet emission, in both black hole and neutron star sources. A heated single-temperature blackbody is able to reproduce the observed relations between colour and magnitude, except when excursions are made to a redder colour than expected, which is due to jet emission. The general picture that is developed is then incorporated into the unified picture of disc-jet behaviour in black hole X-ray binaries. At a given position of a source in the X-ray hardness-intensity diagram, the radio, IR and optical properties can be inferred. Similarly, it is possible to predict the X-ray and radio luminosities and spectral states from optical/IR monitoring.

David M. Russell; Dipankar Maitra; Rob P. Fender; Fraser Lewis

2008-11-18T23:59:59.000Z

187

A unified architectural model for on-demand user-centric communications  

E-Print Network (OSTI)

The rapid growth of networking technologies has drastically changed the way we communicate and enabled a wide range of communication applications. However, these applications have been conceived, designed, and developed separately with little or no connection to each other, resulting in a fragmented and incompatible set of technologies and products. Building new communication applications requires a lengthy and costly development cycle, which severely limits the pace of innovation. Current applications are also typically incapable of responding to changes in user communication needs as well as changing network infrastructure and device technology. In this article, we address these issues and present the Unified Communication Model (UCM), a new and user-centric approach for conceiving, generating, and delivering communication applications on-demand. We also introduce a prototype design and implementation of UCM and discuss future research directions toward realizing next generation communication applications. 1.

Yi Deng; S. Masoud Sadjadi; Peter Clarke; Chi Zhang; Vagelis Hristidis; Raju Rangaswami; Nagarajan Prabakar

2005-01-01T23:59:59.000Z

188

A Unified and Integrated Energy Management System for HVAC Spaces and Power House  

E-Print Network (OSTI)

This paper describes a totally integrated energy management system throughout the plant and facilities. The equipment involves: the power plant (boilers, cogeneration turbines, chillers); HVAC of buildings; air handling and other distribution systems. The energy management system has the architecture for data transmission and processing including multilevel control and optimization through the plant and buildings. The key step in this work is to interface the power plant control and management system with the rest, under a unified energy management concept. The main advantages of the system has been: (i) the ability to optimize and coordinate the overall operation, (ii) to control the feedback loops for their optimum operation, (iii) to communicate between the levels of control hierarchy, all from the same operator station, and (iv) provide the high reliability and availability of the system.

Kaya, A.; Debban, G. D.

1988-09-01T23:59:59.000Z

189

Unified gauge theory for electromagnetism and gravitation based on twistor bundles  

SciTech Connect

A unified gauge theory of the combined gravitational and electromagnetic fields is obtained by two different procedures using twistors as a starting point for the construction of the appropriate bundles. One of these formalisms is obtained by relaxing the conditions on the structure of a twistor bundle theory previously developed by the authors for the Poincare group as the structure group. The other formalism is based on a tensor product bundle and can be readily extended to include structure groups involving direct products of nonabelian groups with the Poincare group. The results of the theory are compared with those obtained in projective theories of the generalized Jordan--Kaluza--Klein type, and some of the essential differences are pointed out.

Luehr, C.P.; Rosenbaum, M.

1984-02-01T23:59:59.000Z

190

From short to fat tails in financial markets: A unified description  

E-Print Network (OSTI)

In complex systems such as turbulent flows and financial markets, the dynamics in long and short time-lags, signaled by Gaussian and fat-tailed statistics, respectively, calls for a unified description. To address this issue we analyze a real dataset, namely, price fluctuations, in a wide range of temporal scales to embrace both regimes. By means of Kramers-Moyal (KM) coefficients evaluated from empirical time series, we obtain the evolution equation for the probability density function (PDF) of price returns. We also present consistent asymptotic solutions for the timescale dependent equation that emerges from the empirical analysis. From these solutions, new relationships connecting PDF characteristics, such as tail exponents, to parameters of KM coefficients arise. The results reveal a dynamical path that leads from Gaussian to fat-tailed statistics, furnishing insights on other complex systems where akin crossover is observed.

Cortines, A A G; Anteneodo, C

2008-01-01T23:59:59.000Z

191

Cisco Systems, Inc. Responses to Department of Commerce ...  

Science Conference Proceedings (OSTI)

... to-year increase in real per capita GDP ... But beyond increases in GDP and employment ... by dramatic innovation in healthcare, education, and energy. ...

2010-10-04T23:59:59.000Z

192

V-232: Cisco ASA Software TFTP Protocol Inspection Denial of...  

NLE Websites -- All DOE Office Websites (Extended Search)

vulnerability is caused due to an error within the idle timeout implementation when handling inspect based TFTP connections and can be exploited to exhaust the connection...

193

V-201: Cisco Intrusion Prevention System SSP Fragmented Traffic...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of the code that processes fragmented traffic could allow an unauthenticated, remote attacker to cause the Analysis Engine process to become unresponsive or cause the...

194

Cisco Systems Funds "Whisker" Growth Research at the ALS  

NLE Websites -- All DOE Office Websites (Extended Search)

shorting between the lead can occur and thus cause system failures. This scanning electron microscope (SEM) image shows a whisker (filament) growing next to a hillock on a...

195

V-125: Cisco Connected Grid Network Management System Multiple...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

input related to an entry field is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code....

196

The global unified parallel file system (GUPFS) project: FY 2003 activities and results  

Science Conference Proceedings (OSTI)

The Global Unified Parallel File System (GUPFS) project is a multiple-phase project at the National Energy Research Scientific Computing (NERSC) Center whose goal is to provide a scalable, high-performance, high-bandwidth, shared file system for all of the NERSC production computing and support systems. The primary purpose of the GUPFS project is to make the scientific users more productive as they conduct advanced scientific research at NERSC by simplifying the scientists' data management tasks and maximizing storage and data availability. This is to be accomplished through the use of a shared file system providing a unified file namespace, operating on consolidated shared storage that is accessible by all the NERSC production computing and support systems. In order to successfully deploy a scalable high-performance shared file system with consolidated disk storage, three major emerging technologies must be brought together: (1) shared/cluster file systems software, (2) cost-effective, high-performance storage area network (SAN) fabrics, and (3) high-performance storage devices. Although they are evolving rapidly, these emerging technologies individually are not targeted towards the needs of scientific high-performance computing (HPC). The GUPFS project is in the process of assessing these emerging technologies to determine the best combination of solutions for a center-wide shared file system, to encourage the development of these technologies in directions needed for HPC, particularly at NERSC, and to then put them into service. With the development of an evaluation methodology and benchmark suites, and with the updating of the GUPFS testbed system, the project did a substantial number of investigations and evaluations during FY 2003. The investigations and evaluations involved many vendors and products. From our evaluation of these products, we have found that most vendors and many of the products are more focused on the commercial market. Most vendors lack the understanding of, or do not have the resources to pay enough attention to, the needs of high-performance computing environments such as NERSC.

Butler, Gregory F.; Baird William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney Cary L.

2004-04-30T23:59:59.000Z

197

Unified single-photon and single-electron counting statistics: From cavity QED to electron transport  

SciTech Connect

A key ingredient of cavity QED is the coupling between the discrete energy levels of an atom and photons in a single-mode cavity. The addition of periodic ultrashort laser pulses allows one to use such a system as a source of single photons--a vital ingredient in quantum information and optical computing schemes. Here we analyze and time-adjust the photon-counting statistics of such a single-photon source and show that the photon statistics can be described by a simple transport-like nonequilibrium model. We then show that there is a one-to-one correspondence of this model to that of nonequilibrium transport of electrons through a double quantum dot nanostructure, unifying the fields of photon-counting statistics and electron-transport statistics. This correspondence empowers us to adapt several tools previously used for detecting quantum behavior in electron-transport systems (e.g., super-Poissonian shot noise and an extension of the Leggett-Garg inequality) to single-photon-source experiments.

Lambert, Neill [Advanced Science Institute, RIKEN, Saitama 351-0198 (Japan); Chen, Yueh-Nan [Department of Physics and National Center for Theoretical Sciences, National Cheng-Kung University, Tainan 701, Taiwan (China); Nori, Franco [Advanced Science Institute, RIKEN, Saitama 351-0198 (Japan); Physics Department, University of Michigan, Ann Arbor, MI 48109-1040 (United States)

2010-12-15T23:59:59.000Z

198

A UNIFIED APPROACH TO THE HELIOSEISMIC INVERSION PROBLEM OF THE SOLAR MERIDIONAL FLOW FROM GLOBAL OSCILLATIONS  

Science Conference Proceedings (OSTI)

Measurements from tracers and local helioseismology indicate the existence of a meridional flow in the Sun with strength in the order of 15 m s{sup -1} near the solar surface. Different attempts were made to obtain information on the flow profile at depths up to 20 Mm below the solar surface. We propose a method using global helioseismic Doppler measurements with the prospect of inferring the meridional flow profile at greater depths. Our approach is based on the perturbation of the p-mode eigenfunctions of a solar model due to the presence of a flow. The distortion of the oscillation eigenfunctions is manifested in the mixing of p-modes, which may be measured from global solar oscillation time series. As a new helioseismic measurement quantity, we propose amplitude ratios between oscillations in the Fourier domain. We relate this quantity to the meridional flow and unify the concepts presented here for an inversion procedure to infer the meridional flow from global solar oscillations.

Schad, A.; Timmer, J. [Freiburg Center for Data Analysis and Modeling (FDM), 79104 Freiburg (Germany); Roth, M. [Kiepenheuer-Institut fuer Sonnenphysik (KIS), 79104 Freiburg (Germany)

2011-06-20T23:59:59.000Z

199

Comparing, optimizing, and benchmarking quantum-control algorithms in a unifying programming framework  

SciTech Connect

For paving the way to novel applications in quantum simulation, computation, and technology, increasingly large quantum systems have to be steered with high precision. It is a typical task amenable to numerical optimal control to turn the time course of pulses, i.e., piecewise constant control amplitudes, iteratively into an optimized shape. Here, we present a comparative study of optimal-control algorithms for a wide range of finite-dimensional applications. We focus on the most commonly used algorithms: GRAPE methods which update all controls concurrently, and Krotov-type methods which do so sequentially. Guidelines for their use are given and open research questions are pointed out. Moreover, we introduce a unifying algorithmic framework, DYNAMO (dynamic optimization platform), designed to provide the quantum-technology community with a convenient matlab-based tool set for optimal control. In addition, it gives researchers in optimal-control techniques a framework for benchmarking and comparing newly proposed algorithms with the state of the art. It allows a mix-and-match approach with various types of gradients, update and step-size methods as well as subspace choices. Open-source code including examples is made available at http://qlib.info.

Machnes, S. [Quantum Group, Department of Physics, Tel-Aviv University, Tel Aviv 69978 (Israel); Institute for Theoretical Physics, University of Ulm, D-89069 Ulm (Germany); Sander, U.; Glaser, S. J.; Schulte-Herbrueggen, T. [Department of Chemistry, Technical University of Munich (TUM), D-85747 Garching (Germany); Fouquieres, P. de; Gruslys, A.; Schirmer, S. [Department of Applied Mathematics and Theoretical Physics, University of Cambridge, CB3 0WA (United Kingdom)

2011-08-15T23:59:59.000Z

200

Towards a Unified Approach to Information Integration - A review paper on data/information fusion  

SciTech Connect

Information or data fusion of data from different sources are ubiquitous in many applications, from epidemiology, medical, biological, political, and intelligence to military applications. Data fusion involves integration of spectral, imaging, text, and many other sensor data. For example, in epidemiology, information is often obtained based on many studies conducted by different researchers at different regions with different protocols. In the medical field, the diagnosis of a disease is often based on imaging (MRI, X-Ray, CT), clinical examination, and lab results. In the biological field, information is obtained based on studies conducted on many different species. In military field, information is obtained based on data from radar sensors, text messages, chemical biological sensor, acoustic sensor, optical warning and many other sources. Many methodologies are used in the data integration process, from classical, Bayesian, to evidence based expert systems. The implementation of the data integration ranges from pure software design to a mixture of software and hardware. In this review we summarize the methodologies and implementations of data fusion process, and illustrate in more detail the methodologies involved in three examples. We propose a unified multi-stage and multi-path mapping approach to the data fusion process, and point out future prospects and challenges.

Whitney, Paul D.; Posse, Christian; Lei, Xingye C.

2005-10-14T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

A unified fuzzy model-based framework for modeling and control of complex systems: from flying vehicle control to brain-machine cooperative control  

Science Conference Proceedings (OSTI)

The invited lecture in 2012 IEEE World Congress on Computational Intelligence (WCCI 2012) presents an overview of a unified fuzzy model-based framework for modeling and control of complex systems. A number of practical applications, ranging from flying ...

Kazuo Tanaka

2012-06-01T23:59:59.000Z

202

Impact of Data Assimilation on Forecasting Convection over the United Kingdom Using a High-Resolution Version of the Met Office Unified Model  

Science Conference Proceedings (OSTI)

A high-resolution data assimilation system has been implemented and tested within a 4-km grid length version of the Met Office Unified Model (UM). A variational analysis scheme is used to correct larger scales using conventional observation ...

Mark Dixon; Zhihong Li; Humphrey Lean; Nigel Roberts; Sue Ballard

2009-05-01T23:59:59.000Z

203

Validation of the Surface Energy Balance over the Antarctic Ice Sheets in the U.K. Meteorological Office Unified Climate Model  

Science Conference Proceedings (OSTI)

Surface radiation measurements and other climatological data were used to validate the representation of the surface energy balance over the East Antarctic Ice Sheet in the U.K. Meteorological Office Unified Climate Model. Model calculations of ...

J. C. King; W. M. Connolley

1997-06-01T23:59:59.000Z

204

Testing the FR I/BL Lac unifying model with HST observations  

E-Print Network (OSTI)

Hubble Space Telescope (HST) observations provide a novel way of testing unified models for FR I radio sources and BL Lac objects. The detection of extended dust discs in some radio galaxies provides information on their jet orientation. Given this, the strength of the compact nuclear sources of FR I and BL Lacs can be compared with model predictions. As a pilot project, we selected five radio galaxies which show extended nuclear discs in the HST images. The relative orientation of the projected radio-jets and of the extended nuclear discs indicates that they are not perpendicular, as the simplest geometrical model would suggest, but that they form an angle of ~ 20 - 40 degrees with the symmetry axis of the disc: a significant change of orientation occurs between the innermost AGN structure and the kpc-scale. Nevertheless, the discs appear to be useful indicators of the radio sources orientation since the angles formed by the disc axis and the jet with the line of sight differ by only ~ 10 - 20 degrees. At the center of each disc an unresolved nuclear source is present. We compared its luminosity with the optical core luminosity of BL Lacs selected for having similar host galaxy magnitude and extended radio luminosity. The BL Lac cores are between 2 E2 and 3 E5 times brighter than the corresponding radio galaxies ones. The FR I/BL Lac core luminosity ratio shows a suggestive correlation with the orientation of the radio galaxies with respect to the line of sight. The behavior of this ratio is quantitatively consistent with a scenario in which the emission in the FR I and BL Lac is dominated by the beamed radiation from a relativistic jet with Doppler factor ~ 5 - 10, thus supporting the basic features of the proposed unification schemes.

Alessandro Capetti; Annalisa Celotti

1998-11-25T23:59:59.000Z

205

A Modified Generalized Chaplygin Gas as the Unified Dark Matter-Dark Energy Revisited  

E-Print Network (OSTI)

A modified generalized Chaplygin gas (MGCG) is considered as the unified dark matter-dark energy revisited. The character of MGCG is endued with the dual role, which behaves as matter at early times and as an quiessence dark energy at late times. The equation of state for MGCG is $p=-\\alpha\\rho/(1+\\alpha)-\\vartheta(z)\\rho^{-\\alpha}/(1+\\alpha) $, where $\\vartheta(z)=-[\\rho_{0c}(1+z)^{3}]^{(1+\\alpha)}(1-\\Omega_{0B})^{\\alpha}\\{\\alpha\\Omega_{0DM}+ \\Omega_{0DE}[\\omega_{DE}+\\alpha(1+\\omega_{DE})](1+z)^{3\\omega_{DE}(1+\\alpha)}\\}$. Some cosmological quantities, such as the densities of different components of the universe $\\Omega_{i}$ ($i$ respectively denotes baryons, dark matter and dark energy) and the deceleration parameter $q$, are obtained. The present deceleration parameter $q_{0}$, the transition redshift $z_{T}$ and the redshift $z_{eq}$, which describes the epoch when the densities in dark matter and dark energy are equal, are also calculated. To distinguish MGCG from others, we then apply the Statefinder diagnostic. Later on, the parameters ($\\alpha$ and $\\omega_{DE}$) of MGCG are constrained by combination of the sound speed $c^{2}_{s}$, the age of the universe $t_{0}$, the growth factor $m$ and the bias parameter $b$. It yields $\\alpha=-3.07^{+5.66}_{-4.98}\\times10^{-2}$ and $\\omega_{DE}=-1.05^{+0.06}_{-0.11}$. Through the analysis of the growth of density perturbations for MGCG, it is found that the energy will transfer from dark matter to dark energy which reach equal at $z_{eq}\\sim 0.48$ and the density fluctuations start deviating from the linear behavior at $z\\sim 0.25$ caused by the dominance of dark energy.

Xue-Mei Deng

2011-10-10T23:59:59.000Z

206

The HARNESS Workbench: Unified and Adaptive Access to Diverse HPC Platforms  

Science Conference Proceedings (OSTI)

The primary goal of the Harness WorkBench (HWB) project is to investigate innovative software environments that will help enhance the overall productivity of applications science on diverse HPC platforms. Two complementary frameworks were designed: one, a virtualized command toolkit for application building, deployment, and execution, that provides a common view across diverse HPC systems, in particular the DOE leadership computing platforms (Cray, IBM, SGI, and clusters); and two, a unified runtime environment that consolidates access to runtime services via an adaptive framework for execution-time and post processing activities. A prototype of the first was developed based on the concept of a 'system-call virtual machine' (SCVM), to enhance portability of the HPC application deployment process across heterogeneous high-end machines. The SCVM approach to portable builds is based on the insertion of toolkit-interpretable directives into original application build scripts. Modifications resulting from these directives preserve the semantics of the original build instruction flow. The execution of the build script is controlled by our toolkit that intercepts build script commands in a manner transparent to the end-user. We have applied this approach to a scientific production code (Gamess-US) on the Cray-XT5 machine. The second facet, termed Unibus, aims to facilitate provisioning and aggregation of multifaceted resources from resource providers and end-users perspectives. To achieve that, Unibus proposes a Capability Model and mediators (resource drivers) to virtualize access to diverse resources, and soft and successive conditioning to enable automatic and user-transparent resource provisioning. A proof of concept implementation has demonstrated the viability of this approach on high end machines, grid systems and computing clouds.

Sunderam, Vaidy S.

2012-03-20T23:59:59.000Z

207

{lambda}{alpha}DM: Observational constraints on unified dark matter with constant speed of sound  

SciTech Connect

We consider the hypothesis that dark energy and dark matter are the two faces of a single dark component, a unified dark matter (UDM) that we assume can be modeled by the affine equation of state (EoS) P=p{sub 0}+{alpha}{rho}, resulting in an effective cosmological constant {rho}{sub {lambda}}=-p{sub 0}/(1+{alpha}). The affine EoS arises from the simple assumption that the speed of sound is constant; it may be seen as an approximation to an unknown barotropic EoS P=P({rho}), and may as well represent the tracking solution for the dynamics of a scalar field with appropriate potential. Furthermore, in principle the affine EoS allows the UDM to be phantom. We constrain the parameters of the model, {alpha} and {omega}{sub {lambda}}, using data from a suite of different cosmological observations, and perform a comparison with the standard {lambda}CDM model, containing both cold dark matter and a cosmological constant. First considering a flat cosmology, we find that the UDM model with affine EoS fits the joint observations very well, better than {lambda}CDM, with best-fit values {alpha}=0.01{+-}0.02 and {omega}{sub {lambda}}=0.70{+-}0.04 (95% confidence intervals). The standard model (best-fit {omega}{sub {lambda}}=0.71{+-}0.04), having one less parameter, is preferred by a Bayesian model comparison. However, the affine EoS is at least as good as the standard model if a flat curvature is not assumed as a prior for {lambda}CDM. For the latter, the best-fit values are {omega}{sub K}=-0.02{sub -0.02}{sup +0.01} and {omega}{sub {lambda}}=0.71{+-}0.04, i.e. a closed model is preferred. A phantom UDM with affine EoS is ruled out well beyond 3{sigma}.

Balbi, Amedeo [Dipartimento di Fisica, Universita di Roma 'Tor Vergata', via della Ricerca Scientifica 1, 00133 Rome (Italy); INFN Sezione di Roma 'Tor Vergata', via della Ricerca Scientifica 1, 00133 Rome (Italy); Bruni, Marco [Dipartimento di Fisica, Universita di Roma 'Tor Vergata', via della Ricerca Scientifica 1, 00133 Rome (Italy); INFN Sezione di Roma 'Tor Vergata', via della Ricerca Scientifica 1, 00133 Rome (Italy); Institute of Cosmology and Gravitation, University of Portsmouth, Mercantile House, Portsmouth PO1 2EG (United Kingdom); Quercellini, Claudia [Dipartimento di Fisica, Universita di Roma 'Tor Vergata', via della Ricerca Scientifica 1, 00133 Rome (Italy)

2007-11-15T23:59:59.000Z

208

Towards A Novel Unified Framework for Developing Formal, Network and Validated Agent-Based Simulation Models of Complex Adaptive Systems  

E-Print Network (OSTI)

Literature on the modeling and simulation of complex adaptive systems (cas) has primarily advanced vertically in different scientific domains with scientists developing a variety of domain-specific approaches and applications. However, while cas researchers are inherently interested in an interdisciplinary comparison of models, to the best of our knowledge, there is currently no single unified framework for facilitating the development, comparison, communication and validation of models across different scientific domains. In this thesis, we propose first steps towards such a unified framework using a combination of agent-based and complex network-based modeling approaches and guidelines formulated in the form of a set of four levels of usage, which allow multidisciplinary researchers to adopt a suitable framework level on the basis of available data types, their research study objectives and expected outcomes, thus allowing them to better plan and conduct their respective research case studies. Firstly, the complex network modeling level of the proposed framework entails the development of appropriate complex network models for the case where interaction data of cas components is available, with the aim of detecting emergent patterns in the cas under

Muaz Ahmed; Khan Niazi

2011-01-01T23:59:59.000Z

209

A Unified Monte Carlo Approach to Fast Neutron Cross Section Data Evaluation - NUCLEAR DATA AND MEASUREMENT SERIES  

NLE Websites -- All DOE Office Websites (Extended Search)

NUCLEAR DATA AND MEASUREMENT SERIES NUCLEAR DATA AND MEASUREMENT SERIES ANL/NDM-166 A Unified Monte Carlo Approach to Fast Neutron Cross Section Data Evaluation Donald L. Smith January 2008 NUCLEAR ENGINEERING DIVISION ARGONNE NATIONAL LABORATORY 9700 SOUTH CASS AVENUE ARGONNE, ILLINOIS 60439, U.S.A. 1 About Argonne National Laboratory Argonne is a U.S. Department of Energy laboratory managed by UChicago Argonne, LLC under contract DE-AC02-06CH11357. The Laboratory's main facility is in the suburbs of Chicago at 9700 South Cass Avenue, Argonne, Illinois 60439. For information about Argonne National Laboratory see http://www.anl.gov. Availability of this Report This report is available, at no cost, at http://www.osti.gov/bridge. It is also available on paper from the U.S. Department of Energy and its contractors, for a processing fee, from:

210

A unified view of coherent and incoherent dihydrogen exchange in transition metal hydrides by nuclear resonance and inelastic neutron scattering  

SciTech Connect

In this paper a unified view of coherent and incoherent dihydrogen exchange in transition metal hydrides by nuclear magnetic resonance (NMR) and inelastic neutron scattering (INS) is presented. It is shown that both exchange processes coexist i.e. do not transform into each other although they may dominate the spectra in different temperature ranges. This superposition is the consequence of the incorporation of the tunnel frequency J of the coherent process into the nuclear two-spin hamiltonian of hydrogen pairs which allows to treat the problem using the well known density matrix theory of NMR line-shapes developed by Alexander and Binsch. It is shown that this theory can also be used to predict the line-shapes of the rotational tunneling transitions observed in the INS spectra of transition metal dihydrogen complexes and that both NMR and INS spectra depend on similar parameters.

Limbach, H.H.; Ulrich, S.; Buntkowsky, G. [Freie Univ. Berlin (Germany). Inst. fuer Organische Chemie; Sabo-Etienne, S.; Chaudret, B. [Toulouse-3 Univ., 31 (France). Lab. de Chimie de Coordination du C.N.R.S.; Kubas, G.J.; Eckert, J. [Los Alamos National Lab., NM (United States)

1995-08-12T23:59:59.000Z

211

PSTAR: Primary and secondary terms analysis and renormalization: A unified approach to building energy simulations and short-term monitoring  

DOE Green Energy (OSTI)

This report presents a unified method of hourly simulation of a building and analysis of performance data. The method is called Primary and Secondary Terms Analysis and Renormalization (PSTAR). In the PSTAR method, renormalized parameters are introduced for the primary terms such that the renormalized energy balance equation is best satisfied in the least squares sense, hence, the name PSTAR. PSTAR allows extraction of building characteristics from short-term tests on a small number of data channels. These can be used for long-term performance prediction (''ratings''), diagnostics, and control of heating, ventilating, and air conditioning systems (HVAC), comparison of design versus actual performance, etc. By combining realistic building models, simple test procedures, and analysis involving linear equations, PSTAR provides a powerful tool for analyzing building energy as well as testing and monitoring. It forms the basis for the Short-Term Energy Monitoring (STEM) project at SERI.

Subbarao, K.

1988-09-01T23:59:59.000Z

212

u-DRM: A Unified Framework of Digital Rights Management based on RFID and Application of Its Usage Data Summary  

E-Print Network (OSTI)

In the Internet, the digital format of most contents has led to its increased piracy because of the ease of copying and sharing the digital contents. Moreover, the advent of new technologies such as ubiquitous computing seems to cause problems of piracy even more than before. Likewise its going to be a more critical issue to control and manage rights of digital contents in the future. Therefore, in this paper, we propose a framework of u-DRM: a unified framework of DRM based on RIFD with watermarking and fingerprinting. The framework consists of two methods using digital mediums and digital contents. And we suggest ways for the application of usage data collected from the proposed framework of u-DRM. Key words:

Jong Hwan Suh; Sang Chan Park

2006-01-01T23:59:59.000Z

213

A unified analysis of the reactor neutrino program towards the measurement of the theta_13 mixing angle  

E-Print Network (OSTI)

We present in this article a detailed quantitative discussion of the measurement of the leptonic mixing angle theta_13 through currently scheduled reactor neutrino oscillation experiments. We thus focus on Double Chooz (Phase I & II), Daya Bay (Phase I & II) and RENO experiments. We perform a unified analysis, including systematics, backgrounds and accurate experimental setup in each case. Each identified systematic error and background impact has been assessed on experimental setups following published data when available and extrapolating from Double Chooz acquired knowledge otherwise. After reviewing the experiments, we present a new analysis of their sensitivities to sin^2(2 theta_13) and study the impact of the different systematics based on the pulls approach. Through this generic statistical analysis we discuss the advantages and drawbacks of each experimental setup.

Guillaume Mention; Thierry Lasserre; Dario Motta

2007-04-04T23:59:59.000Z

214

A Parallel Implementation of a Smoothed Particle Hydrodynamics Method on Graphics Hardware Using the Compute Unified Device Architecture  

Science Conference Proceedings (OSTI)

The smoothed particle hydrodynamics (SPH), which is a class of meshfree particle methods (MPMs), has a wide range of applications from micro-scale to macro-scale as well as from discrete systems to continuum systems. Graphics hardware, originally designed for computer graphics, now provide unprecedented computational power for scientific computation. Particle system needs a huge amount of computations in physical simulation. In this paper, an efficient parallel implementation of a SPH method on graphics hardware using the Compute Unified Device Architecture is developed for fluid simulation. Comparing to the corresponding CPU implementation, our experimental results show that the new approach allows significant speedups of fluid simulation through handling huge amount of computations in parallel on graphics hardware.

Wong Unhong; Wong Honcheng; Tang Zesheng [NAOC-MUST Collaborative Research Laboratory for Lunar and Planetary Exploration, Faculty of Information Technology, Macau University of Science and Technology, Macao (China)

2010-05-21T23:59:59.000Z

215

An interdisciplinary approach to certain fundamental issues in the fields of physics and biology: towards a Unified Theory  

E-Print Network (OSTI)

Recent experiments appear to have revealed the possibility of quantum entanglement between spatially separated human subjects. In addition, a similar condition might exist between basins containing human neurons adhering to printed circuit boards. In both instances, preliminary data indicates what appear to be non-local correlations between brain electrical activities in the case of the human subjects, and also non-local correlations between neuronal basin electrical activities, implying entanglement at the macroscopic level. If the ongoing extended research and the analysis of same continues to support this hypothesis, it may then make it possible to simultaneously address some of the fundamental problems facing us in both physics and biology through the adoption of an interdisciplinary empirical approach based on Bell's experimental philosophy, with the goal of unifying these two fields.

Fred H. Thaheld

2006-01-10T23:59:59.000Z

216

Unified formulation of single and multi-moment normalizations of the raindrop size distribution based on the gamma probability density function  

Science Conference Proceedings (OSTI)

This study offers a unified formulation of single and multi-moment normalizations of the raindrop size distribution (DSD), which have been proposed in the framework of scaling analyses in the literature. The key point is to consider a well-defined ...

Nan Yu; Guy Delrieu; Brice Boudevillain; Pieter Hazenberg; Remko Uijlenhoet

217

Unified $(p,q; ?,?, l)$-deformation of oscillator algebra and two-dimensional conformal field theory  

E-Print Network (OSTI)

The unified $ (p,q; \\alpha,\\gamma, l)$-deformation of a number of well-known deformed oscillator algebras is introduced.The deformation is constructed by imputing new free parameters into the structure functions and by generalizing the defining relations of these algebras. The generalized Jordan-Schwinger and Holstein-Primakoff realizations of the $U_{pq}^{\\alpha \\gamma l}(su(2))$ algebra by the generalized $ (p,q; \\alpha,\\gamma, l)$-deformed operators are found. The generalized $ (p,q; \\alpha,\\gamma, l)$-deformation of the two-dimensional conformal field theory is established. By introducing the $ (p,q; \\alpha,\\gamma, l)$-operator product expansion (OPE) between the energy momentum tensor and primary fields, we obtain the $ (p,q; \\alpha,\\gamma, l)$-deformed centerless Virasoro algebra. The two-point correlation function of the primary generalized $ (p,q; \\alpha,\\gamma, l)$-deformed fields is calculated.

I. M. Burban

2013-09-13T23:59:59.000Z

218

Solar heating and hot water system installed at Southeast of Saline, Unified School District 306, Mentor, Kansas  

DOE Green Energy (OSTI)

A cooperative agreement was negotiated in April 1978 for the installation of a space and domestic hot water system at Southeast of Saline, Kansas Unified School District 306, Mentor, Kansas. The solar system was installed in a new building and was designed to provide 52 percent of the estimated annual space heating load and 84 percent of the estimated annual potable hot water requirement. The collectors are liquid flat plate. They are ground-mounted and cover a total area of 5125 square feet. The system will provide supplemental heat for the school's closed-loop water-to-air heat pump system and domestic hot water. The storage medium is water inside steel tanks with a capacity of 11,828 gallons for space heating and 1,600 gallons for domestic hot water. This final report, which describes in considerable detail the solar heating facility, contains detailed drawings of the completed system. The facility was declared operational in September 1978, and has functioned successfully since.

Not Available

1979-07-01T23:59:59.000Z

219

A UNIFIED MICROSCOPIC-MACROSCOPIC MONTE CARLO SIMULATION OF GAS-GRAIN CHEMISTRY IN COLD DENSE INTERSTELLAR CLOUDS  

SciTech Connect

For the first time, we report a unified microscopic-macroscopic Monte Carlo simulation of gas-grain chemistry in cold interstellar clouds in which both the gas-phase and the grain-surface chemistry are simulated by a stochastic technique. The surface chemistry is simulated with a microscopic Monte Carlo method in which the chemistry occurs on an initially flat surface. The surface chemical network consists of 29 reactions initiated by the accreting species H, O, C, and CO. Four different models are run with diverse but homogeneous physical conditions including temperature, gas density, and diffusion-barrier-to-desorption energy ratio. As time increases, icy interstellar mantles begin to grow. Our approach allows us to determine the morphology of the ice, layer by layer, as a function of time, and to ascertain the environment or environments for individual molecules. Our calculated abundances can be compared with observations of ices and gas-phase species, as well as the results of other models.

Chang Qiang [Department of Chemistry, University of Virginia, Charlottesville, VA 22904 (United States); Herbst, Eric [Also at Departments of Astronomy and Physics, University of Virginia, Charlottesville, VA 22904, USA. (United States)

2012-11-10T23:59:59.000Z

220

Social influence on the use of Clinical Decision Support Systems: Revisiting the Unified Theory of Acceptance and Use of Technology by the fuzzy DEMATEL technique  

Science Conference Proceedings (OSTI)

The aim of study is to examine whether social influence affects medical professionals' behavioral intention to use while introducing a new Clinical Decision Support System (CDSS). The series of Technology Acceptance Models (TAMs) have been widely applied ... Keywords: Clinical Decision Support System (CDSS), Fuzzy Decision-Making Trial and Evaluation Laboratory (fuzzy DEMATEL), Social influence, Technology Acceptance Model (TAM), Unified Theory of Acceptance and Use of Technology (UTAUT)

Don Jyh-Fu Jeng; Gwo-Hshiung Tzeng

2012-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

May 20, 2013 May 20, 2013 V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users A vulnerability was reported in RSA SecurID Products. May 15, 2013 V-156: Linux Kernel Array Bounds Checking Flaw Lets Local Users Gain Elevated Privileges A vulnerability was reported in the Linux Kernel. May 10, 2013 V-153: Symantec Brightmail Gateway Input Validation Flaw Permits Cross-Site Scripting Attacks Symantec's Brightmail Gateway management console is susceptible to stored cross-site scripting (XSS) issues found in some of the administrative interface pages. May 9, 2013 V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities Various components of Cisco Unified CVP are affected. These vulnerabilities can be exploited independently; however, more than one vulnerability could

222

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

27, 2011 27, 2011 T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions A remote user with the ability to conduct a man-in-the-middle attack can decrypt SSL/TLS sessions. September 26, 2011 T-726:Linux-2.6 privilege escalation/denial of service/information leak Vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. September 23, 2011 T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers. September 22, 2011 T-724: Microsoft Security Advisory: Fraudulent digital certificates could

223

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

71 - 4080 of 28,905 results. 71 - 4080 of 28,905 results. Download DOE/EIS-0236, Oakland Operations Office, National Ignition Facility Final Supplemental Environmental Impact Statement to the Stockpile Stewardship and Management Programmatic Environmental Impact Statement Volume II: Response to Public Comments (January 2 DOE issued the Draft SEIS for public review and comment by mailings to stakeholders and by announcements in the Federal Register (FR) on November 5, 1999, (64 FR 60430) (Attachment 4 of Volume I)... http://energy.gov/nepa/downloads/doeeis-0236-oakland-operations-office-national-ignition-facility-final-supplemental-0 Article V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilities Various components of Cisco Unified CVP are affected. These vulnerabilities

224

History of Unified Theories  

NLE Websites -- All DOE Office Websites (Extended Search)

Jahrelang haben Physiker nach vereinheitlichten Theorien gesucht - und Jahrelang haben Physiker nach vereinheitlichten Theorien gesucht - und diese auch gefunden. 1861-1865 James Maxwell, beschreibt in einem Artikel die Zusammenhänge zwischen elektrischen und magnetischen Feldern und vereinigt diese zur Theorie des Elektromagnetismus. Das führte zu den heute berühmten Maxwell'schen Gleichungen. 1881-1884 Heinrich Hertz demonstriert im Experiment die Existenz von Radiowellen und zeigt, dass Radiowellen und Licht elektromagnetische Wellen unterschiedlicher Frequenz darstellen - ein Faktum, das bereits von Maxwell in seiner Theorie vorhergesagt wurde. 1967-1970 Glashow, Salam und Weinberg schlagen eine Theorie vor, welche die elektromagnetische Wechselwirkung mit der schwachen WW vereinigt. Sie sagen die Masse des W Bosons, welches schwache Wechselwirkung - z.B.

225

Grand Unified Theory  

NLE Websites -- All DOE Office Websites (Extended Search)

de la Gran Unificación de la Gran Unificación Volver Principal ESTOY PERDIDO!!! La teoría que (¡esperamos!) unificará las interacciones fuerte, débil, y electromagnética, es la llamada "Teoría de Gran Unificación (TGU)." Los físicos pueden escribir acerca de estas teorías hoy en día, pero se necesitan aún más datos para decir cuál de las muchas versiones describe la naturaleza, si es que alguna lo hace. Suponiendo que sea posible una Gran Unificación de todas las interacciones, entonces todas las interacciones que observamos no son más que diferentes aspectos de la misma teoría unificada. Sin embargo, ¿cómo puede éste ser el caso, cuando las interacciones fuerte, débil y electromagnética son tan diferentes en intensidad y efecto? Aunque parezca

226

UPC (Unified Parallel C)  

NLE Websites -- All DOE Office Websites (Extended Search)

and an extension of the C programming language. Availability UPC is available on Edison and Hopper via the Cray compilers. Using UPC To compile a UPC source file you must...

227

Grand Unified Theories  

NLE Websites -- All DOE Office Websites (Extended Search)

and the four mixing angles in the CKM matrix. The remaining 3 parameters are v, the Higgs VEV (vacuum expectation value) and quartic coupling (or equivalently, M Z , m 0 h ),...

228

Unified Residual Evaluation  

NLE Websites -- All DOE Office Websites (Extended Search)

Missing even one of the three could immediately decrease the speed of the code by an order of magnitude. How can application developers without computer science expertise...

229

DADS Unified Index  

Science Conference Proceedings (OSTI)

... last two would occur close to each ... Caverphone; CBT; CCS; cell probe model; cell ... transitive closure; transitive reduction; transpose sequential search; ...

2013-06-26T23:59:59.000Z

230

Computationally unifying urban masterplanning  

Science Conference Proceedings (OSTI)

Architectural design, particularly in large scale masterplanning projects, has yet to fully undergo the computational revolution experienced by other design-led industries such as automotive and aerospace. These industries use computational frameworks ... Keywords: architectural analysis, architectural design, engineering analysis, unification, urban masterplanning

David Birch; Paul H. J. Kelly; Anthony J. Field; Alvise Simondetti

2013-05-01T23:59:59.000Z

231

Research and development of a unified approach to operations scheduling for electric power under uncertainty. Technical progress report, June 1979-June 1980  

DOE Green Energy (OSTI)

The objective of this study was to develop a unified approach for operations schedulng in electric power systems that explicitly takes into account sources of uncertainty present at all levels in this problem. This objective requires formulating the operations scheduling problem as a single, integrated problem, and developing solution methodologies that start from this integrated formulation and progress to subproblem solution methods that are consistent with it. Progress for the first year of the project is reported. Information is included on: problem definition; time-scale decomposition; stochastic optimization of both parallel and series reservoir systems; stochastic production simulation; maintenance scheduling and nuclear refueling; and short-term resource scheduling. (LCL)

Larson, R.E.

1980-06-01T23:59:59.000Z

232

CISCO / BELMONT / ONLINE / BERKELEY / SAN FRANCISCO BELMONT / ONLINE / BERKELEY / SAN FRANCISCO / BELM  

E-Print Network (OSTI)

of Nuclear safeguards, biomass and combustion systems, Stirling engines, thermoelectric materials, smartgrids

Doudna, Jennifer A.

233

Cisco Catalyst 6503-E, Catalyst C6504-E, Catalyst 6506-E ...  

Science Conference Proceedings (OSTI)

... User Role Network Functions DRBG entropy input, DRBG ... passing any data during a power-on self ... installation hardware in case of loss or damage. ...

2013-09-04T23:59:59.000Z

234

Deploying QoS for Cisco IP and Next Generation Networks: The Definitive Guide  

Science Conference Proceedings (OSTI)

Deploying QoS for IP Next Generation Networks: The Definitive Guide provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference ... Keywords: Networking

Vinod Joseph; Brett Chapman

2009-04-01T23:59:59.000Z

235

CISCO / BELMONT / ONLINE / BERKELEY / SAN FRANCISCO BELMONT / ONLINE / BERKELEY / SAN FRANCISCO / BELMO  

E-Print Network (OSTI)

;References 1. U. S. DoE--Smart Grid. http://www.oe.energy.gov/smartgrid.htm. 2. G. Agha, J. Meseguer, and K

Walker, Matthew P.

236

Cisco Catalyst 4503-E, Catalyst 4506-E, Catalyst 4507R-E ...  

Science Conference Proceedings (OSTI)

... The following figures illustrate the installation of the opacity shields for each platform. Figure 5: Catalyst 4503-E Opacity Shield Installation Page 23. ...

2013-07-18T23:59:59.000Z

237

PSTAR: Primary and secondary terms analysis and renormalization: A unified approach to building energy simulations and short-term monitoring: A summary  

DOE Green Energy (OSTI)

This report summarizes a longer report entitled PSTAR - Primary and Secondary Terms Analysis and Renormalization. A Unified Approach to Building Energy Simulations and Short-Term Monitoring. These reports highlight short-term testing for predicting long-term performance of residential buildings. In the PSTAR method, renormalized parameters are introduced for the primary terms such that the renormalized energy balance equation is best satisfied in the least squares sense; hence, the name PSTAR. Testing and monitoring the energy performance of buildings has several important applications, among them: extrapolation to long-term performance, refinement of design tools through feedback from comparing design versus actual parameters, building-as-a-calorimeter for heating, ventilating, and air conditioning (HVAC) diagnostics, and predictive load control. By combining realistic building models, simple test procedures, and analysis involving linear equations, PSTAR provides a powerful tool for analyzing building energy as well as testing and monitoring. It forms the basis for the Short-Term Energy Monitoring (STEM) project at SERI. 3 figs., 1 tab.

Subbarao, K.

1988-09-01T23:59:59.000Z

238

Bond orientational ordering in liquids: Towards a unified description of water-like anomalies, liquid-liquid transition, glass transition, and crystallization  

E-Print Network (OSTI)

There are at least three fundamental states of matter, depending upon temperature and pressure: gas, liquid, and solid (crystal). These states are separated by first-order phase transitions between them. In both gas and liquid phases the complete translational and rotational symmetry exist, whereas in a solid phase both symmetries are broken. In intermediate phases between liquid and solid, which include liquid crystal and plastic crystal phases, only one of the two symmetries is preserved. Among the fundamental states of matter, the liquid state is most poorly understood. We argue that it is crucial for a better understanding of liquid to recognize that a liquid generally has a tendency to have local structural order and its presence is intrinsic and universal to any liquid. Such structural ordering is a consequence of many body correlations, more specifically, bond angle correlations, which we believe are crucial for the description of the liquid state. We show that this physical picture may naturally explain difficult unsolved problems associated with the liquid state, such as anomalies of water-type liquids (water, Si, Ge, ...), liquid-liquid transition, liquid-glass transition, crystallization and quasicrystal formation, in a unified manner. In other words, we need a new order parameter representing low local free-energy configuration, which is bond orientational order parameter in many cases, in addition to density order parameter for the physical description of these phenomena. Here we review our two-order-parameter model of liquid and consider how transient local structural ordering is linked to all of the above-mentioned phenomena. The relationship between these phenomena are also discussed.

Hajime Tanaka

2013-07-02T23:59:59.000Z

239

Unified Fire Recovery Command Center  

E-Print Network (OSTI)

_____________________ Electric Company _____________________ Telephone Company _____________________ Red Cross Sheriff _____________________ Fire Department _____________________ Colorado State Forest Service _____________________ Colorado Division of Wildlife _____________________ USDA Forest Service _____________________ Natural

240

Unified Theory of All Interactions  

NLE Websites -- All DOE Office Websites (Extended Search)

Unificada de Todas las Interacciones Avanzar Volver Principal ESTOY PERDIDO En los ltimos aos de su vida Einstein trat de escribir una teora que unificara la gravedad...

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Unified Reporting Instructions for NMMSS  

National Nuclear Security Administration (NNSA)

Meeting New Orleans, Louisiana-May 24-26, 2005 Sponsored by the U.S. Department of Energy & the U.S. Nuclear Regulatory Commission NMMS S NMMSS Task Team Established * Task...

242

Unified analysis of streaming news  

Science Conference Proceedings (OSTI)

News clustering, categorization and analysis are key components of any news portal. They require algorithms capable of dealing with dynamic data to cluster, interpret and to temporally aggregate news articles. These three tasks are often solved separately. ... Keywords: dirichlet processes, online inference, topic models

Amr Ahmed; Qirong Ho; Jacob Eisenstein; Eric Xing; Alexander J. Smola; Choon Hui Teo

2011-03-01T23:59:59.000Z

243

Vehicle Technologies Office: Workplace Charging Challenge Partner...  

NLE Websites -- All DOE Office Websites (Extended Search)

Technologies Office: Workplace Charging Challenge Partner: Cisco Systems, Inc. on Facebook Tweet about Vehicle Technologies Office: Workplace Charging Challenge Partner: Cisco...

244

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 27, 2011 January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. January 27, 2011 T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker

245

A unifying perspective on knowledge updates  

Science Conference Proceedings (OSTI)

We introduce an abstract update framework based on viewing a knowledge base as the set of sets of models of its elements and performing updates by introducing additional interpretations --- exceptions --- to the sets of models of elements ...

Martin Slota; Joo Leite

2012-09-01T23:59:59.000Z

246

A unified approach for mining outliers  

Science Conference Proceedings (OSTI)

This paper deals with finding outliers (exceptions) in large datasets. The identification of outliers can often lead to the discovery of truly unexpected knowledge in areas such as electronic commerce, credit card fraud, and even the analysis of performance ...

Edwin M. Knorr; Raymond T. Ng

1997-11-01T23:59:59.000Z

247

Roles and relationships for unified activity management  

Science Conference Proceedings (OSTI)

This paper reports on three ethnographic studies of how people coordinate their activities in various work settings. The findings reported here are a derived set of relationships reflecting the nature of involvement of people in their activities. These ... Keywords: activity management, design, ethnographic study, prototyping, task management, to-do lists, user evaluation

Beverly L. Harrison; Alex Cozzi; Thomas P. Moran

2005-11-01T23:59:59.000Z

248

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.

Matthias Christandl; Artur Ekert; Michal Horodecki; Pawel Horodecki; Jonathan Oppenheim; Renato Renner

2006-08-25T23:59:59.000Z

249

Nuclear Reactions and Stellar Evolution: Unified Dynamics  

SciTech Connect

Motivated by the success of kinetic theory in the description of observables in intermediate and high energy heavy ion collisions, we use kinetic theory to model the dynamics of collapsing iron cores in type II supernova explosions. The algorithms employed to model the collapse, some preliminary results and predictions, and the future of the code are discussed.

Bauer, W.; Strother, T. [Department of Physics and Astronomy, Michigan State University, and National Superconducting Cyclotron Laboratory East Lansing MI 48824 (United States)

2007-10-26T23:59:59.000Z

250

Unifying Condition Numbers for Linear Programming  

E-Print Network (OSTI)

To define conditioning from ill-posedness one needs a norm in the space of data. Let denote such a norm and ? denote the distance to ill-posedness induced by.

251

Application of SCAP to Secure Unified Communications  

Science Conference Proceedings (OSTI)

... Workshop held @ NIST as part of the 4th Information Security Automation Conference, ... Devices UC Network ... To be placed on the distribution list for ...

2012-10-26T23:59:59.000Z

252

LOGJAM: a scalable unified log file archiver  

Science Conference Proceedings (OSTI)

Log files are a necessary record of events on any system. However, as systems scale, so does the volume of data captured. To complicate matters, this data can be distributed across all nodes within the system. This creates challenges in ways to obtain ... Keywords: archiving, log files, system management

Nicholas P. Cardo

2011-11-01T23:59:59.000Z

253

Unified framework for finite element assembly  

Science Conference Proceedings (OSTI)

At the heart of any finite element simulation is the assembly of matrices and vectors from discrete variational forms. We propose a general interface between problem-specific and general-purpose components of finite element programs. This interface ...

M. S. Alnaes; A. Logg; K-A. Mardal; O. Skavhaug; H. P. Langtangen

2009-11-01T23:59:59.000Z

254

Unifying tense, aspect and modality across languages  

Science Conference Proceedings (OSTI)

This paper computes the semantic representation of while as the pragmatically most relevant one which speakers select from a variety of grammatical constructions in which while may occur in current English. The semantic representation of ...

Cornelia Zelinsky-Wibbelt

2001-07-01T23:59:59.000Z

255

Image Parsing: Unifying Segmentation, Detection, and Recognition  

E-Print Network (OSTI)

boundary is modeled by a B-spline using twenty ?ve controlthe positions of the B-spline control points. For a digit/M s S i (U and M s are the B-Spline matrices). We de?ne a

Tu, Zhuowen; Chen, Xiangrong; Yuille, Alan; Zhu, Song Chun

2005-01-01T23:59:59.000Z

256

Image Parsing: Unifying Segmentation, Detection, and Recognition  

E-Print Network (OSTI)

boundary is modeled by a B-spline using twenty five controlthe positions of the B-spline control points. For a digit/U x M x Si (U and M are the B-Spline matrices). We define a

Zhuowen Tu; Xiangrong Chen; Alan L. Yuille; Song-Chun Zhu

2011-01-01T23:59:59.000Z

257

Image Parsing: Unifying Segmentation, Detection, and Recognition  

E-Print Network (OSTI)

boundary is modeled by a B-spline using twenty ?ve controlthe positions of the B-spline control points. For a digit/M s S i (U and M s are the B-Spline matrices). We de?ne a

Zhuowen Tu; Xiangrong Chen; Alan Yuille; Song Chun Zhu

2011-01-01T23:59:59.000Z

258

Image Parsing: Unifying Segmentation, Detection, and Recognition  

E-Print Network (OSTI)

boundary is modeled by a B-spline using twenty ?ve controlthe positions of the B-spline control points. For a digit/M s S i (U and M s are the B-Spline matrices). We de?ne a

Tu, Zhuowen; Chen, Xiangrong; Yuille, Alan; Zhu, Song Chun

2006-01-01T23:59:59.000Z

259

Unifying biological image formats with HDF5  

Science Conference Proceedings (OSTI)

The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?

Matthew T. Dougherty; Michael J. Folk; Erez Zadok; Herbert J. Bernstein; Frances C. Bernstein; Kevin W. Eliceiri; Werner Benger; Christoph Best

2009-10-01T23:59:59.000Z

260

Application of SCAP to Secure Unified Communications  

Science Conference Proceedings (OSTI)

... Vendors Enterprise/ Business www.isalliance.org ... Currently Available Solution Adequate Service Continuity (Switched Network Equivalent) ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Walnut: a unified cloud object store  

Science Conference Proceedings (OSTI)

Walnut is an object-store being developed at Yahoo! with the goal of serving as a common low-level storage layer for a variety of cloud data management systems including Hadoop (a MapReduce system), MObStor (a multimedia serving system), and PNUTS (an ... Keywords: cloud storage, hybrid object store, paxos-based replication

Jianjun Chen; Chris Douglas; Michi Mutsuzaki; Patrick Quaid; Raghu Ramakrishnan; Sriram Rao; Russell Sears

2012-05-01T23:59:59.000Z

262

Toward a Unified Theory of Project Governance  

Science Conference Proceedings (OSTI)

... outdoor temperatures and humidity, uses sophisticated software and firmware to activate the chiller, boilers, fans, window actuators, etc. Page 7. ...

2012-09-25T23:59:59.000Z

263

Threads and or-parallelism unified  

Science Conference Proceedings (OSTI)

One of the main advantages of Logic Programming (LP) is that it provides an excellent framework for the parallel execution of programs. In this work we investigate novel techniques to efficiently exploit parallelism from real-world applications in low ... Keywords: implementation, multi-threading, or-parallelism

Vtor Santos costa; Ins Dutra; Ricardo Rocha

2010-07-01T23:59:59.000Z

264

Globally Unified Monsoon Onset and Retreat Indexes  

Science Conference Proceedings (OSTI)

Different criteria have been used in the past to define the monsoon onset and retreat over different monsoon regions and even over different parts of the same monsoon region. Here an objective criterion is proposed to define, for the first time, ...

Xubin Zeng; Er Lu

2004-06-01T23:59:59.000Z

265

Unifying classical and quantum key distillation  

E-Print Network (OSTI)

Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state ?ABE. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate, i.e., the number of key bits that can be extracted per copy of ?ABE. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eves side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eves memory are important in order to determine the correct security threshold in QKD. 1

Matthias Christ; Renato Renner

2008-01-01T23:59:59.000Z

266

A Unified Theory of Quasibound States  

E-Print Network (OSTI)

We have developed a formalism that includes both quasibound states with real energies and quantum resonances within the same theoretical framework, and that admits a clean and unambiguous distinction between these states and the states of the embedding continuum. States described broadly as 'quasibound' are defined as having a connectedness (in the mathematical sense) to true bound states through the growth of some parameter. The approach taken here builds on our earlier work by clarifying several crucial points and extending the formalism to encompass a variety of continuous spectra, including those with degenerate energy levels. The result is a comprehensive framework for the study of quasibound states. The theory is illustrated by examining several cases pertinent to applications widely discussed in the literature.

Curt A. Moyer

2013-06-27T23:59:59.000Z

267

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2011 5, 2011 T-616: PHP Stream Component Remote Denial of Service Vulnerability PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable. May 4, 2011 T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect. May 3, 2011 T-614: Cisco Unified Communications Manager Database Security Vulnerability The vulnerability is due to unspecified errors in the affected software that may allow the attacker to perform SQL injections. An authenticated,

268

Cloud Computing  

Science Conference Proceedings (OSTI)

... GE, Merrill Lynch, Cisco, Japan Post Office, Citibank, Sprint, Symantec, CIT, Chevron, Dell, Canon, NTT, Allianz, Wells Fargo. ...

2008-12-17T23:59:59.000Z

269

CloudNet: Dynamic Pooling of Cloud Resources by Live WAN Migration of Virtual Machines  

E-Print Network (OSTI)

to a va- riety of commercial switches, including those from Ju- niper, HP, and Cisco. OpenFlow switches

van der Merwe, Kobus

270

ShadowNet: A Platform for Rapid and Safe Network Evolution Xu Chen Z. Morley Mao Jacobus Van der Merwe  

E-Print Network (OSTI)

, with manufacturers like HP, NEC, Ju- niper and Cisco already producing prototype switches [12]. Openflow has also

Mao, Zhuoqing Morley

271

NATIONAL STEM CONSORTIUM  

Science Conference Proceedings (OSTI)

... Manufacturers Assn.) Cyber: A+, Network+, and Security+ from CompTIA and CCNA from Cisco Electric Vehicle: SAE International's Vehicle ...

2013-09-19T23:59:59.000Z

272

Correlated Failures of Power Systems: Analysis of the Nordic Grid  

E-Print Network (OSTI)

. Cohen, "The Smarter Grid," IEEE Security and Privacy, vol. 8, 2010. [7] "Securing the SmartGrid," Cisco

273

Integration Defended: Berkeley Unifieds Strategy to Maintain School Diversity  

E-Print Network (OSTI)

to Maintain School Diversity Lisa Chavez Erica Frankenberg RSchools that Use Student Diversity to Enhance Learning ofthe Promise of Racial Diversity in American Schools, eds.

Chavez, Lisa; Frankenberg, Erica

2009-01-01T23:59:59.000Z

274

DOE VPN Client User Guide  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VPN Client VPN Client User Guide November 2013 U.S. Department of Energy Table of Contents Introduction ................................................................... 3 System Requirements ................................................... 3 Microsoft Windows ........................................................ 3 Mac OS X...................................................................... 4 Windows ......................................................................... 5 Installation for the Cisco AnyConnect Client ................... 5 Disconnecting from the Cisco AnyConnect Client ........... 8 Reconnecting to the Cisco AnyConnect Client ................ 9 Mac OS X ...................................................................... 10

275

Contents  

E-Print Network (OSTI)

These release notes describe new features and caveats in system software release 5.1(2) for the Cisco VCO/4K switch. Use these release notes in conjunction with the Cisco VCO/4K Software Installation Guide and the Cisco VCO/4K System Administrators Guide.

unknown authors

2000-01-01T23:59:59.000Z

276

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 - 23560 of 28,905 results. 51 - 23560 of 28,905 results. Article T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities. http://energy.gov/cio/articles/t-544-cisco-security-advisory-cisco-content-services-gateway-vulnerabilities-0 Page Recovery Act The Department estimates the $6 billion Recovery Act investment will allow

277

Unified Power Quality Conditioner: protection and performance enhancement.  

E-Print Network (OSTI)

?? The proliferation of power electronics-based equipment has produced a significant impact on the quality of electric power supply. Nowadays, much of the equipment is (more)

Axente, Iurie, (Thesis)

2008-01-01T23:59:59.000Z

278

A FILTER METHOD WITH UNIFIED STEP COMPUTATION FOR ...  

E-Print Network (OSTI)

naturally utilize information derived from a good estimate of a solution. ...... The result follows from the following analysis that considers the various cases that can occur. ...... using nonlinear constrained programming, Journal of energy resources technology, .... market equilibrium, Mathematical Programming, 24 (

279

MBAT: A scalable informatics system for unifying digital atlasing workflows  

E-Print Network (OSTI)

Neuroscientist 2002, 2. Lau C, Ng L, Thompson C, Pathak S,Lee, Seth Ruffins, Queenie Ng, Nikhil Sane, Steve Anderson,

Lee, Daren; Ruffins, Seth; Ng, Queenie; Sane, Nikhil; Anderson, Steve; Toga, Arthur

2010-01-01T23:59:59.000Z

280

A UNIFIED APPROACH FOR MINIMIZING COMPOSITE NORMS 1 ...  

E-Print Network (OSTI)

2 }l?Z+ denote the. Algorithm APG iterates when both ITERstop and GRADstop are disabled. Then p(x. (l). 1 ) + f(x. (l). 1 ) ?. minX?E {p(x) + f(x)} + ? whenever

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Einstein's Dream of Unified Forces - extra dimensions | U.S....  

Office of Science (SC) Website

are they hidden? What are the new particles associated with extra dimensions? Through the production of new particles that move in the extra space, the LHC experiments will have...

282

A unified kernel function approach to polynomial interior-point ...  

E-Print Network (OSTI)

of the resulting search directions is forced by using the Nesterov-Todd scaling scheme. ...... Neglecting the term ?x ? ?s in the left-hand side expression of the second .... -update, otherwise we enter an inner iteration by computing the search...

283

Toward a Unified View of the American Monsoon Systems  

Science Conference Proceedings (OSTI)

An important goal of the Climate Variability and Predictability (CLIVAR) research on the American monsoon systems is to determine the sources and limits of predictability of warm season precipitation, with emphasis on weekly to interannual time ...

C. Vera; W. Higgins; J. Amador; T. Ambrizzi; R. Garreaud; D. Gochis; D. Gutzler; D. Lettenmaier; J. Marengo; C. R. Mechoso; J. Nogues-Paegle; P. L. Silva Dias; C. Zhang

2006-10-01T23:59:59.000Z

284

Eigenvalue Algorithms with Several Factorizations --A Unified Theory yet?  

E-Print Network (OSTI)

it be physics, chemistry, mechanics, electrical engineering or economics, to formu­ late a mathematical model equations for rates of change and dynamics. The applied mathematician replaces these continuous and in in a longer historical perspective, scientific computation has evolved from a one person handicraft

Ruhe, Axel

285

A unified method for optimizing linear image restoration filters  

Science Conference Proceedings (OSTI)

Image restoration from degraded images lies at the foundation of image processing, pattern recognition, and computer vision, so it has been extensively studied. A large number of image restoration filters have been devised so far. It is known that a ... Keywords: denoising, image restoration, linear filter, moving-average filter, subspace information criterion (SIC)

Masashi Sugiyama; Hidemitsu Ogawa

2002-11-01T23:59:59.000Z

286

URL: A unified reinforcement learning approach for autonomic cloud management  

Science Conference Proceedings (OSTI)

Cloud computing is emerging as an increasingly important service-oriented computing paradigm. Management is a key to providing accurate service availability and performance data, as well as enabling real-time provisioning that automatically provides ... Keywords: Cloud computing, Reinforcement learning, Virtual machine autoconfiguration

Cheng-Zhong Xu; Jia Rao; Xiangping Bu

2012-02-01T23:59:59.000Z

287

An unified transition detection based on bipartite graph matching approach  

Science Conference Proceedings (OSTI)

This paper addresses transition detection which consists in identifying the boundary between consecutive shots. In this work, we propose an approach to cope with transition detection in which we define and use a new dissimilarity measure based on the ... Keywords: bipartite graph matching, cut, gradual transition

Zenilton Kleber Gonalves Do Patrocnio, Jr.; Silvio Jamil F. Guimares; Henrique Batista Da Silva; Kleber Jacques Ferreira De Souza

2010-11-01T23:59:59.000Z

288

Virtual Processors: Migrating object-clusters unify concurrency and distribution  

Science Conference Proceedings (OSTI)

Concurrent and distributed software systems are currently very distinct in their usage and programming. In the case of Java the first requires threads, the latter RMI, CORBA, Voyager etc. However, they are tightly related and often cited in one breath. ...

Marko Boger; Frank Wienberg; Winfried Lamersdorf

2000-12-01T23:59:59.000Z

289

A unified representation of web logs for mining applications  

Science Conference Proceedings (OSTI)

The collective feedback of the users of an Information Retrieval (IR) system has been shown to provide semantic information that, while hard to extract using standard IR techniques, can be useful in Web mining tasks. In the last few years, several approaches ... Keywords: Query recommendations, Query similarity, Query suggestions, Text categorization for the web, User feedback, Web logs

Michelangelo Diligenti; Marco Gori; Marco Maggini

2011-06-01T23:59:59.000Z

290

Users, Queries and Documents: A Unified Representation for Web Mining  

Science Conference Proceedings (OSTI)

The collective feedback of the users of an Information Retrieval system has been proved to be useful in many tasks. A popular approach in the literature is to process the logs stored by Internet Service Providers (ISP), Intranet proxies or Web search ... Keywords: Web Logs, User Feedback, Query Clustering, Query Recommendations, Query Suggestions

Michelangelo Diligenti; Marco Gori; Marco Maggini

2009-09-01T23:59:59.000Z

291

A Unified Symbolic Evaluation Framework for Parallelizing Compilers  

Science Conference Proceedings (OSTI)

AbstractThe quality of many optimizations and analyses of parallelizing compilers depends significantly on the ability to evaluate symbolic expressions and on the amount of information available about program variables at arbitrary program points. In ... Keywords: Symbolic analysis, symbolic evaluation, program context, data-flow and control-flow analysis, symbolic dependence testing, compiler optimizations, parallelizing compilers, parallel systems.

Thomas Fahringer; Bernhard Scholz

2000-11-01T23:59:59.000Z

292

Mobius: unified messaging and data serving for mobile apps  

Science Conference Proceedings (OSTI)

Mobile application development is challenging for several reasons: intermittent and limited network connectivity, tight power constraints, server-side scalability concerns, and a number of fault-tolerance issues. Developers handcraft complex solutions ... Keywords: caching, data management, messaging, mobile apps, mobile cloud computing, push notification

Byung-Gon Chun; Carlo Curino; Russell Sears; Alexander Shraer; Samuel Madden; Raghu Ramakrishnan

2012-06-01T23:59:59.000Z

293

HAC: A Unified View of Reactive and Deliberative Activity  

Science Conference Proceedings (OSTI)

The Hierarchical Agent Control Architecture (HAC) is a general toolkit for specifying an agent's behavior. By organizing the hierarchy around tasks to be accomplished, not the agents themselves, it is easy to incorporate multi-agent actions and planning ...

Marc S. Atkin; David L. Westbrook; Paul R. Cohen

2001-01-01T23:59:59.000Z

294

ZTE Unified Platform Cryptographic Library Version 1.1 FIPS ...  

Science Conference Proceedings (OSTI)

... BSC ,ZXWN HLR,ZXWN MSCS,ZXC10 MSCe,ZXUN Mss,ZXUN MGW,ZXUN iLIG,ZXC10 HLRe,ZXC10 FLR,ZXC10 OTAFe,ZXUN HSS,ZXUN UniA ...

2011-08-09T23:59:59.000Z

295

UNIFYING THE ZOO OF JET-DRIVEN STELLAR EXPLOSIONS  

Science Conference Proceedings (OSTI)

We present a set of numerical simulations of stellar explosions induced by relativistic jets emanating from a central engine sitting at the center of compact, dying stars. We explore a wide range of durations of the central engine activity, two candidate stellar progenitors, and two possible values of the total energy release. We find that even if the jets are narrowly collimated, their interaction with the star unbinds the stellar material, producing a stellar explosion. We also find that the outcome of the explosion can be very different depending on the duration of the engine activity. Only the longest-lasting engines result in successful gamma-ray bursts. Engines that power jets only for a short time result in relativistic supernova (SN) explosions, akin to observed engine-driven SNe such as SN2009bb. Engines with intermediate durations produce weak gamma-ray bursts, with properties similar to nearby bursts such as GRB 980425. Finally, we find that the engines with the shortest durations, if they exist in nature, produce stellar explosions that lack sizable amounts of relativistic ejecta and are therefore dynamically indistinguishable from ordinary core-collapse SNe.

Lazzati, Davide; Blackwell, Christopher H. [Department of Physics, NC State University, 2401 Stinson Drive, Raleigh, NC 27695-8202 (United States); Morsony, Brian J. [Department of Astronomy, University of Wisconsin-Madison, 2535 Sterling Hall, 475 N. Charter Street, Madison WI 53706-1582 (United States); Begelman, Mitchell C. [JILA, University of Colorado, 440 UCB, Boulder, CO 80309-0440 (United States)

2012-05-01T23:59:59.000Z

296

A Unified Flash Flood Database across the United States  

Science Conference Proceedings (OSTI)

Despite flash flooding being one of the most deadly and costly weather-related natural hazards worldwide, individual datasets to characterize them in the United States are hampered by limited documentation and can be difficult to access. This study is the ...

Jonathan J. Gourley; Yang Hong; Zachary L. Flamig; Ami Arthur; Robert Clark; Martin Calianno; Isabelle Ruin; Terry Ortel; Michael E. Wieczorek; Pierre-Emmanuel Kirstetter; Edward Clark; Witold F. Krajewski

2013-06-01T23:59:59.000Z

297

Hardware/Software Solution Unifying DALI, IBECS, and BACnet  

E-Print Network (OSTI)

daylight. But daylighting control system often can operatesystems can: 1) improve the demand responsiveness of a facility 2) improve lighting and building control operational efficiency by implementing daylighting andsystems can: 4) improve the demand responsiveness of a facility 5) improve lighting and building control operational efficiency by implementing daylighting and

Koch, Ed; Rubinstein, Francis; Sila, Kiliccote

2004-01-01T23:59:59.000Z

298

Behavior-aware, Unified Service Discovery Michael Pantazoglou, Aphrodite Tsalgatidou  

E-Print Network (OSTI)

Athens, Greece Phone: +30 210 727 5206 {michaelp, atsalga}@di.uoa.gr George Spanoudakis City University Department of Computing Northampton Square, London EC1V 0HB, UK Phone: +44 20 7040 8346 gespan@soi.city rendering itself available for discovery and reuse. In terms of their exposed interfaces, both atomic

Spanoudakis, George

299

Unifying Interfacial Self-Assembly and Surface Freezing  

SciTech Connect

X-ray investigations reveal that the monolayers formed at the bulk alkanol-sapphire interface are densely packed with the surface-normal molecules hydrogen bound to the sapphire. About 30-35 C above the bulk, these monolayers both melt reversibly and partially desorb. This system exhibits balanced intermolecular and molecule-substrate interactions which are intermediate between self-assembled and surface-frozen monolayers, each dominated by one interaction. The phase behavior is rationalized within a thermodynamic model comprising interfacial interactions, elasticity, and entropic effects. Separating the substrate from the melt leaves the monolayer structurally intact.

B Ocko; H Hlaing; P Jepsen; S Kewalramani; A Tkachenko; D Pontoni; H Reichert; M Deutsch

2011-12-31T23:59:59.000Z

300

Application of the Creep Continuum Damage Mechanics Unified ...  

Science Conference Proceedings (OSTI)

How to Control Strength and Grain Structure of 304L Stainless Steel during Forging Improved ... Process Modeling and Reduction of Copper Loss in Smelting Slag ... Use of Polymeric Residues from the Footwear Industry in Layers of Asphalt...

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Designing a unified programming model for heterogeneous machines  

Science Conference Proceedings (OSTI)

While high-efficiency machines are increasingly embracing heterogeneous architectures and massive multithreading, contemporary mainstream programming languages reflect a mental model in which processing elements are homogeneous, concurrency is limited, ...

Michael Garland; Manjunath Kudlur; Yili Zheng

2012-11-01T23:59:59.000Z

302

Hardware/Software Solution Unifying DALI, IBECS, and BACnet  

SciTech Connect

The goal of this project was to investigate broader building-level systems/strategies that enable further energy savings and control. This project investigated the potential savings offered by broader centralized control features and the potential advantages they may add to this system through such features as addressability and load shedding. This report documents the results of LBNL's work in this area. This report focuses on building-level systems and strategies and a multi-protocol gateway solution that is indifferent to the specific choice of lighting control/communications technique used to control the office lighting. The elegance of the IEEE 1451 intelligent gateway proposed in this report is that the overall building communications system should work regardless of whether the office lighting is controlled by DALI, UPB, IBECS, ZigBee or any other accepted communications protocol. Many lighting control companies have robust local lighting control systems with functional strategies for the office level controls. What the industry lacks is the efficient integration of local controls with building controls and energy management systems in order to utilize sensory data. LBNL proposes a framework for a gateway with a level of embedded intelligence, linking various device area networks (DANs) to building control systems. The proposed gateway acts as a translator for DANs enabling them to talk to each other and with a building control system. Just like a PC recognizing a mouse as soon as it is plugged in, the gateway will recognize devices with embedded or virtual Transducer Electronic Data Sheet (TEDS). This presents a truly ''plug and play'' capability for the building control systems. As a result, sensory data can be automatically calibrated, collected and utilized with minimal labor for effective and efficient building controls. The mature market cost of the proposed gateway is not yet known. But current product suggest that $1000/bridge is achievable today with off-the-shelf components and wireless routers that are common today for computer applications do not have significantly lower capabilities than the $1000 product and are now available at $100-$200. If it is configured so that it caters to commissioning, maintenance and energy monitoring, its benefit from a mere energy saving equipment can be extended to reduction in installation and maintenance costs.

Koch, Ed; Rubinstein, Francis; Sila, Kiliccote

2004-12-01T23:59:59.000Z

303

Unified description of fission in fusion and spallation reactions  

E-Print Network (OSTI)

We present a statistical-model description of fission, in the framework of compound-nucleus decay, which is found to simultaneously reproduce data from both heavy-ion-induced fusion reactions and proton-induced spallation reactions at around 1 GeV. For the spallation reactions, the initial compound-nucleus population is predicted by the Li\\`{e}ge Intranuclear Cascade Model. We are able to reproduce experimental fission probabilities and fission-fragment mass distributions in both reactions types with the same parameter sets. However, no unique parameter set was obtained for the fission probability. The introduction of fission transients can be offset by an increase of the ratio of level-density parameters for the saddle-point and ground-state configurations. Changes to the finite-range fission barriers could be offset by a scaling of the Bohr-Wheeler decay width as predicted by Kramers. The parameter sets presented allow accurate prediction of fission probabilities for excitation energies up to 300 MeV and spins up to 60 \\hbar.

Davide Mancusi; Robert J. Charity; Joseph Cugnon

2010-07-06T23:59:59.000Z

304

A unified framework for exact cone-beam reconstruction formulas  

SciTech Connect

In this paper, we present concise proofs of several recently developed exact cone-beam reconstruction methods in the Tuy inversion framework, including both filtered-backprojection and backprojection-filtration formulas in the cases of standard spiral, nonstandard spiral, and more general scanning loci. While a similar proof of the Katsevich formula was previously reported, we present a new proof of the Zou and Pan backprojection-filtration formula. Our proof combines both odd and even data extensions so that only the cone-beam transform itself is utilized in the backprojection-filtration inversion. More importantly, our formulation is valid for general smooth scanning curves, in agreement with an earlier paper from our group [Ye, Zhao, Yu, and Wang, Proc. SPIE 5535, 293-300 (Aug. 6 2004)]. As a consequence of that proof, we obtain a new inversion formula, which is in a two-dimensional filtering backprojection format. A possibility for generalization of the Katsevich filtered-backprojection reconstruction method is also discussed from the viewpoint of this framework.

Zhao Shiying; Yu Hengyong; Wang Ge [CT/Micro-CT Laboratory, Department of Radiology University of Iowa, 200 Hawkins Drive Iowa City, Iowa 52242 (United States)

2005-06-15T23:59:59.000Z

305

Unifying design and runtime software adaptation using aspect models  

Science Conference Proceedings (OSTI)

Software systems are seen more and more as evolutive systems. At the design phase, software is constantly in adaptation by the building process itself, and at runtime, it can be adapted in response to changing conditions in the executing environment ... Keywords: Aspect oriented modeling, Software product lines

Carlos Parra; Xavier Blanc; Anthony Cleve; Laurence Duchien

2011-12-01T23:59:59.000Z

306

Unifying Design and Runtime Software Adaptation Using Aspect Models  

E-Print Network (OSTI)

guides de la CIBSE (CIBSE, 2005 et CIBSE, 2006). 1.2.1.2 Corrélation de Phaff et De Gids Phaff et De Gids

Paris-Sud XI, Université de

307

Toward a Unified Treatment of Electronic Processes in Organic Semiconductors  

DOE Green Energy (OSTI)

A quantitative study of n-type doping in highly crystalline organic semiconductor films establishes the predominant influence of electrostatic forces in these low-dielectric materials. Based on these findings, a self-consistent model of doped (purposely or not) organic semiconductors is proposed in which: (1) the equilibrium free carrier density, nf, is a small fraction of the total charge density; (2) a superlinear increase in conductivity with doping density is universal; (3) nf increases with applied electric field; and (4) the carrier mobility is field-dependent regardless of crystallinity.

Gregg. B.A.

2005-01-01T23:59:59.000Z

308

Unified Dark Energy-Dark Matter model with Inverse Quintessence  

E-Print Network (OSTI)

We consider a model where both dark energy and dark matter originate from the coupling of a scalar field with a non-conventional kinetic term to, both, a metric measure and a non-metric measure. An interacting dark energy/dark matter scenario can be obtained by introducing an additional scalar that can produce non constant vacuum energy and associated variations in dark matter. The phenomenology is most interesting when the kinetic term of the additional scalar field is ghost-type, since in this case the dark energy vanishes in the early universe and then grows with time. This constitutes an "inverse quintessence scenario", where the universe starts from a zero vacuum energy density state, instead of approaching it in the future.

Stefano Ansoldi; Eduardo I. Guendelman

2012-09-21T23:59:59.000Z

309

Unified Description of Dark Energy and Dark Matter  

E-Print Network (OSTI)

Dark energy in the universe is assumed to be vacuum energy. The energy-momentum of vacuum is described by a scale-dependent cosmological constant. The equations of motion imply for the density of matter (dust) the sum of the usual matter density (luminous matter) and an additional matter density (dark matter) similar to the dark energy. The scale-dependent cosmological constant is given up to an exponent which is approximated by the experimentally decided density parameters of dark matter and dark energy. This yields that dark matter is one third of dark energy for all times implying an explanation of the coincidence of dark matter and dark energy. In the final state, the universe becomes dark, consisting of dark matter and dark energy.

Walter Petry

2008-10-23T23:59:59.000Z

310

Unified pictures of Q-balls and Q-tubes  

E-Print Network (OSTI)

While Q-balls have been investigated intensively for many years, another type of nontopological solutions, Q-tubes, have not been understood very well. In this paper we make a comparative study of Q-balls and Q-tubes. First, we investigate their equilibrium solutions for four types of potentials. We find, for example, that in some models the charge-energy relation is similar between Q-balls and Q-tubes while in other models the relation is quite different between them. To understand what determines the charge-energy relation, which is a key of stability of the equilibrium solutions, we establish an analytical method to obtain the two limit values of the energy and the charge. Our prescription indicates how the existent domain of solutions and their stability depends on their shape as well as potentials, which would also be useful for a future study of Q-objects in higher-dimensional spacetime.

Takashi Tamaki; Nobuyuki Sakai

2012-08-22T23:59:59.000Z

311

SAVEUS: SAving Victims in Earthquakes through Unified Systems  

Science Conference Proceedings (OSTI)

Natural disasters such as earthquakes damage the systems that are designed to confine the damage they cause. Many schemes have been suggested to minimise the damage but there is no single scheme that is equally effective in all types of natural disasters. ...

Cory Beard; Zhi Qiang Chen; Vijay Kumar; Yugyung Lee; W. Daniel Leon-Salas; Praveen Rao

2013-06-01T23:59:59.000Z

312

UFO: unified convex optimization algorithms for fixed-outline floorplanning  

Science Conference Proceedings (OSTI)

In this paper, we apply two convex optimization methods, named UFO, for fixed-outline floorplanning. Our approach consists of two stages which are a global distribution stage and a local legalization stage. In the first stage, we first transform modules ...

Jai-Ming Lin; Hsi Hung

2010-01-01T23:59:59.000Z

313

Generalizing mapreduce as a unified cloud and HPC runtime  

Science Conference Proceedings (OSTI)

Computational simulation and analysis were one of the keys to the future in data-intensive science as a "fourth paradigm" of scientific discovery but facing a major challenge as handling the incredible increases in dataset sizes. This requires attractive ... Keywords: HPC, cloud, data analysis, fault tolerance, interoperability, iterative mapreduce, map collective, scaling performance

Judy Qiu

2011-11-01T23:59:59.000Z

314

A Unified Operating System for Clouds and Manycore: fos  

E-Print Network (OSTI)

Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for ...

Modzelewski, Kevin

2009-11-20T23:59:59.000Z

315

From Supercritical Fluids to Polymeric Glasses: A Unified ...  

Science Conference Proceedings (OSTI)

... Aristotle University of Thessaloniki, Thessaloniki, Greece cpanayio@auth ... equilibria, heats of mixing, volumetric properties, gas sorption, vibrational ...

2006-07-20T23:59:59.000Z

316

The Evolution of Aggregate Stock Ownership: A Unified Explanation  

E-Print Network (OSTI)

Since World War II, the fraction of stocks owned directly by households has decreased by more than 50 percentage points in the United States, the United Kingdom, and Sweden. We argue that tax policy is the driving force. Using data from eight countries, we show that tax-favored investors have replaced households as stockholders and that the fraction of household ownership decreases with measures of the effective marginal tax rate. We further show that the changes in stock ownership accelerate during the high-inflation period of the 1970s and the 1980s. These findings are important for policy considerations on effective taxation and for financial economics research on the longterm

Kristian Rydqvist; Joshua Spizman; Ilya Strebulaev

2008-01-01T23:59:59.000Z

317

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

released software updates. http:energy.govcioarticlest-635-cisco-anyconnect-secure-mobility-client-lets-remote-users-execute-arbitrary-code Download CX-007686: Categorical...

318

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. http:energy.govcio...

319

Office of Electricity Delivery and Energy Reliability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments of Cisco Systems to Office of Electricity Delivery and Energy Reliability Department of Energy in Response to Request for Information: Addressing Policy and Logistical...

320

Automating Network Security Assessment  

Science Conference Proceedings (OSTI)

... It's not host analysis It's not config analysis Page 6. ... Originally on ~$5K server (quad core, 32G RAM) Now running on Cisco UCS much faster! ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Speaker List for EE Forum Breakout Sessions  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Investment Co., Ltd. (TBC) o Energy Efficiency Financing Cisco Devries, President, Renewable Funding LLC o Research of the Energy Saving Technologies Promotion System Xu...

322

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

v-048-cisco-wireless-lan-controller-cross-site-request-forgery-vulnerability Download LNG Export Study - Related Documents EIA and NERA analysis of LNG exports, and associated...

323

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Secure Access Control System Unauthorized Password Change Vulnerability Cisco Secure ACS operates as a centralized RADIUS and TACACS+ server, combining user authentication,...

324

Internal Users | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Access Security Suites Available by Internet Service Providers How to Download, Install, and Use Cisco AnyConnect VPN Client (PDF) ORNL Security Suites Home Use Option Program...

325

Apple-to-Apple: A Common Framework for Energy-Efficiency in Networks  

E-Print Network (OSTI)

linecard chassis is in use (i.e., Ii>0). The resulting power profiling, for both Cisco CRS-1 and Ju- niper

Paris-Sud XI, Université de

326

A Study of End-to-End Web Access Failures Venkata N. Padmanabhan  

E-Print Network (OSTI)

): latimes.com, nfl.com, pbs.org, cisco.com, ju­ niper.net, ibm.com, fastclick.com, advertising.com, slashdot

Padmanabhan, Venkata N.

327

Hedera: Dynamic Flow Scheduling for Data Center Networks Mohammad Al-Fares  

E-Print Network (OSTI)

.com, cnet.com US-MISC (15): latimes.com, nfl.com, pbs.org, cisco.com, ju- niper.net, ibm.com, fastclick

Vahdat, Amin

328

Innovation and Product Development in the 21st Century  

Science Conference Proceedings (OSTI)

... academia (Harvard and University of Michigan), business (Corning, Cisco Systems ... 2. Andrew, James and Emily Stover DeRocco and Andrew Taylor ...

2013-07-31T23:59:59.000Z

329

Demonstrating the Stalling Events with Instantaneous Total Power Consumption in Smartphone-based Live Video Streaming.  

E-Print Network (OSTI)

??The smartphone usage nearly tripled 2011 according to Cisco Virtual Networking Index. There is a high demand of energy for using popular mobile applications, which (more)

Ickin, Selim; Fiedler, Markus

2012-01-01T23:59:59.000Z

330

NISTIR 7698, Common Platform Enumeration: Applicability ...  

Science Conference Proceedings (OSTI)

... Booth of NIST, Brant A. Cheikes and Mary Parmelee of the MITRE Corporation, Adam Halbardier of Booz Allen Hamilton, Seth Hanford of Cisco ...

2012-03-01T23:59:59.000Z

331

NISTIR 7697, Common Platform Enumeration: Dictionary ...  

Science Conference Proceedings (OSTI)

... and Mary Parmelee of the MITRE Corporation, Adam Halbardier and Christopher McCormick of Booz Allen Hamilton, Seth Hanford of Cisco ...

2012-03-01T23:59:59.000Z

332

NISTIR 7696, Common Platform Enumeration: Name ...  

Science Conference Proceedings (OSTI)

... acknowledge Brant A. Cheikes of The MITRE Corporation, Paul Cichonski of NIST, Adam Halbardier of Booz Allen Hamilton, Seth Hanford of Cisco ...

2012-03-01T23:59:59.000Z

333

NISTIR 7695, Common Platform Enumeration: Naming ...  

Science Conference Proceedings (OSTI)

... like to acknowledge Harold Booth and Paul Cichonski of NIST, Adam Halbardier and David Lee of Booz Allen Hamilton, Seth Hanford of Cisco ...

2012-03-01T23:59:59.000Z

334

Chapter 1 CAUSES AND MECHANISMS OF FISH DOWNSTREAM MIGRATION...  

NLE Websites -- All DOE Office Websites (Extended Search)

(Coregonus lavaretus lavaretus), peled, sardine cisco, and European perch: Fig. 5.3); gas bubbles in the back muscles, inside the gills, fins and blood vessels (pikeperch and...

335

Managing the Risk of Intelligent Electronic Devices on Airfield  

Science Conference Proceedings (OSTI)

... Author of more than $4B in security product development and sales, including Cisco PIX, BorderWare and Protego MARS ... biggest gun ...

2007-12-13T23:59:59.000Z

336

VPN MANUAL Windows 7 Check to ensure OleMiss wireless is visible in the network connections.  

E-Print Network (OSTI)

VPN MANUAL ­ Windows 7 Check to ensure OleMiss wireless is visible in the network connections, click Continue. #12;VPN MANUAL ­ Windows 7 Next, you will be prompted to Launch the Cisco Agent. Click to `Run' the file. #12;VPN MANUAL ­ Windows 7 The Cisco Agent will likely take a few minutes to fully

Tchumper, Gregory S.

337

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2, 2011 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates. May 31, 2011

338

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18, 2013 18, 2013 V-137: Apple Mac OS X update for Java Apple has issued an update for Java for Mac OS X April 17, 2013 V-136: Oracle Critical Patch Update Advisory - April 2013 Several vulnerabilities addressed in this Critical Patch Update affect multiple products April 16, 2013 V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. April 15, 2013 V-134: Cisco AnyConnect Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges Some vulnerabilities were reported in Cisco AnyConnect Secure Mobility Client. April 14, 2013 V-133: Microsoft pulls Patch Tuesday security fix Microsoft has recommended that an update released in the latest Patch Tuesday be removed, after users reported incidents of the "blue screen of

339

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft is hosting a webcast to address customer questions on these bulletins on March

340

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

16, 2012 16, 2012 U-127: Microsoft Security Bulletin MS12-020 - Critical Vulnerabilities in Remote Desktop Could Allow Remote Code Execution March 16, 2012 U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system. March 15, 2012 U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. March 14, 2012 U-124: Microsoft Security Bulletin Advance Notification for March 2012 Microsoft Security Bulletin Advance Notification for March 2012. Microsoft has posted 1 Critical Bulletin, 4 Important bulletins and 1 Moderate bulletin. Bulletins with the Maximum Severity Rating and Vulnerability

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Developing a methodology to link printed circuit board assembly yield targets to commodity group quality goals  

E-Print Network (OSTI)

The increasing complexity of high-end routing products, a highly diverse product mix, and continually demanding quality requirements have intensified the challenges faced by Cisco. Primary among these is managing the broad ...

Cauthen, Jason Wessing

2009-01-01T23:59:59.000Z

342

On Making SCTP Robust to Spurious Retransmissions Sourabh Ladha+  

E-Print Network (OSTI)

in the Internet by events such as route flipping [All00, AP99, Bol93]. If seen from a transport perspective Research Laboratory (DAAD19-01-2-0011), and by the CISCO University Partnership Program. spikes quite

Delaware, University of

343

U-154: IBM Rational ClearQuest ActiveX Control Buffer Overflow...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Multiple Flaws Let Remote Users Execute Arbitrary Code T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code U-126: Cisco...

344

SNRE MS and MLA Career Information From 2009-2010 the School of Natural Resources and Environment graduated 122 MS and MLA students.  

E-Print Network (OSTI)

Grants to Tribes Program) US DOI, Bureau of Land Management (Presidential Management Fellow, Renewable Engineer) Black & Veatch (Renewable Energy Consultant) Blue Tree Strategies (Consultant and Director, Assistant*) China Beijing Environment Exchange (Business Manager) - China Cisco Systems (Value Chain

Edwards, Paul N.

345

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

346

Wilkinson Barker Knauer Memo  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the same "type" in any meaningful way. Cisco also explained that network-based and data center "servers" are not consumer products or part of a class of products that can be...

347

Former Worker Medical Screening Program - Portsmouth Gaseous...  

NLE Websites -- All DOE Office Websites (Extended Search)

Jim Frederick Co-Principal Investigator: Steven Markowitz, MD Toll-free Telephone: (888) 241-1199 Local Outreach Office: Jeanne Cisco 2288 Wakefield Mound Road Piketon, OH 45661...

348

Final_Tech_Session_Schedule_and_Location.xls  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale 9000.0 Vertical Scale 125.0 Vertical Exaggeration 72.0x Ft. "Wolfcamp" Shale North South Cisco Canyon Oil Water Contact Gross Stratigraphy Carey et al. (2005):...

349

Cybersecurity NOI Comments  

Science Conference Proceedings (OSTI)

... 9/20/10, Cisco Systems. 9/20/10, CompTIA. 9/20/10, CTIA. 9/20/10, Google. 9/20/10, IBM. 9/20/10, Information Technology Industry Council. ...

2011-05-06T23:59:59.000Z

350

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

351

Case studies in DSM : utilizing the Design Structure Matrix to improve New Product Introduction  

E-Print Network (OSTI)

This thesis describes a project that applies the Design Structure Matrix (DSM) in support of the Manufacturing Excellence (MX) program at Cisco Systems, Inc to reduce the cycle time of new product development initiatives ...

Go, Julie W

2007-01-01T23:59:59.000Z

352

Systems analysis of emerging IPTV entertainment platform : stakeholders, threats and opportunities  

E-Print Network (OSTI)

Why do certain types of companies, goods, services survive and others do not. Why does one set continuously reinvent themselves and others wither away and die? Why does Cisco continue to provide exciting and innovative ...

Sharma, Shantnu

2008-01-01T23:59:59.000Z

353

Inter-company collaboration within a large lean supply chain initiative  

E-Print Network (OSTI)

Cisco and its four contract manufacturing partners are collaborating to implement a lean replenishment methodology across their supply chain. The new system is expected to result in minimized inventory exposure, increased ...

Mentzer, Maria Ritums

2009-01-01T23:59:59.000Z

354

A note on traces refinement and the conf relation in the unifying theories of programming  

Science Conference Proceedings (OSTI)

There is a close relation between the failures-divergences and the UTP models of CSP, but they are not equivalent. For example, miracles are not available in the failures-divergences model; the UTP theory is richer and can be used to give semantics to ...

Ana Cavalcanti; Marie-Claude Gaudel

2008-09-01T23:59:59.000Z

355

Solving Hard Satisfiability Problems: A Unified Algorithm Based on Discrete Lagrange Multipliers  

Science Conference Proceedings (OSTI)

In this paper, we present improved strategies in DLM-99-SAT to escape from traps and to select proper parameter sets to use when applied to solve some difficult but satisfiable SAT problems. One of the main issues in DLM-99-SAT is that it has a large ... Keywords: DIMACS benchmarks, discrete Lagrange-multiplier method, first-order search procedure, satisfiability, traps

Zhe Wu; Benjamin W. Wah

1999-11-01T23:59:59.000Z

356

A unified framework for document restoration using inpainting and shape-from-shading  

Science Conference Proceedings (OSTI)

We present a restoration framework to reduce undesirable distortions in imaged documents. Our framework is based on two components: (1) an image inpainting procedure that can separate non-uniform illumination (and other) artifacts from the printed content ... Keywords: Digital inpainting, Document image restoration, Geometric warping, Perspective distortion, Physically based flattening, RBF-based smoothing, Shading distortion, Shape-from-shading

Li Zhang; A. M. Yip; M. S. Brown; Chew Lim Tan

2009-11-01T23:59:59.000Z

357

A Unifying Approach to Assessing Market Power in Deregulated Electricity Markets  

E-Print Network (OSTI)

, TCNF provides valuable information about market power not captured by prior indices. We derive its.g., the California energy crisis of 2000; monitoring market power will become even more important in the coming years fractured) literature seeking to improve market power analysis for electricity markets. In particular

Wierman, Adam

358

Towards unifying multi-resolution and multi-description : a distortion-diversity perspective  

E-Print Network (OSTI)

We consider codec structures that exploit diversity in both source coding and channel coding components. We propose to study source-channel schemes using the tradeoff between end-to-end distortion level and the outage ...

Jing, Sheng, Ph. D. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

359

Einstein's Dream of Unified Forces | U.S. DOE Office of Science (SC)  

Office of Science (SC) Website

How can we solve the mystery of dark energy? How can we solve the mystery of dark energy? Sloan Digital Sky Survey Just as the first cartographers created maps of the new world, the Sloan Digital Sky Survey is systematically mapping one quarter of the universe. (Credit: SDSS) Recent measurements with telescopes and space probes have shown that a mysterious force-a dark energy-fills the vacuum of empty space, accelerating the universe's expansion. We don't know what dark energy is, or why it exists. On the other hand, particle theory tells us that, at the microscopic level, even a perfect vacuum bubbles with quantum particles that are a natural source of dark energy. But a naïve calculation of the dark energy generated from the vacuum yields a value 10120 times larger than the amount we observe. Some unknown physical process is required to

360

The Harness Workbench: Unified and Adaptive Access to Diverse HPC Platforms (final report)  

SciTech Connect

In this project, we conducted preliminary research to create a flexible environment that encapsulates the knowledge of the application developers, site system administrators, and the vendors to assist application building and execution on HPC systems, in particular the DOE leadership computing platforms. The key research involved how to describe and use the knowledge from these varied sources to improve productivity of the end-user scientists, while creating a flexible and modular environment supporting all these features.

George Bosilca

2012-11-07T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A Unified View on Relaxations for a Nonlinear Network Flow Problem  

E-Print Network (OSTI)

Jul 7, 2013 ... Given is such network with active and passive components, that is, valves, compressors, pressure regulators (active) and pipelines (passive),...

362

A unified framework for resource-bounded autonomous agents interacting with unknown environments  

E-Print Network (OSTI)

the weather, play chess, solve mazes, drive cars, discover physical theories, solve IQ tests and predict future stock prices. Even though, admit- tedly, AIXI cannot be implemented because it is uncomputable, one should still be able to devise a down... , the implementation and the performance of an autonomous system. In navigation devices for instance, the usage of continuous I/O sets is vital for its robustness. Furthermore, choosing and modeling continuous I/O sets appropriately can be a very challenging task...

Ortega, Pedro Alejandro Jr

2011-07-12T23:59:59.000Z

363

Deaf people, modernity, and a contentious effort to unify Arab sign languages  

E-Print Network (OSTI)

Enable. (n.d.a). Arab decade of disabled persons, 2003-2012.Arab Organization of Disabled People ASL: American Signaccess of technologies for disabled Arab people, including

Al-Fityani, Kinda

2010-01-01T23:59:59.000Z

364

Unified Modeling and Prediction of Weather and Climate: A 25-Year Journey  

Science Conference Proceedings (OSTI)

In recent years there has been a growing appreciation of the potential advantages of using a seamless approach to weather and climate prediction. However, what exactly should this mean in practice? To help address this question, we document some of the ...

Andrew Brown; Sean Milton; Mike Cullen; Brian Golding; John Mitchell; Ann Shelly

2012-12-01T23:59:59.000Z

365

A unified framework for the negotiation and deployment of network services  

Science Conference Proceedings (OSTI)

The Internet network technology today does not allow a sufficient degree of autonomy to express user choices, constraints and preferences in order to dynamically obtain the most suitable services. One of the goals of Autonomic Communication is to produce ...

Spyros Denazis; Lidia Yamamoto

2004-10-01T23:59:59.000Z

366

A Unified Oscillator Model for the El NioSouthern Oscillation  

Science Conference Proceedings (OSTI)

The delayed oscillator, the western Pacific oscillator, the rechargedischarge oscillator, and the advectivereflective oscillator have been proposed to interpret the oscillatory nature of the El NioSouthern Oscillation (ENSO). All of these ...

Chunzai Wang

2001-01-01T23:59:59.000Z

367

Planners, architects and landscape architects designing New Orleans : disciplinary differences in developing the unified plan  

E-Print Network (OSTI)

Designing cities is a complex proposition. Planners, architects and landscape architects all center their practice on aspects of this proposition. As such, their respective disciplines share the realm of urban design. This ...

Boatright, Jessica Berman

2007-01-01T23:59:59.000Z

368

Polymorphous architectures: a unified approach for extracting concurrency of different granularities  

Science Conference Proceedings (OSTI)

Processor architects today are faced by two daunting challenges: emerging applications with heterogeneous computation needs and technology limitations of power, wire delay, and process variation. Designing multiple application-specific processors or ...

Karthikeyan Sankaralingam / Stephen W. Keckler

2006-01-01T23:59:59.000Z

369

Universal Natural Shapes: From Unifying Shape Description to Simple Methods for Shape Analysis and  

E-Print Network (OSTI)

. Javakhishvili Tbilisi State University, I. Vekua Institute of Applied Mathematics, Tbilisi, Georgia Abstract

Paris-Sud XI, Université de

370

A unified framework for max-min and min-max fairness with applications  

Science Conference Proceedings (OSTI)

Max-min fairness is widely used in various areas of networking. In every case where it is used, there is a proof of existence and one or several algorithms for computing it; in most, but not all cases, they are based on the notion of bottlenecks. In ... Keywords: best-effort traffic, elastic traffic, mathematical programming/optimization, max-min fairness, system design

Bozidar Radunovi?; Jean-Yves Le Boudec

2007-10-01T23:59:59.000Z

371

PyDecay/GraphPhys: A Unified Language and Storage System for Particle Decay Process Descriptions  

SciTech Connect

To ease the tasks of Monte Carlo (MC) simulation and event reconstruction (i.e. inferring particle-decay events from experimental data) for long-term BaBar data preservation and analysis, the following software components have been designed: a language ('GraphPhys') for specifying decay processes, common to both simulation and data analysis, allowing arbitrary parameters on particles, decays, and entire processes; an automated visualization tool to show graphically what decays have been specified; and a searchable database storage mechanism for decay specifications. Unlike HepML, a proposed XML standard for HEP metadata, the specification language is designed not for data interchange between computer systems, but rather for direct manipulation by human beings as well as computers. The components are interoperable: the information parsed from files in the specification language can easily be rendered as an image by the visualization package, and conversion between decay representations was implemented. Several proof-of-concept command-line tools were built based on this framework. Applications include building easier and more efficient interfaces to existing analysis tools for current projects (e.g. BaBar/BESII), providing a framework for analyses in future experimental settings (e.g. LHC/SuperB), and outreach programs that involve giving students access to BaBar data and analysis tools to give them a hands-on feel for scientific analysis.

Dunietz, Jesse N.; /MIT /SLAC

2011-06-22T23:59:59.000Z

372

Theorem Proving: Not an Esoteric Diversion, but the Unifying Framework for Industrial Verification  

E-Print Network (OSTI)

The effectiveness of hardware verification techniques has increased markedly in the past decade. As hardware verification techniques become increasingly powerful the idea of transitioning verification technology to industry can be taken seriously. Nevertheless, powerful decision procedures that can completely automate the verification of certain types of hardware, whether they are BDD based model-checkers [10] or automatic microprocessor verification tools [4], cannot be adequate on their own for industrial hardware verification. However, a high-level, general-purpose theorem prover with specific capabilities can provide an overall framework in which these tools can be embedded and in which they can then be effectively used for industrial hardware verification. 1 Introduction The effectiveness of hardware verification techniques has increased markedly in the past decade. These techniques span a spectrum from automatic techniques to interactive theorem proving techniques. At one end o...

D. A. Cyrluk; M. K. Srivas

1995-01-01T23:59:59.000Z

373

A Unified Model for Ion Deposition and Theromomechanical Response in Dry Wall Laser IFE Chambers  

Science Conference Proceedings (OSTI)

High Average Power Laser and Other IFE R&D / Eighteenth Topical Meeting on the Technology of Fusion Energy (Part 1)

James P. Blanchard; Qiyang Hu; Nasr Ghoniem

374

The policy impact of unified government: evidence from2000 to 2002  

E-Print Network (OSTI)

Corp. Tidewater Inc. Renewable Energy Companies EnergyEnergy Co. Renewable Energy Companies References Aldrich, J.constituent ?rms (renewable energy), I can test the

Monroe, Nathan W.

2010-01-01T23:59:59.000Z

375

The global unified parallel file system (GUPFS) project: FY 2003 activities and results  

E-Print Network (OSTI)

testbed system to conduct investigations and evaluations oftestbed system to conduct investigations and evaluations of

Butler, Gregory F.; Baird, William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney, Cary L.

2004-01-01T23:59:59.000Z

376

CAeSaR: unified cluster-assignment scheduling and communication reuse for clustered VLIW processors  

Science Conference Proceedings (OSTI)

Clustered architectures have been proposed as a solution to the scalability problem of wide ILP processors. VLIW architectures, being wide-issue by design, benefit significantly from clustering. Such architectures, being both statically scheduled and ... Keywords: cluster assignment, clustered VLIW, instruction scheduling

Vasileios Porpodas; Marcelo Cintra

2013-09-01T23:59:59.000Z

377

The policy impact of unified government: evidence from2000 to 2002  

E-Print Network (OSTI)

Oil and Gas Companies Exxon Mobil Corp. Peoples Energy Corp.candidates, such as Chevron, Exxon, Halliburton, Kerr McGee,

Monroe, Nathan W.

2010-01-01T23:59:59.000Z

378

A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles  

E-Print Network (OSTI)

This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

379

A Unified Framework for Monitoring Data Streams in Real Time Ahmet Bulut and Ambuj K. Singh  

E-Print Network (OSTI)

-energy photons) over a certain time period, which indicates the existence of a Gamma Ray Burst. If we know monitoring queries, such as finding surprising levels of a data stream, detecting bursts, and to (2- priate lengths a priori. For example, bursts of events can occur at variable temporal modalities from

California at Santa Barbara, University of

380

Engine spray combustion modeling using unified spray model with dynamic mesh refinement.  

E-Print Network (OSTI)

??The primary objective of this study is to improve the spray and combustion modeling of internal combustion engines using dynamic mesh refinement. The first part (more)

Kolakaluri, Ravi

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A unified framework for multipath routing for unicast and multicast traffic  

Science Conference Proceedings (OSTI)

We study the problem of load balancing the traffic from a set of unicast and multicast sessions. The problem is formulated as an optimization problem. However, we assume that the gradient of the network cost function is not available and needs to be ... Keywords: mathematical programming/optimization, multipath routing, network measurements

Tuna Gven; Richard J. La; Mark A. Shayman; Bobby Bhattacharjee

2008-10-01T23:59:59.000Z

382

DT 03/2002Unifying Quantitative and Qualitative Analyses in Management  

E-Print Network (OSTI)

This paper addresses the issue of combining qualitative and quantitative methodologies in management and organization research. It reviews the extant literature, and applies such combined methodology in a research project on vertical strategic alliances, conducted within a just in time manufacturing environment in North America, in 2001. While the major positive and negative aspects are highlighted, I conclude that the successful implementation of this dual method enables a more thorough and robust set of conclusions. Resumen El tema principal abordado en este trabajo es la metodologa combinada cuantitativa y cualitativa en la investigacin sobre la organizacin y el management de la empresa. En el trabajo se hace una extensa revisin de la literatura y se aplica tal metodologa combinada a un proyecto de investigacin sobre alianzas estratgicas, realizado en Estados Unidos en el ao 2001. Si bien se destacan los principales aspectos positivos y negativos de una y otra metodologa, concluyo que la implementacin exitosa de este mtodo dual permite establecer conclusiones ms rigurosas y robustas.

Luiz F. Mesquita; Luiz F. Mesquita

2002-01-01T23:59:59.000Z

383

Influence of the material substructure on crack propagation: a unified treatment  

E-Print Network (OSTI)

The influence of the material texture (substructure) on the force driving the crack tip in complex materials admitting Ginzburg-Landau-like energies is analyzed in a three-dimensional continuum setting. The theory proposed accounts for finite deformations and general coarse-grained order parameters. A modified expression of the J-integral is obtained together with other path-integrals which are necessary to treat cases where the process zone around the tip has finite size. The results can be applied to a wide class of material substructures. As examples, cracks in ferroelectrics and in materials with strain-gradient effects are discussed: in these cases the specializations of the general results fit reasonably experimental data.

Paolo Maria Mariano

2003-05-02T23:59:59.000Z

384

Mechanics of complex bodies: commentary on the unified modelling of material substructures  

E-Print Network (OSTI)

Basic issues of the general model-building framework of the mechanics of complex bodies are discussed. Attention is focused on the representation of the material elements, the conditions for the existence of ground states in conservative setting and the interpretation of the nature of the various balance laws occurring.

Paolo Maria Mariano

2008-03-26T23:59:59.000Z

385

Towards a unified cost optimal methodology for designing low energy buildings in the mediterranean sea region  

Science Conference Proceedings (OSTI)

The increasing sustainability problems our world faces because of the thoughtless energy consumption and emissions production puts an increasing pressure for immediate and drastic energy saving measures. Although the consumption of energy - through appropriate ... Keywords: cost optimal, design methodology, low energy building, mediterranean

Stratis Kanarachos; Ahmed Medhat; Georgette Kanarachou; Mona Fanny

2011-02-01T23:59:59.000Z

386

Unified SensorNet Architecture with Multiple Owners: An Implementation Report  

E-Print Network (OSTI)

User A successfully executes LOAD PROFILE, but cannot run START IDENTIFICATION 22 11 User B successful User A successfully fetches profile from the Smell profile Database . . . . . . . . . . . . . . 22 10

Kansas, University of

387

Gamma-ray bursts and their afterglows: toward a unified model.  

E-Print Network (OSTI)

??Although much progress has been made in our understanding of gamma-ray bursts (GRBs) and their afterglows in the last few decades, some critical questions remain (more)

McMahon, Erin Malia, 1980-

2008-01-01T23:59:59.000Z

388

Unified system level reliability evaluation methodology for multiprocessor Systems-on-Chip  

Science Conference Proceedings (OSTI)

Reliability is a growing fundamental challenge in the design of multiprocessor Systems-on-Chip (MPSoCs). This trend is accelerated by the increasingly adverse process variations and wearout mechanisms that result in an increased number of errors. Previously ... Keywords: lifetime,multiprocessor system-on-chip,network-on-chip,reliability

Alexandre Yasuo Yamamoto; Cristinel Ababei

2012-06-01T23:59:59.000Z

389

A Simple and Unified Method to Model HVDC Links and FACTS Devices in DC Load Flow  

Science Conference Proceedings (OSTI)

The DC load flow is a rapid and approximate solution method for the determination of lines active power flows in power systems. In this paper, the HVDC (High Voltage Direct Current) links and FACTS (Flexible AC Transmission Systems) devices have been ... Keywords: Flexible AC Transmission Systems, High Voltage Direct Current, linearized load flow

Omid Alizadeh Mousavi; Mohammad Javad Sanjari; G.B. Gharehpetian; R.A. Naghizadeh

2009-02-01T23:59:59.000Z

390

Ontologies are us: a unified model of social networks and semantics  

Science Conference Proceedings (OSTI)

In our work we extend the traditional bipartite model of ontologies with the social dimension, leading to a tripartite model of actors, concepts and instances. We demonstrate the application of this representation by showing how community-based semantics ...

Peter Mika

2005-11-01T23:59:59.000Z

391

Autonomous farming: modelling and control of agricultural machinery in a unified framework  

Science Conference Proceedings (OSTI)

There are significant challenges faced by the farming industry, including a reduced labour workforce and a corporate style of farming. Such factors demand an increase in farming efficiency and productivity. This paper describes future autonomous farming ... Keywords: agricultural machinery, agricultural robotics, agronomy data, articulated farm vehicles, autonomous farming, autonomous robots, autonomous vehicles, intelligent systems, precision agriculture, precision farming, tracking control, trajectory tracking, uncertainty, vehicle control, vehicle modelling

Ray Eaton; Jay Katupitiya; Kheng Wah Siew; Blair Howarth

2010-12-01T23:59:59.000Z

392

Unified nuclear core activity map reconstruction using heterogeneous instruments with data assimilation  

E-Print Network (OSTI)

Evaluating the neutronic state of the whole nuclear core is a very important topic that have strong implication for nuclear core management and for security monitoring. The core state is evaluated using measurements. Usually, part of the measurements are used, and only one kind of instruments are taken into account. However, the core state evaluation should be more accurate when more measurements are collected in the core. But using information from heterogeneous sources is at glance a difficult task. This difficulty can be overcome by Data Assimilation techniques. Such a method allows to combine in a coherent framework the information coming from model and the one coming from various type of observations. Beyond the inner advantage to use heterogeneous instruments, this leads to obtain a significant increasing of the quality of neutronic global state reconstruction with respect to individual use of measures. In order to present this approach, we will introduce here the basic principles of data assimilation f...

Bouriquet, Bertrand; Erhard, Patrick; Ponot, Anglique

2011-01-01T23:59:59.000Z

393

Unified nuclear core activity map reconstruction using heterogeneous instruments with data assimilation  

E-Print Network (OSTI)

Evaluating the neutronic state of the whole nuclear core is a very important topic that have strong implication for nuclear core management and for security monitoring. The core state is evaluated using measurements. Usually, part of the measurements are used, and only one kind of instruments are taken into account. However, the core state evaluation should be more accurate when more measurements are collected in the core. But using information from heterogeneous sources is at glance a difficult task. This difficulty can be overcome by Data Assimilation techniques. Such a method allows to combine in a coherent framework the information coming from model and the one coming from various type of observations. Beyond the inner advantage to use heterogeneous instruments, this leads to obtain a significant increasing of the quality of neutronic global state reconstruction with respect to individual use of measures. In order to present this approach, we will introduce here the basic principles of data assimilation focusing on BLUE (Best Unbiased Linear Estimation). Then we will present the configuration of the method within the nuclear core problematic. Finally, we will present the results obtained on nuclear measurement coming from various instruments.

Bertrand Bouriquet; Jean-Philippe Argaud; Patrick Erhard; Anglique Ponot

2011-08-30T23:59:59.000Z

394

Study the power flow control of a power system with unified power flow controller.  

E-Print Network (OSTI)

??Electrical power systems is a large interconnected network that requires a careful design to maintain the system with continuous power flow operation without any limitations. (more)

Peesari, Vakula

2010-01-01T23:59:59.000Z

395

A unified approach to modeling, verifying, and improving the manufacturability of mechanical assemblies  

E-Print Network (OSTI)

The goal of a design engineering organization is to design products that satisfy customers. Reaching this objective is dependent, among other things, on five parameters: the customer expectations, the target percentage of ...

Gray, J. Michael (John Michael), 1978-

2004-01-01T23:59:59.000Z

396

The policy impact of unified government: evidence from2000 to 2002  

E-Print Network (OSTI)

Divided government Energy policy Stock market Eventgovernment (and thus a continuing Democratic veto) would mean stability in energy policy,and divided government. With status quo energy policy out of

Monroe, Nathan W.

2010-01-01T23:59:59.000Z

397

The global unified parallel file system (GUPFS) project: FY 2003 activities and results  

E-Print Network (OSTI)

2 Cary L. Whitney 1 NERSC Center Division ComputationalScientific Computing (NERSC) Center whose goal is to providefile system for all of the NERSC production computing and

Butler, Gregory F.; Baird, William P.; Lee, Rei C.; Tull, Craig E.; Welcome, Michael L.; Whitney, Cary L.

2004-01-01T23:59:59.000Z

398

The global unified parallel file system (GUPFS) project: FY 2002 activities and results  

E-Print Network (OSTI)

3 Appendix D References 1. NERSC Strategic Proposal FY2002and Michael L. Welcome 2 NERSC Center Division Computational7 NERSC User I/O

Butler, Gregory F.; Lee, Rei Chi; Welcome, Michael L.

2003-01-01T23:59:59.000Z

399

A unified treatment for stability preservation in computer simulations of impulsive BAM networks  

Science Conference Proceedings (OSTI)

This paper is concerned with the stability preservation in computer simulations of an impulsive bidirectional associative memory (BAM) network. The simulations are provided by difference equations formulated from a semi-discretisation technique and impulsive ... Keywords: Computer simulations, Exponential stability, Impulsive BAM networks, Lyapunov exponent, Semi-discretisation

Sannay Mohamad; K. Gopalsamy

2008-05-01T23:59:59.000Z

400

A unified architecture for the design and evaluation of wireless fair queueing algorithms  

Science Conference Proceedings (OSTI)

Fair queueing in the wireless domain poses significant challenges due to unique issues in the wireless channel such as location-dependent and bursty channel errors. In this paper, we present a wireless fair service model that captures the scheduling ... Keywords: fair queueing, wireless fair service, wireless networks, wireless scheduling

Thyagarajan Nandagopal; Songwu Lu; Vaduvur Bharghavan

2002-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Unified Treatment of Thermodynamic and Optical Variability in a Simple Model of Unresolved Low Clouds  

Science Conference Proceedings (OSTI)

Comparative studies of global climate models have long shown a marked sensitivity to the parameterization of cloud properties. Early attempts to quantify this sensitivity were hampered by diagnostic schemes that were inherently biased toward the ...

Christopher A. Jeffery; Philip H. Austin

2003-07-01T23:59:59.000Z

402

An Access Definition and Query Language : Towards a Unified Access Control Model.  

E-Print Network (OSTI)

??In this work we suggest a meta access control model emulating established access control models by configuration and offering enhanced features like the delegation of (more)

Sonnenbichler, Andreas

2013-01-01T23:59:59.000Z

403

The policy impact of unified government: evidence from2000 to 2002  

E-Print Network (OSTI)

2010) 142: 111124 Oil and Gas Companies Mitchell Energy &The results show that oil and gas stocks (i.e. Republican included in samples Oil and Gas Companies Exxon Mobil Corp.

Monroe, Nathan W.

2010-01-01T23:59:59.000Z

404

Unifying weighting and case reduction methods based on rough sets to improve retrieval  

Science Conference Proceedings (OSTI)

Case-Based Reasoning systems usually retrieve cases using a similarity function based on K-NN or some derivatives. These functions are sensitive to irrelevant or noisy features. Weighting methods are used to extract the most important information ...

Maria Salam; Elisabet Golobardes

2003-06-01T23:59:59.000Z

405

From regular expressions to nested words: unifying languages and query execution for relational and XML sequences  

Science Conference Proceedings (OSTI)

There is growing interest in query language extensions for pattern matching over event streams and stored database sequences, due to the many important applications that such extensions make possible. The push for such extensions has led DBMS vendors ...

Barzan Mozafari; Kai Zeng; Carlo Zaniolo

2010-09-01T23:59:59.000Z

406

A Unified Approach for Integrated Computer-Aided Design and Manufacturing  

E-Print Network (OSTI)

different types of additive manufacturing technologies, suchbe used to model the additive manufacturing process as well.composite manufacturing and 3D printing, are additive. They

Huang, Bin

2013-01-01T23:59:59.000Z

407

A Unified Approach for Integrated Computer-Aided Design and Manufacturing  

E-Print Network (OSTI)

Lilli Manolis Sherman, 3D Printers lead growth of Rapidprototyping machining(3D printer). The second phase creates

Huang, Bin

2013-01-01T23:59:59.000Z

408

A Unified Approach for Integrated Computer-Aided Design and Manufacturing  

E-Print Network (OSTI)

CNC tool path in terms of B-spline curves, Computer-AidedNon-Uniformed Rational B- spline (NURBS) [43, 44] is anof explicit models are B-spline hyperpatch [68], COONs,

Huang, Bin

2013-01-01T23:59:59.000Z

409

A Unified Architecture for the computation of B-Spline Curves  

E-Print Network (OSTI)

B-Splines in general, and Non-Uniform Rational B-Splines in particular, have become indispensable modeling primitives in computer graphics and geometric modeling applications. In this paper a novel high-performance architecture for the computation of uniform, non-uniform, rational and non-rational B-Spline curves and surfaces is presented. This architecture has been derived through a sequence of steps. First, a systolic architecture for the computation of the basis function values, the basis function evaluation array (the BFEA), is developed. Using the BFEA as its core, an architecture for the computation of non-uniform rational B-Spline curves is constructed. This architecture is then extended to compute NURBS surfaces. Finally, this architecture is augmented to compute the surface normals so that the output from this architecture can be directly used for rendering the NURBS surface.

And Surfaces Meenakshisundaram; Meenakshisundaram Gopi; Swami Manohar

1997-01-01T23:59:59.000Z

410

A unified point process probabilistic framework to assess heartbeat dynamics and autonomic cardiovascular control  

E-Print Network (OSTI)

In recent years, time-varying inhomogeneous point process models have been introduced for assessment of instantaneous heartbeat dynamics as well as specific cardiovascular control mechanisms and hemodynamics. Assessment ...

Chen, Zhe

411

Higgs boson mass and sparticle spectroscopy in Yukawa unified SUSY SO(10)  

Science Conference Proceedings (OSTI)

We employ third family Yukawa unification, predicted by simple supersymmetric SO(10) models, to estimate the lightest MSSM Higgs boson mass. For {mu} > 0 (or {mu} < 0) and m{sub t} = 173.1GeV, the Higgs mass is estimated to lie close to 123-124 GeV. The theoretical uncertainty in this estimate is {+-}3 GeV. We highlight some LHC testable benchmark points which also display the presence of neutralino-stau coannihilation channel.

Shafi, Qaisar [Bartol Research Institute, Department of Physics and Astronomy, University of Delaware, Newark, DE 19716 (United States)

2012-07-27T23:59:59.000Z

412

A Unified Representation of Deep Moist Convection in Numerical Modeling of the Atmosphere. Part I  

Science Conference Proceedings (OSTI)

A generalized framework for cumulus parameterization applicable to any horizontal resolution between those typically used in general circulation and cloud-resolving models is presented. It is pointed out that the key parameter in the ...

Akio Arakawa; Chien-Ming Wu

2013-07-01T23:59:59.000Z

413

Unified Analytical Solution for Radial Flow to a Well in a Confined Aquifer  

E-Print Network (OSTI)

Drawdowns generated by extracting water from a large diameter (e.g. water supply) well are affected by wellbore storage. We present an analytical solution in Laplace transformed space for drawdown in a uniform anisotropic aquifer caused by withdrawing water at a constant rate from a partially penetrating well with storage. The solution is back transformed into the time domain numerically. When the pumping well is fully penetrating our solution reduces to that of Papadopulos and Cooper [1967]; Hantush [1964] when the pumping well has no wellbore storage; Theis [1935] when both conditions are fulfilled and Yang et.al. [2006] when the pumping well is partially penetrating, has finite radius but lacks storage. We use our solution to explore graphically the effects of partial penetration, wellbore storage and anisotropy on time evolutions of drawdown in the pumping well and in observation wells.

Phoolendra Kumar Mishra; Velimir V. Vesselinov

2011-10-26T23:59:59.000Z

414

Unified Analytical Solution for Radial Flow to a Well in a Confined Aquifer  

E-Print Network (OSTI)

Drawdowns generated by extracting water from a large diameter (e.g. water supply) well are affected by wellbore storage. We present an analytical solution in Laplace transformed space for drawdown in a uniform anisotropic aquifer caused by withdrawing water at a constant rate from a partially penetrating well with storage. The solution is back transformed into the time domain numerically. When the pumping well is fully penetrating our solution reduces to that of Papadopulos and Cooper [1967]; Hantush [1964] when the pumping well has no wellbore storage; Theis [1935] when both conditions are fulfilled and Yang et.al. [2006] when the pumping well is partially penetrating, has finite radius but lacks storage. We use our solution to explore graphically the effects of partial penetration, wellbore storage and anisotropy on time evolutions of drawdown in the pumping well and in observation wells.

Mishra, Phoolendra Kumar

2011-01-01T23:59:59.000Z

415

A Unified approach to NNLO soft and virtual corrections in electroweak, Higgs, QCD, and SUSY processes.  

E-Print Network (OSTI)

) ? (2CF ? CA) ln ( tu sQ2 ) , (3.20) and c1 = CF [ ?3 2 + ln ( tu Q4 )] ln ( 2F s ) + ?0 4 ln ( 2R s ) . (3.21) These are in agreement with the NLO result in [30]. 14 3.6.2 qg ? qV Here tq = u, tg = t, and Re?? (1) S = CF ln(?u/s) + CF + (CA/2) ln... (t/u) + CA/2 [19]. The NLO soft and virtual corrections are ?(1)qg?qV = ? B qg?qV ?s(2R) pi {c3D1(s2) + c2D0(s2) + c1?(s2)} (3.22) with c3 = CF + 2CA, c2 = ? 3 4 CF ? (CF + CA) ln ( 2F Q2 ) ? CA ln ( tu sQ2 ) , (3.23) and c1 = [ ??0 4 ? 3 4 CF + CF ln...

Kidonakis, Nikolaos

416

Cogeneration of Dark Matter and Baryons by Non-Standard-Model Sphalerons in Unified Models  

E-Print Network (OSTI)

Sphalerons of a new gauge interaction can convert a primordial asymmetry in B or L into a dark matter asymmetry. From the equilibrium conditions for the sphalerons of both the electroweak and the new interactions, one can compute the ratios of B, L, and X, where X is the dark matter number, thus determining the mass of the dark matter particle fairly precisely. Such a scenario can arise naturally in the context of unification with larger groups. An illustrative model embeddable in $SU(6) \\times SU(2) \\subset E_6$ is described as well as an equally simple model based on SU(7).

S. M. Barr; Heng-Yu Chen

2013-08-30T23:59:59.000Z

417

Unified Einstein-Virasoro Master Equation in the General Non-Linear Sigma Model  

E-Print Network (OSTI)

bf d ? aec + ? a e ? d H bec + ? b e (? d H aec ? ? acf H def ? H acf H de f )). (6.12d) (6.12e) The background ?eld

Boer, J. de

2009-01-01T23:59:59.000Z

418

The Uintah Framework: A Unified Heterogeneous Task Scheduling and Runtime System  

E-Print Network (OSTI)

Computing Facility, "Titan Web Page," 2011, http://www.olcf.ornl.gov/titan/. [15] J. Vetter, R. Glassbrook

Utah, University of

419

Weak Hopf Algebras unify the Hennings-Kauffman-Radford and the Reshetikhin-Turaev invariant  

E-Print Network (OSTI)

We present an invariant of connected and oriented closed 3-manifolds based on a coribbon Weak Hopf Algebra H with a suitable left-integral. Our invariant can be understood as the generalization to Weak Hopf Algebras of the Hennings-Kauffman-Radford evaluation of an unoriented framed link using a dual quantum-trace. This quantum trace satisfies conditions that render the link evaluation invariant under Kirby moves. If H is a suitable finite-dimensional Hopf algebra (not weak), our invariant reduces to the Kauffman-Radford invariant for the dual of H. If H is the Weak Hopf Algebra Tannaka-Krein reconstructed from a modular category C, our invariant agrees with the Reshetikhin-Turaev invariant. In particular, the proof of invariance of the Reshetikhin-Turaev invariant becomes as simple as that of the Kauffman-Radford invariant. Modularity of C is only used once in order to show that the invariant is non-zero; apart from this, a fusion category with ribbon structure would be sufficient. Our generalization of the Kauffman-Radford invariant for a Weak Hopf Algebra H and the Reshetikhin-Turaev invariant for its category of finite-dimensional comodules C=M^H always agree by construction. There is no need to consider a quotient of the representation category modulo 'negligible morphisms' at any stage, and our construction contains the Reshetikhin-Turaev invariant for an arbitrary modular category C, whether its relationship with some quantum group is known or not.

Hendryk Pfeiffer

2011-05-02T23:59:59.000Z

420

Weak Hopf Algebras unify the Hennings-Kauffman-Radford and the Reshetikhin-Turaev invariant  

E-Print Network (OSTI)

We present an invariant of connected and oriented closed 3-manifolds based on a coribbon Weak Hopf Algebra H with a suitable left-integral. Our invariant can be understood as the generalization to Weak Hopf Algebras of the Hennings-Kauffman-Radford evaluation of an unoriented framed link using a dual quantum-trace. This quantum trace satisfies conditions that render the link evaluation invariant under Kirby moves. If H is a suitable finite-dimensional Hopf algebra (not weak), our invariant reduces to the Kauffman-Radford invariant for the dual of H. If H is the Weak Hopf Algebra Tannaka-Krein reconstructed from a modular category C, our invariant agrees with the Reshetikhin-Turaev invariant. In particular, the proof of invariance of the Reshetikhin-Turaev invariant becomes as simple as that of the Kauffman-Radford invariant. Modularity of C is only used once in order to show that the invariant is non-zero; apart from this, a fusion category with ribbon structure would be sufficient. Our generalization of the ...

Pfeiffer, Hendryk

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Summaries, ranked retrieval and sessions: a unified framework for information access evaluation  

Science Conference Proceedings (OSTI)

We introduce a general information access evaluation framework that can potentially handle summaries, ranked document lists and even multi query sessions seamlessly. Our framework first builds a trailtext which represents a concatenation of all ... Keywords: evaluation, metrics, sessions, test collections

Tetsuya Sakai; Zhicheng Dou

2013-07-01T23:59:59.000Z

422

Process Science And Philosophy: For Want Of Synthetic Thought And A Unifying Philosophy  

Science Conference Proceedings (OSTI)

This paper examines the issues of integrating scientific knowledge and it attempts to reveal the potential of a more fundamental model of interdisciplinary science. Proposed is an approach which joins process science with process philosophy through a ...

Stanley G. Gatchel; Murat M. Tanik

2001-12-01T23:59:59.000Z

423

Lighting and Human Performance II: Beyond Visibility Models Toward a Unified Human Factors Approach to Performance  

Science Conference Proceedings (OSTI)

To understand the relationship between lighting conditions and human performance, it is first necessary to identify the routes by which lighting conditions can affect human performance. There are three such routes: the visual system, the circadian photobiological system, and the perceptual system. This report updates and replaces an earlier work and explores the relationship between lighting conditions and the ability to carry out tasks in interiors.

2001-10-29T23:59:59.000Z

424

Deliquescence and efflorescence of small particles: Unifying perspectives from nucleation theory  

SciTech Connect

We examine size dependent deliquescence/efflorescence phase transformation for particles down to several nanometers in size. A thin layer criterion (TLC) is introduced to define a deliquescence relative humidity (DRH) for small particles. The usual bulk deliquescence conditions are recovered in the limit of large dry particle size. Nano-size particles are shown to deliquesce to metastable states via a nucleation process at relative humidity just below the DRH. The nucleation barrier is located at a critical solution layer thickness and vanishes at the DRH defined by the TLC. Methods from nucleation theory form the basis for the analysis and yield new insights into the theory, facilitate the interpretation of measurements, and point to unification of deliquescence and efflorescence processes for particles in the nano regime. Methods include thermodynamic area constructions, Legendre transforms relating the binary free-energy surfaces for deliquescence and efflorescence processes, and application of nucleation theorems.

McGraw,R.; Lewis, E.

2009-02-23T23:59:59.000Z

425

A unified foundational ontology and some applications of it in business modeling  

E-Print Network (OSTI)

Abstract: Foundational ontologies provide the basic concepts upon which any domain-specific ontology is built. This paper presents a new foundational ontology, UFO, and shows how it can be used as a guideline in business modeling and for evaluating business modeling methods. UFO is derived from a synthesis of two other foundational ontologies, GFO/GOL and OntoClean/DOLCE. While their main areas of application are natural sciences and linguistics/cognitive engineering, respectively, the main purpose of UFO is to provide a foundation for conceptual modeling, including business modeling. 1

Giancarlo Guizzardi; Gerd Wagner

2004-01-01T23:59:59.000Z

426

Unified high-level synthesis and module placement for defect-tolerant microfluidic biochips  

Science Conference Proceedings (OSTI)

Microfluidic biochips promise to revolutionize biosensing and clinical diagnostics. As more bioassays are executed concurrently on a biochip, system integration and design complexity are expected to increase dramatically. This problem is also identified ... Keywords: biochip, defect tolerance, microfluidics, placement, synthesis

Fei Su; Krishnendu Chakrabarty

2005-06-01T23:59:59.000Z

427

A unified information theoretic framework for pair- and group-wise registration of medical images  

E-Print Network (OSTI)

The field of medical image analysis has been rapidly growing for the past two decades. Besides a significant growth in computational power, scanner performance, and storage facilities, this acceleration is partially due ...

Zllei, Lilla, 1977-

2006-01-01T23:59:59.000Z

428

A unified processor model for compiler verification and simulation using ASM  

Science Conference Proceedings (OSTI)

For safety critical embedded systems the correctness of the processor, toolchain and compiler is an important issue. Translation validation is one approach for compiler verification. A common semantic framework to represent source and target language ...

Roland Lezuo; Andreas Krall

2012-06-01T23:59:59.000Z

429

FORMS: Unifying reference model for formal specification of distributed self-adaptive systems  

Science Conference Proceedings (OSTI)

The challenges of pervasive and mobile computing environments, which are highly dynamic and unpredictable, have motivated the development of self-adaptive software systems. Although noteworthy successes have been achieved on many fronts, the construction ... Keywords: Formal methods, autonomic computing, self-adaptation

Danny Weyns; Sam Malek; Jesper Andersson

2012-04-01T23:59:59.000Z

430

A unified approach to topology generation and area optimization of general floorplans  

Science Conference Proceedings (OSTI)

In this paper, it is shown that for any rectangularly dualizable graph, a feasible topology can be obtained by using only either straight or Z-cutlines recursively within a bounding rectangle. Given an adjacency graph, a potential topology, which may ... Keywords: VLSI floorplanning, placement, AND-OR graphs, heuristic search

Partha S. Dasgupta; Susmita Sur-Kolay; Bhargab B. Bhattacharya

1995-12-01T23:59:59.000Z

431

Towards ontological foundations for agent modelling concepts using the unified fundational ontology (UFO)  

Science Conference Proceedings (OSTI)

Foundational ontologies provide the basic concepts upon which any domain-specific ontology is built. This paper presents a new foundational ontology, UFO, and shows how it can be used as a foundation of agent concepts and for evaluating agent-oriented ...

Giancarlo Guizzardi; Gerd Wagner

2004-06-01T23:59:59.000Z

432

A unified model of early word learning: Integrating statistical and social cues  

Science Conference Proceedings (OSTI)

Previous studies on early language acquisition have shown that word meanings can be acquired by an associative procedure that maps perceptual experience onto linguistic labels based on cross-situational observation. Recently, a social-pragmatic account ... Keywords: Cognitive development, Computational modeling, Language development, Social cue, Statistical learning, Word learning

Chen Yu; Dana H. Ballard

2007-08-01T23:59:59.000Z

433

Validated, unified model for optics and heat transfer in line-axis concentrating solar energy collectors  

SciTech Connect

A rigorous numerical simulation model for the prediction of the combined optical and thermofluid behaviour of line-axis concentrating solar energy collectors combines two-dimensional steady-state finite element analysis of convective heat transfer and ray-trace techniques. The optical analysis considers both direct and diffuse insolation components and is therefore useful for the analysis of compound parabolic concentrating collectors. Experiments using Mach-Zehnder interferometry indicate a parametric range for which such a two-dimensional representation is valid.

Eames, P.C.; Norton, B. (Univ. of Ulster (United Kingdom))

1993-04-01T23:59:59.000Z

434

Microsoft Word - Wind Report Final June 15 2010.doc  

Gasoline and Diesel Fuel Update (EIA)

B B EIA Task Order No. DE-DT0000804, Subtask 3 The Cost and Performance of Distributed Wind Turbines, 2010-35 Final Report June 2010 Prepared for: Office of Integrated Analysis & Forecasting U.S. Energy Information Administration Prepared by: ICF International Contact: Robert Kwartin T: (703) 934-3586 E: RKwartin@icfi.com ii Table of Contents Executive Summary ..................................................................................................................... iv Introduction ................................................................................................................................... v 1. Technology Overview............................................................................................................1

435

Microsoft Word - PV Report v20.doc  

Gasoline and Diesel Fuel Update (EIA)

A A EIA Task Order No. DE-DT0000804, Subtask 3 Photovoltaic (PV) Cost and Performance Characteristics for Residential and Commercial Applications Final Report August 2010 Prepared for: Office of Integrated Analysis and Forecasting U.S. Energy Information Administration Prepared by: ICF International Contact: Robert Kwartin T: (703) 934-3586 E: rkwartin@icfi.com ii Table of Contents Executive Summary ...................................................................................................................... v 1. Introduction ...........................................................................................................................1 1.1 Objective ....................................................................................................................1

436

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

28, 2011 28, 2011 T-566: Citrix Secure Gateway Unspecified Vulnerability A vulnerability has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. February 18, 2011 T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device. February 17, 2011 T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via

437

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

20, 2011 20, 2011 T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. January 19, 2011 T-537: Oracle Critical Patch Update Advisory - January 2011 A Critical Patch Update is a collection of patches for multiple security vulnerabilities. It also includes non-security fixes that are required because of interdependencies by those security patches. Critical Patch Updates are cumulative. January 18, 2011 T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software vary depending on

438

Office of Electricity Delivery and Energy Reliability  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Comments of Cisco Systems to Comments of Cisco Systems to Office of Electricity Delivery and Energy Reliability Department of Energy in Response to Request for Information: Addressing Policy and Logistical Challenges to Smart Grid Implementation Issued September 13, 2010 FR Doc. 2010-23251 November 30, 2010 Cisco Systems provides these Comments in response to the Request for Information ("RFI") issued by the Office of Electricity Delivery and Energy Reliability of the Department of Energy ("DOE") on September 13, 2010. The RFI seeks information across a broad range of topics, but also requests that commenters be "concise," and provide "facts and concrete recommendations that can augment the general knowledge." 1 1. Interoperability Standards and the Smart Grid

439

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

91 - 18700 of 28,560 results. 91 - 18700 of 28,560 results. Article Energy Efficiency Hits from the Doors (and Windows) Our 1970's-vintage house always seemed a bit too welcoming when howling winter winds swept up Colorado's foothills. http://energy.gov/energysaver/articles/energy-efficiency-hits-doors-and-windows Article U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system. http://energy.gov/cio/articles/u-205-rsa-access-manager-session-replay-flaw-lets-remote-users-access-system Article U-125: Cisco ASA Multiple Bugs Let Remote Users Deny Service Several vulnerabilities were reported in Cisco ASA. http://energy.gov/cio/articles/u-125-cisco-asa-multiple-bugs-let-remote-users-deny-service

440

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 23020 of 28,905 results. 11 - 23020 of 28,905 results. Article U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. http://energy.gov/cio/articles/u-138-cisco-ios-ipsec-ike-unspecified-denial-service-vulnerability Article Registration Now Open for 2013 Science Bowl Teams Participating Teams Compete in Science, Technology, Engineering, and Math for Opportunity to Travel to Washington, DC for the National Science Bowl http://energy.gov/articles/registration-now-open-2013-science-bowl-teams Article Global Nuclear Energy Partnership Steering Group Members Approve Transformation to the International Framework for Nuclear Energy

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Energy Conservation Program for Consumer Products and Certain Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Program for Consumer Products and Certain Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034 Energy Conservation Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034 Pursuant to the guidance issued by the Office of General Counsel in its Notice of Guidance on Ex Parte Communications, 74 F.R. 197, this memorandum summarizes a November 22, 2013 meeting between Cisco Systems, Inc. ("Cisco") and Department staff regarding the above-referenced Proposed Determination. Cisco_DOE_Ex Parte.pdf More Documents & Publications Ex Parte Communication, Docket EERE-BT-DET-0033

442

Energy Conservation Program for Consumer Products and Certain Commercial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Conservation Program for Consumer Products and Certain Energy Conservation Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034 Energy Conservation Program for Consumer Products and Certain Commercial and Industrial Equipment: Proposed Determination of Computer Servers as a Covered Consumer Product, EERE-2013-BT-DET-0034 Pursuant to the guidance issued by the Office of General Counsel in its Notice of Guidance on Ex Parte Communications, 74 F.R. 197, this memorandum summarizes a November 22, 2013 meeting between Cisco Systems, Inc. ("Cisco") and Department staff regarding the above-referenced Proposed Determination. Cisco_DOE_Ex Parte.pdf More Documents & Publications DOE's Proposed Coverage Determination for Set-Top Boxes

443

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

601 - 23610 of 28,905 results. 601 - 23610 of 28,905 results. Article Workers Deliver Award-Winning Respiratory Safety RICHLAND, Wash. - Workers supporting the Richland Operations Office at the Hanford site found a way to make their everyday work even safer. http://energy.gov/em/articles/workers-deliver-award-winning-respiratory-safety Article V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. http://energy.gov/cio/articles/v-125-cisco-connected-grid-network-management-system-multiple-vulnerabilities Article V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by

444

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11 - 21220 of 28,905 results. 11 - 21220 of 28,905 results. Article V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information Two vulnerabilities were reported in Cisco Video Surveillance Manager. http://energy.gov/cio/articles/v-202-cisco-video-surveillance-manager-bugs-let-remote-users-obtain-potentially Download Audit Report: OAS-M-07-04 Follow-Up Audit of the National Nuclear Security Administration's Implementation of the 2003 Design Basis Threat Policy http://energy.gov/ig/downloads/audit-report-oas-m-07-04 Download EA-121-A Electric Clearinghouse, Inc. http://energy.gov/oe/downloads/ea-121-electric-clearinghouse-inc Download EA-178 Citizens Power Sales http://energy.gov/oe/downloads/ea-178-citizens-power-sales Download EA-247 AES NewEnergy Inc

445

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2011 3, 2011 T-636: Wireshark Multiple Flaws Let Remote Users Deny Service Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. June 2, 2011 T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges

446

A unified mathematical framework and an adaptive numerical method for fluid-structure interaction with rigid, deforming, and elastic bodies  

Science Conference Proceedings (OSTI)

Many problems of interest in biological fluid mechanics involve interactions between fluids and solids that require the coupled solution of momentum equations for both the fluid and the solid. In this work, we develop a mathematical framework and an ... Keywords: Adaptive mesh refinement, Distributed Lagrange multipliers, Fluid-structure interaction, Free swimming, Immersed boundary method, Incompressible Navier-Stokes equations

Amneet Pal Singh Bhalla, Rahul Bale, Boyce E. Griffith, Neelesh A. Patankar

2013-10-01T23:59:59.000Z

447

A unified framework for the construction of one-step finite volume and discontinuous Galerkin schemes on unstructured meshes  

Science Conference Proceedings (OSTI)

In this article, a conservative least-squares polynomial reconstruction operator is applied to the discontinuous Galerkin method. In a first instance, piecewise polynomials of degree N are used as test functions as well as to represent the data in each ... Keywords: Discontinuous Galerkin, Euler equations, Finite volume, Hyperbolic PDE, Ideal and relativistic MHD equations, Local continuous space-time Galerkin method, M-exact PNPM least squares reconstruction, Nonlinear elasticity, One-step time discretization, Unstructured meshes, WENO

Michael Dumbser; Dinshaw S. Balsara; Eleuterio F. Toro; Claus-Dieter Munz

2008-09-01T23:59:59.000Z

448

Unified Architecture for Large-Scale Attested Metering Michael LeMay, George Gross, Carl A. Gunter, Sanjam Garg  

E-Print Network (OSTI)

as the interface. 2.2. Unique Characteristics Just as cellphones have become ubiquitous, mobile com- puting unreachable areas. However, it also raises serious privacy concerns. The in- troduction of cellphones compromised the location privacy of customers, since the radio signals of cellphones can be tracked

Gross, George

449

Einstein-Hopf drag, Doppler shift of thermal radiation and blackbody friction: A unifying perspective on an intriguing physical effect  

E-Print Network (OSTI)

The thermal friction force acting on an atom moving relative to a thermal photon bath has recently been calculated on the basis of the fluctuation-dissipation theorem. The thermal fluctuations of the electromagnetic field give rise to a drag force on an atom provided one allows for dissipation of the field energy via spontaneous emission. The drag force exists if the atomic polarizability has a nonvanishing imaginary part. Here, we explore alternative derivations. The damping of the motion of a simple harmonic oscillator is described by radiative reaction theory (result of Einstein and Hopf), taking into account the known stochastic fluctuations of the electromagnetic field. Describing the excitations of the atom as an ensemble of damped harmonic oscillators, we identify the previously found expressions as generalizations of the Einstein-Hopf result. In addition, we present a simple explanation for blackbody friction in terms of a Doppler shift of the thermal radiation in the inertial frame of the moving atom...

Lach, G; Jentschura, U D

2011-01-01T23:59:59.000Z

450

A Unified Model for Moist Convective Boundary Layers Based on a Stochastic Eddy-Diffusivity/Mass-Flux Parameterization  

Science Conference Proceedings (OSTI)

A single-column model (SCM) is developed for representing moist convective boundary layers. The key component of the SCM is the parameterization of subgrid-scale vertical mixing, which is based on a stochastic eddy-diffusivity/mass-flux (EDMF) ...

Kay Suelj; Joo Teixeira; Daniel Chung

2013-07-01T23:59:59.000Z

451

A unified numerical framework model for simulating flow, transport, and heat transfer in porous and fractured media  

E-Print Network (OSTI)

or chemical species in a multiphase porous medium system canand radiation in a multiphase, multicomponent, porous mediummultiphase flow, multicomponent transport, and heat transfer in porous

Wu, Yu-Shu

2004-01-01T23:59:59.000Z

452

A Tropical Ocean Recharge Mechanism for Climate Variability. Part II: A Unified Theory for Decadal and ENSO Modes  

Science Conference Proceedings (OSTI)

Decadal to interdecadal timescale variability in the Pacific region, commonly referred to as the Pacific decadal oscillation (PDO), is studied in this research using analytical and numerical models. A coupled analytical model is formulated to ...

Xiaochun Wang; Fei-Fei Jin; Yuqing Wang

2003-11-01T23:59:59.000Z

453

Two-Stream Approximations to Radiative Transfer in Planetary Atmospheres: A Unified Description of Existing Methods and a New Improvement  

Science Conference Proceedings (OSTI)

Existing two-stream approximations to radiative transfer theory for particulate media are shown to be represented by identical forms of coupled differential equations if the intensity is replaced by integrals of the intensity over hemispheres. ...

W. E. Meador; W. R. Weaver

1980-03-01T23:59:59.000Z

454

Unified Theory of Bivacuum, Particles Duality, Fields & Time. New Bivacuum Mediated Interaction, Overunity Devices, Cold Fusion & Nucleosynthesis  

E-Print Network (OSTI)

New concept of Bivacuum is introduced, as a dynamic matrix of the Universe, composed from sub-quantum particles and antiparticles, forming vortical structures. These structures are presented by continuum of dipoles, each dipole containing a pair of correlated torus and antitorus: V(+) and V(-) of the opposite energy/mass, spin, charge and magnetic moments, compensating each other. The rest mass and charge of sub-elementary fermions or antifermions is a result of Bivacuum dipoles opposite symmetry shifts. Their fusion to triplets follows by elementary particles and antiparticles origination. The [corpuscle (C) - wave (W)] duality is a result of correlated beats between the 'actual' and 'complementary' states of sub-elementary fermions of triplets. It is shown, that Principle of least action, the 2d and 3d laws of thermodynamics can be a consequences of forced combinational resonance between positive and negative virtual pressure waves (VPW+/-) of Bivacuum and [C-W] pulsation of elementary particles. The quantum entanglement, mediated by virtual microtubules, composed from Bivacuum dipoles, connecting remote particles, is a result of such Bivacuum-matter interaction. The pace of time for any closed system is determined by pace of kinetic energy change of this system. The proposed mechanism of overunity devices can be provided by the electrons acceleration, induced by their resonant interaction with high frequency positive and negative VPW+/- in pull-in range conditions. The latter can be excited by pulsing currents and fields. The mechanism of overheating and cold fusion in electrolytic cells without violation of energy conservation is proposed also.

Alex Kaivarainen

2002-07-06T23:59:59.000Z

455

A cloud approach to unified lifecycle data management in architecture, engineering, construction and facilities management: Integrating BIMs and SNS  

Science Conference Proceedings (OSTI)

The problem of data integration throughout the lifecycle of a construction project among multiple collaborative enterprises remains unsolved due to the dynamics and fragmented nature of the construction industry. This study presents a novel cloud approach ... Keywords: Building information modeling, Business social networking services, Cloud computing, Life cycle data management, Self-organisation, Version control

Yi Jiao, Yinghui Wang, Shaohua Zhang, Yin Li, Baoming Yang, Lei Yuan

2013-04-01T23:59:59.000Z

456

A unified numerical framework model for simulating flow, transport, and heat transfer in porous and fractured media  

E-Print Network (OSTI)

fluid flow, multicomponent transport, and heat transfer in porous and fractured media,fluid flow, solute transport, and heat transfer occur in porous and fractured media.fluid flow, mass transport, and heat-transfer processes through porous and fractured media.

Wu, Yu-Shu

2004-01-01T23:59:59.000Z

457

A unified numerical framework model for simulating flow, transport, and heat transfer in porous and fractured media  

E-Print Network (OSTI)

equations of mass and thermal energy, shown in Equation (1),is contributed by thermal energy carried mainly by bulk flowfor component k or thermal energy, respectively, are defined

Wu, Yu-Shu

2004-01-01T23:59:59.000Z

458

Stereoradar Meteorology: A New Unified Approach to Process Data from Airborne or Ground-Based Meteorological Radars  

Science Conference Proceedings (OSTI)

The concept of stereoradar in meteorology was first proposed by Testud and Amayenc. It consists of radar observations of a precipitation cell from two viewing angles, using an attenuated frequency. The initial inspiration of the technique lays in ...

Ahmed Kabche; Jacques Testud

1995-08-01T23:59:59.000Z

459

The Rise and Fall of the Dream Schools: Equity and Local Politics in the San Francisco Unified School District  

E-Print Network (OSTI)

Richard F. and McLaughlin, Milbrey W. (1988). the plan (Elmore and McLaughlin, 1988; Hess, 1999; 1996; Elmore and McLaughlin, 1988; Darling-?Hammond,

Livingston, Matthew Merritt

2011-01-01T23:59:59.000Z

460

A unified risk-Informed framework to assess the proliferation risk and license the proliferation performance of nuclear energy systems  

E-Print Network (OSTI)

In order to strengthen the current non-proliferation regime it is necessary to guarantee high standards of security for the sites that use, store, produce, or reprocess special nuclear materials (SNM). The current surge ...

Cavalieri d'Oro, Edoardo

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

A Unified Risk-Informed Framework to Assess the Proliferation Risk and License the Proliferation Performace of Nuclear Energy  

E-Print Network (OSTI)

In order to strengthen the current non-proliferation regime it is necessary to guarantee high standards of security for the sites that use, store, produce, or reprocess special nuclear materials (SNM). The current surge ...

d'Oro, Edoardo Cavalieri

462

A unified theory of resonant excitation of kinetic ballooning modes by energetic ions/alpha particles in tokamaks  

SciTech Connect

A complete theory of wave-particle interactions is presented whereby both circulating and trapped energetic ions can destabilize kinetic ballooning modes in tokamaks. Four qualitatively different types of resonances, involving wave-precessional drift, wave-transit, wave-bounce, and precessional drift-bounce interactions, are identified, and the destabilization potential of each is assessed. For a characteristic slowing-down distribution function, the dominant interaction is that which taps those resonant ions with the highest energy. Implications of the theory for present and future generation fusion experiments are discussed. 16 refs.

Biglari, H.; Chen, L.

1991-10-01T23:59:59.000Z

463

A unified numerical framework model for simulating flow, transport, and heat transfer in porous and fractured media  

E-Print Network (OSTI)

Flow, Transport, and Heat Transfer in Porous and Fracturedtransport, and heat transfer in porous and fracturedflow, chemical transport, and heat transfer in rock. These

Wu, Yu-Shu

2004-01-01T23:59:59.000Z

464

Unified Field Theory From Enlarged Transformation Group. The Covariant Derivative for Conservative Coordinate Transformations and Local Frame Transformations  

E-Print Network (OSTI)

Pandres has developed a theory in which the geometrical structure of a real four-dimensional space-time is expressed by a real orthonormal tetrad, and the group of diffeomorphisms is replaced by a larger group called the conservation group. This paper extends the geometrical foundation for Pandres' theory by developing an appropriate covariant derivative which is covariant under all local Lorentz (frame) transformations, including complex Lorentz transformations, as well as conservative transformations. After defining this extended covariant derivative, an appropriate Lagrangian and its resulting field equations are derived. As in Pandres' theory, these field equations result in a stress-energy tensor that has terms which may automatically represent the electroweak field. Finally, the theory is extended to include 2-spinors and 4-spinors.

Edward Lee Green

2009-07-22T23:59:59.000Z

465

A unified numerical framework model for simulating flow, transport, and heat transfer in porous and fractured media  

E-Print Network (OSTI)

transport, and heat transfer processes in porous media. 2.1.mass transport, and heat-transfer processes through porousinvolved. These heat-transfer processes are complicated by

Wu, Yu-Shu

2004-01-01T23:59:59.000Z

466

Unified Plug-in Electric Vehicle (PEV) to Smart Grid Integration Approach within Automotive and Utility Industries  

Science Conference Proceedings (OSTI)

This technical update is a status report on the OEM (Original Equipment Manufacturer) Central Server Phase 1 project through 2013. The OEM Central Server is a server-based application that enables utilities to manage charging for the entire installed base of Plug-in Electric Vehicles (PEVs) as controllable loads. The application uses a set of open, interoperable standards-based interfaces either via aggregated, indirect Demand Response (DR) programs using Open Automated Demand Response ...

2013-12-30T23:59:59.000Z

467

Modes of Interannual Tropical OceanAtmosphere Interactiona Unified View. Part III: Analytical Results in Fully Coupled Cases  

Science Conference Proceedings (OSTI)

The parameter-space dependence of the eigenmodes of the coupled tropical ocean-atmosphere system, linearized about a climatological basic state, is further examined in a stripped-down intermediate coupled model using the formulation derived in ...

Fei-Fei Jin; David Neelin

1993-11-01T23:59:59.000Z

468

Power Flow Controller for Renewables: Transformer-less Unified Power Flow Controller for Wind and Solar Power Transmission  

SciTech Connect

GENI Project: MSU is developing a power flow controller to improve the routing of electricity from renewable sources through existing power lines. The fast, innovative, and lightweight circuitry that MSU is incorporating into its controller will eliminate the need for a separate heavy and expensive transformer, as well as the construction of new transmission lines. MSUs controller is better suited to control power flows from distributed and intermittent wind and solar power systems than traditional transformer-based controllers are, so it will help to integrate more renewable energy into the grid. MSUs power flow controller can be installed anywhere in the existing grid to optimize energy transmission and help reduce transmission congestion.

None

2012-02-08T23:59:59.000Z

469

X9.82 Part 1 Overview and Basic Principles  

Science Conference Proceedings (OSTI)

... Def: Deterministic Random Bit Generator (DRBG) ... Unified Functional Model ? Unify pseudo and true random number generators ... as a backup ...

2012-06-27T23:59:59.000Z

470

Writing with Complex Type  

E-Print Network (OSTI)

Unified Font Object (UFO). www.unifiedfontobject.org/ [24]like Unified Font Object (UFO) [23] and Scalable Vector

Lewis, Jason; Nadeau, Bruno

2009-01-01T23:59:59.000Z

471

Duke's Consulting Practicum Program (CPP) offers Master of Engineering Management students the opportunity to work on real-world consulting projects  

E-Print Network (OSTI)

Implementation Tech Development Alliance One Cisco Deutsche Bank Hill Rom IBM Lenovo Microsoft Nokia Parsons SES Americom AEPCM Computer Construction Data Centers Energy Finance Food & Agriculture Healthcare InsurancePhone Apps IT Platforms Offshoring/Outsourcing PCTV Pipelines Renewable Energy Resource Planning Risk

472

ENGINEERING SUH-PREMELY GENEROUS  

E-Print Network (OSTI)

to help produce graduate engineers with expertise in circuits and systems design." Halla is a Springfield positions at LSI Logic Corp. and Intel Corp. He is on the board of directors for Cisco Systems Inc with their interest areas and integrate best practices for those projects' mechanical, lighting, electrical

Farritor, Shane

473

Visit the National Academies Press online, the authoritative source for all books from the National Academy of Sciences, the National Academy of Engineering, the Institute of  

E-Print Network (OSTI)

Works; John Ahearne, Sigma Xi; Robert Aiken, CISCO Systems, Inc.; Bruce Alberts, University. Carl Lineberger, University of Colorado, Boulder; James Mongan, Partners Healthcare System; Gilbert-7 Conclusion 7-9 8. INNOVATION INCENTIVES 8-1 Action D-1: Modernize the Patent System 8-3 Action D-2

Hone, James

474

XUTools: UNIX commands for processing next-generation structured text  

Science Conference Proceedings (OSTI)

Traditional Unix tools operate on sequences of characters, bytes, fields, lines, and files. However, modern practitioners often want to manipulate files in terms of a variety of language-specific constructs--C functions, Cisco IOS interface blocks, and ... Keywords: automation, change management, configuration management, text processing, tools, unix

Gabriel A. Weaver; Sean W. Smith

2012-12-01T23:59:59.000Z

475

GOOGLE BOOK SETTLEMENT: BRILLIANT BUT EVIL?  

E-Print Network (OSTI)

1 GOOGLE BOOK SETTLEMENT: BRILLIANT BUT EVIL? Pamela Samuelson, Berkeley Law Cisco Distinguished Lecture May 13, 2010 OVERVIEW · Google Book Search Project, the lawsuit it k d & f ttli itprovoked under the Google Partner Program · It also includes millions of books from university research library

Sadoulet, Elisabeth

476

The Best Damn Firewall Book Period, 2 edition  

Science Conference Proceedings (OSTI)

The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, SonicWALL, and Check Point.Compiled from the best of the Syngress firewall ... Keywords: Security

Cherie Amon; Thomas W. Shinder; Anne Carasik-Henmi

2007-12-01T23:59:59.000Z

477

Blackhat Revelations: Securing the network: changing priorities  

Science Conference Proceedings (OSTI)

May need to be upgraded as often as sys admins. apply patches Mike Lynn, a former ISS researcher held the Blackhat conference spellbound with his demonstration of the execution of shell code on a Cisco device. He showed what is possible if a vulnerability ...

Bruce Potter

2005-08-01T23:59:59.000Z

478

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

479

A DETAILED MORPHO-KINEMATIC MODEL OF THE ESKIMO, NGC 2392: A UNIFYING VIEW WITH THE CAT'S EYE AND SATURN PLANETARY NEBULAE  

Science Conference Proceedings (OSTI)

The three-dimensional and kinematic structure of the Eskimo nebula, NGC 2392, has been notoriously difficult to interpret in detail given its complex morphology, multiple kinematic components and its nearly pole-on orientation along the line of sight. We present a comprehensive, spatially resolved, high-resolution, long-slit spectroscopic mapping of the Eskimo planetary nebula. The data consist of 21 spatially resolved, long-slit echelle spectra tightly spaced over the Eskimo and along its bipolar jets. This data set allows us to construct a velocity-resolved [N II] channel map of the nebula with a resolution of 10 km s{sup -1} that disentangles its different kinematic components. The spectroscopic information is combined with Hubble Space Telescope images to construct a detailed three-dimensional morpho-kinematic model of the Eskimo using the code SHAPE. With this model we demonstrate that the Eskimo is a close analog to the Saturn and the Cat's Eye nebulae, but rotated 90 Degree-Sign to the line of sight. Furthermore, we show that the main characteristics of our model apply to the general properties of the group of elliptical planetary nebulae with ansae or FLIERS, once the orientation is considered. We conclude that this kind of nebula belongs to a class with a complex common evolutionary sequence of events.

Garcia-Diaz, Ma. T.; Lopez, J. A.; Steffen, W.; Richer, M. G., E-mail: tere@astrosen.unam.mx, E-mail: jal@astrosen.unam.mx, E-mail: wsteffen@astrosen.unam.mx, E-mail: richer@astrosen.unam.mx [Instituto de Astronomia, Universidad Nacional Autonoma de Mexico, Campus Ensenada, Ensenada, Baja California, 22800 (Mexico)

2012-12-20T23:59:59.000Z

480

The unification of the fundamental interaction within Maxwell electromagnetism: Model of hydrogen atom. Gravity as the secondary electric force. Calculation of the unified inertia force  

E-Print Network (OSTI)

Considering two static, electrically charged, elementary particles, we demonstrate a possible way of proving that all known fundamental forces in the nature are the manifestations of the single, unique interaction. We re-define the gauging of integration constants in the Schwarzschild solution of Einstein field equations. We consider the potential energy in this context regardless it is gravitational or electric potential energy. With the newly gauged constants, we sketch how the unique interaction can be described with the help of an appropriate solution of the well-known Maxwell equations. According the solution, there are two zones, in the system of two oppositely charged particles, where the force is oscillating. The first particle can be in a stable, constant distance from the second particle, between the neighbouring regions of repulsion and attraction. In an outer oscillation zone, the corresponding energy levels in the proton-electron systems are identical (on the level of accuracy of values calculated by the Dirac's equations) to some experimentally determined levels in the hydrogen atom. For each system of two particles, there is also the zone with the macroscopic, i.e. monotonous behavior of the force. As well, the solution can be used to demonstrate that the net force between two assemblies consisting each (or at least one) of the same numbers of both positively and negatively charged particles is never zero. A secondary electric force, having the same orientation as the primary electric force between the oppositely charged particles, is always present. It can be identified to the gravity. Finally, the solution of the Maxwell equations can be used to calculate the inertia force of a particle. The consistent formulas for both acting and inertia forces enable to construct the dimensionless (without gravitational constant, permitivity of vacuum, etc.) equation of motion.

L. Neslusan

2010-12-28T23:59:59.000Z

Note: This page contains sample records for the topic "t-703 cisco unified" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Toward a Unified Parameterization of the Boundary Layer and Moist Convection. Part I: A New Type of Mass-Flux Model  

Science Conference Proceedings (OSTI)

Higher-order closure (HOC) models have been proposed for parameterization of the turbulent planetary boundary layer (PBL). HOC models must include closures for higher-order moments (e.g., fourth moments in third-order closure models), for ...

Cara-Lyn Lappen; David A. Randall

2001-08-01T23:59:59.000Z

482

Modeling of Trade Wind Cumuli with a Low-Order Turbulence Model: Toward a Unified Description of Cu and Se Clouds in Meteorological Models  

Science Conference Proceedings (OSTI)

A simple method is proposed to extend a low-order turbulence scheme including a subgrid-scale cloudiness scheme to represent not only nonconvective (stratiform) cloudiness and turbulence but also shallow, nonprecipitating cumulus convection by ...

P. Bechtold; J. W. M. Cuijpers; P. Mascart; P. Trouilhet

1995-02-01T23:59:59.000Z

483

Unified Theory of Relativistic Identification of Information in a Systems Age: Proposed Convergence of Unique Identification with Syntax and Semantics through Internet Protocol version 6  

E-Print Network (OSTI)

This paper proposes to utilize internet protocol version six (IPv6) to uniquely identify not only things (objects) but also processes, relationships (syntax, semantics) and interfaces (sensors). Convergence of identification ...

Datta, Shoumen

2008-07-31T23:59:59.000Z

484

ISOTHERMAL DISTRIBUTIONS IN MONDian GRAVITY AS A SIMPLE UNIFYING EXPLANATION FOR THE UBIQUITOUS{rho}{proportional_to}r {sup -3} DENSITY PROFILES IN TENUOUS STELLAR HALOS  

SciTech Connect

That the stellar halo of the Milky Way has a density profile which, to first approximation, satisfies{rho}{proportional_to}r {sup -3} and has been known for a long time. More recently, it has become clear that M31 also has such an extended stellar halo, which approximately follows the same radial scaling. Studies of distant galaxies have revealed the same phenomenology. Also, we now know that the density profiles of the globular cluster systems of our Galaxy and Andromeda to first approximation follow{rho}{proportional_to}r {sup -3},{Sigma}{proportional_to}R {sup -2} in projection. Recently, diffuse populations of stars have been detected spherically surrounding a number of Galactic globular clusters, extending much beyond the Newtonian tidal radii, often without showing any evidence of tidal features. Within the standard Newtonian and general relativity scenario, numerous and diverse particular explanations have been suggested, individually tailored to each of the different classes of systems described above. Here we show that in a MONDian gravity scenario any isothermal tenuous halo of tracer particles forming a small perturbation surrounding a spherically symmetric mass distribution will have an equilibrium configuration which to first approximation satisfies a{rho}{proportional_to}r {sup -3} scaling.

Hernandez, X.; Jimenez, M. A.; Allen, C., E-mail: xavier@astro.unam.mx [Instituto de Astronomia, Universidad Nacional Autonoma de Mexico, Apartado Postal 70-264, C.P. 04510 Mexico D.F. (Mexico)

2013-06-20T23:59:59.000Z

485

A UNIFIED PARTICLE DIFFUSION THEORY FOR CROSS-FIELD SCATTERING: SUBDIFFUSION, RECOVERY OF DIFFUSION, AND DIFFUSION IN THREE-DIMENSIONAL TURBULENCE  

Science Conference Proceedings (OSTI)

A new nonlinear theory for cosmic-ray scattering across the mean magnetic field is derived. This theory can be applied for arbitrary turbulence geometry. Previous theories such as the extended nonlinear guiding center theory are deduced as special limits. Furthermore, the new theory can explain subdiffusive transport for slab turbulence and the recovery of diffusion for slab/two-dimensional and three-dimensional turbulence. The nonlinear standard theory for field line wandering can be obtained as a special limit.

Shalchi, A., E-mail: andreasm4@yahoo.co [Department of Physics and Astronomy, University of Manitoba, Winnipeg, Manitoba R3T 2N2 (Canada)

2010-09-10T23:59:59.000Z

486

Ensuring track safety and reducing unnecessary train speed restrictions in hot weather by the application of a unified track stability management tool.  

E-Print Network (OSTI)

??"In this thesis, practices/procedures adopted by different railways to manage track stability have been collated and a gap analysis has been undertaken to help improve (more)

Ahmad, Shah Sanjar Nafis.

2011-01-01T23:59:59.000Z

487

The spectral order of accuracy: A new unified tool in the design methodology of excitation-adaptive wave equation FDTD schemes  

Science Conference Proceedings (OSTI)

We define a new concept, termed the spectral order of accuracy (SOoA), which is the spectral domain analogue of the familiar order of accuracy (OoA). The SOoA is pivotal in a refined version of a recently-introduced methodology for formulating excitation-adaptive ... Keywords: Dispersion relation preserving schemes, Finite difference time domain, Higher order schemes, Maxwell's equations, Nonstandard FDTD, Numerical dispersion, Wave equation

B. Finkelstein; R. Kastner

2009-12-01T23:59:59.000Z

488

A UNIFIED MONTE CARLO TREATMENT OF GAS-GRAIN CHEMISTRY FOR LARGE REACTION NETWORKS. II. A MULTIPHASE GAS-SURFACE-LAYERED BULK MODEL  

SciTech Connect

The observed gas-phase molecular inventory of hot cores is believed to be significantly impacted by the products of chemistry in interstellar ices. In this study, we report the construction of a full macroscopic Monte Carlo model of both the gas-phase chemistry and the chemistry occurring in the icy mantles of interstellar grains. Our model treats icy grain mantles in a layer-by-layer manner, which incorporates laboratory data on ice desorption correctly. The ice treatment includes a distinction between a reactive ice surface and an inert bulk. The treatment also distinguishes between zeroth- and first-order desorption, and includes the entrapment of volatile species in more refractory ice mantles. We apply the model to the investigation of the chemistry in hot cores, in which a thick ice mantle built up during the previous cold phase of protostellar evolution undergoes surface reactions and is eventually evaporated. For the first time, the impact of a detailed multilayer approach to grain mantle formation on the warm-up chemistry is explored. The use of a multilayer ice structure has a mixed impact on the abundances of organic species formed during the warm-up phase. For example, the abundance of gaseous HCOOCH{sub 3} is lower in the multilayer model than in previous grain models that do not distinguish between layers (so-called two phase models). Other gaseous organic species formed in the warm-up phase are affected slightly. Finally, we find that the entrapment of volatile species in water ice can explain the two-jump behavior of H{sub 2}CO previously found in observations of protostars.

Vasyunin, A. I. [Department of Chemistry, The University of Virginia, Charlottesville, VA (United States)] [Department of Chemistry, The University of Virginia, Charlottesville, VA (United States); Herbst, Eric, E-mail: anton.vasyunin@gmail.com, E-mail: eh2ef@virginia.edu [Departments of Chemistry, Astronomy, and Physics, The University of Virginia, Charlottesville, VA (United States)] [Departments of Chemistry, Astronomy, and Physics, The University of Virginia, Charlottesville, VA (United States)

2013-01-10T23:59:59.000Z

489

Neutrino oscillations in an SO(10) supersymmetric grand unified theory with U(2)xU(1){sup n} family symmetry  

Science Conference Proceedings (OSTI)

In a previous paper we analyzed fermion masses (focusing on neutrino masses and mixing angles) in an SO(10) SUSY GUT with U(2)xU(1){sup n} family symmetry. The model is ''natural'' containing all operators in the Lagrangian consistent with the states and their charges. With minimal family symmetry breaking vacuum expectation values (VEVs) the model is also predictive giving a unique solution to atmospheric (with maximal {nu}{sub {mu}}{yields}{nu}{sub {tau}} mixing) and solar (with SMA MSW {nu}{sub e}{yields}{nu}{sub s} mixing) neutrino oscillations. In this paper we analyze the case of general family breaking VEVs. We now find several new solutions for three, four, and five neutrinos. For three neutrinos we now obtain SMA MSW, LMA MSW, or vacuum oscillation solutions for solar neutrinos. In all three cases the atmospheric data are described by maximal {nu}{sub {mu}}{yields}{nu}{sub {tau}} mixing. In the four and five neutrino cases, in addition to fitting atmospheric and solar data as before, we are now able to fit LSND data. All this is obtained with the additional parameters coming from the family symmetry breaking VEVs, providing only minor changes in the charged fermion fits. (c) 2000 The American Physical Society.

Blazek, T. [Department of Physics and Astronomy, Northwestern University, Evanston, Illinois 60208 (United States); Raby, S. [Department of Physics, The Ohio State University, 174 W. 18th Ave., Columbus, Ohio 43210 (United States); Tobe, K. [Department of Physics, The Ohio State University, 174 W. 18th Ave., Columbus, Ohio 43210 (United States)

2000-09-01T23:59:59.000Z

490

Proceedings of the Huntsville Simulation Conference 2007, October 30November 1, 2007, Huntsville, Alabama A General Model of Resources Using the Unified Modeling Language  

E-Print Network (OSTI)

. The farmer's thousand bushels of wheat may be fit for grinding into flour or only for mixing with animal feed, standardization, composition, and statelessness. Wheat in a silo occupies a central location, but a large flour milling comp

Rice, Stephen V.

491

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2013 8, 2013 V-087: Adobe Flash Player Two Vulnerabilities Two vulnerabilities are reported as 0-day which can be exploited by malicious people to compromise a user's system. February 7, 2013 V-086: IntegraXor ActiveX Control Buffer Overflow Vulnerability The vulnerability is caused due to an error in the PE3DO32A.ocx ActiveX control and can be exploited to cause a buffer overflow. February 6, 2013 V-085: Cisco Unity Express Input Validation Hole Permits Cross-Site Request Forgery Attacks A vulnerability was reported in Cisco Unity Express. February 5, 2013 V-084: RSA Archer eGRC Permits Cross-Site Scripting, Cross-Domain Access, Clickjacking, and File Upload Attacks Several vulnerabilities were reported in RSA Archer eGRC. February 4, 2013 V-083: Oracle Java Multiple Vulnerabilities

492

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3, 2013 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. March 27, 2013 V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users Gain Full Control Two vulnerabilities were reported in EMC Smarts Network Configuration Manager. March 26, 2013 V-119: IBM Security AppScan Enterprise Multiple Vulnerabilities IBM has acknowledged multiple vulnerabilities March 22, 2013 V-117: Symantec Enterprise Vault for File System Archiving Unquoted Search Path Lets Local Users Gain Elevated Privileges

493

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, 2011 8, 2011 T-686: IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability IBM Tivoli Integrated Portal Java Double Literal Denial of Service Vulnerability. August 5, 2011 T-685: Cisco Warranty CD May Load Malware From a Remote Site Cisco Warranty CD May Load Malware From a Remote Site. August 4, 2011 T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code. August 3, 2011 T-683:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code. August 2, 2011 T-682:Double free vulnerability in MapServer MapServer developers have discovered flaws in the OGC filter support in

494

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 10, 2011 January 10, 2011 T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777. January 6, 2011 T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation

495

Page not found | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41 - 30750 of 31,917 results. 41 - 30750 of 31,917 results. Download Personal Property Management Certification Brochure http://energy.gov/management/downloads/personal-property-management-certification-brochure Download Self-Assessment for Level I Certification Applicants http://energy.gov/management/downloads/self-assessment-level-i-certification-applicants Article T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS

496

JC3 High Impact Assessment Bulletins | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

High Impact High Impact Assessment Bulletins JC3 High Impact Assessment Bulletins RSS August 9, 2013 V-215: NetworkMiner Directory Traversal and Insecure Library Loading Vulnerabilities The vulnerabilities are reported in versions 1.4.1 and prior August 8, 2013 V-214: Mozilla Firefox Multiple Vulnerabilities The vulnerabilities are reported in versions prior to 23.0. August 5, 2013 V-211: IBM iNotes Multiple Vulnerabilities IBM iNotes has two cross-site scripting vulnerabilities and an ActiveX Integer overflow vulnerability August 2, 2013 V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated,

497

JC3 Medium Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

September 28, 2012 September 28, 2012 U-270:Trend Micro Control Manager Input Validation Flaw in Ad Hoc Query Module Lets Remote Users Inject SQL Commands Trend Micro has been notified of a potential product vulnerability in Control Manager. September 27, 2012 U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service A vulnerability was reported in Cisco IOS. September 26, 2012 U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users A vulnerability was reported in Oracle Database. September 25, 2012 U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA® Authentication Client 3.5 Access Control Vulnerability Multiple RSA Products Authentication Bypass Vulnerability September 21, 2012 U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain

498

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5, 2013 5, 2013 V-127: Samba Bug Lets Remote Authenticated Users Modify Files A remote authenticated user can modify files on the target share April 4, 2013 V-126: Mozilla Firefox Multiple Vulnerabilities Multiple vulnerabilities have been reported in Mozilla Firefox, which can be exploited by malicious, local users to gain escalated privileges and by malicious people to conduct spoofing and cross-site scripting attacks and compromise a user's system April 3, 2013 V-125: Cisco Connected Grid Network Management System Multiple Vulnerabilities Some vulnerabilities have been reported in Cisco Connected Grid Network Management System. April 2, 2013 V-124: Splunk Web Input Validation Flaw Permits Cross-Site Scripting Attacks A vulnerability was reported in Splunk Web. April 1, 2013

499

JC3 Bulletin Archive | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21, 2011 21, 2011 U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition October 20, 2011 U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator. October 19, 2011 U-014: Oracle Java Runtime Environment (JRE) Multiple Flaws Let Remote Users Execute Arbitrary Code and Deny Service A remote user can create a Java applet or Java Web Start application that, when loaded by the target user, will access or modify data or execute

500

JC3 High Impact Assessment Bulletins | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

April 9, 2012 April 9, 2012 U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. April 6, 2012 U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks A remote user can obtain potentially sensitive information. April 2, 2012 U-138: Cisco IOS IPSec IKE Unspecified Denial of Service Vulnerability The IKEv1 feature of Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a reload of an affected device. March 30, 2012 U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes