Sample records for trade secrets act

  1. Uniform Trade Secrets Act (Drafted by the National Conference of Commissioners on Uniform State Laws, as amended 1985)

    E-Print Network [OSTI]

    Shamos, Michael I.

    Uniform Trade Secrets Act (Drafted by the National Conference of Commissioners on Uniform State) acquisition of a trade secret of another by a person who knows or has reason to know that the trade secret was acquired by improper means; or (ii) disclosure or use of a trade secret of another without express

  2. Trade Secrets.PDF

    Office of Environmental Management (EM)

    ENERGY OFFICE OF INSPECTOR GENERAL OFFICE OF INSPECTIONS INSPECTION OF THE LICENSING OF TRADE SECRETS BY SANDIA NATIONAL LABORATORIES MARCH 2002 U.S. DEPARTMENT OF ENERGY...

  3. DOE Proposes New Rules to Protect Trade Secrets and Confidential...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Proposes New Rules to Protect Trade Secrets and Confidential Business Information DOE Proposes New Rules to Protect Trade Secrets and Confidential Business Information March 8,...

  4. DOE Finalizes New Rule to Protect Trade Secrets and Confidential...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Finalizes New Rule to Protect Trade Secrets and Confidential Business Information DOE Finalizes New Rule to Protect Trade Secrets and Confidential Business Information May 5, 2011...

  5. NEUROENDOCRINOLOGY The Rhythmic Secretion of Mating-Induced Prolactin Secretion Is Controlled by Prolactin Acting Centrally

    E-Print Network [OSTI]

    Cleyde V. Helena; De’nise T. Mckee; Richard Bertram; Ameae M. Walker; Marc E. Freeman

    Artificial copulomimetic cervical stimulation (CS) induces an immediate release of oxytocin (OT) and prolactin (PRL) followed by a daily PRL rhythm characterized by nocturnal and diurnal surges. Although we have shown that the initial release of PRL is induced by the immediate release of OT, we tested whether the PRL that is released in response to CS is responsible for the initiation and maintenance of the subsequent PRL surges. Thus, we injected OVX rats centrally or peripherally with ovine PRL (oPRL) at 2200 h. Central oPRL induced PRL surges in OVX rats that were similar in size and timing to those of CS rats, whereas peripheral oPRL induced surges that were of smaller amplitude and delayed. We then infusedaPRLantagonist(S179D,0.1ng/h)centrallyintoOVXandOVX-CSratsandmeasuredtherelease of endogenous PRL and the activity of neuroendocrine dopaminergic neurons. Central infusion of S179D did not influence basal PRL secretion in OVX rats but prevented the expression of the CS-induced PRL surges and the accompanying noontime increase of CS-induced dopaminergic activity when continuedfor3d.However,centralinfusionofS179DonlyonthedayofCSdidnotpreventthedailyrhythm of PRL surges. These results demonstrate that PRL acts centrally to induce the PRL rhythm and that PRL in the brain is essential for the maintenance but not for the initiation of the CS-induced rhythmic PRL surges. (Endocrinology 150: 3245–3251, 2009) In rodents, the mating stimulus or stimulation of the uterine

  6. The Sherman Antitrust Act (1890) Section 1. Trusts, etc., in restraint of trade illegal; penalty

    E-Print Network [OSTI]

    Shamos, Michael I.

    1890-01-01T23:59:59.000Z

    The Sherman Antitrust Act (1890) Section 1. Trusts, etc., in restraint of trade illegal; penalty or commerce among the several States, or with foreign nations, is declared to be illegal. Every person who shall make any contract or engage in any combination or conspiracy hereby declared to be illegal shall

  7. Using Section 111 of the Clean Air Act for Cap-and-Trade of Greenhouse Gas Emissions: Obstacles and Solutions

    E-Print Network [OSTI]

    Enion, Rhead M.

    2012-01-01T23:59:59.000Z

    focused nitro- gen oxide emissions-trading program for largeNSPS program could use emissions trading, including cap-and-regulations that allow emissions trading, to achieve GHG

  8. Leptin acts centrally to induce the prepubertal secretion of luteinizing hormone in the female rat: a potential early role in the pubertal process

    E-Print Network [OSTI]

    Dearth, Robert Keith

    1999-01-01T23:59:59.000Z

    in controlling LH secretion during late juvenile and peripubertal development, hence contributing to hypothalamic-pituitary function during sexual maturation. Therefore, this study was conducted to determine if lepton is capable of stimulating LH release during...

  9. Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret

    E-Print Network [OSTI]

    Bernstein, Phil

    Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract) Josh Cohen Benaloh \\Lambda Abstract In 1979, Blackley and Shamir independently proposed schemes by which a secret can a homomorphism property attained by these and several other secret sharing schemes which allows multiple secrets

  10. Clean coal technology and emissions trading: Is there a future for high-sulfur coal under the Clean Air Act Amendments of 1990?

    SciTech Connect (OSTI)

    Bailey, K.A.; South, D.W. [Argonne National Lab., IL (United States); McDermott, K.A. [Argonne National Lab., IL (United States)]|[Illinois State Univ., Normal, IL (United States)

    1991-12-31T23:59:59.000Z

    The near-term and long-term fate of high-sulfur coal is linked to utility compliance plans, the evolution of emission allowance trading, state and federal regulation, and technological innovation. All of these factors will play an implicit role in the demand for high-sulfur coal. This paper will explore the potential impact that emissions trading will have on high-sulfur coal utilization by electric utilities. 28 refs., 6 figs., 4 tabs.

  11. Clean coal technology and emissions trading: Is there a future for high-sulfur coal under the Clean Air Act Amendments of 1990

    SciTech Connect (OSTI)

    Bailey, K.A.; South, D.W. (Argonne National Lab., IL (United States)); McDermott, K.A. (Argonne National Lab., IL (United States) Illinois State Univ., Normal, IL (United States))

    1991-01-01T23:59:59.000Z

    The near-term and long-term fate of high-sulfur coal is linked to utility compliance plans, the evolution of emission allowance trading, state and federal regulation, and technological innovation. All of these factors will play an implicit role in the demand for high-sulfur coal. This paper will explore the potential impact that emissions trading will have on high-sulfur coal utilization by electric utilities. 28 refs., 6 figs., 4 tabs.

  12. Mobile Proactive secret sharing

    E-Print Network [OSTI]

    Schultz, David Andrew

    2007-01-01T23:59:59.000Z

    This thesis describes mobile proactive secret sharing (MPSS), an extension of proactive secret sharing. Mobile proactive secret sharing is much more flexible than proactive secret sharing in terms of group membership: ...

  13. Trade Policy

    E-Print Network [OSTI]

    Ashford, Nicholas A.

    2014-01-01T23:59:59.000Z

    In an otherwise insightful and thoughtful article, Sebastian Pfotenhauer (Trade Policy Is Science Policy,” Issues, Fall 2013) might better have entitled his contribution “Trade Policy Needs to Be Reconciled with Science ...

  14. The Jones Act : an economic and political evaluation

    E-Print Network [OSTI]

    Smith, Richard A. (Richard Allen), 1981-

    2004-01-01T23:59:59.000Z

    On June 5, 1920, the Merchant Marine Act of 1920, also known as the Jones Act, became law. The Jones Act, a cabotage law, restricts American waterborne domestic trade to vessels flagged in the United States, owned by ...

  15. Secret War, Secret Science Brad Osgood

    E-Print Network [OSTI]

    Osgood, Brad

    Secret War, Secret Science Brad Osgood Stanford University #12;Tehran meeting November 28th -- December 1st 1943 "In war-time, truth is so precious that she should always be attended by a bodyguard. David Kahn, The Codebreakers #12;The early events · Britain's first offensive action of the war

  16. Insider trading at the turn of the century: two essays

    E-Print Network [OSTI]

    Tartaroglu, Semih -.

    2009-05-15T23:59:59.000Z

    ) prior to positive (negative) earnings surprises declined after the Act. Finally, I document that the earnings announcements become more informative after the Act, which is consistent with less price discovery through insider trading prior to earnings...

  17. Proposed Trade Agreements Would Make Policy Implications of Environmental Research Entirely Irrelevant

    E-Print Network [OSTI]

    Proposed Trade Agreements Would Make Policy Implications of Environmental Research Entirely. That threat, unfortu- nately, appears very real at the moment, because of several trade partnership agreements that are being negotiated secretly.1,2 Inspired by the North American Free Trade Agreement (NAFTA) of 1994

  18. Heterogeneity and Trade

    E-Print Network [OSTI]

    Costinot, Arnaud

    2007-01-01T23:59:59.000Z

    s ), and, because of free trade in …nal goods, factor price2007], Wealth Heterogeneity and Trade, mimeo Uni- versity ofTheory of International Trade, Cambridge University Press. [

  19. Trade and institutions

    E-Print Network [OSTI]

    Mahakitsiri, Doungdao

    2012-01-01T23:59:59.000Z

    xi Chapter 1 Trade, Wage Premia and Labor1.2.2 Thailand: trade policy and labor market . . . . . 1.33.4 Free Trade Agreements and Customs Unions . . . . . . .

  20. Security Trade Control Guidelines for Academic Exchange Agreements

    E-Print Network [OSTI]

    Takada, Shoji

    Security Trade Control Guidelines for Academic Exchange Agreements at Kyoto University Committee for Security Trade Control December 28, 2012 Recent years have seen an increasing number of academic exchange globalization. Under the Foreign Exchange and Foreign Trade Act (FEFTA), which was put into effect in April 2010

  1. LE SECRET DE LALE SECRET DE LA LONGVIT DESLONGVIT DES

    E-Print Network [OSTI]

    St-Ong, Guillaume

    LE SECRET DE LALE SECRET DE LA LONGÉVITÉ DESLONGÉVITÉ DES PALOURDESPALOURDES MULTI 23 9 4 Le secret de la longévité des palourdes multi-centenaires 7 La microalgue Haslea ostrearia au

  2. Practical Mobile Proactive Secret Sharing

    E-Print Network [OSTI]

    Dryjanski, David

    2008-01-01T23:59:59.000Z

    Secret sharing schemes are needed to store and protect secrets in large scale distributed systems. These schemes protect a secret by dividing the it into shares and distributing the shares to multiple shareholders. This ...

  3. NAFTA, Trade, and Development

    E-Print Network [OSTI]

    Blecker, Robert A.; Esquivel, Gerardo

    2010-01-01T23:59:59.000Z

    many reasons why expanded trade with Mexico and efforts toin the U.S. interest. First, trade with Mexico is more of afor the United States than trade with most Asian countries.

  4. Essays in international trade

    E-Print Network [OSTI]

    Romalis, John

    2001-01-01T23:59:59.000Z

    This thesis is a collection of essays on the effect of trade costs on international trade. Chapter 1 derives and empirically examines how factor proportions determine the structure of commodity trade when international ...

  5. Rational secret sharing

    E-Print Network [OSTI]

    Reyzin, Alissa Natanovna

    2007-01-01T23:59:59.000Z

    Recent work has attempted to bridge the fields of Cryptography and Game Theory in order to create more robust protocols that allow for a variety of player types. A keystone functionality used in cryptography is Secret ...

  6. TRADE COSTS AND THE GAINS FROM TRADE IN CROP AGRICULTURE

    E-Print Network [OSTI]

    Tullos, Desiree

    TRADE COSTS AND THE GAINS FROM TRADE IN CROP AGRICULTURE JEFFREY J. REIMER AND MAN LI We develop trade, and the elasticity of trade volumes to trade costs. The distribution of the gains from trade the extent by which changes in one country are transmitted to others. Key words: geography, grains, trade

  7. Multiparty quantum secret sharing

    SciTech Connect (OSTI)

    Zhang Zhanjun [School of Physics and Material Science, Anhui University, Hefei 230039 (China); Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China); Li Yong [Department of Physics, Huazhong Normal University, Wuhan 430079 (China); Man Zhongxiao [Wuhan Institute of Physics and Mathematics, Chinese Academy of Sciences, Wuhan 430071 (China)

    2005-04-01T23:59:59.000Z

    Based on a quantum secure direct communication (QSDC) protocol [Phys. Rev. A 69 052319 (2004)], we propose a (n,n)-threshold scheme of multiparty quantum secret sharing of classical messages (QSSCM) using only single photons. We take advantage of this multiparty QSSCM scheme to establish a scheme of multiparty secret sharing of quantum information (SSQI), in which only all quantum information receivers collaborate can the original qubit be reconstructed. A general idea is also proposed for constructing multiparty SSQI schemes from any QSSCM scheme.

  8. Emissions Trading and Social Justice

    E-Print Network [OSTI]

    Farber, Daniel A

    2011-01-01T23:59:59.000Z

    David  M.  Driesen,  Does  Emissions  Trading  Encourage  Jason  Coburn,  Emissions  Trading   and   Environmental  Szambelan,  U.S.  Emissions  Trading  Markets  for  SO 2  

  9. NBER WORKING PAPER SERIES TRADE BOOMS, TRADE BUSTS, AND TRADE COSTS

    E-Print Network [OSTI]

    Hickman, Mark

    NBER WORKING PAPER SERIES TRADE BOOMS, TRADE BUSTS, AND TRADE COSTS David S. Jacks Christopher M Nottingham GEP Trade Costs Conference. Finally, Jacks gratefully acknowledges the Social Sciences that full credit, including © notice, is given to the source. #12;Trade Booms, Trade Busts, and Trade Costs

  10. Secret Agent Man Johnny Rivers Tuning: Normal

    E-Print Network [OSTI]

    Reiners, Peter W.

    ----------------------------------------------------------------------------- Secret Agent Man tomorrow Chorus: Bm Em Bm Em Secret Agent Man, Secret Agent Man C B7 Em They've given you a number

  11. Short term effects of moderate carbon prices on land use in the New Zealand emissions trading

    E-Print Network [OSTI]

    Silver, Whendee

    Short term effects of moderate carbon prices on land use in the New Zealand emissions trading Zealand Emissions Trading Scheme (NZ ETS) was introduced through the Climate Change Response Act............................................................................ 14 #12;1 1 Introduction The New Zealand Emissions Trading Scheme (NZ ETS) was legislated through

  12. The Secret is MSG

    E-Print Network [OSTI]

    Hacker, Randi; Tsutsui, William; Ashworth, William

    2007-10-24T23:59:59.000Z

    , bitter, and salty--but also a fifth, which he called umami and which gets turned on with a buzz by monosodium glutamate. So when you enjoy some KFC, remember that the secret might just be MSG. #ashworth #ceas #japan #tsutsui...

  13. Absolute Maximal Entanglement and Quantum Secret Sharing

    E-Print Network [OSTI]

    Helwig, Wolfram; Riera, Arnau; Latorre, José I; Lo, Hoi-Kwong

    2012-01-01T23:59:59.000Z

    We study the existence of absolutely maximally entangled (AME) states in quantum mechanics and its applications to quantum information. AME states are characterized by being maximally entangled for all bipartitions of the system and exhibit genuine multipartite entanglement. With such states, we present a novel parallel teleportation protocol which teleports multiple quantum states between groups of senders and receivers. The notable features of this protocol are that (i) the partition into senders and receivers can be chosen after the state has been distributed, and (ii) one group has to perform joint quantum operations while the parties of the other group only have to act locally on their system. We also prove the equivalence between pure state quantum secret sharing schemes and AME states with an even number of parties. This equivalence implies the existence of AME states for an arbitrary number of parties based on known results about the existence of quantum secret sharing schemes.

  14. Extracellular secretion of recombinant proteins

    DOE Patents [OSTI]

    Linger, Jeffrey G.; Darzins, Aldis

    2014-07-22T23:59:59.000Z

    Nucleic acids encoding secretion signals, expression vectors containing the nucleic acids, and host cells containing the expression vectors are disclosed. Also disclosed are polypeptides that contain the secretion signals and methods of producing polypeptides, including methods of directing the extracellular secretion of the polypeptides. Exemplary embodiments include cellulase proteins fused to secretion signals, methods to produce and isolate these polypeptides, and methods to degrade lignocellulosic biomass.

  15. Online Secret Sharing Christian Cachin

    E-Print Network [OSTI]

    Cachin, Christian

    On­line Secret Sharing Christian Cachin Institute for Theoretical Computer Science ETH Z¨urich CH. Abstract. We propose a new construction for computationally secure secret sharing schemes with general access structures where all shares are as short as the secret. Our scheme provides the capability

  16. Lecture Notes in Secret Sharing Carles Padro

    E-Print Network [OSTI]

    Lecture Notes in Secret Sharing Carles Padr´o Nanyang Technological University, Singapore Version 2.7 Exercises . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 2 Secret Sharing.2 Secret Sharing Schemes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 2.3 Threshold Secret

  17. The feasibility of effluent trading in the energy industries

    SciTech Connect (OSTI)

    Veil, J.A.

    1997-05-01T23:59:59.000Z

    In January 1996, the U.S. Environmental Protection Agency (EPA) released a policy statement endorsing effluent trading in watersheds, hoping to spur additional interest in the subject. The policy describes five types of effluent trades - point source/point source, point source/nonpoint source, pretreatment, intraplant, and nonpoint source/nonpoint source. This report evaluates the feasibility of effluent trading for facilities in the oil and gas industry (exploration and production, refining, and distribution and marketing segments), electric power industry, and the coal industry (mines and preparation plants). Nonpoint source/nonpoint source trades are not considered since the energy industry facilities evaluated here are all point sources. EPA has administered emission trading programs in its air quality program for many years. Programs for offsets, bubbles, banking, and netting are supported by federal regulations, and the 1990 Clean Air Act (CAA) amendments provide a statutory basis for trading programs to control ozone and acid rain. Different programs have had varying degrees of success, but few have come close to meeting their expectations. Few trading programs have been established under the Clean Water Act (CWA). One intraplant trading program was established by EPA in its effluent limitation guidelines (ELGs) for the iron and steel industry. The other existing effluent trading programs were established by state or local governments and have had minimal success.

  18. Generalized quantum secret sharing

    SciTech Connect (OSTI)

    Singh, Sudhir Kumar; Srikanth, R. [Department of Electrical Engineering, University of California, Los Angeles, California 90095 (United States); Optics Group, Raman Research Institute, Bangalore-560080 (India)

    2005-01-01T23:59:59.000Z

    We explore a generalization of quantum secret sharing (QSS) in which classical shares play a complementary role to quantum shares, exploring further consequences of an idea first studied by Nascimento, Mueller-Quade, and Imai [Phys. Rev. A 64, 042311 (2001)]. We examine three ways, termed inflation, compression, and twin thresholding, by which the proportion of classical shares can be augmented. This has the important application that it reduces quantum (information processing) players by replacing them with their classical counterparts, thereby making quantum secret sharing considerably easier and less expensive to implement in a practical setting. In compression, a QSS scheme is turned into an equivalent scheme with fewer quantum players, compensated for by suitable classical shares. In inflation, a QSS scheme is enlarged by adding only classical shares and players. In a twin-threshold scheme, we invoke two separate thresholds for classical and quantum shares based on the idea of information dilution.

  19. Recovery Act

    Broader source: Energy.gov [DOE]

    Recovery Act and Energy Department programs were designed to stimulate the economy while creating new power sources, conserving resources and aligning the nation to once again lead the global energy economy.

  20. Secret Objective Standoff: International Safeguards Educational Exercise

    SciTech Connect (OSTI)

    Okowita, Samantha L [ORNL

    2014-01-01T23:59:59.000Z

    The International Safeguards Regime, being so multi-faceted, can be overwhelming to those first introduced to its many components. The organizers and lecturers of workshops and courses on nonproliferation often provide a series of independent lectures and must somehow demonstrate the cohesive and effective nature of the system. An exercise titled The Secret Objective Standoff was developed to complement lectures with hands-on learning to assist participants in bringing all the many components (IAEA agreements, export controls, treaty obligations, international diplomacy, etc.) of the International Safeguards Regime together. This exercise divides participants into teams that are assigned the role of either a country or the IAEA and asks that they fully immerse themselves in their roles. The teams are then randomly assigned three unique and secret objectives that are intended to represent realistic and current geopolitical scenarios. Through construction, trading, or hoarding of four resources (experts, technology, money, and uranium), the teams have a finite number of turns to accomplish their objectives. Each turn has three phases random dispersal of resources, a timed discussion where teams can coordinate and strategize with others, and an action phase. During the action phase, teams inform the moderator individually and secretly what they will be doing that turn. The exercise has been tested twice with Oak Ridge National Laboratory personnel, and has been conducted with outside participants twice, in each case the experience was well received by both participants and instructors. This exercise provides instructors the ability to modify the exercise before or during game play to best fit their educational goals. By offering a range of experiences, from an in-depth look at specific components to a generalized overview, this exercise is an effective tool in helping participants achieve a full understanding the International Safeguards Regime.

  1. Trade and Workforce Changeover in Brazil

    E-Print Network [OSTI]

    Muendler, Marc-Andreas

    2007-01-01T23:59:59.000Z

    trade theory that foreign trade expands less schooling-conclusion of the ?rst wave of trade reforms between 1991stable both before and after trade liberalization. Between

  2. Secret-Sharing for NP Ilan Komargodski

    E-Print Network [OSTI]

    Secret-Sharing for NP Ilan Komargodski Moni Naor Eylon Yogev Abstract A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret while any

  3. Secret-Sharing for NP Ilan Komargodski

    E-Print Network [OSTI]

    Naor, Moni

    Secret-Sharing for NP Ilan Komargodski Moni Naor Eylon Yogev July 22, 2014 Abstract A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret

  4. Secret Santa, Generalized (and Some Enumerative Problems)

    E-Print Network [OSTI]

    Donnelly, Rob

    Secret Santa, Generalized (and Some Enumerative Problems) Rob Donnelly May 17, 2006 #12;Secret Santa, Generalized May 17, 2006 The Original Secret Santa Problem The Original Secret Santa Problem/she takes A mathematical interpretation of Secret Santa The question essentially asks for the pro- portion

  5. On-line secret sharing Laszlo Csirmaz

    E-Print Network [OSTI]

    Tardos, Gábor

    On-line secret sharing L´aszl´o Csirmaz G´abor Tardos Abstract In a perfect secret sharing scheme the dealer distributes shares to participants so that qualified subsets can recover the secret, while unqualified subsets have no information on the secret. In an on-line secret sharing scheme the dealer assigns

  6. Secret-Sharing for NP Ilan Komargodski

    E-Print Network [OSTI]

    Secret-Sharing for NP Ilan Komargodski Moni Naor Eylon Yogev June 11, 2014 Abstract A computational secret-sharing scheme is a method that enables a dealer, that has a secret, to distribute this secret among a set of parties such that a "qualified" subset of parties can efficiently reconstruct the secret

  7. Hierarchical Threshold Secret Sharing Tamir Tassa #

    E-Print Network [OSTI]

    Tassa, Tamir

    Hierarchical Threshold Secret Sharing Tamir Tassa # December 6, 2006 Abstract We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret of the common secret. Even though secret sharing in hierarchical groups has been studied extensively in the past

  8. AgFoodTradeAgFoodTrade New Issues in Agricultural,New Issues in Agricultural,

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    AgFoodTradeAgFoodTrade New Issues in Agricultural,New Issues in Agricultural, Food & Bioenergy TradeFood & Bioenergy Trade AgFoodTradeAgFoodTrade New Issues in Agricultural,New Issues in Agricultural, Food & Bioenergy TradeFood & Bioenergy Trade AgFoodTradeAgFoodTrade New Issues in Agricultural

  9. Regulatory Entry Barriers and Trade

    E-Print Network [OSTI]

    Tobal, Martin

    2011-01-01T23:59:59.000Z

    Economic International trade policy for oligopolisticquality, and international trade, 2009. [8] R.C. Feenstra,Market structure and foreign trade . [17] P.R. Lane and G.M.

  10. Water Quality Trading Program (Ohio)

    Broader source: Energy.gov [DOE]

    Water quality trading is a tool for achieving water quality improvements. Under the right circumstances, trading has the potential to yield both environmental and economic benefits, while...

  11. Deep water gives up another secret

    E-Print Network [OSTI]

    Manning, CE

    2013-01-01T23:59:59.000Z

    water gives up another secret Craig E. Manning 1 Departmentstep toward unlocking the secrets of Earth’s deep ?uids. 1

  12. Tough Choices: Determinants of Senator's Trade Votes

    E-Print Network [OSTI]

    Aldrich, John; Brinegar, Adam; Kramer, Claire; Merolla, Jennifer

    2006-01-01T23:59:59.000Z

    The Guide to the Politics of Trade and Foreign Investment.Destler, I.M. 1986. American Trade Politics: System UnderP. Quinn. 1994. “Free Trade, Fair Trade, Strategic Trade,

  13. 1996 update on compliance and emissions trading under the U.S. acid rain program

    E-Print Network [OSTI]

    Ellerman, A. Denny

    1998-01-01T23:59:59.000Z

    November 1997This paper reports on the second year of compliance with the sulfur dioxide (SO2) emissions-reduction and -trading provisions of the Title IV of the 1990 Clean Air Act Amendments (CAAA). The material is intended ...

  14. The SO2 Allowance Trading System: The Ironic History of a Grand Policy Experiment

    E-Print Network [OSTI]

    Schmalensee, Richard

    Two decades have passed Two decades have passed since the Clean Air Act Amendments of 1990 launched a grand experiment in market-based environmental policy: the SO2 cap-and-trade system. That system performed well but ...

  15. Hierarchical Threshold Secret Sharing Tamir Tassa

    E-Print Network [OSTI]

    Beimel, Amos

    Hierarchical Threshold Secret Sharing Tamir Tassa Abstract We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among and the presence of higher level participants is imperative to allow the recovery of the common secret. Even though

  16. Generalized Secret Sharing and Monotone Functions

    E-Print Network [OSTI]

    Bernstein, Phil

    Generalized Secret Sharing and Monotone Functions Josh Benaloh University of Toronto Jerry Leichter Yale University January 9, 1996 Abstract Secret Sharing from the perspective of threshold schemes has of the secret sharing functions which we may wish to form. For example, if it is desirable to divide a secret

  17. Space Efficient Secret Sharing: A Recursive Approach

    E-Print Network [OSTI]

    1 Space Efficient Secret Sharing: A Recursive Approach Abhishek Parakh and Subhash Kak Abstract This paper presents a k-threshold secret sharing technique that distributes a secret S into shares of size |S| k-1 , where |S| denotes the secret size. This bound is close to the optimal bound of |S| k

  18. Hierarchical Threshold Secret Sharing Tamir Tassa

    E-Print Network [OSTI]

    Tassa, Tamir

    Hierarchical Threshold Secret Sharing Tamir Tassa December 6, 2006 Abstract We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among and the presence of higher level participants is imperative to allow the recovery of the common secret. Even though

  19. UNCONDITIONALLY SECURE MULTIPARTY COMPUTATION AND SECRET SHARING

    E-Print Network [OSTI]

    Shpilrain, Vladimir

    UNCONDITIONALLY SECURE MULTIPARTY COMPUTATION AND SECRET SHARING DIMA GRIGORIEV AND VLADIMIR". Finally, we propose a secret sharing scheme where an advantage over Shamir's and other known secret sharing schemes is that nobody, including the dealer, ends up knowing the shares (of the secret) owned

  20. Allowance trading: Market operations and regulatory response

    SciTech Connect (OSTI)

    Bailey, K.A.; South, D.W.; McDermott, K.A.

    1992-12-31T23:59:59.000Z

    The use of the SO{sub 2} allowance system as defined by Title IV of the 1990 Clean Air Act Amendments offers utilities greater compliance flexibility than EPA technology standards, State Implementation Plan (SEP) performance standards, or EPA bubble/offset strategies. Traditional methods at best offered the utility the ability to trade emissions between different units at a particular plant. The SO{sub 2} emissions trading system advocated under Title IV will allow a utility to trade emissions across its utility system, and/or trade emissions between utilities to take advantage of interfirm control cost differences. The use of transferable emission allowances offers utilities greater flexibility in the choice of how to control emissions: the choices include fuel switching, flue gas scrubbing, environmental dispatch, repowering, and even the choice not to control emissions [as long as the New Source Performance Standards (NSPS) and Prevention of Significant Deterioration (PSD) requirements are met]. The added flexibility allows utilities to choose the least cost manner of compliance with Title IV requirements. It is hoped (intended) that pollution control cost-minimization by individual utilities will in turn reduce the cost of controlling SO{sub 2} for the electric utility industry in aggregate. In addition, through the use of NO{sub x} emission averaging, the utility would average NO{sub x} emissions from different point sources in order to comply with the prescribed emission standard.

  1. Allowance trading: Market operations and regulatory response

    SciTech Connect (OSTI)

    Bailey, K.A.; South, D.W.; McDermott, K.A.

    1992-01-01T23:59:59.000Z

    The use of the SO[sub 2] allowance system as defined by Title IV of the 1990 Clean Air Act Amendments offers utilities greater compliance flexibility than EPA technology standards, State Implementation Plan (SEP) performance standards, or EPA bubble/offset strategies. Traditional methods at best offered the utility the ability to trade emissions between different units at a particular plant. The SO[sub 2] emissions trading system advocated under Title IV will allow a utility to trade emissions across its utility system, and/or trade emissions between utilities to take advantage of interfirm control cost differences. The use of transferable emission allowances offers utilities greater flexibility in the choice of how to control emissions: the choices include fuel switching, flue gas scrubbing, environmental dispatch, repowering, and even the choice not to control emissions [as long as the New Source Performance Standards (NSPS) and Prevention of Significant Deterioration (PSD) requirements are met]. The added flexibility allows utilities to choose the least cost manner of compliance with Title IV requirements. It is hoped (intended) that pollution control cost-minimization by individual utilities will in turn reduce the cost of controlling SO[sub 2] for the electric utility industry in aggregate. In addition, through the use of NO[sub x] emission averaging, the utility would average NO[sub x] emissions from different point sources in order to comply with the prescribed emission standard.

  2. Quantum Strongly Secure Ramp Secret Sharing

    E-Print Network [OSTI]

    Paul Zhang; Ryutaroh Matsumoto

    2014-08-08T23:59:59.000Z

    Quantum secret sharing is a scheme for encoding a quantum state (the secret) into multiple shares and distributing them among several participants. If a sufficient number of shares are put together, then the secret can be fully reconstructed. If an insufficient number of shares are put together however, no information about the secret can be revealed. In quantum ramp secret sharing, partial information about the secret is allowed to leak to a set of participants, called an unqualified set, that cannot fully reconstruct the secret. By allowing this, the size of a share can be drastically reduced. This paper introduces a quantum analog of classical strong security in ramp secret sharing schemes. While the ramp secret sharing scheme still leaks partial information about the secret to unqualified sets of participants, the strong security condition ensures that qudits with critical information can no longer be leaked.

  3. The Dermatology Acting Internship

    E-Print Network [OSTI]

    Stephens, John B; Raimer, Sharon S; Jr, Richard F Wagner

    2011-01-01T23:59:59.000Z

    our experience with an acting internship in dermatology, weevolving role of the acting internship in the medical SchoolThe Dermatology Acting Internship John B Stephens MD, Sharon

  4. Radiation Protection Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act combines the radiation safety provisions of The Atomic Energy Development and Radiation Control Act and the Environmental Radiation Protection Act, and empowers the Department of...

  5. Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack

    E-Print Network [OSTI]

    Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack Jiali Choy, Khoongming Khoo,kkhoongm,lchuanwe@dso.org.sg Abstract. In this paper, we present several new attacks on multiple encryption block ciphers based on the meet-in-the-middle attack. In the first attack (GDD-MTM), we guess a certain number of secret key bits

  6. CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes

    E-Print Network [OSTI]

    Csirmaz, László

    CECC'08 L. Csirmaz: Secret Sharing Schemes 1 / 35 Secret Sharing Schemes: Solved & Unsolved Problems Laszlo Csirmaz Central European University July 3, 2008 #12;CECC'08 L. Csirmaz: Secret Sharing Schemes 2 / 35 Secret Sharing Scheme { the beginning Contents 1 Secret Sharing Scheme { the beginning 2 De

  7. 3/6/13 NetflixSpilled Your BrokebackMountain Secret, Lawsuit Claims | Threat Level | Wired.com www.wired.com/threatlevel/2009/12/netflix-privacy-lawsuit 1/13

    E-Print Network [OSTI]

    Sandhu, Ravi

    3/6/13 NetflixSpilled Your BrokebackMountain Secret, Lawsuit Claims | Threat Level | Wired.com wwwTweet 18 0 Netflix Spilled Your Brokeback Mountain Secret, Lawsuit Claims By Ryan Singel 12.17.09 4:29 PM on Thursday, alleging that Netflix violated fair-trade laws and a federal privacy law protecting video rental

  8. Essays on Trade and Production Sharing

    E-Print Network [OSTI]

    Noguera, Guillermo Marcelo

    2011-01-01T23:59:59.000Z

    1.2 The Value Added Content of Trade . . . . . 1.33.4 Trade Costs over Time . . . . . . . . . . . 3.5One . . . . . . . . . .Sharing and Trade in 2 Augmented

  9. Carbon Trading Protocols for Geologic Sequestration

    E-Print Network [OSTI]

    Hoversten, Shanna

    2009-01-01T23:59:59.000Z

    EU ETS: European Union Emissions Trading System GHG: Greenstarts operating an emissions trading scheme (ETS) similarGovernments operating emissions trading systems face the

  10. Freedom of Information Act (FOIA) and Privacy Act Requests |...

    Energy Savers [EERE]

    Freedom of Information Act (FOIA) and Privacy Act Requests Freedom of Information Act (FOIA) and Privacy Act Requests FOIA and Privacy Act Requests FOIA Requests FOIA information...

  11. Recovery Act: State Assistance for Recovery Act Related Electricity...

    Energy Savers [EERE]

    Information Center Recovery Act Recovery Act: State Assistance for Recovery Act Related Electricity Policies Recovery Act: State Assistance for Recovery Act Related...

  12. Corporate governance and insider trading

    E-Print Network [OSTI]

    Rozanov, Konstantin A

    2008-01-01T23:59:59.000Z

    I investigate the relation between corporate governance and insider trading by corporate executives. Despite the general view that trade on non-public information adversely affects capital market participants, the impact ...

  13. Essays on trade, CO?, and the environment

    E-Print Network [OSTI]

    Shapiro, Joseph S

    2013-01-01T23:59:59.000Z

    The first chapter of this thesis uses a general equilibrium model of trade and the environment to investigate two questions. First, how do the gains from trade compare against the environmental costs of trade? Trade can ...

  14. The Illegal Timber Trade

    E-Print Network [OSTI]

    The Illegal Timber Trade: The Problem & Potential Solutions Presentation for World Bank Workshop@earthsight.org.uk #12;Some of the largest bilateral Illegal timber flows*: By volume (rwe): 1. Logs Russia ­ China 12/Sawn Burma ­ China 1.6 mill m3 (until 2005) Timber vs Processed Products Illegally Sourced vs Illegally

  15. WORLD PRODUCTION AND TRADE IN

    E-Print Network [OSTI]

    WORLD PRODUCTION AND TRADE IN FISH MEAL AND OIL UNITED STATES DEPARTMENT OF THE INTERIOR · FISH THIS REPORT IS A GENERAL ACCOUNT OF THE WORLD ' S PRO- DUCTION AND TRADE IN FISH MEAL AND OIL. IN 1959- DICATE WHAT IS INCLUDED BESIDES FISHMEAL AND FISH BODY OIL. #12;WORLD PRODUCTION AND TRADE IN FISH MEAL

  16. WORKFLOW SIMULATION FOR INTERNATIONAL TRADE

    E-Print Network [OSTI]

    Thomborson, Clark

    WORKFLOW SIMULATION FOR INTERNATIONAL TRADE Qiang Dong Supervised by Professor Clark Thomborson's competitive world. International trade has received some academic attention as an application of Business Process Reengineering. A major issue in international trade is due to problems pertaining to mutual

  17. Percolation of secret correlations in a network

    E-Print Network [OSTI]

    Raul, Garcia-Patron

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks—more precisely, the question of percolation of secret correlations in a network. It is known that ...

  18. International Trade of Biofuels (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-05-01T23:59:59.000Z

    In recent years, the production and trade of biofuels has increased to meet global demand for renewable fuels. Ethanol and biodiesel contribute much of this trade because they are the most established biofuels. Their growth has been aided through a variety of policies, especially in the European Union, Brazil, and the United States, but ethanol trade and production have faced more targeted policies and tariffs than biodiesel. This fact sheet contains a summary of the trade of biofuels among nations, including historical data on production, consumption, and trade.

  19. THE SO2 ALLOWANCE TRADING SYSTEM: THE IRONIC HISTORY OF A GRAND POLICY EXPERIMENT

    E-Print Network [OSTI]

    Ford, Andrew

    and Robert N. Stavins ABSTRACT Two decades have passed since the Clean Air Act Amendments of 1990 launched-based instruments, cap-and-trade, Clean Air Act amendments of 1990, sulfur dioxide, acid rain JEL Classification Policy Experiment Richard Schmalensee and Robert N. Stavins1 Two decades have passed since the Clean Air

  20. Rational Secret Sharing without Broadcast Amjed Shareef,

    E-Print Network [OSTI]

    Rational Secret Sharing without Broadcast Amjed Shareef, Department of Computer Science use the concept of rational secret sharing, which was initially introduced by Halpern and Teague [2], where players' preferences are that they prefer to learn the secret than not, and moreover they prefer

  1. Graph Decompositions and Secret Sharing Schemes 1

    E-Print Network [OSTI]

    Stinson, Douglas

    Graph Decompositions and Secret Sharing Schemes 1 C. Blundo and A. De Santis Dipartimento di In this paper, we continue a study of secret sharing schemes for access structures based on graphs. Given a graph G, we require that a subset of participants can compute a secret key if they contain an edge of G

  2. RSA-Based Secret Handshakes Damien Vergnaud

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    RSA-Based Secret Handshakes Damien Vergnaud Laboratoire de Math´ematiques Nicolas Oresme Universit. A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, Smetters, Staddon and Wong

  3. Quantum secret sharing with qudit graph states

    SciTech Connect (OSTI)

    Keet, Adrian; Fortescue, Ben; Sanders, Barry C. [Institute for Quantum Information Science, University of Calgary, Alberta, T2N 1N4 (Canada); Markham, Damian [LTCI-CNRS, Telecom ParisTech, 37/39 rue Dareau, F-75014 Paris (France)

    2010-12-15T23:59:59.000Z

    We present a unified formalism for threshold quantum secret sharing using graph states of systems with prime dimension. We construct protocols for three varieties of secret sharing: with classical and quantum secrets shared between parties over both classical and quantum channels.

  4. Hierarchical Threshold Secret Sharing Tamir Tassa

    E-Print Network [OSTI]

    Tassa, Tamir

    Hierarchical Threshold Secret Sharing Tamir Tassa Division of Computer Science, The Open University tassa@yahoo.com Abstract. We consider the problem of threshold secret sharing in groups with hierarchical structure. In such settings, the secret is shared among a group of participants

  5. CSASC L. Csirmaz: Secret sharing on infinite structures 1 / 29 Secret Sharing on Infinite Structures

    E-Print Network [OSTI]

    Csirmaz, László

    CSASC L. Csirmaz: Secret sharing on infinite structures 1 / 29 Secret Sharing on Infinite: Secret sharing on infinite structures 2 / 29 Threshold scheme ­ a case study Contents 1 Threshold scheme, graphs, and graphs #12;CSASC L. Csirmaz: Secret sharing on infinite structures 3 / 29 Threshold scheme

  6. Secret Selling of Secrets with Several Buyers Arto Salomaa and Lila Santean

    E-Print Network [OSTI]

    Kari, Lila

    Secret Selling of Secrets with Several Buyers Arto Salomaa and Lila Santean Mathematics Department to a binary number. 1 Introduction S is a seller of secrets who has listed a number of questions and offers to sell the answer to any of them at a huge price which we assume to be the same for each of the secrets

  7. Allowance trading: Correcting the past and looking to the future

    SciTech Connect (OSTI)

    Shah, A.Y.; Canter, L.W. [Univ. of Oklahoma, Norman, OK (United States). Environmental and Ground Water Institute

    1995-09-01T23:59:59.000Z

    Allowance trading is basic to the Title IV acid rain provisions of the 1990 Clean Air Act Amendments (CAAA) in the United States; the provisions seek to achieve a 10-million-ton reduction in annual sulfur dioxide emissions from the electric power utility industry. Allowance trading, a market-based approach, is conceptually similar to the emissions trading policy of the US Environmental Protection Agency (EPA). An allowance is defined as the authorization to emit, during or after a specified calendar year, one ton of sulfur dioxide. This paper provides an overview of the allowance trading program by summarizing some important features, particularly as they are responsive to limitations and concern as related to the precursor emissions trading program in the early to mid-1980s. Such features include a simple definition of baseline emission levels, encouragements for nationwide trading, disincentives for accumulation of excess allowance,s opportunities for leasing other short-term allowance transfer arrangements, enforcement provisions, and benefits of bonus allowances and early emission reductions. Adherence to implementation protocols for the acid rain provisions of Title IV of the CAAA will provide a good opportunity to evaluate this market-based approach for environmental quality management.

  8. Sikkim and Himalayan Trade

    E-Print Network [OSTI]

    Sen, Jahar

    1981-01-01T23:59:59.000Z

    Lama. 6 The merchandise imported from Sikkim to Darjeeling, as the report indicated, consisted of horses, cattle including sheep and goats. blankets. salt. musk. wax, ghee, oranges. millet, rice, lime and 11 copper. The imports in 1863 were nearly... would be exported to Sikkim and Tibet replacing brick tea imported from Lhasa and China. Trade was conducted in four routes in Sikkim : two via Namchee and Chadam to the Great Rangeet and two via Zeeme to Goke and Tramduc to Colbong. The Tibetan...

  9. The New Political Economy of Trade : : Heterogeneous Firms and Trade Policy

    E-Print Network [OSTI]

    Plouffe, Michael

    Lobbying on Global Trade. Ithaca: Cornell University Press.Roots of American Trade Policy. ’ World Politics 49.3. 309-The Politics of Foreign Trade. Chicago: Aldine- Atherton,

  10. Trade Productivity Upgrading, Trade Fragmentation, and FDI in Manufacturing: The Asian Development Experience

    E-Print Network [OSTI]

    Singh, Nirvikar; Mora, Jesse

    2012-01-01T23:59:59.000Z

    Wang. “How Vertically Specialized is Chinese Trade? ” U.S.International Trade Commission, Office of Economics WorkingDecomposing China-Japan-U.S. Trade: Vertical Specialization,

  11. ELECTORAL BARRIERS TO TRADE:Measuring the Effects of Income and Political Participation on Trade Openness

    E-Print Network [OSTI]

    Boussalis, Constantine

    2007-01-01T23:59:59.000Z

    preferences for "open" or "protectionist" trade policies. Aseconomic consequences of free trade rise, those The authorsA Guide to Measures of Trade Policy and Openness", presented

  12. Secret Plans Tab by Eagles Of Death Metal, www.Ultimate-Guitar.Com SECRET PLANS -Eagles of Death Metal

    E-Print Network [OSTI]

    Reiners, Peter W.

    Secret Plans Tab by Eagles Of Death Metal, www.Ultimate-Guitar.Com ------------------------------------------------------------------------------- SECRET PLANS - Eagles of Death Metal It Secret Plans Midnight missions Wheels in motion Hoo Hoo Secret Plans Midnight mission With emotion Hou

  13. Water Management Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act regulates and registers water withdrawals in the Commonwealth of Massachusetts to enable effective planning and management of water use and conservation. The Act establishes a Water...

  14. Guessing human-chosen secrets

    E-Print Network [OSTI]

    Bonneau, Joseph

    2012-06-12T23:59:59.000Z

    number of third parties seeking to authenticate users [121, 244]. Reliable data on damages caused by weak human-chosen secrets is hard to come by [141], but a recent study of corporate data breaches commissioned by Verizon [12] suggested that nearly a... on Financial Cryptography and Data Security. Springer-Verlag, 2012 Some data on personal knowledge questions analysed in §7 was published in collaboration with Mike Just and Greg Matthews, who assisted in gathering government census records from around...

  15. The Secret Sauce for TOD

    E-Print Network [OSTI]

    Goldin, S. E.

    2011-01-01T23:59:59.000Z

    CSD Typical Household TOD LEED Building Green Car 72% reduction in energy consumption* *based on EnergyStar The Secret Sauce for TOD 1. Get Your Own Organization in Alignment 2. Have Great Staff, Financial Consultants and Legal...? http://www.epa.gov/smartgrowth/location_efficiency_BTU.htm Conventional Suburban Development (CSD) vs. Transit Oriented Development (TOD) 50% reduction in energy use for multifamily buildings The most inefficient TOD beats the most efficient...

  16. Semiquantum secret sharing using entangled states

    SciTech Connect (OSTI)

    Li Qin [College of Information Engineering, Xiangtan University, Xiangtan 411105 (China); Department of Computer Science, Sun Yat-sen University, Guangzhou 510006 (China); Department of Mathematics, Hong Kong Baptist University, Kowloon (Hong Kong); Chan, W. H. [Department of Mathematics, Hong Kong Baptist University, Kowloon (Hong Kong); Long Dongyang [Department of Computer Science, Sun Yat-sen University, Guangzhou 510006 (China)

    2010-08-15T23:59:59.000Z

    Secret sharing is a procedure for sharing a secret among a number of participants such that only the qualified subsets of participants have the ability to reconstruct the secret. Even in the presence of eavesdropping, secret sharing can be achieved when all the members are quantum. So what happens if not all the members are quantum? In this paper, we propose two semiquantum secret sharing protocols by using maximally entangled Greenberger-Horne-Zeilinger-type states in which quantum Alice shares a secret with two classical parties, Bob and Charlie, in a way that both parties are sufficient to obtain the secret, but one of them cannot. The presented protocols are also shown to be secure against eavesdropping.

  17. Trading Away Financial Stability in Colombia

    E-Print Network [OSTI]

    Tufts University

    Trading Away Financial Stability in Colombia: Capital Controls and the US-Colombia Trade Agreement@bu.edu #12;Trading Away Financial Stability in Colombia: Capital Controls and the US-Colombia Trade Agreement SerieBrief # 66 | Abril 2011 Trading Away Financial Stability in Colombia: Capital Controls and the US-Colombia

  18. Matroids and quantum-secret-sharing schemes

    SciTech Connect (OSTI)

    Sarvepalli, Pradeep; Raussendorf, Robert [Department of Physics and Astronomy, University of British Columbia, Vancouver V6T 1Z1 (Canada)

    2010-05-15T23:59:59.000Z

    A secret-sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret-sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret-sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum-secret-sharing schemes. In addition to providing a new perspective on quantum-secret-sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum-secret-sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum-secret-sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure-state quantum-secret-sharing scheme with information rate 1.

  19. WORKING PAPER N 2008 -52 Trade in services and trade in goods

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    WORKING PAPER N° 2008 - 52 Trade in services and trade in goods: Differences and complementarities Carolina Lennon JEL Codes: F12, F15, L8 Keywords: International trade in services, trade in goods, gravity ­ ÉCOLE NORMALE SUPÉRIEURE halshs-00586223,version1-15Apr2011 #12;Trade in Services and Trade in Goods

  20. Tools of the Trade: The Socio-Technology of Arbitrage in a Wall Street Trading Room

    E-Print Network [OSTI]

    Schweik, Charles M.

    Tools of the Trade: The Socio-Technology of Arbitrage in a Wall Street Trading Room Daniel Beunza at the Santa Fe Institute. #12;2 Tools of the Trade: The Socio-Technology of Arbitrage in a Wall Street Trading of trading in the era of quantitative finance. To do so, we conduct an ethnography of arbitrage, the trading

  1. Essays on International Finance and Trade

    E-Print Network [OSTI]

    Zeng, Li

    2009-01-01T23:59:59.000Z

    Mobility,” in Brookings Trade Forum: 2001, ed. by Susan M.745–75. _______, 1994, “Dynamics of the Trade Balance andthe Terms of Trade: The J-Curve? ” American Economic Review,

  2. Trade Liberalization And Poverty Dynamics

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Trade Liberalization And Poverty Dynamics in Vietnam 2002-2006 Barbara COELLO World Bank Madior-28Mar2014 #12;1 Trade liberalization and poverty dynamics in Vietnam 2002-2006 Barbara Coello, the World liberalization and poverty dynamics in Vietnam 2002-2006 Abstract This paper shows the evolution of poverty

  3. Privacy Act of 1974; Publication of Compilation of Privacy Act...

    Office of Environmental Management (EM)

    Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of 1974; Publication of Compilation of Privacy Act Systems of Records Privacy Act of...

  4. Efficient multiparty quantum-secret-sharing schemes

    SciTech Connect (OSTI)

    Xiao Li; Deng Fuguo [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Long Guilu [Department of Physics, Tsinghua University, Beijing 100084 (China); Key Laboratory for Quantum Information and Measurements, MOE, Beijing 100084 (China); Center of Atomic and Molecular NanoSciences, Tsinghua University, Beijing 100084 (China); Center for Quantum Information, Tsinghua University, Beijing 100084 (China); Pan Jianwei [Institute for Experimental Physics University of Vienna, Boltzmanngasse 5, Vienna 9 (Austria)

    2004-05-01T23:59:59.000Z

    In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.

  5. Hydrogen Delivery Infrastructure Analysis, Options and Trade...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Analysis, Options and Trade-offs, Transition and Long-term Hydrogen Delivery Infrastructure Analysis, Options and Trade-offs, Transition and Long-term Presentation on Hydrogen...

  6. Green Industrial Policy: Trade and Theory

    E-Print Network [OSTI]

    Karp, Larry; Stevenson, Megan

    2012-01-01T23:59:59.000Z

    Papers Year 2012 Paper 1126 Green Industrial Policy: Trade© 2012 by author(s). Green Industrial Policy: Trade andreality and the potential for green indus- trial policy. We

  7. The Social Consequences of Keeping a BIG Secret

    E-Print Network [OSTI]

    Mankoff, Jennifer

    The Social Consequences of Keeping a BIG Secret Yla R. Tausczik Cindy K. Chung James W. Pennebaker Secret? #12;Secrets #12;Hypotheses Individual Level Social Withdrawal Hypothesis OR Hypervigilance Hypothesis System Level Secrets will alter relationships, with or without others knowing about the secret

  8. On Identification Secret Sharing Schemes Departmant of Information Engineering

    E-Print Network [OSTI]

    Bielefeld, University of

    1 On Identification Secret Sharing Schemes Ning Cai Departmant of Information Engineering. #12; 2 Running head: Identification Secret Sharing Corresponding Author: Ning Cai Departmant be a set of participants sharing a secret from a set of secrets. A secret sharing scheme is a protocol

  9. A Novel Visual Secret Sharing Scheme without Image Size Expansion

    E-Print Network [OSTI]

    Heys, Howard

    A Novel Visual Secret Sharing Scheme without Image Size Expansion Nazanin Askari, Cecilia Moloney. Visual cryptography is a secure secret sharing scheme that divides secret images into shares which on their own reveal no information of the original secret image. Recovery of the secret image can be performed

  10. Recovery Act Milestones

    ScienceCinema (OSTI)

    Rogers, Matt

    2013-05-29T23:59:59.000Z

    Every 100 days, the Department of Energy is held accountable for a progress report on the American Recovery and Reinvestment Act. Update at 200 days, hosted by Matt Rogers, Senior Advisor to Secretary Steven Chu for Recovery Act Implementation.

  11. Intergovernmental Personnel Act Assignments

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-08-24T23:59:59.000Z

    This Manual implements provisions of the Intergovernmental Personnel Act (IPA) within the Department of Energy (DOE) and establishes requirements, responsibilities, and authority for effecting assignments under the Act. Does not cancel other directives.

  12. Water Quality Act (Montana)

    Broader source: Energy.gov [DOE]

    The Water Quality Act establishes water conservation and protection, as well as the prevention, abatement, and control of water pollution, as the policy of the state of Montana. The Act establishes...

  13. Coastal Management Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Coastal Management Act provides enabling authority for the State to prepare and administer a coastal management program. The Act does not establish new regulations or laws; it is designed to...

  14. ACT-ARA

    Energy Science and Technology Software Center (OSTI)

    003092IBMPC00 ACT-ARA: Code System for the Calculation of Changes in Radiological Source Terms with Time   

  15. Secret sharing using artificial neural network

    E-Print Network [OSTI]

    Alkharobi, Talal M.

    2004-11-15T23:59:59.000Z

    ................................................................................ 1 1.1 The Rise of Computer Crime ................................................... 1 1.2 Importance of Information Security......................................... 3 1.3 Introduction to Secret Sharing... ............................ 9 2.1.1 Shares building phase................................................... 10 2.1.2 Shares distribution phase.............................................. 11 2.1.3 Secret reconstruction phase.......................................... 12...

  16. Endogenous trade protection under regional trade agreements: the Andean case

    E-Print Network [OSTI]

    Sanchez Bizot, Gustavo

    2006-08-16T23:59:59.000Z

    Endogenous tariff formation has been the subject of theoretical studies that attempt to determine the fundamental economic variables that influence the structure of industry protection implemented by international trade policy makers. An empirical...

  17. Replicating the carry trade through an exchange traded fund

    E-Print Network [OSTI]

    Shan, Jonathan (Jonathan W.)

    2013-01-01T23:59:59.000Z

    There is an overarching belief that the carry trade is a simple investment strategy based on the popular mantra of buying low and selling high. However, in reality, there are several factors that need to be taken into ...

  18. Emissions trading to reduce greenhouse gas emissions in the United States : the McCain-Lieberman Proposal

    E-Print Network [OSTI]

    Paltsev, Sergey.

    The Climate Stewardship Act of 2003 (S. 139) is the most detailed effort to date to design an economy-wide cap-and-trade system for US greenhouse gas emissions reductions. The Act caps sectors at their 2000 emissions in ...

  19. The Death Penalty’s Dirty Little Secret

    E-Print Network [OSTI]

    Zimring, Franklin E.

    2013-01-01T23:59:59.000Z

    Death Penalty’s Dirty Little Secret Abstract: Why is it thatDeath Penalty’s Dirty Little Secret 141 less than a fifth ofPenalty’s Dirty Little Secret 143 attorney for the indigent

  20. United States Trade and Foreign Labor Interests: The Effects on Foreign Labor of Linking Trade with Labor Provisions in Bilateral U.S. Free Trade Agreements

    E-Print Network [OSTI]

    Soleimani, Jonathan

    2008-01-01T23:59:59.000Z

    Daniel K. "The End of the Big Trade Deal." The International2004. Ibid. Sandra Polaski, “Trade and Labor Standards: Afor International Peace: Trade, Equity, and Development

  1. Technology Trade and NAFTA Walter G. Park

    E-Print Network [OSTI]

    Lansky, Joshua

    Technology Trade and NAFTA Walter G. Park Associate Professor Department of Economics American technology trade among member countries relative to their trade with the rest of the world. However, the extent and scope of technology trade varies by member countries. Mexico, for instance, is a recipient

  2. Emissions Trading: A Feasible Analysis for UBC

    E-Print Network [OSTI]

    Emissions Trading: A Feasible Analysis for UBC Vivian Hoffman, J Chisholm I. Introduction The GVRD environmental objectives are achieved. Emissions reduction credit trading (or emissions trading) is an example Valley (LFV). Section III describes the market-based instruments of emissions trading and facility

  3. Cap-and-Trade A. Denny Ellerman

    E-Print Network [OSTI]

    MIT CEEEPR Cap-and-Trade A. Denny Ellerman Massachusetts Institute of Technology Emissions Trading for Energy and Environmental Policy Research #12;MIT CEEEPR Two Types of Air Emissions Trading · Credit- · OTC/SIP-Call NOx Budget Programs: 1999- · EU's CO2 Emissions Trading Scheme: 2005- ­ The first CO2

  4. Oil Trading Simon Basey / November 28, 2013

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    of oil and gas. #12;9 Trading tactics · ARBITRAGE: trade the dislocation of prices between geographicalOil Trading Simon Basey / November 28, 2013 #12;2 What does IST do? Imports crude oil and other Markets BP's equity crude oil, NGLs and natural gas Generates entrepreneurial trading income Manages BP

  5. The Value of Emissions Trading

    E-Print Network [OSTI]

    Webster, Mort David.

    This paper estimates the value of international emissions trading, focusing attention on a here-to-fore neglected component: its value as a hedge against uncertainty. Much analysis has been done of the Kyoto Protocol and ...

  6. NAIHC Convention and Trade Show

    Broader source: Energy.gov [DOE]

    The National American Indian Housing Council's (NAIHC) most longstanding Annual Event, the 39th Annual NAIHC Convention and Trade Show is an opportunity to learn about tribal housing, attend...

  7. Securities trading of concepts (STOC)

    E-Print Network [OSTI]

    Dahan, Ely

    Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a “securities trading ...

  8. Applying the gravity approach to sector trade: Who bears the trade costs?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Applying the gravity approach to sector trade: Who bears the trade costs? Angela CHEPTEA, Alexandre to sector trade: Who bears the trade costs? Angela CHEPTEA INRA, UMR1302 SMART, F-35000 Rennes, France, France Financial support received by the "New Issues in Agricultural, Food and Bio-energy Trade

  9. P-Trade the Generic P2P Trading Platform Foundations

    E-Print Network [OSTI]

    Narasayya, Vivek

    P-Trade ­ the Generic P2P Trading Platform Foundations · Auctions are negotiation mechanisms configuration depends on multiple factors like traded good, participants, information available on the value of the traded good, etc. The system architecture of P-Trade · A central auction name server (ANS) containing

  10. Asia-Pacific Trade Economists' Conference Trade-Led Growth in Times of Crisis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Asia-Pacific Trade Economists' Conference Trade-Led Growth in Times of Crisis The World Trade session 2: The Crisis: A Catalyst for More Coherent Trade Policies and Inclusive Growth? Author: Patrick A or carrying the endorsement of the United Nations. #12;1 Policy Brief October 26, 2009 The World Trade Regime

  11. alters melatonin secretion: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    changes of the gonadal function and prolactin secretion Physics Websites Summary: infusion on prolactin secretion was examined in SCGX goats to establish that the effect of...

  12. RNA Type III Secretion Signals that require Hfq. | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    that require Hfq. RNA Type III Secretion Signals that require Hfq. Abstract: effector proteins from the bacterium to a host cell; however, the secretion signal is poorly...

  13. Recovery Act Project Stories

    Broader source: Energy.gov [DOE]

    Funded by the American Recovery and Reinvestment Act, these Federal Energy Management Program (FEMP) projects exemplify the range of technical assistance provided to federal agencies.

  14. Wetlands Protection Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act establishes regulations regarding the removal, dredging, filling, and altering of land bordering waters, allowing such activity only with permits and in certain situations. Specific...

  15. Shore Protection Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Shore Protection Act is the primary legal authority for protection and management of Georgia's shoreline features including sand dunes, beaches, sandbars, and shoals, collectively known as the...

  16. Energy Monitoring Act (Canada)

    Broader source: Energy.gov [DOE]

    This act requires that every energy enterprise file with the Minister a return setting out statistics and information relating to its ownership and control; financial information; information,...

  17. Wetland Conservation Act (Minnesota)

    Broader source: Energy.gov [DOE]

    This chapter of the Minnesota Administrative Rules implements the Wetland Conservation Act of 1991, setting standards for water preservation, withdrawal, and replacement.

  18. U of T team decodes secret

    E-Print Network [OSTI]

    Zandstra, Peter W.

    U of T team decodes secret messages of our genes May 05, 2010 Joseph Hall Health Reporter they need to perform in. Basically, the U of T team has broken that code ­ and proven their decryption works

  19. Extracting secret keys from integrated circuits

    E-Print Network [OSTI]

    Lim, Daihyun, 1976-

    2004-01-01T23:59:59.000Z

    Modern cryptographic protocols are based on the premise that only authorized participants can obtain secret keys and access to information systems. However, various kinds of tampering methods have been devised to extract ...

  20. APS X-rays Reveal Picasso's Secret

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | 2003 | 2002 | 2001 2000 Subscribe to APS News rss feed APS X-rays Reveal Picasso's Secret OCTOBER 15, 2012 Bookmark and Share X-rays reveal that Picasso's "Old Guitarist," at...

  1. How to Share a Quantum Secret

    SciTech Connect (OSTI)

    Cleve, R. [Department of Computer Science, University of Calgary, Calgary, Alberta, T2N 1N4 (CANADA)] [Department of Computer Science, University of Calgary, Calgary, Alberta, T2N 1N4 (CANADA); Gottesman, D. [T-6 Group, Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)] [T-6 Group, Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States); Lo, H. [Hewlett-Packard Labs, Bristol BS34 8QZ (United Kingdom)] [Hewlett-Packard Labs, Bristol BS34 8QZ (United Kingdom)

    1999-07-01T23:59:59.000Z

    We investigate the concept of quantum secret sharing. In a (k,thinspn) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k{minus}1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum {open_quotes}no-cloning theorem,{close_quotes} which requires that n{lt}2k , and we give efficient constructions of all threshold schemes. We also show that, for k{le}n{lt}2k{minus}1 , then any (k,thinspn) threshold scheme {ital must} distribute information that is globally in a mixed state. {copyright} {ital 1999} {ital The American Physical Society }

  2. Mutual Dependence for Secret Key Agreement

    E-Print Network [OSTI]

    Chan, Chung

    A mutual dependence expression is established for the secret key agreement problem when all users are active. In certain source networks, the expression can be interpreted as certain notions of connectivity and network ...

  3. Percolation of secret correlations in a network

    SciTech Connect (OSTI)

    Leverrier, Anthony; Garcia-Patron, Raul [ICFO-Institut de Ciencies Fotoniques, 08860 Castelldefels (Barcelona) (Spain); Research Laboratory of Electronics, MIT, Cambridge, MA 02139 (United States) and Max-Planck Institut fur Quantenoptik, Hans-Kopfermann Str. 1, D-85748 Garching (Germany)

    2011-09-15T23:59:59.000Z

    In this work, we explore the analogy between entanglement and secret classical correlations in the context of large networks--more precisely, the question of percolation of secret correlations in a network. It is known that entanglement percolation in quantum networks can display a highly nontrivial behavior depending on the topology of the network and on the presence of entanglement between the nodes. Here we show that this behavior, thought to be of a genuine quantum nature, also occurs in a classical context.

  4. Rising College Premiums in Mexico: How Important Is Trade?

    E-Print Network [OSTI]

    Mehta, Aashish; Acuna, Belinda

    2010-01-01T23:59:59.000Z

    Domestic reform, trade and investment liberalisation, …G.H. , Harrison, A. , 1999. Trade Liberalization and WageG. , 1999. Who gains from trade reform? Some remaining

  5. Global Trade Policy Development in a Two-Track System

    E-Print Network [OSTI]

    Crump, Larry

    2006-01-01T23:59:59.000Z

    publication 9 March 2006 global trade policy development inbetween nations that reduce trade barriers on a reciprocalmight enhance the global trade policy develop- ment process

  6. Emissions Trading, Electricity Industry Restructuring, and Investment in Pollution Abatement

    E-Print Network [OSTI]

    Fowlie, Meredith

    2005-01-01T23:59:59.000Z

    Foss, B . "Carbon Emissions Trading is New Weapon to BattleBehavior and the Emission Trading Market, Resources andof Sulfur Dioxide Emissions Trading." The Journal of

  7. BP's Perspective on Emissions Purdue Emissions Trading Workshop

    E-Print Network [OSTI]

    BP's Perspective on Emissions Trading Purdue Emissions Trading Workshop April 30, 2010 Mark - Government policies can create a carbon price via three primary mechanisms: - Emissions trading (BP's strong

  8. From Trade-to-Trade in US Treasuries

    E-Print Network [OSTI]

    Dungey, Mardi; Henry, Olan; McKenzie, Michael

    will use small limit orders to search for trading counter parties. Once they have identified a dealer who has indicated a willingness to trade, they will enter into quantity negotiations, i.e. a workup will take place. This process affords greater anonymity... the dataset and characterises the data in terms of transaction size, intensity and workups. A comprehensive examination of the data is undertaken and the analysis suggests that the information content of news arrival, volume and workup time each have a role...

  9. DOE Finalizes New Rule to Protect Trade Secrets and Confidential Business

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"Wave theJulyD&D Project|Statement |3250.1DOE Federal and

  10. DOE Proposes New Rules to Protect Trade Secrets and Confidential Business

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: Theof"WaveInteractions and Policy (2009) |ReservationInformation | Department

  11. Microsoft Word - DOE Trade Secrets Rule Summary v 2.docx | Department of

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions forCheneyNovember S. DEPARTMENTthe UseCR-091April 6,DOE/NNSAMs.6

  12. Ex post evaluation of tradable permits : the U.S. SO? cap-and-trade program

    E-Print Network [OSTI]

    Ellerman, A. Denny

    2003-01-01T23:59:59.000Z

    The U.S. SO2 cap-and-trade program was established as a result of the enactment of the 1990 Clean Air Act Amendments (1990 CAAA) under the authority granted by Title IV, which included several measures to reduce precursor ...

  13. PROACTIVE SECRET SHARING How to Cope With Perpetual Leakage

    E-Print Network [OSTI]

    Goldwasser, Shafi

    PROACTIVE SECRET SHARING Or: How to Cope With Perpetual Leakage Amir Herzberg Stanis/law Jarecki,stasio,hugo,motig@watson.ibm.com October 15, 1998 Abstract Secret sharing schemes protect secrets by distributing them over different the entire life­time of the secret the adversary is restricted to compromise less than k of the n locations

  14. Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing

    E-Print Network [OSTI]

    Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing October 2001 CMU­CS­01 protocol to perform non­interactive verifiable secret redistribution (VSR) for secrets distributed with Shamir's secret sharing scheme. We base our VSR protocol on Desmedt and Jajodia's re­ distribution

  15. The dealer's random bits in perfect secret sharing schemes

    E-Print Network [OSTI]

    Csirmaz, László

    The dealer's random bits in perfect secret sharing schemes L#19;aszl#19;o Csirmaz #3; Mathematical A secret sharing scheme permits a secret to be shared among partici- pants of an n-element group in such a way that only quali#12;ed subsets of participants can recover the secret. If any non-quali#12;ed

  16. Secret sharing schemes on graphs L aszl o Csirmaz

    E-Print Network [OSTI]

    Csirmaz, László

    Secret sharing schemes on graphs L#19;aszl#19;o Csirmaz Mathematical Institute of the Hungarian secret sharing scheme based on G is a method to distribute a secret data among the vertices of G, the participants, so that a subset of participants can recover the secret if they contain an edge of G, otherwise

  17. Secret-Sharing Schemes: A Survey Amos Beimel

    E-Print Network [OSTI]

    Beimel, Amos

    Secret-Sharing Schemes: A Survey Amos Beimel Department of Computer Science, Ben-Gurion University, Beer-Sheva, Israel. Abstract. A secret-sharing scheme is a method by which a dealer dis- tributes shares to parties such that only authorized subsets of parties can reconstruct the secret. Secret

  18. Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access

    E-Print Network [OSTI]

    Fuji-Hara, Ryoh

    Ideal Secret Sharing Schemes: Yet Another Combinatorial Characterization, Certain Access Structures secret sharing scheme is a method of sharing a secret key in some key space among a finite set of participants in such a way that only the authorized subsets of participants can reconstruct the secret key from

  19. Rational Secret Sharing and Multiparty Computation: Extended Abstract

    E-Print Network [OSTI]

    Fiat, Amos

    Rational Secret Sharing and Multiparty Computation: Extended Abstract Joseph Halpern Department the problems of secret sharing and multiparty computation, assuming that agents prefer to get the secret (resp get it. We show that, under these assumptions, neither secret sharing nor multiparty function

  20. Anonymous Secret Sharing Schemes Dipartimento di Informatica ed Applicazioni

    E-Print Network [OSTI]

    Stinson, Douglas

    Anonymous Secret Sharing Schemes C. Blundo Dipartimento di Informatica ed Applicazioni Universit January 29, 1996 Abstract In this paper we study anonymous secret sharing schemes. Informally, in an anony­ mous secret sharing scheme the secret can be reconstructed without knowledge of which participants hold

  1. Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing

    E-Print Network [OSTI]

    Verifiable Secret Redistribution Theodore M. Wong Jeannette M. Wing October 2001 CMU-CS-01 protocol to perform non-interactive verifiable secret redistribution (VSR) for secrets distributed with Shamir's secret sharing scheme. We base our VSR protocol on Desmedt and Jajodia's re- distribution

  2. SETUP in Secret Sharing Schemes using Random Values

    E-Print Network [OSTI]

    SETUP in Secret Sharing Schemes using Random Values Ruxandra F. Olimid E-mail: ruxandra.olimid@fmi.unibuc.ro Abstract. Secret sharing schemes divide a secret among multiple par- ticipants so that only authorized subsets of parties can reconstruct it. We show that SETUP (Secretly Embedded Trapdoor with Universal Pro

  3. Recovery Act State Summaries | Department of Energy

    Energy Savers [EERE]

    Act State Memo Virgin Islands Recovery Act State Memo Washington Recovery Act State Memo West Virginia Recovery Act State Memo Wisconsin Recovery Act State Memo Wyoming Recovery...

  4. Aspects of Late Helladic sea trade

    E-Print Network [OSTI]

    Bachhuber, Christoph Stephen

    2004-09-30T23:59:59.000Z

    The trade mechanisms joining the Mycenaean Aegean to the greater Levant have intrigued and eluded Bronze Age scholarship since the earliest discoveries of foreign objects in Mycenaean burials. In the past decade, topics of interregional trade...

  5. Essays on international trade and investment

    E-Print Network [OSTI]

    Tang, Heiwai

    2008-01-01T23:59:59.000Z

    This dissertation consists of three essays on international trade and investment. In the first essay, I study how cross-country differences in labor market institutions shape the pattern of international trade with a focus ...

  6. Climate policy and dependence on traded carbon

    E-Print Network [OSTI]

    Andrew, Robbie M; Davis, Steven J; Peters, Glen P

    2013-01-01T23:59:59.000Z

    coal, oil, gas) to international trade in products (Davis etas traded oil). Globally, consumption of products was moreproducts consumed in many of the same countries increasingly rely on coal, oil and

  7. Essays on trades and security prices

    E-Print Network [OSTI]

    Obizhaeva, Anna

    2007-01-01T23:59:59.000Z

    This thesis consists of three chapters that investigate the complex relation between security prices and trades of market participants. In the first chapter, I study the evolution of stock prices after trades with different ...

  8. Essays on Trade and Production Sharing

    E-Print Network [OSTI]

    Noguera, Guillermo Marcelo

    2011-01-01T23:59:59.000Z

    content, the bilateral VAX ratio of China-U.S. trade is: vaillustrates that the bilateral VAX ratio removes both theTherefore, the bilateral VAX ratio for Japan-U.S. trade is

  9. Emission trading with absolute and intensity caps

    E-Print Network [OSTI]

    Song, Jaemin

    2005-01-01T23:59:59.000Z

    The Kyoto Protocol introduced emission trading to help reduce the cost of compliances for the Annex B countries that have absolute caps. However, we need to expand the emission trading to cover developing countries in order ...

  10. Food sovereignty and agricultural trade policy commitments

    E-Print Network [OSTI]

    Boyer, Edmond

    in Agricultural, Food and Bioenergy Trade (AGFOODTRADE)" (Grant Agreement No. 212036) research project, funded production with enough barrier protection to shelter it from world price fluctuations and unfair trading

  11. Fact sheet EU poll illegal timber trade Illegal logging and related timber trade

    E-Print Network [OSTI]

    March 2009 Fact sheet EU poll illegal timber trade Illegal logging and related timber trade Illegal level is needed to halt the trade in illegal timber and timber products on the European market trade. It has clarified obligations for all companies in the supply chain to prove the legality

  12. ICTSD Project on Trade and Sustainable Land Management International Centre for Trade

    E-Print Network [OSTI]

    ICTSD Project on Trade and Sustainable Land Management ICTSD International Centre for Trade and Sustainable Development Selected Issue Briefs ICTSD Programme on Agricultural Trade and Sustainable Development Trade and Sustainable Land Management in Drylands August 2007 #12;#12;August 2007 ICTSD Programme

  13. Trade Integration and Business Cycle Synchronization in the EMU: the Negative Eect of New Trade Flows

    E-Print Network [OSTI]

    Boyer, Edmond

    Trade Integration and Business Cycle Synchronization in the EMU: the Negative Eect of New Trade : 10.1007/s11079-014-9318-8 #12;Abstract This paper questions the impact of trade integration on business cycle synchronization in the EMU by distinguishing increase of existing trade flows (the intensive

  14. Commerce and Trade 17-307 Chapter 17. COMMERCE AND TRADE

    E-Print Network [OSTI]

    Richerson, Peter J.

    Commerce and Trade 17-307 Chapter 17. COMMERCE AND TRADE I. Introduction A. The General Division and trade are unusual in animals, especially among the "higher" vertebrates. We have to go to "lower that humans engage in division of labor and trade on a variety of scales ranging from the family (division

  15. Applying the gravity approach to sector trade: Who bears the trade costs?

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Applying the gravity approach to sector trade: Who bears the trade costs? Angela Cheptea1 approach is widely used to explain trade patterns between countries. In this article we question the simple application of this approach to product/sector-level trade on two grounds. First, we demonstrate

  16. China's forest products trade falls nearly 18% China's forest products trade falls nearly 18%

    E-Print Network [OSTI]

    China's forest products trade falls nearly 18% China's forest products trade falls nearly 18% 11/08/2009 - 09:05 According to China's latest Customs statistics, foreign trade of China's forest products in the first five months showed a year-on-year general downturn. The total value of foreign trade of China

  17. Wind Energy Act (Maine)

    Broader source: Energy.gov [DOE]

    The Maine Wind Energy Act is a summary of legislative findings that indicate the state's strong interest in promoting the development of wind energy and establish the state's desire to ease the...

  18. Public Utilities Act (Illinois)

    Broader source: Energy.gov [DOE]

    This act aims to make energy services in the state reliable and efficient, while preserving the quality if the environment. It states the duties of public utilities in terms of accounts and reports...

  19. Environmental Protection Act (Illinois)

    Broader source: Energy.gov [DOE]

    This Act states general provisions for the protection of the environment. It also states specific regulations for air, water and land pollution as well as atomic radiation, toxic chemical and oil...

  20. High Voltage Safety Act

    Broader source: Energy.gov [DOE]

    The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage...

  1. Land Reclamation Act (Missouri)

    Broader source: Energy.gov [DOE]

    It is the policy of the state to balance surface mining interests with the conservation of natural resources and land preservation. This Act authorizes the Land Reclamation Commission of the...

  2. Forest Conservation Act (Maryland)

    Broader source: Energy.gov [DOE]

    The main purpose of Maryland's Forest Conservation Act is to minimize the loss of Maryland's forest resources during land development by making the identification and protection of forests and...

  3. Mississippi Public Utility Act

    Broader source: Energy.gov [DOE]

    The Mississippi Public Utility Act is relevant to any project that plans to generate energy. It requires that a utility must first obtain a Certificate of Public Convenience and Necessity (CPCN)...

  4. Radiation Management Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    This Act establishes The Department of Environmental Quality as the designated official agency of the State of Oklahoma for all regulatory activities for the use of atomic energy and sources of...

  5. Healthy Air Act (Maryland)

    Broader source: Energy.gov [DOE]

    The Maryland Healthy Air Act was developed with the purpose of bringing Maryland into attainment with the National Ambient Air Quality Standards (NAAQS) for ozone and fine particulate matter by the...

  6. Illegal Logging and Related Trade

    E-Print Network [OSTI]

    are the responsibility of the authors. All rights reserved. No part of this publication may be reproduced or transmitted by Stephen Austin and Sons Ltd The material selected for the printing of this report is Elemental Chlorine framework 14 3.1.3 Checks and balances 16 3.1.4 International trade cooperation 18 3.1.5 Ensuring a balance

  7. Energy trading and information systems

    SciTech Connect (OSTI)

    NONE

    1995-12-31T23:59:59.000Z

    This document contains reports which were presented at the meeting on Energy Trading and Information Systems. Topics were concerned with the importance and use of information systems to the natural gas industry. Individual papers have been processed separately for the United States Department of Energy databases.

  8. Toolbox Safety Talk DOT Materials of Trade

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Toolbox Safety Talk DOT ­ Materials of Trade Environmental Health & Safety Facilities Safety by Trades personnel that meet the definition of hazardous materials even though they may be sold as consumer commodities. The DOT regulations have exceptions for Materials of Trade (MOT). The MOT exception provides

  9. IATP | Trade Observatory | Headlines q What's new

    E-Print Network [OSTI]

    IATP | Trade Observatory | Headlines q Home q What's new q Geneva Update q Headlines q Library q Treaty Database q Related sites q About Trade Observatory Select a category to display: Archives August Industries Unite to Seek Free and Fair Trade Canada NewsWire July 8, 2003 Email this pageCanada News

  10. Trade and Resource Policy with Overlapping Generations

    E-Print Network [OSTI]

    Karp, Larry S.

    Trade and Resource Policy with Overlapping Generations Larry Karp Armon Rezai July 23, 2013 Abstract Trade changes incentives to protect an open-access natural resource. In an OLG setting autarchy. Trade reverses these incentives. In a dynamic political economy, resource policies in both

  11. "Extreme Project Management" One World Trade

    E-Print Network [OSTI]

    Guiltinan, Mark

    "Extreme Project Management" One World Trade Center A special presentation with a discussion of managing multiple large projects at the World Trade Center site with multiple adjacencies, complicated 1984), PE, PMP, is the Program Director for One World Trade Center. Lynda Tollner, is a Program

  12. Trade and Resource Sustainability with Overlapping Generations

    E-Print Network [OSTI]

    Karp, Larry S.

    Trade and Resource Sustainability with Overlapping Generations Larry Karp Armon Rezai March 28, 2014 Abstract Trade changes incentives to protect an open-access natural resource. In an OLG setting autarchy. Trade reverses these incentives. In a dynamic political economy, agents without bequest motives

  13. The Trade and Climate Change Joint Agenda

    E-Print Network [OSTI]

    The Trade and Climate Change Joint Agenda CEPS Working Document No. 295/June 2008 Thomas L. Brewer Abstract Climate change, international trade, investment and technology transfer are all issues that have............................................................................ 6 3.2 Coverage of the Multilateral Climate and Trade Regimes

  14. Trade Pattern and Economic Development when Endogenous

    E-Print Network [OSTI]

    Trade Pattern and Economic Development when Endogenous and Exogenous Comparative Advantages Coexist Papers Center for International Development at Harvard University #12;CID Working Paper no. 3 Trade is divided between commercialized sector which trades with foreign country and self-sufficient sector which

  15. Freedom of Information Act/Privacy Act Requests | National Nuclear...

    National Nuclear Security Administration (NNSA)

    ActPrivacy Act Requests | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

  16. Recovery Act Funds at Work

    Broader source: Energy.gov [DOE]

    Funds from the American Recovery and Reinvestment Act of 2009 (Recovery Act) are being put to work to improve safety, reliability, and service in systems across the country. Here are case studies from a variety of Recovery Act programs.

  17. Massachusetts Clean Air Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    The Act contains regulations to prevent the pollution and contamination of the atmosphere. The Act establishes a contiguous metropolitan pollution control district, comprised of towns in the...

  18. Coastal Marshlands Protection Act (Georgia

    Broader source: Energy.gov [DOE]

    The Coastal Marshlands Protection Act provides the Coastal Resources Division with the authority to protect tidal wetlands. The Coastal Marshlands Protection Act limits certain activities and...

  19. Environmental Protection Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Environmental Protection Act is Ontario's key legislation for environmental protection. The act grants the Ministry of the Environment broad powers to deal with the discharge of contaminants...

  20. Recovery Act State Memos Kentucky

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    * KENTUCKY RECOVERY ACT SNAPSHOT Kentucky has substantial natural resources, including coal, oil, gas, and hydroelectric power. The American Recovery & Reinvestment Act (ARRA)...

  1. ARM - Recovery Act

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become a UsergovAboutRecovery Act Recovery Act Logo

  2. Dynamic access policies for unconditionally secure secret

    E-Print Network [OSTI]

    Martin, Keith

    generation of cryptographic secrets · Key management in distributed environments · Multiparty computation #12 Awaji Island, Japan 2 Ueli's orders · Choose a topic related to information theoretic security · Provide an overview · Identify some open problems · Give a "nice talk" #12;ITW 2005 Awaji Island, Japan 3 A little bit

  3. Secret Symmetries in AdS/CFT

    E-Print Network [OSTI]

    Marius de Leeuw; Takuya Matsumoto; Sanefumi Moriyama; Vidas Regelskis; Alessandro Torrielli

    2012-04-11T23:59:59.000Z

    We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.

  4. Secret Symmetries in AdS/CFT

    E-Print Network [OSTI]

    de Leeuw, Marius; Moriyama, Sanefumi; Regelskis, Vidas; Torrielli, Alessandro

    2012-01-01T23:59:59.000Z

    We discuss special quantum group (secret) symmetries of the integrable system associated to the AdS/CFT correspondence. These symmetries have by now been observed in a variety of forms, including the spectral problem, the boundary scattering problem, n-point amplitudes, the pure-spinor formulation and quantum affine deformations.

  5. Scalable Mechanisms for Rational Secret Sharing

    E-Print Network [OSTI]

    Dani, Varsha; Saia, Jared

    2012-01-01T23:59:59.000Z

    We consider the classical secret sharing problem in the case where all agents are selfish but rational. In recent work, Kol and Naor show that, when there are two players, in the non-simultaneous communication model, i.e. when rushing is possible, there is no Nash equilibrium that ensures both players learn the secret. However, they describe a mechanism for this problem, for any number of players, that is an epsilon-Nash equilibrium, in that no player can gain more than epsilon utility by deviating from it. Unfortunately, the Kol and Naor mechanism, and, to the best of our knowledge, all previous mechanisms for this problem require each agent to send O(n) messages in expectation, where n is the number of agents. This may be problematic for some applications of rational secret sharing such as secure multi-party computation and simulation of a mediator. We address this issue by describing mechanisms for rational secret sharing that are designed for large n. Both of our results hold for n > 2, and are Nash equil...

  6. Secrets of the Motor That Drives Archaea Revealed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secrets of the Motor That Drives Archaea Revealed Secrets of the Motor That Drives Archaea Revealed Print Thursday, 14 February 2013 00:00 An international team led by John Tainer...

  7. BigNeuron: Unlocking the Secrets of the Human Brain

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    BigNeuron: Unlocking the Secrets of the Human Brain BigNeuron: Unlocking the Secrets of the Human Brain Berkeley Researchers and Supercomputers to Help Create a Standard 3D Neuron...

  8. Fair-weather clouds hold dirty secret | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fair-weather clouds hold dirty secret Fair-weather clouds hold dirty secret Released: May 05, 2013 New study reveals particles that seed small-scale clouds over Oklahoma Air...

  9. Low-density random matrices for secret key extraction

    E-Print Network [OSTI]

    Zhou, Hongchao

    Secret key extraction, the task of extracting a secret key from shared information that is partially known by an eavesdropper, has important applications in cryptography. Motivated by the requirements of high-speed quantum ...

  10. Medieval Studies Movie Series: The Secret of Kells (2009)

    E-Print Network [OSTI]

    Indiana University

    2009-01-01T23:59:59.000Z

    Medieval Studies Movie Series: Journeys The Secret of Kells (2009) Wednesday, February 20 7.30pm with secret wisdom and magical power. The boy's quest takes him deep into the woods, where he encounters

  11. Secret key agreement using asymmetry in channel state knowledge

    E-Print Network [OSTI]

    Wornell, Gregory W.

    We study secret-key agreement protocols over a wiretap channel controlled by a state parameter. The secret-key capacity is established when the wiretap channel is discrete and memoryless, the sender and receiver are both ...

  12. Role of obestatin on growth hormone secretion: An in vitro approach

    SciTech Connect (OSTI)

    Pazos, Yolanda, E-mail: yolanda.pazos@usc.es [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Alvarez, Carlos J.P. [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Universidad de Santiago de Compostela (USC), Santiago de Compostela (Spain); Camina, Jesus P. [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Al-Massadi, Omar [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Universidad de Santiago de Compostela (USC), Santiago de Compostela (Spain); Seoane, Luisa M. [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Casanueva, Felipe F. [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain) [Area de Endocrinologia Molecular y Celular, Instituto de Investigacion Sanitaria (IDIS), Complejo Hospitalario Universitario de Santiago (CHUS), Santiago de Compostela (Spain); CIBER Fisiopatologia de la Obesidad y Nutricion (CB06/03), Instituto de Salud Carlos III (Spain); Universidad de Santiago de Compostela (USC), Santiago de Compostela (Spain)

    2009-12-25T23:59:59.000Z

    Obestatin, the ghrelin-associated peptide, showed to activate MAPK signaling with no effect on Akt nor cell proliferating activity in rat tumor somatotroph cells (growth cells, GC). A sequential analysis of the obestatin transmembrane signaling pathway indicated a route involving the consecutive activation of G{sub i}, PI3k, novel PKC{epsilon}, and Src for ERK1/2 activation. Furthermore, obestatin treatment triggers growth hormone (GH) release in the first 30 min, being more acute at 15 min. At 1 h, obestatin treated cells showed the same levels in GH secretion than controls. Added to this functionality, obestatin was secreted by GC cells. Based on the capacity to stimulate GH release from somatotroph cells, obestatin may act directly in the pituitary through an autocrine/paracrine mechanism.

  13. The geography of So{sub 2} emissions trading

    SciTech Connect (OSTI)

    Solomon, B. [Environmental Protection Agency, Washington, DC (United States)

    1995-12-01T23:59:59.000Z

    Interstate trading of SO{sub 2} emission allowances under the Clean Air Act Amendments of 1990 represents the largest-scale application of market principles to environmental protection. some opponents have hypothesized that high emitting electric power plants in the Midwestern states will buy additional allowances and thereby sustain SO{sub 2} emissions at unacceptable high levels. Much of these emissions would then continue to return downwind as sulfates in the Northeast, damaging critical ecosystems such as lakes and forests in the Adirondacks. A competing hypothesis is that in an increasingly competitive utility industry, a power plant will choose the least-cost compliance option for its SO{sub 2} emission requirements, which for many large and dirty Midwestern plants will be to retrofit with scrubbers. This paper will provide the first comprehensive empirical analysis of the geographic pattern of SO{sub 2} allowance trading for the first three years (early 1992 to early 1995) to determine the validity of the first hypothesis. It will be shown that with the exception of one electric utility in Illinois, the Midwestern states have not used allowance trading to sustain high emission levels. A Congressionally-mandated subsidy for scrubber retrofits at Phase I affected-units, however, has allowed two of these states (Ohio and Indiana) plus three additional Appalachian states (Tennessee, West Virginia and Pennsylvania) to acquire large quantities of bonus allowances. Most of these additional allowances may be banked for future use at other affected units by the acquiring utilities, since the newly scrubbed plants will have much lower SO{sub 2} emissions because of the scrubber retrofits. The good news is that the trading program is projected to save a lot of money, over $2 billion out of a possible $3 billion in annual compliance costs by the time of Phase II.

  14. Small Business Administration Recovery Act Implementation | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small Business Administration Recovery Act Implementation Small...

  15. The cardiokine story unfolds: ischemic stress-induced protein secretion

    E-Print Network [OSTI]

    Glembotski, Christopher

    on secreted proteins to mount a response designed to resist stress-induced damage. This review examines

  16. Recovery Act State Memos Montana

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... 5 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Green power transmission line given new life ......

  17. Fighting Iran with Trade Sanctions

    E-Print Network [OSTI]

    Bhala, Raj

    2014-01-01T23:59:59.000Z

    acts continued, and the human rights environment changed minimally. But, thanks to the November 2013 deal, sanctions one day may be viewed retrospectively as efficacious, because they appear to have played a necessary part in causing the economic...

  18. Logging and the Law How the U.S. Lacey Act Helps Reduce

    E-Print Network [OSTI]

    to cut global warming pollution by reducing tropical deforestation. More information about UCS a r y 3 C h a p t e r o n e introduction 4 Illegal Logging and Associated Trade 4 Causes of Illegal t e r f o U r global Benefits of the lacey act 14 Economic Benefits 15 Societal Benefits 16

  19. The Lacey Act: A tool in U.S. Efforts to Combat Illegal

    E-Print Network [OSTI]

    The Lacey Act: A tool in U.S. Efforts to Combat Illegal LoggingLogging July 2010 Why Does the U.S. Combat Illegal Logging? Illegal logging robs countries, impoverishes forest communities and puts money and trade. Profits from illegal logging have been used to fuel conflict and purchase arms. #12;U.S. Efforts

  20. Optimal information rate of secret sharing schemes on trees

    E-Print Network [OSTI]

    Tardos, Gábor

    The information rate for an access structure is the reciprocal of the load of the optimal secret sharing scheme method. AMS classification numbers. 05B40, 05C85, 94A60, 94A62, 94A17 1 Introduction Secret sharing sharing scheme for the access structure based on a graph G a secret sharing scheme on G. The load

  1. Characterizing Ideal Weighted Threshold Secret Amos Beimel1

    E-Print Network [OSTI]

    Beimel, Amos

    Characterizing Ideal Weighted Threshold Secret Sharing Amos Beimel1 , Tamir Tassa1,2 , and Enav Science, The Open University, Ra'anana, Israel. Abstract. Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret sharing. In such settings, there is a set of users where each user

  2. Secret sharing on the d-dimensional Laszlo Csirmaz

    E-Print Network [OSTI]

    Csirmaz, László

    Secret sharing on the d-dimensional cube L´aszl´o Csirmaz Central European University Abstract We prove that for d > 1 the best information ratio of the perfect secret sharing scheme based on the edge that the information ratio of the infinite d-dimensional lattice is d. Key words: Secret sharing scheme, polymatroid

  3. Strongly Secure Ramp Secret Sharing Schemes for General Access Structures

    E-Print Network [OSTI]

    Yamamoto, Hirosuke

    Strongly Secure Ramp Secret Sharing Schemes for General Access Structures Mitsugu Iwamoto 1 , Hirosuke Yamamoto 2 Abstract Ramp secret sharing (SS) schemes can be classified into strong ramp SS schemes and weak ramp SS schemes. The strong ramp SS schemes do not leak out any part of a secret explicitly even

  4. Perfect Secret Sharing Schemes from Room GhulamRasool Chaudhry

    E-Print Network [OSTI]

    Seberry, Jennifer

    Perfect Secret Sharing Schemes from Room Squares Ghulam­Rasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collabo­ ration between unauthorised participants cannot reduce

  5. Weighted modulated secret image sharing method Chien-Chang Chen

    E-Print Network [OSTI]

    Chen, Chaur-Chin

    Weighted modulated secret image sharing method Chien-Chang Chen Hsuan Chuang University Department-layered structure for grouping participants with different weights in a secret image sharing problem. Conventional secret im- age sharing methods suffer from truncation distortion, which is the difference between a pixel

  6. Secret-key generation with correlated sources and noisy channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-key generation with correlated sources and noisy channels Ashish Khisti EECS Dept. MIT for secret-key generation between remote terminals is considered. The sender communicates to the receiver discrete memoryless sources. Lower and upper bounds for the secret-key rate are presented and shown

  7. Weakly-Private Secret Sharing Schemes Amos Beimel1

    E-Print Network [OSTI]

    Beimel, Amos

    Weakly-Private Secret Sharing Schemes Amos Beimel1 and Matthew Franklin2 1 Department of Computer. Abstract. Secret-sharing schemes are an important tool in cryptogra- phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret-sharing schemes realizing gen

  8. The secret lives of polynomial identities Bruce Reznick

    E-Print Network [OSTI]

    Reznick, Bruce

    The secret lives of polynomial identities Bruce Reznick University of Illinois at Urbana-Champaign University of Washington May 18, 2012 Bruce Reznick University of Illinois at Urbana-Champaign The secret of Illinois at Urbana-Champaign The secret lives of polynomial identities #12;"An idea which can be used only

  9. CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT

    E-Print Network [OSTI]

    Dujella, Andrej

    CONTINUED FRACTIONS AND RSA WITH SMALL SECRET EXPONENT ANDREJ DUJELLA Abstract. Extending of Verheul and van Tilborg variant of Wiener's attack on RSA cryptosystem with small secret exponent. 1 of two large primes p and q. The public exponent e and the secret exponent d are related by ed 1 (mod (n

  10. The secret lives of polynomial identities Bruce Reznick

    E-Print Network [OSTI]

    Reznick, Bruce

    The secret lives of polynomial identities Bruce Reznick University of Illinois at Urbana-Champaign The secret lives of polynomial identities #12;"An idea which can be used only once is a trick. If you can use of Illinois at Urbana-Champaign The secret lives of polynomial identities #12;"An idea which can be used only

  11. Multipartite Secret Sharing by Bivariate Interpolation # Tamir Tassa + Nira Dyn #

    E-Print Network [OSTI]

    Tassa, Tamir

    Multipartite Secret Sharing by Bivariate Interpolation # Tamir Tassa + Nira Dyn # Abstract Given that we present herein. We design ideal perfect secret sharing schemes for these types of access structures that are based on bivariate interpolation. The secret sharing schemes for the two types

  12. Interactive Secret Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Interactive Secret Key Generation over Reciprocal Fading Channels Ashish Khisti Dept. of Electrical--We study a two-terminal secret-key generation problem over a two-way, approximately reciprocal, block of the secret-key is gen- erated from the correlated channel state sequences by creating omniscience between

  13. Dynamic access policies for unconditionally secure secret sharing schemes

    E-Print Network [OSTI]

    Martin, Keith

    Dynamic access policies for unconditionally secure secret sharing schemes Keith M. Martin.martin@rhul.ac.uk Abstract--- Secret sharing schemes are cryptographic primitives that can be employed in any situation where it is desirable to distribute information relating to secret data amongst a number of entities. Following a secure

  14. Secret Sets and Applications R. Molva \\Lambda G. Tsudik y

    E-Print Network [OSTI]

    Tsudik, Gene

    Secret Sets and Applications R. Molva \\Lambda G. Tsudik y August 14, 1997 Abstract This paper introduces the notion of a secret set -- a basic construct for communication with groups of mutually suspicious entities. A set is secret if any entity can test its membership in the set but can determine

  15. Perfect Secret Sharing Schemes from Room Ghulam-Rasool Chaudhry

    E-Print Network [OSTI]

    Seberry, Jennifer

    Perfect Secret Sharing Schemes from Room Squares Ghulam-Rasool Chaudhry Hossein Ghodosi Jennifer retirement Abstract Secret sharing schemes are one of the most important primitives in distributed systems. In perfect secret sharing schemes, collabo- ration between unauthorised participants cannot reduce

  16. The secret lives of polynomial identities Bruce Reznick

    E-Print Network [OSTI]

    Reznick, Bruce

    The secret lives of polynomial identities Bruce Reznick University of Illinois at Urbana, 2010 Math 499, March 2, 2011 Bruce Reznick University of Illinois at Urbana-Champaign The secret lives-Champaign The secret lives of polynomial identities #12;"An idea which can be used only once is a trick. If you can use

  17. The secret lives of polynomial identities Bruce Reznick

    E-Print Network [OSTI]

    Reznick, Bruce

    The secret lives of polynomial identities Bruce Reznick University of Illinois at Urbana-Champaign University of Konstanz June 30, 2011 Bruce Reznick University of Illinois at Urbana-Champaign The secret of Illinois at Urbana-Champaign The secret lives of polynomial identities #12;"An idea which can be used only

  18. Protecting Secret Keys with Personal Entropy Carl Ellison

    E-Print Network [OSTI]

    Schneier, Bruce

    Protecting Secret Keys with Personal Entropy Carl Ellison Cybercash, Inc., cme@cybercash.com Chris technology often requires users to protect a secret key by selecting a password or passphrase. While a good to recover the secret key. As time passes, the ability to remember the passphrase fades and the user may

  19. Secret Communication using Artificial Noise Rohit Negi, Satashu Goel

    E-Print Network [OSTI]

    Yener, Aylin

    Secret Communication using Artificial Noise Rohit Negi, Satashu Goel ECE Department, Carnegie Mellon University, PA 15213, USA {negi,satashug}@ece.cmu.edu Abstract-- The problem of secret receiver without the eavesdropper being able to decode the secret message. We consider the problem

  20. Secret-Key Generation over Reciprocal Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation over Reciprocal Fading Channels Ashish Khisti Department of Electrical and Computer Engineering University of Toronto Nov. 14, 2012 #12;Motivation Secret-Key Generation in Wireless, 2012 2/ 22 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  1. Secret-Key Generation from Channel Reciprocity: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    Secret-Key Generation from Channel Reciprocity: A Separation Approach Ashish Khisti Department: Secret-Key Generation Secure Message Transmission Physical Layer Authentication Jamming Resistance Feb 11, 2013 2/ 20 #12;Motivation Secret-Key Generation in Wireless Fading Channels A B KA KB Forward

  2. Secret sharing on trees: problem solved Laszlo Csirmaz

    E-Print Network [OSTI]

    Csirmaz, László

    Secret sharing on trees: problem solved L´aszl´o Csirmaz G´abor Tardos Abstract We determine the worst case information rate for all secret sharing schemes based on trees. It is the inverse of 2 - 1/c ) algorithm which finds an optimal cover on any tree, and thus a perfect secret sharing scheme with optimal

  3. Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups

    E-Print Network [OSTI]

    Fehr, Serge

    Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS-box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme differs from an ordinary linear secret sharing scheme (over, say

  4. Secret-Key Generation using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Generation using Correlated Sources and Channels Ashish Khisti, Member, IEEE of generating a shared secret key between two terminals in a joint source-channel setup -- the terminals to correlated discrete memoryless source sequences. We establish lower and upper bounds on the secret

  5. Compartmented Secret Sharing Based on the Chinese Remainder Theorem

    E-Print Network [OSTI]

    Compartmented Secret Sharing Based on the Chinese Remainder Theorem Sorin Iftene Faculty of Computer Science "Al. I. Cuza" University Ia¸si, Romania siftene@infoiasi.ro Abstract A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) which are distributed

  6. On Linear Secret Sharing for Connectivity in Directed Graphs

    E-Print Network [OSTI]

    Beimel, Amos

    On Linear Secret Sharing for Connectivity in Directed Graphs Amos Beimel 1 and Anat Paskin 2 1 Dept, Israel. Abstract. In this work we study linear secret sharing schemes for s­t connectivity in directed.e., edges) can reconstruct the secret if it contains a path from node s to node t. We prove that in every

  7. Round-Optimal and Efficient Verifiable Secret Matthias Fitzi1

    E-Print Network [OSTI]

    Garay, Juan A.

    Round-Optimal and Efficient Verifiable Secret Sharing Matthias Fitzi1 , Juan Garay2 , Shyamnath@iiit.ac.in Abstract. We consider perfect verifiable secret sharing (VSS) in a syn- chronous network of n processors (players) where a designated player called the dealer wishes to distribute a secret s among the players

  8. Ideal Social Secret Sharing Using Birkhoff Interpolation Method

    E-Print Network [OSTI]

    Ideal Social Secret Sharing Using Birkhoff Interpolation Method Nasrollah Pakniat a , Ziba Eslami a Illinois University, Carbondale, Illinois, USA Abstract The concept of social secret sharing (SSS-cooperative parties. As our contribution, we propose an ideal social secret sharing (Ideal-SSS) in which the size

  9. On Linear Secret Sharing for Connectivity in Directed Graphs

    E-Print Network [OSTI]

    Beimel, Amos

    On Linear Secret Sharing for Connectivity in Directed Graphs Amos Beimel1 and Anat Paskin2 1 Dept, Israel. Abstract. In this work we study linear secret sharing schemes for s-t connectivity in directed.e., edges) can reconstruct the secret if it contains a path from node s to node t. We prove that in every

  10. Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyytia

    E-Print Network [OSTI]

    Hyytiä, Esa

    Hybrid Secret Key Escrow Mechanisms as Counters Esa Hyyti¨a Telecommunications Research Center can be used in several ways. One interesting application of the Shamir's secret sharing scheme in the context of privacy aware traffic monitoring is to escrow a secret key after m suspicious events have been

  11. Hardware implementation of secure Shamir's secret sharing scheme

    E-Print Network [OSTI]

    Karpovsky, Mark

    Hardware implementation of secure Shamir's secret sharing scheme Pei Luo and Andy Yu-Lun Lin Electrical and Computer Engineering Boston University Email: markkar@bu.edu Abstract--Shamir's secret sharing scheme is an effective way to distribute secret to a group of shareholders. But this scheme is vulnerable

  12. Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch

    E-Print Network [OSTI]

    Markowitch, Olivier

    Two Optimum Secret Sharing Schemes Revisited Zhengjun Cao Olivier Markowitch Department of Computer, caoamss@gmail.com Abstract In 2006, Obana et al proposed two optimum secret shar- ing schemes secure efficient because they only extend the secret to an array of two elements. The new scheme for a single se

  13. Secure Broadcasting of a Common Message with Independent Secret Keys

    E-Print Network [OSTI]

    Khisti, Ashish

    Secure Broadcasting of a Common Message with Independent Secret Keys Rafael F. Schaefer Department broadcasting with indepen- dent secret keys is studied. The particular scenario is analyzed where a common of it. The transmitter shares independent secret keys of arbitrary rates with both legitimate receivers

  14. Reusing Shares in Secret Sharing Schemes Yuliang Zheng

    E-Print Network [OSTI]

    Zheng, Yuliang

    Reusing Shares in Secret Sharing Schemes Yuliang Zheng Thomas Hardjono Jennifer Seberry The Centre for The Computer Journal 1 #12;Reusing Shares in Secret Sharing Schemes Abstract A (t w) threshold scheme is a method for sharing a secret among w shareholders so that the collaboration of at least t shareholders

  15. How to Share a Secret p.1/25

    E-Print Network [OSTI]

    Roughan, Matthew

    % % !% & )10 2 3 $ 40 2 0 ! 5 $ " $ 6 " 87 $ 9 2A@ % &' ( $!0 ( $ How to Share a Secret ­ p.1/25 #12# ¡ ¥ © ¥ ¥ )¦ # '@ A ¡ £ 0 A ¡ £87 A ¡ £ 4 # ! ( £ ¥ © ¥ ¦ ¦ ! ¦ # ¥¡ © ! © ¥ ¥ ' © (B How to Share a Secret ­ p.2 ¤¦ ' ¥ ¥ ¡ ©¡ # '@ ¥ ¥ ¡ ¦ F F F How to Share a Secret ­ p.3/25 #12;¦ ! A ¡ ¥ ¥ ¥ ¡ ! ¥§¦ !# '@ ¡ 0 © ! ' © ( 4

  16. Optimal BlackBox Secret Sharing over Arbitrary Abelian Groups

    E-Print Network [OSTI]

    Fehr, Serge

    Optimal Black­Box Secret Sharing over Arbitrary Abelian Groups Ronald Cramer and Serge Fehr BRICS­box secret sharing scheme for the threshold access structure Tt,n is one which works over any finite Abelian group G. Briefly, such a scheme di#ers from an ordinary linear secret sharing scheme (over, say, a given

  17. The Causes of Trade Globalization: A Political-Economy and World-Systems Approach

    E-Print Network [OSTI]

    Kwon, Roy

    2011-01-01T23:59:59.000Z

    Washington DC: World Bank. World Trade Organization.2010. World Trade Report2010: Trade in Natural Resources. Geneva, Switzerland: WTO

  18. Regulation, Allocation, and Leakage in Cap-and-Trade Markets for CO2

    E-Print Network [OSTI]

    Bushnell, Jim B; Chen, Yihsu

    2009-01-01T23:59:59.000Z

    competitiveness in the eu emissions trading scheme: Policyand-trade systems for emissions trading is the allocation orciency of the resulting emissions trading market. Certainly

  19. U.S. Timber Production, Trade, Consumption,

    E-Print Network [OSTI]

    Laughlin, Robert B.

    and Technology Assessment Unit at the Forest Products Laboratory. Chris McKeever created computer files managers, forest industries, trade associations, forestry schools, renewable resource organizations

  20. Facing an Arbitrage Opportunity: Trade or Wait?

    E-Print Network [OSTI]

    2014-12-09T23:59:59.000Z

    Dec 9, 2014 ... The results obtained herein are in contrast to the standard textbook arbitrage trading ..... 3.2.1 Graphic Illustration and Numerical Experiments.

  1. International Electricity Trade - Open Access | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    DOE has consistently expressed its policy that international electricity trade should be subject to the same principles of comparable open access and non-discrimination that apply...

  2. U.S. Agriculture and International Trade

    E-Print Network [OSTI]

    McCorkle, Dean; Benson, Geoffrey A.; Marchant, Mary; Rosson, C. Parr

    1999-06-23T23:59:59.000Z

    by high tariffs and nontariff barriers. International trade has a major impact on U.S. agriculture. Exports are crucial, providing a market for a major share of crop production and a growing share of meat output. In 1996, 28 percent of U.S. farm cash... upheavals in the countries of the for- mer Soviet Union will not end soon and this will be an impediment to economic growth and expanded trade. The most recent trade agreement under the General Agreement on Tariffs and Trade (GATT), the so-called Uruguay...

  3. Multilateral, regional and bilateral energy trade governance

    SciTech Connect (OSTI)

    Leal-Arcas, Rafael; Grasso, Costantino; Rios, Juan Alemany (Queen Mary Univ. of London (United Kingdom))

    2014-12-01T23:59:59.000Z

    The current international energy trade governance system is fragmented and multi-layered. Streamlining it for greater legal cohesiveness and international political and economic cooperation would promote global energy security. The current article explores three levels of energy trade governance: multilateral, regional and bilateral. Most energy-rich countries are part of the multilateral trading system, which is institutionalized by the World Trade Organization (WTO). The article analyzes the multilateral energy trade governance system by focusing on the WTO and energy transportation issues. Regionally, the article focuses on five major regional agreements and their energy-related aspects and examines the various causes that explain the proliferation of regional trade agreements, their compatibility with WTO law, and then provides several examples of regional energy trade governance throughout the world. When it comes to bilateral energy trade governance, this article only addresses the European Union’s (EU) bilateral energy trade relations. The article explores ways in which gaps could be filled and overlaps eliminated whilst remaining true to the high-level normative framework, concentrating on those measures that would enhance EU energy security.

  4. Recovery Act Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection RadiationRecord-Setting Microscopy IlluminatesHandbookRODs Sign Act

  5. AME40463: Senior Design Project Spring 2010 ENGINEERING TRADE STUDY

    E-Print Network [OSTI]

    Batill, Stephen M.

    AME40463: Senior Design Project ­ Spring 2010 ENGINEERING TRADE STUDY The engineering trade study indicate how that information influenced design decisions for the platform. Trade Study Proposal (due Feb prior to the beginning of the all-class meeting at 9:30 a.m. Trade Study Report (due Feb. 23): The trade

  6. DEMOCRACYS OPEN SECRET bridges vol. 29, April 2011 / Pielke's Perspective

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    explanation was that Germany participates in emissions trading and this would necessarily limit carbon dioxide no matter how much was produced. Obviously, emissions trading cannot make the impossible possible. Many

  7. Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers

    SciTech Connect (OSTI)

    Bagherinezhad, Saber [Department of Computer Science, Sharif University of Technology, P.O. Box 11365-9161, Tehran (Iran, Islamic Republic of); Karimipour, Vahid [Department of Physics, Sharif University of Technology, P.O. Box 11365-9161, Tehran (Iran, Islamic Republic of)

    2003-04-01T23:59:59.000Z

    We introduce a protocol for quantum secret sharing based on reusable entangled states. The entangled state between the sender and the receiver acts only as a carrier to which data bits are entangled by the sender and disentangled from it by the receivers, all by local actions of simple gates. We also show that the interception by Eve or the cheating of one of the receivers introduces a quantum bit error rate larger than 25% which can be detected by comparing a subsequence of the bits.

  8. Generalized Semi-Quantum Secret Sharing Schemes

    E-Print Network [OSTI]

    Gheorghiu, Vlad

    2012-01-01T23:59:59.000Z

    We investigate quantum secret sharing schemes constructed from $[n,k,delta]_D$ non-binary stabilizer quantum error correcting codes with carrier qudits of prime dimension $D$. We provide a systematic way of determining the access structure, which completely determines the forbidden and intermediate structures. We then show that the information available to the intermediate structure can be fully described and quantified by what we call the \\emph{information group}, a subgroup of the Pauli group of $k$ qudits, and employ this group structure to construct a method for hiding the information from the intermediate structure via twirling of the information group and sharing of classical bits between the dealer and the players. Our scheme allows the transformation of a ramp (intermediate) quantum secret sharing scheme into a semi-quantum perfect secret sharing scheme with the same access structure as the ramp one but without any intermediate subsets, and is optimal in the amount of classical bits the dealer has to ...

  9. Structural mapping of the ClpB ATPases of Plasmodium falciparum: Targeting protein folding and secretion for antimalarial drug design.

    E-Print Network [OSTI]

    Ah Young, AP; Koehl, A; Cascio, D; Egea, PF

    2015-01-01T23:59:59.000Z

    falciparum: Targeting protein folding and secretion forfalciparum: targeting protein folding and secretion for

  10. NIST Organic Act National Institute of Standards and Technology Act

    E-Print Network [OSTI]

    Magee, Joseph W.

    NIST Organic Act National Institute of Standards and Technology Act SECTION 1. FINDINGS in manufacturing technology, quality control, and techniques for ensuring product reliability and cost concerns compete strongly in world markets. (3) Improvements in manufacturing and product technology depend

  11. OECD TRADE POLICY WORKING PAPERS The OECD Trade Policy Working Paper series is designed to make available to a wide

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    #12;OECD TRADE POLICY WORKING PAPERS The OECD Trade Policy Working Paper series is designed to make been declassified on the responsibility of the Working Party of the Trade Committee under the OECD.contact@oecd.org. OECD TRADE POLICY WORKING PAPERS are published on www.oecd.org/trade © OECD 2011 Applications

  12. Structural basis for alginate secretion across the bacterial outer membrane

    SciTech Connect (OSTI)

    Whitney, J.C.; Robinson, H.; Hay, I. D.; Li, C.; Eckford, P. D. W.; Amaya, M. F.; Wood, L. F.; Ohman, D. E.; Bear, C. E.; Rehm, B. H.; Howell, P. L.

    2011-08-09T23:59:59.000Z

    Pseudomonas aeruginosa is the predominant pathogen associated with chronic lung infection among cystic fibrosis patients. During colonization of the lung, P. aeruginosa converts to a mucoid phenotype characterized by the overproduction of the exopolysaccharide alginate. Secretion of newly synthesized alginate across the outer membrane is believed to occur through the outer membrane protein AlgE. Here we report the 2.3 {angstrom} crystal structure of AlgE, which reveals a monomeric 18-stranded {beta}-barrel characterized by a highly electropositive pore constriction formed by an arginine-rich conduit that likely acts as a selectivity filter for the negatively charged alginate polymer. Interestingly, the pore constriction is occluded on either side by extracellular loop L2 and an unusually long periplasmic loop, T8. In halide efflux assays, deletion of loop T8 ({Delta}T8-AlgE) resulted in a threefold increase in anion flux compared to the wild-type or {Delta}L2-AlgE supporting the idea that AlgE forms a transport pathway through the membrane and suggesting that transport is regulated by T8. This model is further supported by in vivo experiments showing that complementation of an algE deletion mutant with {Delta}T8-AlgE impairs alginate production. Taken together, these studies support a mechanism for exopolysaccharide export across the outer membrane that is distinct from the Wza-mediated translocation observed in canonical capsular polysaccharide export systems.

  13. International Trade and Sustainability: A survey Louis Dupuy

    E-Print Network [OSTI]

    Boyer, Edmond

    International Trade and Sustainability: A survey Louis Dupuy LAREFI Working Paper N°2012-01 April, institutions and international trade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3 International trade in the sustainability literature 11 3.1 Openness and sustainability

  14. Purdue Climate Change Research Center Emissions Trading Workshop

    E-Print Network [OSTI]

    Purdue Climate Change Research Center Emissions Trading Workshop Introduction and Overview manner. Workshop rather than conference. #12;What is Emissions Trading? (or "Cap and Trade") · Cap & Enforcement · Measurement, Reporting, and Verification (MRV) mechanisms for reductions #12;Five Emissions

  15. Market power in international carbon emissions trading: a laboratory test

    E-Print Network [OSTI]

    Carlén, Björn.

    The prospect that governments of one or a few large countries, or trading blocs, would engage in international greenhouse gas emissions trading has led several policy analysts to express concerns that trade would be ...

  16. Market Microstructure Patterns Powering Trading and Surveillance Agents

    E-Print Network [OSTI]

    Cao, Longbing

    Market Microstructure Patterns Powering Trading and Surveillance Agents Longbing Cao (University are then used for powering market trading and surveillance agents for automatically detecting market models. From data analysis perspective, we view it valuable for smart trading in designing legal

  17. Auction Market System in Electronic Security Trading Platform

    E-Print Network [OSTI]

    Tesfatsion, Leigh

    Auction Market System in Electronic Security Trading Platform Li Xihao Bielefeld Graduate School security trading platform Xetra oper- ated by Frankfurt Stock Exchange, we consider the Xetra auction. Keywords: agent-based modelling, computational market experiment, electronic security trading platform

  18. Pollution Control Act (South Carolina)

    Broader source: Energy.gov [DOE]

    This Act declares the maintenance of reasonable standards of purity of air and water to be the public policy of the state. The Act authorizes the Department of Health and Environmental Control to...

  19. Solid Waste Act (New Mexico)

    Broader source: Energy.gov [DOE]

    The main purpose of the Solid Waste Act is to authorize and direct the establishment of a comprehensive solid waste management program. The act states details about specific waste management...

  20. Montana Radon Control Act (Montana)

    Broader source: Energy.gov [DOE]

    The Radon Control Act regulates the emission of radon, the gaseous decay products of uranium or thorium. The Act addresses operator certification of radon-producing facilities, testing and...

  1. Two-Party secret key distribution via a modified quantum secret sharing protocol

    SciTech Connect (OSTI)

    Grice, Warren P [ORNL; Evans, Philip G [ORNL; Lawrie, Benjamin J [ORNL; Legre, Matthieu [ID Quantique, Inc.; Lougovski, Pavel [ORNL; Qi, Bing [ORNL; Ray, William R [ORNL; Williams, Brian P [ORNL; Smith IV, Amos M [ORNL

    2015-01-01T23:59:59.000Z

    We present and demonstrate a method of distributing secret information based on N-party single-qubit Quantum Secret Sharing (QSS) in a modied plug-and-play two-party Quantum Key Distribution (QKD) system with N 2 intermediate nodes and compare it to both standard QSS and QKD. Our setup is based on the Clavis2 QKD system built by ID Quantique but is generalizable to any implementation. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N 2 parties. This method signicantly reduces the number of resources (single photon detectors, lasers and dark ber connections) needed to implement QKD on the grid.

  2. Port Royal, Jamaica, and the slave trade

    E-Print Network [OSTI]

    Johnson, David A

    2000-01-01T23:59:59.000Z

    of the eighteenth century in the Florida Keys, Henrietta Marie had just quit Port Royal after off-loading her human cargo. The artifact collection of shackles, ship's equipment and trade goods represents the trappings of the maritime slave trade. Particularly...

  3. ARM - Recovery Act Instruments

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadap Documentation TDMADAP :ProductsVaisala CL51Instruments Related Links RHUBC-IIActRecovery Act

  4. Recovery Act State Memos Nebraska

    Energy Savers [EERE]

    ... 6 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Biofuels company builds new facility in Nebraska ... 7 * Nebraska appliance rebate...

  5. Recovery Act State Memos Arkansas

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6 RECOVERY ACT SUCCESS STORIES - ENERGY EMPOWERS * Program finds unique way to fund energy upgrades ... 7 * Green collar courses ......

  6. Climate Change, the Clean Air Act, and Industrial Pollution

    E-Print Network [OSTI]

    Kaswan, Alice

    2012-01-01T23:59:59.000Z

    trading program, the Emissions Trading System (ETS), and inCLIMATE CHANGE: THE EU EMISSIONs TRADING Sci HlME (ETS) GEsRegulatory Agency in Emissions Trading, 59 ADMIN. L. Riv.

  7. DOE GC Joins Customs Service Trade Data System to Strengthen...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GC Joins Customs Service Trade Data System to Strengthen Enforcement Effort DOE GC Joins Customs Service Trade Data System to Strengthen Enforcement Effort February 14, 2011 -...

  8. Goldschmidt Conference Abstracts 2009 A437 Archaeometric evidence of trade

    E-Print Network [OSTI]

    Sparks, Donald L.

    Goldschmidt Conference Abstracts 2009 A437 Archaeometric evidence of trade of leucite Roman Volcanic province, Italy), a fact that implies an specific and important trade way of heavy

  9. Greenhouse Gas Emissions Impacts of Liberalizing Trade in Environmenta...

    Open Energy Info (EERE)

    Liberalizing Trade in Environmental Goods Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Emissions Impacts of Liberalizing Trade in Environmental Goods...

  10. Constraints on secret neutrino interactions after Planck

    E-Print Network [OSTI]

    Forastieri, Francesco; Natoli, Paolo

    2015-01-01T23:59:59.000Z

    (Abridged) Neutrino interactions beyond the standard model may affect the cosmological evolution and can be constrained through observations. We consider the possibility that neutrinos possess secret scalar or pseudoscalar interactions mediated by the Nambu-Goldstone boson of a still unknown spontaneously broken global $U(1)$ symmetry, as in, e.g. , Majoron models. In such scenarios, neutrinos still decouple at $T\\simeq 1$ MeV, but become tightly coupled again ('recouple') at later stages of the cosmological evolution. We use available observations of CMB anisotropies, including Planck 2013 and the joint BICEP2/Planck 2015 data, to derive constraints on the quantity $\\gamma_{\

  11. Constraints on secret neutrino interactions after Planck

    E-Print Network [OSTI]

    Francesco Forastieri; Massimiliano Lattanzi; Paolo Natoli

    2015-06-03T23:59:59.000Z

    (Abridged) Neutrino interactions beyond the standard model may affect the cosmological evolution and can be constrained through observations. We consider the possibility that neutrinos possess secret scalar or pseudoscalar interactions mediated by the Nambu-Goldstone boson of a still unknown spontaneously broken global $U(1)$ symmetry, as in, e.g. , Majoron models. In such scenarios, neutrinos still decouple at $T\\simeq 1$ MeV, but become tightly coupled again ('recouple') at later stages of the cosmological evolution. We use available observations of CMB anisotropies, including Planck 2013 and the joint BICEP2/Planck 2015 data, to derive constraints on the quantity $\\gamma_{\

  12. Quantum secret sharing using product states

    SciTech Connect (OSTI)

    Hsu, L.-Y.; Li, C.-M. [Department of Physics, Chung Yuan Christian University, Chung-Li, 32023, Taiwan (China); Institute and Department of Electrophysics, National Chiao Tung University, Hsinchu 30050, Taiwan (China)

    2005-02-01T23:59:59.000Z

    This study proposes quantum secret sharing protocols using product states. The first two protocols adopt the quantum key distribution protocol using product states [Guo et al.Phys. Rev. A 64, 042301 (2001)]. In these two protocols, the sender does not reveal any information about the qutrits until confirming that each receiver has received a qutrit. This study also considers the security and some possible eavesdropping strategies. In the third proposed protocol, three-level Bell states are exploited for qutrit preparation via nonlocality swapping.

  13. Secret Energy Savings | OpenEI Community

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ |Rippey JumpAir Jump to:ScottsSearch HomeSeatricitySecret

  14. Efficient multiparty quantum secret sharing of secure direct communication

    E-Print Network [OSTI]

    Jian Wang; Quan Zhang; Chao-jing Tang

    2005-12-17T23:59:59.000Z

    In this paper, we present an (n, n) threshold quantum secret sharing scheme of secure direct communication using Greenberger-Horne-Zeilinger state. The present scheme is efficient in that all the Greenberger-Horne-Zeilinger states used in the quantum secret sharing scheme are used to generate shared secret messages except those chosen for checking eavesdropper. In our scheme, the measuring basis of communication parties is invariable and the classical information used to check eavesdropping needs only the results of measurements of the communication parties. Another nice feature of our scheme is that the sender transmit her secret messages to the receivers directly and the receivers recover the sender's secret by combining their results, different from the QSS scheme whose object is essentially to allow a sender to establish a shared key with the receivers. This feature of our scheme is similar to that of quantum secret direct communication.

  15. Triple acting radial seal

    DOE Patents [OSTI]

    Ebert, Todd A (West Palm Beach, FL); Carella, John A (Jupiter, FL)

    2012-03-13T23:59:59.000Z

    A triple acting radial seal used as an interstage seal assembly in a gas turbine engine, where the seal assembly includes an interstage seal support extending from a stationary inner shroud of a vane ring, the interstage seal support includes a larger annular radial inward facing groove in which an outer annular floating seal assembly is secured for radial displacement, and the outer annular floating seal assembly includes a smaller annular radial inward facing groove in which an inner annular floating seal assembly is secured also for radial displacement. A compliant seal is secured to the inner annular floating seal assembly. The outer annular floating seal assembly encapsulates the inner annular floating seal assembly which is made from a very low alpha material in order to reduce thermal stress.

  16. Secure direct communication based on secret transmitting order of particles

    SciTech Connect (OSTI)

    Zhu Aidong; Zhang Shou [Center for the Condensed-Matter Science and Technology, Harbin Institute of Technology, Harbin, Heilongjiang 150001 (China); Department of Physics, College of Science, Yanbian University, Yanji, Jilin 133002 (China); Xia Yan; Fan Qiubo [Department of Physics, College of Science, Yanbian University, Yanji, Jilin 133002 (China)

    2006-02-15T23:59:59.000Z

    We propose the schemes of quantum secure direct communication based on a secret transmitting order of particles. In these protocols, the secret transmitting order of particles ensures the security of communication, and no secret messages are leaked even if the communication is interrupted for security. This strategy of security for communication is also generalized to a quantum dialogue. It not only ensures the unconditional security but also improves the efficiency of communication.

  17. Systemic trade-risk of critical resources

    E-Print Network [OSTI]

    Klimek, Peter; Thurner, Stefan

    2015-01-01T23:59:59.000Z

    In the wake of the 2008 financial crisis the role of strongly interconnected markets in fostering systemic instability has been increasingly acknowledged. Trade networks of commodities are susceptible to deleterious cascades of supply shocks that increase systemic trade-risks and pose a threat to geopolitical stability. On a global and a regional level we show that supply risk, scarcity, and price volatility of non-fuel mineral resources are intricately connected with the structure of the world-trade network of or spanned by these resources. On the global level we demonstrate that the scarcity of a resource, as measured by its trade volume compared to extractable reserves, is closely related to the susceptibility of the trade network with respect to cascading shocks. On the regional level we find that to some extent the region-specific price volatility and supply risk can be understood by centrality measures that capture systemic trade-risk. The resources associated with the highest systemic trade-risk indica...

  18. Rechargeable Heat Battery's Secret Revealed: Solar Energy Capture...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rechargeable Heat Battery Rechargeable Heat Battery's Secret Revealed Solar energy capture in chemical form makes it storable and transportable January 11, 2011 | Tags: Chemistry,...

  19. Kinetic regulation of coated vesicle secretion

    E-Print Network [OSTI]

    Lionel Foret; Pierre Sens

    2008-07-28T23:59:59.000Z

    The secretion of vesicles for intracellular transport often rely on the aggregation of specialized membrane-bound proteins into a coat able to curve cell membranes. The nucleation and growth of a protein coat is a kinetic process that competes with the energy-consuming turnover of coat components between the membrane and the cytosol. We propose a generic kinetic description of coat assembly and the formation of coated vesicles, and discuss its implication to the dynamics of COP vesicles that traffic within the Golgi and with the Endoplasmic Reticulum. We show that stationary coats of fixed area emerge from the competition between coat growth and the recycling of coat components, in a fashion resembling the treadmilling of cytoskeletal filaments. We further show that the turnover of coat components allows for a highly sensitive switching mechanism between a quiescent and a vesicle producing membrane, upon a slowing down of the exchange kinetics. We claim that the existence of this switching behaviour, also triggered by factors such as the presence of cargo and variation of the membrane mechanical tension, allows for efficient regulation of vesicle secretion. We propose a model, supported by different experimental observations, in which vesiculation of secretory membranes is impaired by the energy consuming desorption of coat proteins, until the presence of cargo or other factors triggers a dynamical switch into a vesicle producing state.

  20. Recovery Act Recipient Data | Department of Energy

    Office of Environmental Management (EM)

    Recovery Act Recipient Data Recovery Act Recipient Data A listing of all Recovery Act recipients and their allocations. Updated weekly. recoveryactfunding.xls More Documents &...

  1. A Tree Based Recursive Scheme for Space E#cient Secret Sharing

    E-Print Network [OSTI]

    A Tree Based Recursive Scheme for Space E#cient Secret Sharing Abhishek Parakh and Subhash Kak a k­out­of­n recursive secret sharing scheme based on an n­ary tree data structure. In recursive hiding of secrets, the user encodes additional secrets in the shares of the secret in­ tended

  2. Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without Encryption

    E-Print Network [OSTI]

    Wang, Yongge

    Efficient LDPC Code Based Secret Sharing Schemes and Private Data Storage in Cloud without in LDPC and LT codes, this paper introduces three classes of secret sharing schemes called BP-XOR secret sharing schemes, pseudo-BP-XOR secret sharing schemes, and LDPC secret sharing schemes. By establishing

  3. FAIR TRADE CONTRACTS FOR SOME, AN INSURANCE Claire CHAMBOLLE

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    FAIR TRADE CONTRACTS FOR SOME, AN INSURANCE FOR OTHERS Claire CHAMBOLLE Sylvaine PORET 2009 Cahier://www.enseignement.polytechnique.fr/economie/ mailto:chantal.poujouly@polytechnique.edu hal-00367500,version1-11Mar2009 #12;Fair Trade Contracts the impact of Fair Trade contracts between sub-groups of farmers and a Fair Trade organization on the spot

  4. World Trade Review http://journals.cambridge.org/WTR

    E-Print Network [OSTI]

    Boyer, Edmond

    World Trade Review http://journals.cambridge.org/WTR Additional services for World Trade Review here Climate and trade policies: from mutual destruction to mutual support PATRICK A. MESSERLIN World Trade Review / Volume 11 / Issue 01 / January 2012, pp 53 - 80 DOI: 10.1017/S1474745611000395, Published

  5. Productivity and Firm Selection: Intra-National and International Trade.

    E-Print Network [OSTI]

    Sussex, University of

    Productivity and Firm Selection: Intra-National and International Trade. Gregory Corcos (NHH) Firm Selection: Intra- vs International Trade April 23, 2007 1 / 35 #12;Overview Objective: Quantify the productivity gains from inter- and intra-national trade. What we do in this paper: model the effect of trade

  6. International Trade and Unionization: Evidence from Reshad N. Ahsan

    E-Print Network [OSTI]

    Bandyopadhyay, Antar

    International Trade and Unionization: Evidence from India Reshad N. Ahsan University of Melbourne exploit an exogenous episode of trade liberalization to examine the impact of interna- tional trade and provides us with predictions on the relationship between trade and both unionization and union wages. We

  7. Trade and Foreign Investment in Business Services James R. Markusen

    E-Print Network [OSTI]

    Sussex, University of

    Trade and Foreign Investment in Business Services James R. Markusen Bridget Strand Abstract At some conceptual level, trade in goods and services are not that much different. However, the speed at which trade are quite different from those for trade in goods prompts us to take a more careful look. The paper begins

  8. Ecology 1993 Trade-offs between sprinting and clinging ability

    E-Print Network [OSTI]

    Bennett, Albert F.

    Functional Ecology 1993 7,28 1-286 Trade-offs between sprinting and clinging ability in Kenyan corresponding to those it uses most frequently; or (b) a trade-off exists between maximizing clinging architecture and composition may underlie this trade-off. Comparison with trade-offs in arboreal locomotor

  9. WORLD TRADE WEEK 2013 COLLEGE/UNIVERSITY SCHOLARSHIPS

    E-Print Network [OSTI]

    de Lijser, Peter

    WORLD TRADE WEEK 2013 COLLEGE/UNIVERSITY SCHOLARSHIPS The World Trade Week 2013 Education Committee is sponsoring several $1000 scholarships for students intending to pursue a career in international trade relating to international trade. If a student's major does not have an international dimension

  10. 7Emissions Trading Workshop Summary Report Discussion Synthesis

    E-Print Network [OSTI]

    7Emissions Trading Workshop Summary Report Discussion Synthesis Background On April 30, 2010, more than 70 people gathered for an all-day workshop on emissions trading at Purdue University's Discovery of different emission trading proposals. The need for such discussion is great. Pollution trading is a high

  11. The Energy and Economic Impacts of Expanding International Emissions Trading

    E-Print Network [OSTI]

    The Energy and Economic Impacts of Expanding International Emissions Trading Tianyu Qi, Niven Trading Tianyu Qi* , Niven Winchester , Valerie J. Karplus and Xiliang Zhang Abstract Emissions trading of the European Union's Emissions Trading System with a new system in Australia in 2015, this paper simulates

  12. Electric trade in the United States 1994

    SciTech Connect (OSTI)

    NONE

    1998-08-01T23:59:59.000Z

    Wholesale trade in electricity plays an important role for the US electric utility industry. Wholesale, or bulk power, transactions allow electric utilities to reduce power costs, increase power supply options, and improve reliability. In 1994, the wholesale trade market totaled 1.9 trillion kilowatthours, about 66% of total sales to ultimate consumers. This publication, Electric Trade in the United States 1994 (ELECTRA), is the fifth in a series of reports on wholesale power transactions prepared by the Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1994.

  13. Is international emissions trading always beneficial?

    E-Print Network [OSTI]

    Babiker, Mustafa H.M.

    Economic efficiency is a major argument for the inclusion of an international emission permit trading system under the Kyoto Protocol. Using a partial equilibrium framework, energy system models have shown that implementing ...

  14. Equity and Emissions Trading in China

    E-Print Network [OSTI]

    Zhang, D.

    China has embarked on an ambitious pathway for establishing a national carbon market in the next five to ten years. In this study, we analyze the distributional aspects of a Chinese emissions-trading scheme from ethical, ...

  15. The temporal efficiency of SO? emissions trading

    E-Print Network [OSTI]

    Ellerman, A. Denny

    2002-01-01T23:59:59.000Z

    This paper provides an empirical evaluation of the temporal efficiency of the U.S. Acid Rain Program, which implemented a nationwide market for trading and banking sulfur dioxide (SO2) emission allowances. We first develop ...

  16. An empirical analysis of quantitative trading strategies

    E-Print Network [OSTI]

    Aiuchi, Masaharu

    2008-01-01T23:59:59.000Z

    Along with the increasing computing power, growing availability of various data streams, introduction of the electronic exchanges, decreasing trading costs and heating-up competition in financial investment industry, ...

  17. Trade and Workforce Changeover in Brazil

    E-Print Network [OSTI]

    Muendler, Marc-Andreas

    2007-01-01T23:59:59.000Z

    Rate and Job Flows in Brazil,” Journal of Policy Reform,intensive occupations in Brazil’s traded-goods sector isinput tari? (in z jt ). Brazil’s nominal exchange rate is

  18. Rick arbitrage : analysis and trading systems

    E-Print Network [OSTI]

    Naheta, Akshay, 1981-

    2004-01-01T23:59:59.000Z

    In this thesis we quantify the risk arbitrage investment process and create trading strategies that generate positive risk-adjusted returns. We use a sample of 895 stock swap mergers, cash mergers, and cash tender offers ...

  19. Climate policy and dependence on traded carbon

    E-Print Network [OSTI]

    Andrew, Robbie M; Davis, Steven J; Peters, Glen P

    2013-01-01T23:59:59.000Z

    imported products or fossil fuels are more exposed to energytrade in carbon (as fossil fuels and also embodied inWithin this, trade in fossil fuels was larger (10.8 GtCO 2

  20. Essays on Trade and Production Sharing

    E-Print Network [OSTI]

    Noguera, Guillermo Marcelo

    2011-01-01T23:59:59.000Z

    Cost Elasticity United States Top Sources Bias (%) China TopTotal Costs Normalized at 100 in 1995) Canada China MexicoChina and Korea: not distinguishing between final and intermediate goods causes the trade cost

  1. Double acting bit holder

    DOE Patents [OSTI]

    Morrell, Roger J. (Blommington, MN); Larson, David A. (Minneapolis, MN); Ruzzi, Peter L. (Eagan, MN)

    1994-01-01T23:59:59.000Z

    A double acting bit holder that permits bits held in it to be resharpened during cutting action to increase energy efficiency by reducing the amount of small chips produced. The holder consist of: a stationary base portion capable of being fixed to a cutter head of an excavation machine and having an integral extension therefrom with a bore hole therethrough to accommodate a pin shaft; a movable portion coextensive with the base having a pin shaft integrally extending therefrom that is insertable in the bore hole of the base member to permit the moveable portion to rotate about the axis of the pin shaft; a recess in the movable portion of the holder to accommodate a shank of a bit; and a biased spring disposed in adjoining openings in the base and moveable portions of the holder to permit the moveable portion to pivot around the pin shaft during cutting action of a bit fixed in a turret to allow front, mid and back positions of the bit during cutting to lessen creation of small chip amounts and resharpen the bit during excavation use.

  2. Recovery Act | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    three Recovery Act-funded Smart Grid Investment Grant (SGIG) projects. February 28, 2014 Smart Meter Investments Yield Positive Results in Maine Central Maine Power's (CMP) SGIG...

  3. Coal Mine Safety Act (Virginia)

    Broader source: Energy.gov [DOE]

    This Act is the primary legislation pertaining to coal mine safety in Virginia. It contains information on safety rules, safety standards and required certifications for mine workers, prohibited...

  4. Green Energy Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Green Energy Act was created to expand Ontario's production of renewable energy, encourage energy conservation and promote the creation of clean-energy green jobs.

  5. Montana Dam Safety Act (Montana)

    Broader source: Energy.gov [DOE]

    This Act establishes the state's interest in the construction of dams for water control and regulation and for hydropower generation purposes. It regulates dam construction, operation, and...

  6. Water Pollution Control Act (Minnesota)

    Broader source: Energy.gov [DOE]

    This Act gives the Minnesota Pollution Control Agency broad responsibility to establish pollution standards for state waters; monitor water conditions and sources of pollution; review construction,...

  7. Solid Waste Management Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act provides for the planning and regulation of solid waste storage, collection, transportation, processing, treatment, and disposal. It requires that municipalities submit plans for municipal...

  8. Solid Waste Management Act (Oklahoma)

    Broader source: Energy.gov [DOE]

    This Act establishes rules for the permitting, posting of security, construction, operation, closure, maintenance and remediation of solid waste disposal sites; disposal of solid waste in ways that...

  9. Massachusetts Clean Waters Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act establishes a Division of Water Pollution Control within the Massachusetts Department of Environmental Protection. The Division is responsible for establishing a program for the prevention...

  10. Georgia Hazardous Waste Management Act

    Broader source: Energy.gov [DOE]

    The Georgia Hazardous Waste Management Act (HWMA) describes a comprehensive, Statewide program to manage hazardous wastes through regulating hazardous waste generation, transportation, storage,...

  11. Water Quality Control Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Water Quality Control Act (WQCA) establishes the water pollution control program. The WQCA identifies the responsibilities and extent of authority for the Commissioner of the Water Quality...

  12. Recovery Act State Memos Florida

    Energy Savers [EERE]

    of renewable energy. The Florida Energy and Climate Commission has awarded the Florida Solar Energy Center (FSEC) 10 million in Recovery Act money, enabling the center to set...

  13. Ground Water Management Act (Virginia)

    Broader source: Energy.gov [DOE]

    Under the Ground Water Management Act of 1992, Virginia manages ground water through a program regulating the withdrawals in certain areas called Ground Water Management Areas (GWMA). Currently,...

  14. Florida Coastal Management Act (Florida)

    Broader source: Energy.gov [DOE]

    This Act is intended to provide for the development of natural, commercial, recreational, ecological, industrial, and aesthetic resources, including, but not limited to, energy facilities, of...

  15. Montana Environmental Policy Act (Montana)

    Broader source: Energy.gov [DOE]

    The Montana Environmental Policy Act aims to provide for the consideration of environmental impacts by the legislature when enacting laws, and for public transparency regarding the possible...

  16. Hazardous Sites Cleanup Act (Pennsylvania)

    Broader source: Energy.gov [DOE]

    This Act tasks the Pennsylvania Department of Environmental Protection with regulating hazardous waste. The department is charged with siting, review, permitting and development of hazardous waste...

  17. Freedom of Information Act FOIA 10CFR

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Freedom of Information Act Freedom of Information Act Regulations Code of Federal Regulations (CFR) for the Freedom of Information Act is 10 CFR 1004 THE FREEDOM OF INFORMATION ACT...

  18. Review: The Secret War Between Downloading and Uploading: Tales of the Computer as a Culture Machine by Peter Lunenfeld

    E-Print Network [OSTI]

    Milbourn, Amanda

    2013-01-01T23:59:59.000Z

    The Secret War Between Downloading and Uploading: Tales ofISBN 9780262015479. In The Secret War Between Downloadingproduced cultural goods. The Secret War Between Downloading

  19. Secret lives, public lies : the conversos and socio-religious non-conformism in the Spanish Golden Age

    E-Print Network [OSTI]

    Ingram, Kevin

    2006-01-01T23:59:59.000Z

    Sanford, Lost Lexicon: Secret Meanings in the Vocabulary ofOF CALIFORNIA, SAN DIEGO Secret Lives, Public Lies: TheChapter 6: Diego Velázquez’s Secret History…………………………………

  20. Electric trade in the United States, 1996

    SciTech Connect (OSTI)

    NONE

    1998-12-01T23:59:59.000Z

    Wholesale trade in electricity plays an important role for the US electric utility industry. Wholesale, or bulk power, transactions allow electric utilities to reduce power costs, increase power supply options, and improve reliability. In 1996, the wholesale trade market totaled 2.3 trillion kilowatthours, over 73% of total sales to ultimate consumers. This publication, Electric Trade in the United States 1996 (ELECTRA), is the sixth in a series of reports on wholesale power transactions prepared by the Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1996. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. 1 fig., 43 tabs.

  1. Experience Ancient Egypt Uncover the secrets of the ancient world...

    E-Print Network [OSTI]

    Travis, Adrian

    Experience Ancient Egypt Uncover the secrets of the ancient world... A day event for Children in Care in school years 7 - 9 Discover the secrets of Ancient Egypt at this FREE taster day. Explore the incredible Ancient Egypt Gallery at the Fitzwilliam Museum and create some Egyptian artwork. Plus enjoy

  2. Quantum secret sharing schemes and reversibility of quantum operations

    SciTech Connect (OSTI)

    Ogawa, Tomohiro [Graduate School of Information Science and Technology, University of Tokyo, 7-3-1 Hongo, Bunkyo-ku, Tokyo, 113-8656 (Japan); Sasaki, Akira [Sumitomo Mitsui Banking Corporation, 1-3-2, Marunouchi, Chiyoda-ku, Tokyo 100-0005 (Japan); Iwamoto, Mitsugu [Graduate School of Information Systems, University of Electro-Communications, 1-5-1 Chofugaoka, Chofu-shi, Tokyo, 182-8585 (Japan); Yamamoto, Hirosuke [Graduate School of Frontier Sciences, University of Tokyo, 5-1-5 Kashiwanoha, Kashiwa-shi, Chiba, 277-8561 (Japan)

    2005-09-15T23:59:59.000Z

    Quantum secret sharing schemes encrypting a quantum state into a multipartite entangled state are treated. The lower bound on the dimension of each share given by Gottesman [Phys. Rev. A 61, 042311 (2000)] is revisited based on a relation between the reversibility of quantum operations and the Holevo information. We also propose a threshold ramp quantum secret sharing scheme and evaluate its coding efficiency.

  3. National Environmental Policy Act (NEPA) Categorically Excluded...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Environmental Management System NEPA National Environmental Policy Act (NEPA) Categorically Excluded Actions National Environmental Policy Act (NEPA) Categorically Excluded...

  4. Secret key distillation from shielded two-qubit states

    E-Print Network [OSTI]

    Joonwoo Bae

    2010-09-22T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  5. Secret key distillation from shielded two-qubit states

    SciTech Connect (OSTI)

    Bae, Joonwoo [School of Computational Sciences, Korea Institute for Advanced Study, Seoul 130-722 (Korea, Republic of)

    2010-05-15T23:59:59.000Z

    The quantum states corresponding to a secret key are characterized using the so-called private states, where the key part consisting of a secret key is shielded by the additional systems. Based on the construction, it was shown that a secret key can be distilled from bound entangled states. In this work, I consider the shielded two-qubit states in a key-distillation scenario and derive the conditions under which a secret key can be distilled using the recurrence protocol or the two-way classical distillation, advantage distillation together with one-way postprocessing. From the security conditions, it is shown that a secret key can be distilled from bound entangled states in a much wider range. In addition, I consider the case that in which white noise is added to quantum states and show that the classical distillation protocol still works despite a certain amount of noise although the recurrence protocol does not.

  6. Secret Histories/Impossible Objects: Toward a Hemispheric Poetics of Twentieth-Century Long Poems

    E-Print Network [OSTI]

    Leslie, Juliana Isabel

    2013-01-01T23:59:59.000Z

    Graham, Sarah H.S. “We have a secret. We are alive”: H.D. ’sCALIFORNIA SANTA CRUZ SECRET HISTORIES/IMPOSSIBLE OBJECTS:ABSTRACT Juliana Leslie Secret Histories/Impossible Objects:

  7. "Sabiha Gök?cen's 80-year-old secret" : Kemalist nation formation and the Ottoman Armenians

    E-Print Network [OSTI]

    Ulgen, Fatma

    2010-01-01T23:59:59.000Z

    year old secret? 2.1. Introduction………………………………………………….Tree Uprooted by a 60-year old Secret. ? The New York Times,Gökçen‘s 80-Year-Old Secret?: Kemalist Nation Formation and

  8. Economics of pollution trading for SO{sub 2} and NOx

    SciTech Connect (OSTI)

    Dallas Burtraw; David A. Evans; Alan Krupnick; Karen Palmer; Russell Toth

    2005-03-15T23:59:59.000Z

    For years economists have urged policymakers to use market-based approaches such as cap-and-trade programs or emission taxes to control pollution. The sulphur dioxide (SO{sub 2}) allowance market created by Title IV of the 1990 US Clean Air Act Amendments represents the first real test of the wisdom of economists' advice. Subsequent urban and regional applications of NOx emission allowance trading took shape in the 1990s in the United States, culminating in a second large experiment in emission trading in the eastern United States that began in 2003. This paper provides an overview of the economic rationale for emission trading and a description of the major US programs for SO{sub 2} and nitrogen oxides. These programs are evaluated along measures of performance including cost savings, environmental integrity, and incentives for technological innovation. The authors offer lessons for the design of future programs including, most importantly, those reducing carbon dioxide. 128 refs., 1 fig., 1 tab.

  9. California's CapandTrade Auction Proceeds

    E-Print Network [OSTI]

    Kammen, Daniel M.

    ................................................................3 A. AB 32: California's Global Warming Solutions Act enacted the Global Warming Solutions Act, known as AB 32 (Pavley).1 to the most pressing environmental and energy issues at the state, local, and national levels. Authors

  10. Key Distillation and the Secret-Bit Fraction

    E-Print Network [OSTI]

    Nick S. Jones; Lluis Masanes

    2008-05-12T23:59:59.000Z

    We consider distillation of secret bits from partially secret noisy correlations P_ABE, shared between two honest parties and an eavesdropper. The most studied distillation scenario consists of joint operations on a large number of copies of the distribution (P_ABE)^N, assisted with public communication. Here we consider distillation with only one copy of the distribution, and instead of rates, the 'quality' of the distilled secret bits is optimized, where the 'quality' is quantified by the secret-bit fraction of the result. The secret-bit fraction of a binary distribution is the proportion which constitutes a secret bit between Alice and Bob. With local operations and public communication the maximal extractable secret-bit fraction from a distribution P_ABE is found, and is denoted by Lambda[P_ABE]. This quantity is shown to be nonincreasing under local operations and public communication, and nondecreasing under eavesdropper's local operations: it is a secrecy monotone. It is shown that if Lambda[P_ABE]>1/2 then P_ABE is distillable, thus providing a sufficient condition for distillability. A simple expression for Lambda[P_ABE] is found when the eavesdropper is decoupled, and when the honest parties' information is binary and the local operations are reversible. Intriguingly, for general distributions the (optimal) operation requires local degradation of the data.

  11. EU-California Environmental Agreements: The Role of Trade in Emissions Permits and Escape Clauses

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2008-01-01T23:59:59.000Z

    the role of trade in emissions permits and escape clauses. (agreements. Trade in emissions permits has ambiguous and inAlthough trade in emissions permits reduces the aggregate

  12. The OECD Anti-Bribery Convention: Changing the Currents of Trade

    E-Print Network [OSTI]

    D'Souza, Anna

    2009-01-01T23:59:59.000Z

    Institutions and International Trade: a Reconsideration ofin Gravity Models of Trade and Integration,” Working paperDeterminants of Bilateral Trade: Does Gravity Work in a

  13. Measuring and moderating the water resource impact of biofuel production and trade

    E-Print Network [OSTI]

    Fingerman, Kevin Robert

    2012-01-01T23:59:59.000Z

    2.I! V! “Global issues of trade, energy, and subsidies haveal.  (2010).  Global  trade  and  environmental  impact  2005).  "Environmental  trade  measures,  the  shrimp-­?

  14. Emissions Trading and Air Toxics Emissions: RECLAIM and Toxics Regulation in the South Coast Air Basin

    E-Print Network [OSTI]

    Cohen, Nancy J.

    1993-01-01T23:59:59.000Z

    Emissions Trading and Air Toxics Emissions: RECLAIM anda mar- ket-based emissions trading program called theimpacts cre- ated by emissions trading programs that affect

  15. Strategic Behavior, Private Information, and Decentralization in the European Union Emissions Trading System

    E-Print Network [OSTI]

    Malueg, David A.; Yates, Andrew J.

    2009-01-01T23:59:59.000Z

    in the European Union emissions trading scheme. Rev EnvironDecentralization in the EU emissions trading scheme andthe European Union Emissions Trading System David A. Malueg

  16. Distributing Pollution Rights in Cap-and-Trade Programs: Are Outcomes Independent of Allocation?

    E-Print Network [OSTI]

    Fowlie, Meredith; Perloff, Jeffrey M.

    2008-01-01T23:59:59.000Z

    policy- the RECLAIM emission trading policy." Environ.Incentives Market: a new emissions trading program for Lospolitical feasibility of emissions trading programs. See,

  17. Going Mobile: Emissions Trading Gets a Boost from Mobile Source Emission Reduction Credits

    E-Print Network [OSTI]

    Goldschein, Perry S.

    1995-01-01T23:59:59.000Z

    Going Mobile: Emissions Trading Gets a Boost From Mobilehave tested various emissions trading policies to supplementAn Analysis of EPA's Emissions Trading Program, 6 YALE J. ON

  18. Cap-and-Trade Modeling and Analysis: Congested Electricity Market Equilibrium

    E-Print Network [OSTI]

    Limpaitoon, Tanachai

    2012-01-01T23:59:59.000Z

    Market power in emissions trading: strategically manipu-pricing under carbon emissions trading: A dominant firm with2008). Implications of CO2 emissions trading for short-run

  19. State Power and Trade-Environment Negotiations: Lessons from the EU, NAFTA and GATT/WTO

    E-Print Network [OSTI]

    Steinberg, Richard

    1995-01-01T23:59:59.000Z

    several medium-sized powers, regional trading blocs are morestructure of power and interests in the world trading systemworld trading system, larger European powers have decided to

  20. Cap-and-Trade Modeling and Analysis: Congested Electricity Market Equilibrium

    E-Print Network [OSTI]

    Limpaitoon, Tanachai

    2012-01-01T23:59:59.000Z

    The case of wholesale power trading in Germany Power andY. (2011). Market power in emissions trading: strategicallyto model market power in permit trading. The conjectural

  1. Sack Goldman Sachs Cap-and-Trade The revolving door between Washington and Wall Street has produced a new scheme to

    E-Print Network [OSTI]

    Hansen, James E.

    designed to wind down the pollution in accord with the public good, not the polluters' profits. Before by polluters before accepting the Clean Air Act was that old power plants be "grandfathered", avoiding many to sell. #12;Horse-trading further mars the outcome. House and Senate energy bills legislate continued

  2. How to Share a Secret p.1/40

    E-Print Network [OSTI]

    Roughan, Matthew

    Ð Ë Ò × ÍÒ Ú Ö× ØÝ Ó Ð How to Share a Secret ­ p.1/40 #12;Ì Ö Ñ Ý Ô × Ö Ø¸ ØÛÓ Ó Ø Ñ Ö º Ò Ñ Ò Ö Ò Ð Ò ´½ ¼ ¹ ½ ¼µ How to Share a Secret ­ p.2/40 #12;Ì Ö Ñ Ý Ô × Ö Ø¸ ØÛÓ Ó Ø Ñ Ö º Ò Ñ Ò Ö Ò Ð Ò ´½ ¼ ¹ ½ ¼µ Ì Ö Ñ Ý Ô × Ö Ø¸ Ø Ý ÒÓÛ ×ÓÑ Ñ Ø ×º Å ØØ ÊÓÙ Ò¸ ¾¼½¾ How to Share a Secret ­ p.2/40 #12;Ë Ö Ø× Ë

  3. Texas Clean Air Act (Texas)

    Broader source: Energy.gov [DOE]

    This Act is designed to safeguard the state's air resources from pollution by requiring the control and abatement of air pollution and emissions of air contaminants, consistent with the protection...

  4. Tennessee Air Quality Act (Tennessee)

    Broader source: Energy.gov [DOE]

    The Tennessee Air Quality Act (AQA) delegates the power to maintain air quality in the State to the Department of Environment and Conservation. Under the Department of the Environment and...

  5. Renewable Energy Act (New Mexico)

    Broader source: Energy.gov [DOE]

    The purposes of the Renewable Energy Act are to prescribe the amounts of renewable energy resources that public utilities shall include in their electric energy supply portfolios for sales to...

  6. Water Quality Act (New Mexico)

    Broader source: Energy.gov [DOE]

    This act establishes the Water Quality Control Commission and states the powers and duties of the commission. Rules are stated for adoption of regulations and standards and information is provided...

  7. Nuclear Decommissioning Financing Act (Maine)

    Broader source: Energy.gov [DOE]

    The Nuclear Decommissioning Financing Act calls for the establishment of a tax-exempt, tax-deductible decommissioning fund by the licensee of any nuclear power generating facility to pay for the...

  8. Georgia Radiation Control Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Radiation Control Act is designed to prevent any associated harmful effects upon the environment or the health and safety of the public through the institution and maintenance of a...

  9. Toxic Pollution Prevention Act (Illinois)

    Broader source: Energy.gov [DOE]

    It is the purpose of this Act to reduce the disposal and release of toxic substances which may have adverse and serious health and environmental effects, to promote toxic pollution prevention as...

  10. Toxics Use Reduction Act (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act, revised significantly in 2006, seeks to mitigate the use of toxic substances and the production of toxic byproducts through reporting requirements as well as resource conservation plans...

  11. Montana Hazardous Waste Act (Montana)

    Broader source: Energy.gov [DOE]

    This Act addresses the safe and proper management of hazardous wastes and used oil, the permitting of hazardous waste facilities, and the siting of facilities. The Department of Environmental...

  12. Efficient Use of Energy Act

    Broader source: Energy.gov [DOE]

    The Efficient Use of Energy Act of 2005 allows public electric and natural gas utilities to implement cost-effective energy-reduction programs. The programs may be funded through a tariff rider for...

  13. Delaware Land Protection Act (Delaware)

    Broader source: Energy.gov [DOE]

    The Land Protection Act requires the Department of Natural Resources and Environmental Control to work with the Delaware Open Space Council to develop standards and criteria for determining the...

  14. Coastal Facilities Review Act (Maryland)

    Broader source: Energy.gov [DOE]

    This Act aims to preserve Maryland's coastal areas and to balance competing demands for resources by requiring environmental impact evaluations to be conducted prior to the approval of the...

  15. Niobrara Scenic River Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act establishes the Niobrara Council, to assist in all aspects of the management of the Niobrara scenic river corridor and promulgate rules and regulations related to the preservation of the...

  16. International Trade of Wood Pellets (Brochure)

    SciTech Connect (OSTI)

    Not Available

    2013-05-01T23:59:59.000Z

    The production of wood pellets has increased dramatically in recent years due in large part to aggressive emissions policy in the European Union; the main markets that currently supply the European market are North America and Russia. However, current market circumstances and trade dynamics could change depending on the development of emerging markets, foreign exchange rates, and the evolution of carbon policies. This fact sheet outlines the existing and potential participants in the wood pellets market, along with historical data on production, trade, and prices.

  17. The small firm enters international trade

    E-Print Network [OSTI]

    Steelquist, Laura McDowell

    1973-01-01T23:59:59.000Z

    be & ditcd for ~ 6] information of benefit to the, smaller fir?& engaged i;& internationai trade. ~ The Small Business Adm inis Lrat ion ' s Fx~&&rt Marl' . t ', n n' for S. &ai 3 cr &'3 rms- provides a discussion of i oreigr I 3P] market analysis... for the small business firm and is useful in this field. However, this book does not cover the foreign cultux al environment, which may be the decisive factor in marketing, and provides no information con- cerning shipp. ', ng and finance. Many trade...

  18. antibody secreting cell: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    15 16 17 18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 1 Reconfigurable microfluidics combined with antibody microarrays for enhanced detection of T-cell secreted...

  19. Quantum secret sharing between multiparty and multiparty without entanglement

    SciTech Connect (OSTI)

    Yan Fengli [College of Physics, Hebei Normal University, Shijiazhuang 050016 (China); CCAST (World Laboratory), P.O. Box 8730, Beijing 100080 (China); Gao Ting [CCAST (World Laboratory), P.O. Box 8730, Beijing 100080 (China); College of Mathematics and Information Science, Hebei Normal University, Shijiazhuang 050016 (China); Department of Mathematics, Capital Normal University, Beijing 100037 (China)

    2005-07-15T23:59:59.000Z

    We propose a quantum secret sharing protocol between multiparty (m members in group 1) and multiparty (n members in group 2) using a sequence of single photons. These single photons are used directly to encode classical information in a quantum secret sharing process. In this protocol, all members in group 1 directly encode their respective keys on the states of single photons via unitary operations; then, the last one (the mth member of group 1) sends 1/n of the resulting qubits to each of group 2. Thus the secret message shared by all members of group 1 is shared by all members of group 2 in such a way that no subset of each group is efficient to read the secret message, but the entire set (not only group 1 but also group 2) is. We also show that it is unconditionally secure. This protocol is feasible with present-day techniques.

  20. Secret-Key Generation Using Correlated Sources and Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    We study the secret-key capacity in a joint source-channel coding setup-the terminals are connected over a discrete memoryless channel and have access to side information, modelled as a pair of discrete memoryless source ...

  1. 2015 ACI National Home Performance Conference and Trade Show...

    Office of Environmental Management (EM)

    2015 ACI National Home Performance Conference and Trade Show 2015 ACI National Home Performance Conference and Trade Show May 4, 2015 9:00AM EDT to May 7, 2015 5:0...

  2. Credit and Trade References President and Fellows of Harvard College

    E-Print Network [OSTI]

    Credit and Trade References President and Fellows of Harvard College 1033 Massachusetts Avenue, 2nd;Trade References VWR International Risk Department Contact: Brian Newton TEL: 770-792-1271 FAX: 484

  3. Trade and Capital Flows: A Financial Frictions Perspective

    E-Print Network [OSTI]

    Antràs, Pol

    The classical Heckscher?Ohlin?Mundell paradigm states that trade and capital mobility are substitutes in the sense that trade integration reduces the incentives for capital to flow to capital?scarce countries. In this paper ...

  4. The Economics of Trade, Biofuel, and the Environment

    E-Print Network [OSTI]

    Hochman, Gal; Sexton, Steven; Zilberman, David D.

    2010-01-01T23:59:59.000Z

    prices. The reason: demand for biofuel increases, and ?rst-The Economics of Trade, Biofuel, and the Environment GalThe Economics of Trade, Biofuel, and the Environment ? Gal

  5. International Environmental Agreements: Emissions trade, safety valves and escape clauses

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2012-01-01T23:59:59.000Z

    of emissions trade on IEA participation Ex ante heterogenousachieving ef?cient abatement. An IEA that combines trade inhelp in creating a successful IEA. It is reasonable to use

  6. agricultural trade liberalizations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the politics of trade policy-making. However, this dissertation (more) Kim, In Song 2014-01-01 18 A Multilevel Analysis of Agricultural Trade and Socioeconomic Inequality in...

  7. agricultural trade liberalization: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the politics of trade policy-making. However, this dissertation (more) Kim, In Song 2014-01-01 18 A Multilevel Analysis of Agricultural Trade and Socioeconomic Inequality in...

  8. Paying a Visit: The Dalai Lama Effect on International Trade

    E-Print Network [OSTI]

    Fuchs, Andreas; Klann, Nils-Hendrik

    2011-01-26T23:59:59.000Z

    The Chinese government frequently threatens that meetings between its trading partners’ officials and the Dalai Lama will be met with animosity and ultimately harm trade ties with China. We run a gravity model of exports to China from 159 partner...

  9. International Environmental Agreements: Emissions trade, safety valves and escape clauses

    E-Print Network [OSTI]

    Karp, Larry; Zhao, Jinhua

    2012-01-01T23:59:59.000Z

    trade policy, and environmental policy in an attempt to help2 Trade policy and environmental policy 3 The ef?ciency ofInstitutute for Environmental Policy Solultions. S TAVINS ,

  10. Entanglement-secured single-qubit quantum secret sharing

    SciTech Connect (OSTI)

    Scherpelz, P.; Resch, R.; Berryrieser, D.; Lynn, T. W. [Department of Physics, Harvey Mudd College, 301 Platt Boulevard, Claremont, California 91711 (United States)

    2011-09-15T23:59:59.000Z

    In single-qubit quantum secret sharing, a secret is shared between N parties via manipulation and measurement of one qubit at a time. Each qubit is sent to all N parties in sequence; the secret is encoded in the first participant's preparation of the qubit state and the subsequent participants' choices of state rotation or measurement basis. We present a protocol for single-qubit quantum secret sharing using polarization entanglement of photon pairs produced in type-I spontaneous parametric downconversion. We investigate the protocol's security against eavesdropping attack under common experimental conditions: a lossy channel for photon transmission, and imperfect preparation of the initial qubit state. A protocol which exploits entanglement between photons, rather than simply polarization correlation, is more robustly secure. We implement the entanglement-based secret-sharing protocol with 87% secret-sharing fidelity, limited by the purity of the entangled state produced by our present apparatus. We demonstrate a photon-number splitting eavesdropping attack, which achieves no success against the entanglement-based protocol while showing the predicted rate of success against a correlation-based protocol.

  11. Georgia Water Quality Control Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Water Quality Control Act (WQCA) is a set of environmental regulations and permitting requirements that comply with the federal Clean Water Act. The Georgia Water Quality Control Act...

  12. Arbeidslivets lover Act relating to working environment,

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Arbeidslivets lover Act relating to working environment, working hours and employment protection, etc. (Working Environment Act). as subsequently amended, last by the Act of 14. December 2012 No. 80.notification................................................................... 6 Chapter 3. Working environment measures..................................... 6 Section.3

  13. Secure Peer-to-Peer Trading for Multiplayer Games

    E-Print Network [OSTI]

    GauthierDickey, Chris

    in multiplayer games. Finally, Bitcoin [10], a digital currency, is directly related to trading since they allow

  14. Forgotten Secret Recovering Scheme and Fuzzy Vault Scheme Constructed Based on Systematic Error-Correcting Codes

    E-Print Network [OSTI]

    ]. From 2000 to 2009, the present author proposed the "For- gotten Secret Recovering Problem (FSRP)" [3

  15. Ion Secretion by Salt Glands of Desert Iguanas (Dipsosaurus dorsalis) Lisa C. Hazard*

    E-Print Network [OSTI]

    Hazard, Lisa C.

    22 Ion Secretion by Salt Glands of Desert Iguanas (Dipsosaurus dorsalis) Lisa C. Hazard* DepartmentCl-secreting salt glands of many birds and reptiles, the nasal salt glands of lizards can secrete potassium as well iguana, Dipsosaurus dorsalis. Lizards were given combinations of ions for several days, and secreted salt

  16. SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998.

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    SECRET SHARING SCHEMES 679 Received May 13, 1997; accepted March 10, 1998. Communicated by Jean) Constructing Perfect Secret Sharing Schemes for General And Uniform Access Structures HUNG-MIN SUN AND SHIUH secret sharing scheme allows a secret K to be shared among a set of partici- pants in such a way

  17. A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM

    E-Print Network [OSTI]

    Shpilrain, Vladimir

    A SECRET SHARING SCHEME BASED ON GROUP PRESENTATIONS AND THE WORD PROBLEM MAGGIE HABEEB, DELARAM KAHROBAEI, AND VLADIMIR SHPILRAIN Abstract. A (t, n)-threshold secret sharing scheme is a method to distribute a secret among n participants in such a way that any t participants can recover the secret

  18. A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Hassan Jameel, Sungyoung Lee

    E-Print Network [OSTI]

    A Secret Sharing Scheme for Preventing the Cheaters from Acquiring the Secret Hassan Jameel { hassan, sylee }@oslab.khu.ac.kr Abstract. In this paper, we propose a secret sharing scheme which prevents the cheaters from recovering the secret when the honest participants cannot, with high probability

  19. Dal's Secret Pals "Do onto others as you would have them do unto you."

    E-Print Network [OSTI]

    Brownstone, Rob

    Dal's Secret Pals "Do onto others as you would have them do unto you." Dalhousie's Secret Pal make others feel appreciated. We all need some special attention from time to time. Dal's Secret Pals to feel special. Birthdays and special occasions are very important to Secret Pals, but any hour of any

  20. An efficient way to access an array at a secret index

    E-Print Network [OSTI]

    An efficient way to access an array at a secret index Timothy Atkinson Marius C. Silaghi Abstract We propose cryptographic primitives for reading and assigning the (shared) secret found at a secret index in a vector of secrets. The problem can also be solved in constant round with existing general

  1. Guessing Secrets E#ciently via List Decoding Noga Alon # Venkatesan Guruswami + Tali Kaufman # Madhu Sudan

    E-Print Network [OSTI]

    Guruswami, Venkatesan

    # Madhu Sudan § Abstract We consider the guessing secrets problem defined by Chung, Graham, and Leighton

  2. Electric trade in the United States 1992

    SciTech Connect (OSTI)

    Not Available

    1994-09-01T23:59:59.000Z

    This publication, Electric Trade in the US 1992 (ELECTRA), is the fourth in a series of reports on wholesale power transactions prepared by the Electric Data Systems Branch, Survey Management Division, Office of Coal, Nuclear, Electric and Alternate Fuels, Energy Information Administration (EIA). The electric trade data are published biennially. The first report presented 1986 data, and this report provides information on the electric power industry during 1992. The electric trade data collected and presented in this report furnish important information on the wholesale structure found within the US electric power industry. The patterns of interutility trade in the report support analyses of wholesale power transactions and provide input for a broader understanding of bulk power market issues that define the emerging national electric energy policies. The report includes information on the quantity of power purchased, sold, exchanged, and wheeled; the geographical locations of transactions and ownership classes involved; and the revenues and costs. Information on the physical transmission system are being included for the first time in this publication. Transmission data covering investor-owned electric utilities were shifted from the Financial Statistics of Selected Investor-Owned Electric Utilities to the ELECTRA publication. Some of the prominent features of this year`s report include information and data not published before on transmission lines for publicly owned utilities and transmission lines added during 1992 by investor-owned electric utilities.

  3. Adaptive systems for foreign exchange trading

    E-Print Network [OSTI]

    Fernandez, Thomas

    - cal analysis. Technical analysis attempts to predict markets by identifying patterns in the price;FinancialMarkets Jones CM (2001 & 2002). Much of it has concen- trated on high frequency (intraday) trading exchange markets. Professor Michael Dempster and Graham Bates, both of the Centre for Financial Research

  4. Optimal Trading Strategy Supply/Demand Dynamics

    E-Print Network [OSTI]

    Gabrieli, John

    prices through the changes in their supply/demand.2 Thus, to study how market participants trade can have interesting implications on the observed behavior of intraday volume, volatility and prices: November 15, 2004. This Draft: April 8, 2006 Abstract The supply/demand of a security in the market

  5. TRADE nontechnical training programs inventory. Volume I

    SciTech Connect (OSTI)

    Not Available

    1984-10-01T23:59:59.000Z

    In a continuing effort to facilitate communications and resource exchange among the DOE contractors, the TRADE (Training Resources and Data Exchange) Committee has compiled this volume. This inventory is one of four inventories, which taken together, total almost 1400 courses and reflect the range and focus of in-house training programs being offered throughout the DOE GOCO system by approximately 50 contractors.

  6. Federal Trade Commission Necesita Crdito o Seguro?

    E-Print Network [OSTI]

    Comisión Federal de Comercio (Federal Trade Commission, FTC), la agencia nacional de protección del sus cuentas, es recolecta- da de su informe de crédito. A través de programas estadísticos, los a tiempo y en forma. Algunas compañías de seguros también usan la información en los informes de crédito

  7. Carbon Trading, Carbon Taxes and Social Discounting

    E-Print Network [OSTI]

    Weiblen, George D

    Carbon Trading, Carbon Taxes and Social Discounting Elisa Belfiori belf0018@umn.edu University of Minnesota Abstract This paper considers the optimal design of policies to carbon emissions in an economy, such as price or quantity controls on the net emissions of carbon, are insufficient to achieve the social

  8. THE FREE TRADE AGREEMENT BETWEEN THE UNITED STATES AND MOROCCO

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    THE FREE TRADE AGREEMENT BETWEEN THE UNITED STATES AND MOROCCO THE IMPORTANCE OF A GRADUAL Trade Policy Center Lahsen Abdelmalki (**) René Sandretto (**) (**) University Lyon 2 and GATE modalities of trade liberalization may have different impacts on the welfare, the rate of growth

  9. A Trade Space Model for Robotic Lunar Exploration

    E-Print Network [OSTI]

    A Trade Space Model for Robotic Lunar Exploration Zachary James Bailey, David W. Miller June 2010 SSL # 11-10 #12;#12;A Trade Space Model for Robotic Lunar Exploration Zachary James Bailey, David W of Technology. #12;2 #12;A Trade Space Model for Robotic Lunar Exploration by Zachary James Bailey Submitted

  10. SLAVE TRADE AND SLAVERY ON THE SWAHILI COAST, 150017501

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Chapter 4 SLAVE TRADE AND SLAVERY ON THE SWAHILI COAST, 1500­17501 Thomas Vernet Agreat deal of research has been carried out on the slave trade and slavery on the Swahili coast. John Middleton wrote on the coast, which demanded plentiful servile manpower. The slave trade, centered on Zanzibar, developed

  11. Pattern of Trade and Economic Development in the Model

    E-Print Network [OSTI]

    Pattern of Trade and Economic Development in the Model of Monopolistic Competition Jeffrey D. Sachs for International Development at Harvard University #12;CID Working Paper no. 14 Pattern of Trade and Economic into the model of monopolistic competition to investigate the interplay between trade policies and development

  12. Trade Diversion from Tomato Suspension Agreements Kathy Baylis*

    E-Print Network [OSTI]

    Perloff, Jeffrey M.

    Trade Diversion from Tomato Suspension Agreements Kathy Baylis* Assistant Professor, Agriculture-3310 Abstract: Trade barriers can cause output to be diverted to other countries and into other products. We over four-fifths of the direct effects of the trade barrier. When the VPR was binding, Mexico exported

  13. An Interactive Computer Model of Two-Country Trade

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    91 An Interactive Computer Model of Two-Country Trade Bill Hamlen and Kevin Hamlen Abstract We introduce an interactive computer model of two-country trade that allows students to investigate is to present an interactive computer model of two-country international trade that allows students

  14. Trade-offs in signalling components differ with signalling effort

    E-Print Network [OSTI]

    Bertram, Sue

    ARTICLES Trade-offs in signalling components differ with signalling effort SUSAN M. BERTRAM on signal components, males that signal often might be forced to make trade-offs among these signalling limitations. We explored the conditions under which males make trade-offs among components of signalling

  15. Pro-Trade Democrats Go AWOL (NYT) 639 words

    E-Print Network [OSTI]

    Lopez-Carr, David

    Pro-Trade Democrats Go AWOL (NYT) 639 words Published: June 13, 2005 Back in 1993, Vice President Al Gore went on prime-time television to debate Ross Perot, a foe of free trade, in a clash Mr. Gore is widely believed to have won. The debate helped propel supporters of the North American Free Trade

  16. Trade and Exposure Kathryn M.E. Dominguez

    E-Print Network [OSTI]

    Shyy, Wei

    Trade and Exposure Kathryn M.E. Dominguez Ford School of Public Policy, Department of Economics Are firms that engage in trade more vulnerable to exchange rate risk? In this paper we examine the relationship between exchange rate movements, firm value and trade. Our empirical work tests whether exchange

  17. North-South Standards Harmonization and International Trade

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    North-South Standards Harmonization and International Trade Olivier CADOT Lausanne University Anne,version1-20Mar2014 #12;1 North-South Standards Harmonization and International Trade Anne-Célia Disdier investigate whether the technical requirements contained in North-South Agreements affect international trade

  18. Can Affirmative Motivations Improve Compliance in Emissions Trading Leigh Raymond

    E-Print Network [OSTI]

    Can Affirmative Motivations Improve Compliance in Emissions Trading Programs?* Leigh Raymond be inferred. #12;Can Affirmative Motivations Improve Compliance in Emissions Trading Programs? Abstract Early emissions trading programs have obtained a very high rate of compliance, in part by using continuous

  19. Emissions Trading: What Makes It Work? Julien Chevallier1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Emissions Trading: What Makes It Work? Julien Chevallier1 04 July 2009 Abstract: At the stage permits markets. Keywords: climate change policy; emissions trading; banking borrowing; initial allocation-4Jul2009 #12;2 Review of current climate policies The European Union Emissions Trading Scheme (EU ETS

  20. International Trade in Natural Gas: Golden Age of LNG?

    E-Print Network [OSTI]

    Gabrieli, John

    International Trade in Natural Gas: Golden Age of LNG? Yichen Du and Sergey Paltsev Report No. 271;1 International Trade in Natural Gas: Golden Age of LNG? Yichen Du* and Sergey Paltsev* Abstract The introduction of liquefied natural gas (LNG) as an option for international trade has created a market for natural gas where

  1. Trading Functionality for Power within Applications Melanie Kambadur

    E-Print Network [OSTI]

    Trading Functionality for Power within Applications Melanie Kambadur Columbia University melanie down a program, so they must err on the side of caution when trading performance for power. Compounding application to trade performance for power, it may not be for another, preventing the sys- tem from taking

  2. GEORGIA RECOVERY ACT SNAPSHOT | Department of Energy

    Energy Savers [EERE]

    ACT SNAPSHOT Georgia has substantial natural resources, including biomass and hydroelectric power .The American Recovery & Reinvestment Act (ARRA) is making a meaningful down...

  3. Kathleen Carlson Appointed Interim Acting Deputy Administrator...

    National Nuclear Security Administration (NNSA)

    Interim Acting Deputy Administrator for Defense Programs Press Release Aug 16, 2001 Kathleen Carlson Appointed Interim Acting Deputy Administrator for Defense Programs...

  4. Safety of Dams and Reservoirs Act (Nebraska)

    Broader source: Energy.gov [DOE]

    This act regulates dams and associated reservoirs to protect health and public safety and minimize adverse consequences associated with potential dam failure. The act describes the responsibilities...

  5. Virginia Electric Utility Regulation Act (Virginia)

    Broader source: Energy.gov [DOE]

    The Virginia Electric Utility Regulation Act constitutes the main legislation in Virginia that pertains to the regulation of the state's electric utilities. The Act directs the State Corporation...

  6. ARKANSAS RECOVERY ACT SNAPSHOT | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ARKANSAS RECOVERY ACT SNAPSHOT Arkansas has substantial natural resources, including gas, oil, wind, biomass, and hydroelectric power. The American Recovery & Reinvestment Act...

  7. Taxes and Trading versus Intensity Standards: Second-Best Environmental Policies with Incomplete Regulation (Leakage) or Market Power

    E-Print Network [OSTI]

    Holland, Stephen P.

    2009-01-01T23:59:59.000Z

    2007) compares taxes and emissions trading in concentratedtaxes (equivalently emissions trading) may not be the best

  8. Edwin Zaccai (d.), Sustainable consumption, ecology and fair trade, Londres, Routledge, 2007 Is large-scale fair trade possible?

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Edwin Zaccai (éd.), Sustainable consumption, ecology and fair trade, Londres, Routledge, 2007 1 Is large-scale fair trade possible? Ronan Le Velly Abstract The article presents the changes in the nature of the market relationship that are induced by the expansion of fair trade. It shows that the increase

  9. Trading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work A Platform for Trading Agent Competition

    E-Print Network [OSTI]

    Zhang, Dongmo

    -2011 TAC Ad Auctions: 2009-2012 Power TAC: 2011-2012 #12;Trading Agent Competition Market Design GameTrading Agent Competition Market Design Game Strategic Trader Game Conclusion and Future Work A Platform for Trading Agent Competition Dongmo Zhang and Chun Gao Intelligent Systems Laboratory University

  10. Recovery Act | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM615_CostNSAR -Department of Energy Recovery ActCategoryRecovery Act

  11. Brves observations sur un secret de Polichinelle : L'influence du droit europen sur le droit mdical travers l'exemple du secret mdical

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Brèves observations sur un secret de Polichinelle : L'influence du droit européen sur le droit médical à travers l'exemple du secret médical Estelle BROSSET Maître de conférences HDR en droit public Centre de droit de la santé (UMR 7268) S'il est un secret ­(mal) gardé- en droit médical, c'est bien

  12. Emerging Economies, Trade Policy, and Macroeconomic Shocks

    E-Print Network [OSTI]

    Bown, Chad P.; Crowley, Meredith A.

    2014-05-09T23:59:59.000Z

    and across countries – as to how constrained these emerging economies are by WTO disciplines over their applied import tariff policies. Argentina, India, Malaysia, Philippines and Thailand, for example, each have years for which there are major changes... 0 Emerging Economies, Trade Policy, and Macroeconomic Shocks Chad P. Bown† The World Bank Meredith A. Crowley‡ University of Cambridge This version: March 2014 Abstract This paper estimates the impact of aggregate...

  13. Free Trade Agreements in the World Trade Organization: The Experience of East Asia and the Japan-Mexico Economic Partnership Agreement

    E-Print Network [OSTI]

    Turinov, Anna

    2008-01-01T23:59:59.000Z

    at 4. 51. Id. at 4-5. FREE TRADE AGREEMENTS IN THE WTO miesits enthusiasm with respect to trade liber- alization at themultilateral level. Japan's trade policy has under- gone a

  14. Trade Dynamics in the East Asian Miracle: A Time Series Analysis of U.S.-East Asia Commodity Trade, 1962-1992

    E-Print Network [OSTI]

    Singh, Nirvikar; Mora, Jesse; Carolan, Terrie

    2012-01-01T23:59:59.000Z

    in the current analysis. Trade Dynamics in the East AsianProduct fragmentation and trade integration: East Asia in aand William H. Branson, ed. , Trade and Structural Change in

  15. Clean Air Act. Revision 5

    SciTech Connect (OSTI)

    Not Available

    1994-02-15T23:59:59.000Z

    This Reference Book contains a current copy of the Clean Air Act, as amended, and those regulations that implement the statute and appear to be most relevant to DOE activities. The document is provided to DOE and contractor staff for informational purposes only and should not be interpreted as legal guidance. This Reference Book has been completely revised and is current through February 15, 1994.

  16. Communist China's foreign trade and its implication for Japan

    E-Print Network [OSTI]

    Hsieh, Leh-An

    1972-01-01T23:59:59.000Z

    steel, machinery, chemicals, and medical equipment. Oesides sugar, Communist China also imports Cuban nickel, copper, manganese, chrome and cobalt, tobacco, beans, and cowhides. [15, p. 74]. Asian Communist Countries Communist Chinese trade with I... of the possibility of Communist China? Japanese trading expansion, based on an analysis of i) the past trade between these two countries, if) Communist Chinese export capacity, iii ) Japanese major import demands. Findings and conclusions are stated on the end...

  17. An analysis of SO sub 2 emission compliance under the 1990 Clean Air Act Amendments

    SciTech Connect (OSTI)

    Hanson, D.A.; Cilek, C.M.; Pandola, G.; Taxon, T.

    1992-01-01T23:59:59.000Z

    The effectiveness of SO{sub 2} emission allowance trading under Title 4 of the 1990 Amendments to the Clean Air Act (CAA) is of great interest due to the innovative nature of this market incentive approach. However, it may be a mistake to frame the compliance problem for a utility as a decision to trade or not. Trading of allowances should be the consequence, not the decision. The two meaningful decision variables for a utility are the control approaches chosen for its units and the amount of allowances to hold in its portfolio of assets for the future. The number allowances to be bought or sold (i.e. traded) is determined by the emission reduction and banking decisions. Our preferred approach is to think of the problem in terms of ABC's of the 1990 CAA Amendments: abatement strategy, banking, and cost competitiveness. The implications of the general principles presented in this paper on least cost emission reductions and emissions banking to hedge against risk are being simulated with version 2 of the ARGUS model representing the electric utility sector and regional coal supplies and transportation rates. A rational expectations forecast for allowances prices is being computed. The computed allowance price path has the property that demand for allowances by electric utilities for current use or for banking must equal the supply of allowances issued by the federal government or provided as forward market contracts in private market transactions involving non-utility speculators. From this rational expectations equilibrium forecast, uncertainties are being explored using sensitivity tests. Some of the key issues are the amount of scrubbing and when it is economical to install it, the amount of coal switching and how much low sulfur coal premiums will be bid up; and the amount of emission trading within utilities and among different utilities.

  18. An analysis of SO{sub 2} emission compliance under the 1990 Clean Air Act Amendments

    SciTech Connect (OSTI)

    Hanson, D.A.; Cilek, C.M.; Pandola, G.; Taxon, T.

    1992-07-01T23:59:59.000Z

    The effectiveness of SO{sub 2} emission allowance trading under Title 4 of the 1990 Amendments to the Clean Air Act (CAA) is of great interest due to the innovative nature of this market incentive approach. However, it may be a mistake to frame the compliance problem for a utility as a decision to trade or not. Trading of allowances should be the consequence, not the decision. The two meaningful decision variables for a utility are the control approaches chosen for its units and the amount of allowances to hold in its portfolio of assets for the future. The number allowances to be bought or sold (i.e. traded) is determined by the emission reduction and banking decisions. Our preferred approach is to think of the problem in terms of ABC`s of the 1990 CAA Amendments: abatement strategy, banking, and cost competitiveness. The implications of the general principles presented in this paper on least cost emission reductions and emissions banking to hedge against risk are being simulated with version 2 of the ARGUS model representing the electric utility sector and regional coal supplies and transportation rates. A rational expectations forecast for allowances prices is being computed. The computed allowance price path has the property that demand for allowances by electric utilities for current use or for banking must equal the supply of allowances issued by the federal government or provided as forward market contracts in private market transactions involving non-utility speculators. From this rational expectations equilibrium forecast, uncertainties are being explored using sensitivity tests. Some of the key issues are the amount of scrubbing and when it is economical to install it, the amount of coal switching and how much low sulfur coal premiums will be bid up; and the amount of emission trading within utilities and among different utilities.

  19. Building 9731 ? Secret City Festivals Y-12 public tour - ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    - Secret City Festival's Y-12 public tour Or: Building 9731 to be featured in Secret City Festival's public tour (title provided by The Oak Ridger) In March 1943 the very first...

  20. Investigation of the Structure and Function of Type III Secretion Needle and Tip Proteins

    E-Print Network [OSTI]

    Zhang, Lingling

    2009-04-22T23:59:59.000Z

    Many Gram-negative pathogens possess type III secretion systems as part of their required virulence factor repertoire. The type III secretion apparatus (TTSA) spans the bacterial inner and outer membranes and resembles a ...

  1. The cell-secreted microenvironment : shaping embryonic stem cell self-renewal and differentiation

    E-Print Network [OSTI]

    Przybyla, Laralynne M. (Laralynne Michelle)

    2012-01-01T23:59:59.000Z

    The objective of this work is to obtain an in depth understanding of how embryonic stem cell-secreted signals contribute to their identity. We analyze the contribution of broad and specific signals present in the cell-secreted ...

  2. Oh no I'm toast! : mastering videogame secrets in theory and practice

    E-Print Network [OSTI]

    Drzaic, Kristina Lynn

    2007-01-01T23:59:59.000Z

    Secrets are a ubiquitous part of contemporary videogame design, yet are largely unexplored within academic discourse and often dismissed as extras. I contend that secrets play a fundamental and influential role within a ...

  3. Keeping Secrets in Hardware: the Microsoft Xbox(TM) Case Study

    E-Print Network [OSTI]

    Huang, Andrew "bunnie"

    2002-05-26T23:59:59.000Z

    This paper discusses the hardware foundations of the cryptosystem employed by the Xbox(TM) video game console from Microsoft. A secret boot block overlay is buried within a system ASIC. This secret boot block decrypts and ...

  4. FY 2008 E-Government Act Report | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8 E-Government Act Report FY 2008 E-Government Act Report FY 2008 E-Government Act Report FY 2008 E-Government Act Report More Documents & Publications FY 2008 E-Government Act...

  5. Google matrix analysis of the multiproduct world trade network

    E-Print Network [OSTI]

    Ermann, Leonardo

    2015-01-01T23:59:59.000Z

    Using the United Nations COMTRADE database \\cite{comtrade} we construct the Google matrix $G$ of multiproduct world trade between the UN countries and analyze the properties of trade flows on this network for years 1962 - 2010. This construction, based on Markov chains, treats all countries on equal democratic grounds independently of their richness and at the same time it considers the contributions of trade products proportionally to their trade volume. We consider the trade with 61 products for up to 227 countries. The obtained results show that the trade contribution of products is asymmetric: some of them are export oriented while others are import oriented even if the ranking by their trade volume is symmetric in respect to export and import after averaging over all world countries. The construction of the Google matrix allows to investigate the sensitivity of trade balance in respect to price variations of products, e.g. petroleum and gas, taking into account the world connectivity of trade links. The ...

  6. Trade Adjustment Assistance Community College and Career Training...

    Broader source: Energy.gov (indexed) [DOE]

    View a list of all current Trade Adjustment Assistance Community College and Career Training (TAACCCT) grant program awards containing Energy andor Manufacturing topics. This...

  7. DOE and Japanese Ministry of Economy, Trade, and Industry Sign...

    Broader source: Energy.gov (indexed) [DOE]

    Statement between the U.S. Department of Energy and the Japanese Ministry of Economy, Trade, and Industry on Memorandum of Cooperation and Implementing Arrangement MOC focuses on...

  8. Optimization Online - Facing an Arbitrage Opportunity: Trade or Wait?

    E-Print Network [OSTI]

    Robert Jarrow

    2014-12-09T23:59:59.000Z

    Dec 9, 2014 ... Abstract: In traditional thinking, an arbitrageur will trade immediately once an arbitrage opportunity appears. Is this the best strategy for the ...

  9. President Louisiana State Building and Construction Trades Council

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Robert "Tiger" Hammond President Louisiana State Building and Construction Trades Council Panel Discussion: "Workforce Issues as a Vulnerability to Energy Development" U.S....

  10. adaptive trading agent: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stock returns and Charles M. C. Lee; Bhaskaran Swaminathan 277 The Value of Emissions Trading MIT - DSpace Summary: This paper estimates the value of international emissions...

  11. association trade mission: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stock returns and Charles M. C. Lee; Bhaskaran Swaminathan 93 The Value of Emissions Trading MIT - DSpace Summary: This paper estimates the value of international emissions...

  12. ascent propulsion trades: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stock returns and Charles M. C. Lee; Bhaskaran Swaminathan 129 The Value of Emissions Trading MIT - DSpace Summary: This paper estimates the value of international emissions...

  13. The New Mexico Building and Construction Trades Council and Los...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANL sign labor agreements September 21, 2012 Unions, LANL sign labor agreements The New Mexico Building and Construction Trades Council and Los Alamos National Security LLC, have...

  14. Engaging Efficiency First Chapters and Other Trade Associations...

    Broader source: Energy.gov (indexed) [DOE]

    Residential Workforce Business Partners Peer Exchange Call Series: Engaging Efficiency First Chapters and Other Trade Associations in Energy Efficiency Programs, Call Slides and...

  15. Utility Energy Efficiency Schemes: Savings Obligations and Trading...

    Open Energy Info (EERE)

    Schemes: Savings Obligations and Trading **Subscription Required** Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Utility Energy Efficiency Schemes: Savings Obligations...

  16. Cross Border Trading and Borrowing in the EU ETS A. Denny Ellerman* and Raphael Trotignon**

    E-Print Network [OSTI]

    multi- national trading system, the European Union's CO2 Emissions Trading Scheme (EU ETS) provides** This paper exploits a little used data resource within the central registry of the European Union's Emissions Trading System (EU ETS) to analyze cross border trading and inter-year borrowing during the first trading

  17. An Analysis of Trading Motivations in Phase II of the European Union

    E-Print Network [OSTI]

    Lewis, Robert Michael

    An Analysis of Trading Motivations in Phase II of the European Union Emissions Trading Scheme By Executive Summary I. The European Union Emission Trading Scheme a. Evolution of the EU ETS b. Structure of Trading Behavior in Phase II of the European Union Emissions Trading Scheme "Our generation's response

  18. an Recovery and Reinvestment Act of 20091 (Recovery Act) provides protections for cert

    E-Print Network [OSTI]

    Tam, Tin-Yau

    ors, subcontractors, grantees, or professional membership organizations acting in the interest ry Act vernmen ctors, sububbbbbcoonttraactctorors,s,s,s,s grantees, or proofofofofofesesesessisisis

  19. DOE Policy Re Recovery Act Recipient Use of Recovery Act Logos on Signage

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy (“DOE”) policy regarding use of the Recovery Act logo by Recovery Act recipients and subgrantees.

  20. Indo-Pakistan Trade Cooperation and Saarc

    E-Print Network [OSTI]

    Ghuman, Ranjit Singh; Madaan, Da Vinder Kumar

    2006-01-01T23:59:59.000Z

    of India’s exports to Pakistan, Soyabean, p-xylene, iron ores, sugar, polypropylene, norfloxin, tyres, bidi leaves, and reactive coloured chemicals were the major items during 1985-2005. Their total share in India’s exports to Pakistan was 11.5 per cent... , etc. Pakistan has excess capacity of 3000 MW electricity which can be easily given to northern Indian states if the required arrangements are done. Prices of mutual trade items between the two countries are also competitive. It is estimated...

  1. C Trade Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainable andBucoda,BurkeNebraska: EnergyByron Center,L ElectricTrade Ltd

  2. Green Hercules Trading Ltd | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetec AG Contracting JumpGoveNebraska:EthanolHabits Jump to:Hercules Trading

  3. World Trade Organization | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit withTianlinPapers Home Kyoung'sWoongjin Polysilicon Co LtdWorld FuelTrade

  4. NH Acid Rain Control Act (New Hampshire)

    Broader source: Energy.gov [DOE]

    The Act is implemented under New Hampshire's acid deposition control program established under the Rules to Control Air Pollution in Chapter Env-A 400. The goal of the Act is to reduce emissions...

  5. Georgia Hazardous Site Response Act (Georgia)

    Broader source: Energy.gov [DOE]

    The Georgia Hazardous Site Response Act is Georgia’s version of Superfund. The Act provides for graduated fees on the disposal of hazardous waste, a trust fund to enable the EPD to clean up or plan...

  6. Clean Air Act Amendments of 1990

    E-Print Network [OSTI]

    Hanneschlager, R. E.

    Congress is currently debating amendments to the Clean Air Act which would strengthen and enhance the current Clean Air Act. The bill would guarantee a reduction of 10 million tons of sulfur dioxide from 1980 levels; would sharply reduce pollutants...

  7. Lakes and Rivers Improvement Act (Ontario, Canada)

    Broader source: Energy.gov [DOE]

    The Lakes and Rivers Improvement Act proscribes the management, protection, preservation and use of the waters of the lakes and rivers of Ontario and the land under them. The Act also details...

  8. Public Waterfront Act- Chapter 91 (Massachusetts)

    Broader source: Energy.gov [DOE]

    This Act contains a number of regulations regarding the construction of structures and other activity near rivers, streams, harbors, and tidelands. Regulations pertaining to this Act can be found...

  9. District of Columbia Recovery Act State Memo

    Broader source: Energy.gov [DOE]

    The American Recovery & Reinvestment Act (ARRA) is making a meaningful down payment on the nation’s energy and environmental future. The Recovery Act investments in the District of Columbia...

  10. NH Clean Power Act (New Hampshire)

    Broader source: Energy.gov [DOE]

    The Act calls for annual reductions of multiple pollutants, including SO2, Nox, CO2, and mercury. The Act calls for an 87% reduction in SO2 emissions and a 70% reduction in Nox emissions from...

  11. Services Trade and Professional, Scientific and Technical Firms: A Survey of Small to Medium-Sized California Firms

    E-Print Network [OSTI]

    Kroll, Cynthia A.; Begley, Jackie

    2007-01-01T23:59:59.000Z

    Jaffee, Dwight M. "Services Trade and California Employment:Services Trade and Professional, Scientific and TechnicalJuly 2007 Services Trade and Professional, Scientific and

  12. What Do Emissions Markets Deliver and to Whom? Evidence from Southern California’s NOx Trading Program

    E-Print Network [OSTI]

    Fowlie, Meredith; Holland, Stephen P.; Mansur, Erin T

    2009-01-01T23:59:59.000Z

    Justice Critique of Emissions Trading. ” Ecology Lawgions: The case of the emission trading programme RECLAIM inTietenberg, Tom H. 2006. Emissions Trading Principles and

  13. Not All Carbon Credits are Created Equal: The Constitutional and the Cost of Regional Cap-and-Trade Market Linkage

    E-Print Network [OSTI]

    Howland, Juliet

    2009-01-01T23:59:59.000Z

    of Intertemporal Emission Trading, Bank- ing, and Borrowing,based mechanisms, including emissions trading, provide an42. INTERNATIONAL EMISSIONS TRADING ASSOCIATION, IETA REPORT

  14. Clean Air Act, Section 309

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T, Inc.'sEnergyTexas1. FeedstockCLEAN AIR ACT § 309* §7609. Policy review (a)

  15. Williamson Act | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown ofNationwideWTEDBird, Idaho:Wildwood Crest, NewKansas:Williams,Florida:ActLegal

  16. WIPP - Privacy Act of 1974

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEureka Analytics andWFRNewsWindPrivacy Act

  17. Recovery Act | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMay 2015 < prevQuick Guide:U.N.June 8,Past Opportunities » Recovery Act

  18. Sandia National Laboratories: Recovery Act (ARRA) Projects

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    with: ARRA * awardees * contractors * DOE * Energy * Grid Integration * Partnership * photovoltaic * Photovoltaics * PV * Recovery Act * reliability * Renewable Energy * SAND...

  19. Energy Employees' Occupational Illness Compensation Program Act...

    Energy Savers [EERE]

    Employees' Occupational Illness Compensation Program Act (EEOICPA) Tracking Database, INL Energy Employees' Occupational Illness Compensation Program Energy Employees' Occupational...

  20. Atrazine acts as an endocrine disrupter by inhibiting cAMP-specific phosphodiesterase-4

    SciTech Connect (OSTI)

    Kucka, Marek [Section on Cellular Signaling, Program in Developmental Neuroscience, NICHD, NIH, Bethesda, MD (United States)] [Section on Cellular Signaling, Program in Developmental Neuroscience, NICHD, NIH, Bethesda, MD (United States); Pogrmic-Majkic, Kristina; Fa, Svetlana [Laboratory for Ecotoxicology, Department of Biology and Ecology, University of Novi Sad, Faculty of Sciences, 21000 Novi Sad (Serbia)] [Laboratory for Ecotoxicology, Department of Biology and Ecology, University of Novi Sad, Faculty of Sciences, 21000 Novi Sad (Serbia); Stojilkovic, Stanko S. [Section on Cellular Signaling, Program in Developmental Neuroscience, NICHD, NIH, Bethesda, MD (United States)] [Section on Cellular Signaling, Program in Developmental Neuroscience, NICHD, NIH, Bethesda, MD (United States); Kovacevic, Radmila, E-mail: radmila.kovacevic@dbe.uns.ac.rs [Laboratory for Ecotoxicology, Department of Biology and Ecology, University of Novi Sad, Faculty of Sciences, 21000 Novi Sad (Serbia)] [Laboratory for Ecotoxicology, Department of Biology and Ecology, University of Novi Sad, Faculty of Sciences, 21000 Novi Sad (Serbia)

    2012-11-15T23:59:59.000Z

    Atrazine, one of the most commonly used herbicides worldwide, acts as an endocrine disruptor, but the mechanism of its action has not been characterized. In this study, we show that atrazine rapidly increases cAMP levels in cultured rat pituitary and testicular Leydig cells in a concentration-dependent manner, but less effectively than 3-isobutyl-1-methylxanthine, a competitive non-specific inhibitor of phosphodiesterases (PDEs). In forskolin (an activator of adenylyl cyclase)- and probenecid (an inhibitor of cyclic nucleotide transporters)-treated cells, but not in 3-isobutyl-1-methylxanthine-treated cells, atrazine further increased cAMP levels, indicating that inhibition of PDEs accounts for accumulation of cAMP. In contrast to cAMP, atrazine did not alter cGMP levels, further indicating that it inhibits cAMP-specific PDEs. Atrazine-induced changes in cAMP levels were sufficient to stimulate prolactin release in pituitary cells and androgen production in Leydig cells, indicating that it acts as an endocrine disrupter both in cells that secrete by exocytosis of prestored hormones and in cells that secrete by de novo hormone synthesis. Rolipram abolished the stimulatory effect of atrazine on cAMP release in both cell types, suggesting that it acts as an inhibitor of PDE4s, isoforms whose mRNA transcripts dominate in pituitary and Leydig cells together with mRNA for PDE8A. In contrast, immortalized lacto-somatotrophs showed low expression of these mRNA transcripts and several fold higher cAMP levels compared to normal pituitary cells, and atrazine was unable to further increase cAMP levels. These results indicate that atrazine acts as a general endocrine disrupter by inhibiting cAMP-specific PDE4s. -- Highlights: ? Atrazine stimulates cAMP accumulation in pituitary and Leydig cells. ? Atrazine also stimulates PRL and androgens secretion. ? Stimulatory effects of atrazine were abolished in cells with IBMX-inhibited PDEs. ? Atrazine specificity toward cAMP-specific PDEs was indicated by no changes in cGMP. ? Rolipram, a specific PDE4 inhibitor, also prevents stimulatory effects of atrazine. ? Atrazine acts as an endocrine disrupter by inhibiting cAMP-specific PDE4.

  1. Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels

    E-Print Network [OSTI]

    Sayeed, Akbar M.

    Minimum Energy Per Bit for Secret Key Acquisition Over Multipath Wireless Channels Tzu-Han Chou the secret key capacity. We analyze the low-SNR regime to quantify the minimum energy per secret key bit of conventional channel capacity, there is a non-zero SNR that achieves the minimum energy per key bit. A time

  2. Characterization of a type vi secretion system and related proteins of pseudomonas syringae 

    E-Print Network [OSTI]

    Records, Angela Renee

    2009-05-15T23:59:59.000Z

    728a genome encodes a novel secretion pathway, the type VI secretion system (T6SS), that functions to deliver at least one protein outside of the bacterial cell. Western blot analyses show that this secretion is dependent on clpV, a gene that likely...

  3. Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes

    E-Print Network [OSTI]

    Extending Brickell-Davenport Theorem to Non-Perfect Secret Sharing Schemes Oriol Farr`as1 University, Singapore December 18, 2012 Abstract One important result in secret sharing is the Brickell-Davenport Theorem: every ideal perfect secret sharing scheme defines a matroid that is uniquely determined

  4. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir--We study the non-coherent capacity of secret-key agreement with public discussion over i.i.d. Rayleigh state information (CSI). We present two results. At high Signal-to-Noise Ratio (SNR), the secret

  5. The power and in uence in some Youden squares and secret sharing

    E-Print Network [OSTI]

    Seberry, Jennifer

    The power and in uence in some Youden squares and secret sharing Lakoa Fitina, Kenneth G Russell subsets of critical sets of some Youden squares in the context of secret sharing schemes. A subset C is inaccessible to subsets of a critical set C of Y , called the strongbox of C, may be thought to contain secret

  6. WeaklyPrivate Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2

    E-Print Network [OSTI]

    Beimel, Amos

    Weakly­Private Secret Sharing Schemes # Amos Beimel 1 and Matthew Franklin 2 1 Department. Abstract. Secret­sharing schemes are an important tool in cryptogra­ phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret­sharing schemes realizing gen

  7. A Remark on Secret-Key Generation over Correlated Fading Channels

    E-Print Network [OSTI]

    Khisti, Ashish

    A Remark on Secret-Key Generation over Correlated Fading Channels Ashish Khisti ECE Dept. Univ@ee.ucla.edu Abstract-- We study secret-key agreement with public discussion over a flat-fading wiretap channel model. INTRODUCTION In recent years there has been a significant interest in developing secret-key agreement protocols

  8. On Secret Sharing Schemes, Matroids and Polymatroids Jaume Marti-Farre, Carles Padro

    E-Print Network [OSTI]

    On Secret Sharing Schemes, Matroids and Polymatroids Jaume Mart´i-Farr´e, Carles Padr´o Dep. de.edu June 22, 2009 Abstract The complexity of a secret sharing scheme is defined as the ratio between the maximum length of the shares and the length of the secret. The optimization of this parameter for gen

  9. Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement over Non-Coherent Block-Fading Channels with Public Discussion Ashish Khisti Member, IEEE Abstract Fundamental limits of secret-key generation over a two-way, reciprocal and block establish upper and lower bounds on the secret-key generation capacity with public discussion. The upper

  10. Whisper: Local Secret Maintenance in Sensor Networks1 Vinayak Naik Anish Arora Sandip Bapat Mohamed Gouda

    E-Print Network [OSTI]

    Arora, Anish

    Whisper: Local Secret Maintenance in Sensor Networks1 Vinayak Naik Anish Arora Sandip Bapat Mohamed for secret maintenance between a pair of network neighbors. We claim that certain adversaries cannot compromise the current secret shared by the neighbors, nor can they cause the neighbors to unduly waste

  11. IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 10, OCTOBER 2010 885 Cooperative Secret Communication with

    E-Print Network [OSTI]

    Tao, Meixia "Melissa"

    IEEE COMMUNICATIONS LETTERS, VOL. 14, NO. 10, OCTOBER 2010 885 Cooperative Secret Communication--Gaussian interference channel, secrecy capacity, power control. I. INTRODUCTION THE problem of secret communication key, provided that the receiver has a better channel than the eavesdropper. Recently, the secret

  12. A New (k, n)-Threshold Secret Sharing Scheme and Its Extension

    E-Print Network [OSTI]

    A New (k, n)-Threshold Secret Sharing Scheme and Its Extension Jun Kurihara, Shinsaku Kiyomoto)-threshold secret sharing scheme (threshold scheme), a heavy computational cost is required to make n shares and recover the secret. As a solution to this problem, several fast thresh- old schemes have been proposed

  13. Secret-key Agreement with Channel State Information at the Transmitter

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-key Agreement with Channel State Information at the Transmitter Ashish Khisti, Member of secret-key agreement over a wiretap channel with state parameters. The transmitter com- municates discussion channel is available. We derive lower and upper bounds on the secret-key capacity. The lower bound

  14. An ideal multi-secret sharing scheme based on minimal privileged coalitions

    E-Print Network [OSTI]

    An ideal multi-secret sharing scheme based on minimal privileged coalitions Yun Song , Zhihui Li Abstract How to construct an ideal multi-secret sharing scheme for general access structures is difficult if such coalitions exist. Furthermore, in terms of privileged coalitions, we show that most of the existing multi-secret

  15. SECRET COMMUNICATION IN PRESENCE OF COLLUDING EAVESDROPPERS Satashu Goel and Rohit Negi

    E-Print Network [OSTI]

    Yener, Aylin

    SECRET COMMUNICATION IN PRESENCE OF COLLUDING EAVESDROPPERS Satashu Goel and Rohit Negi ECE consider the problem of secret communications be- tween two nodes over a wireless link in the presence with multiple antennas. Com- munication is secret if the eavesdropper is unable to decode the message whereas

  16. Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Secret-Key Agreement Capacity over Reciprocal Fading Channels: A Separation Approach Ashish: akhisti@comm.utoronto.ca Abstract--Fundamental limits of secret-key agreement over reciprocal wireless source generation. The resulting secret-key involves contributions of both channel sequences and source

  17. Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal

    E-Print Network [OSTI]

    Koksal, Can Emre

    Secret Key Generation From Mobility Onur Gungor, Fangzhou Chen, C. Emre Koksal Department of Electrical and Computer Engineering The Ohio State University, Columbus, 43210 Abstract--We consider secret of these beacons; in the second phase, nodes generate secret key bits via a public discussion. Our problem can

  18. Secret sharing schemes on access structures with intersection number equal to one

    E-Print Network [OSTI]

    Secret sharing schemes on access structures with intersection number equal to one Jaume Mart important problems in secret sharing. These problems are studied in this paper for access structures on the optimal information rate are provided for the non-ideal case. Keywords. Cryptography; secret sharing

  19. Recipes from the Secret Book of Artephius San Francisco Bay Area, California

    E-Print Network [OSTI]

    Owens, John

    Recipes from the Secret Book of Artephius Gold Team San Francisco Bay Area, California The Codex Leicester Introduction We seek the recipes contained in The Secret Book of Artephius, a text first referenced in the 12th century, but likely much older. The last known whereabouts of The Secret Book

  20. Non-Coherent Capacity of Secret-Key Agreement with Public Discussion

    E-Print Network [OSTI]

    Khisti, Ashish

    1 Non-Coherent Capacity of Secret-Key Agreement with Public Discussion Anurag Agrawal, Zouheir-coherent capacity of secret-key agreement with public discussion, where neither the sender nor the receivers have Signal-to-Noise Ratio (SNR), the secret-key capacity is bounded in SNR, regardless of the number