Powered by Deep Web Technologies
Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Efficient Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

Efficient Efficient Data Transfer Protocols for Big Data Brian Tierney ∗ , Ezra Kissel † , Martin Swany † , Eric Pouyoul ∗ ∗ Lawrence Berkeley National Laboratory, Berkeley, CA 94270 † School of Informatics and Computing, Indiana University, Bloomington, IN 47405 Abstract-Data set sizes are growing exponentially, so it is important to use data movement protocols that are the most efficient available. Most data movement tools today rely on TCP over sockets, which limits flows to around 20Gbps on today's hardware. RDMA over Converged Ethernet (RoCE) is a promising new technology for high-performance network data movement with minimal CPU impact over circuit-based infrastructures. We compare the performance of TCP, UDP, UDT, and RoCE over high latency 10Gbps and 40Gbps network paths, and show that RoCE-based data transfers can fill a 40Gbps path using much less CPU than other protocols.

2

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; L. Masinter; P. Leach; T. Berners-Lee

1999-06-01T23:59:59.000Z

3

Hypertext Transfer Protocol -- HTTP/1.1  

Science Conference Proceedings (OSTI)

The Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, object-oriented protocol which can be used for many tasks, such as name servers and distributed ...

R. Fielding; J. Gettys; J. Mogul; H. Frystyk; T. Berners-Lee

1997-01-01T23:59:59.000Z

4

An object-oriented implementation of the Xpress Transfer Protocol  

SciTech Connect

Object-oriented design principles map well onto protocol implementations because protocols essentially manipulate two structures - packets and the states of the endpoints. In this paper the authors describe an implementation of the Xpress Transfer Protocol as a user space daemon written in C++. The object-oriented model forces the programmer to properly place functionality and information ownership. The model facilitates porting to various platforms and greatly eases the task of building data delivery services.

Strayer, W.T.; Gray, S.; Cline, R.E. Jr.

1994-10-01T23:59:59.000Z

5

On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols  

Science Conference Proceedings (OSTI)

No quantum key distribution (QKD) protocol has been proved fully secure. A remaining problem is the eavesdropper's ability to make coherent measurements on the joint properties of large composite systems. This problem has been recently solved by Yao ...

Dominic Mayers

1995-08-01T23:59:59.000Z

6

PROTOCOLS MANUAL  

NLE Websites -- All DOE Office Websites (Extended Search)

as your end-user's. For instance, if you always issue the same set of commands when you enter SPIRES, you can assemble the commands in a protocol and add it, with your account as...

7

Effective Protocols for Mobile Communications and Networking  

SciTech Connect

This report examines methods of mobile communications with an emphasis on mobile computing and wireless communications. Many of the advances in communications involve the use of Internet Protocol (IP), Asynchronous Transfer Mode (ATM), and ad hoc network protocols. However, many of the advances in these protocols have been focused on wired communications. Recently much focus has been directed at advancing communication technology in the area of mobile wireless networks. This report discusses various protocols used in mobile communications and proposes a number of extensions to existing protocols. A detailed discussion is also included on desirable protocol characteristics and evaluation criteria. In addition, the report includes a discussion on several network simulation tools that maybe used to evaluate network protocols.

Espinoza, J.; Sholander, P.; Van Leeuwen, B,

1998-12-01T23:59:59.000Z

8

Specifications - The Security Content Automation Protocol ...  

Science Conference Proceedings (OSTI)

... Platform Enumeration Version: 2.3 Web site: http://scap.nist.gov/specifications/ cpe Contact Email: cpe@nist.gov Official Dictionary: https://nvd.nist ...

2013-08-12T23:59:59.000Z

9

NFS version 4 Protocol  

Science Conference Proceedings (OSTI)

NFS (Network File System) version 4 is a distributed file system protocol which owes heritage to NFS protocol versions 2 [RFC1094] and 3 [RFC1813]. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2000-12-01T23:59:59.000Z

10

Efficient Wide Area Data Transfer Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

stood the challenges presented by their extraordinary instru- ment in terms of data generation, distribution, and analysis. Many other research disciplines are now facing the...

11

Delta Coherence Protocols: The Home Update Protocol  

SciTech Connect

We describe a new class of directory coherence protocols called delta coherence protocols that use network guarantees to support a new and highly concurrent approach to maintain a consistent shared memory. Delta coherence protocols are more concurrent than other coherence protocols in that they allow processes to pipeline memory accesses without violating sequential consistency; support multiple concurrent readers and writers to the same cache block; and allow processes to access multiple shared variables atomically without invalidating the copies held by other processes or otherwise obtaining exclusive access to the referenced variables. Delta protocols include both update and invalidate protocols. In this paper we describe the simplest, most basic delta protocol, an update protocol called the home update protocol. Delta protocols are based on isotach network guarantees. An isotach network maintains a logical time system that allows each process to predict and control the logical time at which its messages are received. Processes use isotach guarantees to control the logical time at which their requests on shared memory appear to be executed. We prove the home update protocol is correct using logical time to reason about the order in which requests are executed.

Williams, C.; Reynolds, P.F.; de Supinoki, B.

2000-07-21T23:59:59.000Z

12

THE RIMINI PROTOCOL Oil Depletion Protocol  

E-Print Network (OSTI)

Soaring oil prices have drawn attention to the issue of the relative supply and demand for crude oil. This fact alone tells us that oil is a finite resource, which in turn means that it is subject to depletion1 THE RIMINI PROTOCOL an Oil Depletion Protocol ~ Heading Off Economic Chaos and Political Conflict

Keeling, Stephen L.

13

A Multiple Access Protocol for Multimedia Transmission over Wireless Networks  

E-Print Network (OSTI)

This paper develops and evaluates the performance of an advanced multiple access protocol for transmission of full complement of multimedia signals consisting of various combinations of voice, video, data, text and images over wireless networks. The protocol is called Advanced Multiple Access Protocol for Multimedia Transmission (AMAPMT) and is to be used in the Data Link Layer of the protocol stack. The principle of operation of the protocol is presented in a number of logical flow charts. The protocol grants permission to transmit to a source on the basis of a priority scheme that takes into account a time-to-live (TTL) parameter of all the transactions, selectable priorities assigned to all the sources and relevant channel state information (CSI) in this order. Performance of the protocol is evaluated in terms of quality of service parameters like packet loss ratio (PLR), mean packet transfer delay (MPTD) and throughput. Using a simulation model based on an OPNET simulation software package does the evalua...

Yu, Hong

2012-01-01T23:59:59.000Z

14

Attacks and improvements to an RIFD mutual authentication protocol and its extensions  

Science Conference Proceedings (OSTI)

In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, ... Keywords: authentication, privacy, rfid, security

Shaoying Cai; Yingjiu Li; Tieyan Li; Robert H. Deng

2009-03-01T23:59:59.000Z

15

Designing Security Properties-Centric Communication Protocols using a Component-Based Approach  

Science Conference Proceedings (OSTI)

Numerous communication protocols have been designed offering a set of security properties through the use of cryptographic tools to secure electronic document transfer. However, there is no clear match between the tools used and security properties they ... Keywords: Communication Protocols, Component-based Approach, Electronic Document Transfer, Security Components, Security Properties

N. Nobelis; K. Boudaoud; C. Delettre; M. Riveill

2012-01-01T23:59:59.000Z

16

Commercial Buildings Communications protocols  

Science Conference Proceedings (OSTI)

There are many automation and control protocols in use in commercial building and residential sectors today. For both commercial building and residential sectors there are several thousand manufacturers throughout the world that supply end-use electrical appliances and other building fixtures that communicate using these automation and control protocols. Some of these protocols are based on open standards (for example, BACnet, DALI) while others are semi-proprietary (for example, Zigbee, LonWorks, Modbus...

2008-05-15T23:59:59.000Z

17

House Simulation Protocols Report  

Energy.gov (U.S. Department of Energy (DOE))

Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and...

18

Office Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Services » Oversight » Safety & Emergency Management Evaluations Services » Oversight » Safety & Emergency Management Evaluations » Office Protocols Office Protocols July 22, 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents December 4, 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 Protocol for High Hazard Nuclear Facility Project Oversight June 26, 2012 Protocol, Required Reading - June 2012 Protocol for Required Reading June 26, 2012 Protocol, Small Team Oversight Activities - June 2012 Protocol for Small Team Oversight Activities (Rev. 1) May 13, 2011 Protocol, Site Leads - May 2011 Protocol for Site Leads May 13, 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011

19

Web Recency Maintenance Protocol  

Science Conference Proceedings (OSTI)

In this paper, we propose a new protocol namely Web Recency Maintenance Protocol (WRMP) that employs "push" mechanism to maintain the currency of the World Wide Web (WWW) at Search Engine (SE) site. As of this writing SEs are adopting "pull" technology, ...

K. Satya Sai Prakash; S. V. Raghavan

2002-12-01T23:59:59.000Z

20

An Evaluation of UDP Transport Protocols  

Science Conference Proceedings (OSTI)

Although the speed of LAN and WAN networking is growing at an exponential rate, the applications that use those networks have not followed suit. With fiber optic interconnects, gigahertz processor speeds, and 10 gigabit per second network interface cards, hardware does not seem to be the limiting factor. It is becoming increasingly obvious that the protocols that are the basis of networking today are ill-suited to a new generation of networking technology. For this reason, Oak Ridge National Laboratory is particularly interested in improving bulk transfers over high-bandwidth, high-latency networks because of its involvement in storage and in the transfer of data for cutting-edge scientific applications. This report summarizes our evaluation of a new group of protocols specifically designed to get more useful bandwidth from today's high speed, wide area networks.

Carter, S

2004-12-21T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

A Protocol for Quantum Energy Distribution  

E-Print Network (OSTI)

A new protocol, quantum energy distribution (QED), is proposed in which multiple parties can simultaneously extract positive energy from spin chains by common secret keys shared by an energy supplier. QED is robust against impersonation; an adversary, who does not have a common secret key and attempts to get energy, will instead give energy to the spin chains. The total amount of energy transfer gives a lower bound of the residual energy of any local cooling process by the energy supplier.

Masahiro Hotta

2008-03-11T23:59:59.000Z

22

SCADA protocol vulnerabilities  

Science Conference Proceedings (OSTI)

The majority of network traffic in process control networks is generated by industrial communication protocols, whose implementation represents a considerable part of the code that runs in process control systems. Consequently a large number of attack ...

Julian L. Rrushi

2012-01-01T23:59:59.000Z

23

The SUPDUP Protocol  

E-Print Network (OSTI)

The SUPDUP protocol provides for login to a remote system over a network with terminal-independent output, so that only the local system need know how to handle the user's terminal. It offers facilities for graphics and ...

Stallman, Richard M.

1983-07-01T23:59:59.000Z

24

Tech Transfer  

Tech Transfer The Industrial Partnerships Office is improving tech transfer processes with our very own Yellow Belt. Several of the Lab's process ...

25

Transferring Data  

NLE Websites -- All DOE Office Websites (Extended Search)

, 2012 David Turner NERSC User Services Group * Secure Shell (ssh) - Protocol version 2 since 2006 - Encrypts all communications * Control - Prevents password "sniffing" * Data -...

26

Optimal protocols for nonlocality distillation  

Science Conference Proceedings (OSTI)

Forster et al. recently showed that weak nonlocality can be amplified by giving the first protocol that distills a class of nonlocal boxes (NLBs) [Phys. Rev. Lett. 102, 120401 (2009)] We first show that their protocol is optimal among all nonadaptive protocols. We next consider adaptive protocols. We show that the depth-2 protocol of Allcock et al. [Phys. Rev. A 80, 062107 (2009)] performs better than previously known adaptive depth-2 protocols for all symmetric NLBs. We present a depth-3 protocol that extends the known region of distillable NLBs. We give examples of NLBs for which each of the Forster et al., the Allcock et al., and our protocols perform best. The understanding we develop is that there is no single optimal protocol for NLB distillation. The choice of which protocol to use depends on the noise parameters for the NLB.

Hoeyer, Peter; Rashid, Jibran [Department of Computer Science, University of Calgary, 2500 University Drive N.W., Calgary, Alberta, 2N 1N4 (Canada)

2010-10-15T23:59:59.000Z

27

APS Protocol for  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for Protocol for RECEIPT OF HAZARDOUS MATERIAL SHIPMENTS (Updated January 22, 2007) Scope & Application Throughout this document, the term hazardous material means any material regulated by the U.S. Department of Transportation as a hazardous material. This procedure governs APS Beamline acceptance of all packages known or suspected to contain hazardous materials. It applies not only to shipments delivered to Argonne National Laboratory by common carriers, but also to materials brought to the laboratory by researchers in personal, rental, or institutionally owned vehicles. There is no threshold quantity below which the procedure need not be followed. Purpose This procedure is intended to minimize the negative consequences that could result from

28

Transferring Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Transferring Data Transferring Data to and from NERSC Yushu Yao 1 Tuesday, March 8, 2011 Overview 2 * Structure of NERSC Systems and Disks * Data Transfer Nodes * Transfer Data from/to NERSC - scp/sftp - bbcp - GridFTP * Sharing Data Within NERSC Tuesday, March 8, 2011 Systems and Disks 3 System Hopper Franklin Carver Euclid Data Transfer Node PDSF Global Home ($HOME) Global Scratch ($GSCRATCH) Project Directory Local Non-shared Scratch Data transfer nodes can access most of the disks, suggested for transferring data in/out NERSC Tuesday, March 8, 2011 Data Transfer Nodes * Two Servers Available Now: - dtn01.nersc.gov and dtn02.nersc.gov - Accessible by all NERSC users * Designed to Transfer Data: - High speed connection to HPSS and NGF (Global Home, Project, and Global Scratch) - High speed ethernet to wide area network

29

Accountable internet protocol (aip)  

Science Conference Proceedings (OSTI)

This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding ... Keywords: accountability, address, internet architecture, scalability, security

David G. Andersen; Hari Balakrishnan; Nick Feamster; Teemu Koponen; Daekyeong Moon; Scott Shenker

2008-08-01T23:59:59.000Z

30

Protocols from perceptual observations  

Science Conference Proceedings (OSTI)

This paper presents a cognitive vision system capable of autonomously learning protocols from perceptual observations of dynamic scenes. The work is motivated by the aim of creating a synthetic agent that can observe a scene containing interactions between ... Keywords: Autonomous learning, Cognitive vision, Inductive logic programming, Spatio-temporal reasoning, Symbol grounding, Unsupervised clustering

Chris J. Needham; Paulo E. Santos; Derek R. Magee; Vincent Devin; David C. Hogg; Anthony G. Cohn

2005-09-01T23:59:59.000Z

31

UTask-Web URL http://park.itc.u-tokyo.ac.jp/kyomu/info/zenki/zenki-top/framepage7.htm URL https://zkyomu-m.c.u-tokyo.ac.jp/UTask-m/mobile  

E-Print Network (OSTI)

UTask-Web 1 UTask-Web UTask-Web 12 ID UTask-Web UTask-Web URL http://park.itc.u-tokyo.ac.jp/kyomu/info/zenki/zenki-top/framepage7.htm URL https://zkyomu-m.c.u-tokyo.ac.jp/UTask-m/mobile 2011 10 #12;UTask-Web 2 UTask-WebWeb................................................... 3 UTask-Web

Katsumoto, Shingo

32

Protocols for wide-area data-intensive applications: design and performance issues  

Science Conference Proceedings (OSTI)

Providing high-speed data transfer is vital to various data-intensive applications. While there have been remarkable technology advances to provide ultra-high-speed network bandwidth, existing protocols and applications may not be able to fully utilize ...

Yufei Ren; Tan Li; Dantong Yu; Shudong Jin; Thomas Robertazzi; Brian L. Tierney; Eric Pouyoul

2012-11-01T23:59:59.000Z

33

RDMA read based rendezvous protocol for MPI over InfiniBand: design alternatives and benefits  

Science Conference Proceedings (OSTI)

Message Passing Interface (MPI) is a popular parallel programming model for scientific applications. Most high-performance MPI implementations use Rendezvous Protocol for efficient transfer of large messages. This protocol can be designed using either ... Keywords: InfiniBand, MPI, communication overlap

Sayantan Sur; Hyun-Wook Jin; Lei Chai; Dhabaleswar K. Panda

2006-03-01T23:59:59.000Z

34

Technology Transfer  

A new search feature has been implemented, which allows searching of technology transfer information across the Department of Energy Laboratories.

35

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

36

Supplement No. 2 to the FUSRAP Summary Protocol Verification and Certification Protocol  

Energy.gov (U.S. Department of Energy (DOE))

Supplement No. 2 to the FUSRAP Summary Protocol Verification and Certification Protocol (November 1985, Rev. 1)

37

Securing Block Storage Protocols over IP  

Science Conference Proceedings (OSTI)

This document discusses how to secure block storage and storage discovery protocols running over IP (Internet Protocol) using IPsec and IKE (Internet Key Exchange). Threat models and security protocols are developed for iSCSI (Internet Protocol Small ...

B. Aboba; J. Tseng; J. Walker; V. Rangan; F. Travostino

2004-04-01T23:59:59.000Z

38

Appraisal Process Protocols, Independent Oversight - November...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Protocols, Independent Oversight - November 2012 Appraisal Process Protocols, Independent Oversight - November 2012 November 2012 Updated Independent Oversight...

39

Energy Efficiency Savings Protocols | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols Energy Efficiency Savings Protocols In April 2013 the U.S. Department of Energy published the first set of protocols for determining energy savings from energy efficiency measures and programs. You can read individual protocols below or all of them combined into a single report titled The Uniform Methods Project: Methods for Determining Energy Efficiency Savings for Specific Measures. Acknowledgements Introduction Commercial and Industrial Lighting Evaluation Protocol Commercial and Industrial Lighting Controls Evaluation Protocol Small Commercial and Residential Unitary and Split System HVAC Cooling Equipment-Efficiency Upgrade Evaluation Protocol Residential Furnaces and Boilers Evaluation Protocol Residential Lighting Evaluation Protocol

40

Kyoto Protocol | Open Energy Information  

Open Energy Info (EERE)

Kyoto Protocol Kyoto Protocol Jump to: navigation, search http://www.wired.com/thisdayintech/tag/climate-change/ Kyoto protocol negotiation The Kyoto Protocol, negotiated in 1997 and into force in 2005, is a binding agreement in which industrialized nations will seek emission-reducing strategies for the future years to come. "The Kyoto Protocol is a legally binding agreement under which industrialized countries will reduce their collective emissions of greenhouse gases by 5.2% compared to the year 1990 (but note that, compared to the emissions levels that would be expected by 2010 without the Protocol, this target represents a 29% cut). The goal is to lower overall emissions from six greenhouse gases - carbon dioxide, methane, nitrous oxide, sulfur hexafluoride, HFCs, and PFCs - calculated as an average over

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

DotDFS: A Grid-based high-throughput file transfer system  

Science Conference Proceedings (OSTI)

DotGrid platform is a Grid infrastructure integrated with a set of open and standard protocols recently implemented on the top of Microsoft .NET in Windows and MONO .NET in UNIX/Linux. DotGrid infrastructure along with its proposed protocols provides ... Keywords: Concurrent systems, Data grids, Event-driven architecture, File transfer protocols, Grid computing, Grid security, High throughput file transfer, Modeling parallel TCP throughput

Alireza Poshtkohi; M. B. Ghaznavi-Ghoushchi

2011-02-01T23:59:59.000Z

42

Scalable RFID Security Protocols supporting Tag Ownership Transfer  

E-Print Network (OSTI)

server, then the damage would be very serious. · Tag Tracking: if the responses of a tag are linkable be able to resist tag track- ing attacks. If messages from tags are anonymous, then the problem of tag its identifier. Tag tracking is thus partially possible [10], as in the HM scheme. The RFID

Sheldon, Nathan D.

43

VITP: an information transfer protocol for vehicular computing  

Science Conference Proceedings (OSTI)

Recent advances in wireless inter-vehicle communication systems enable the development of Vehicular Ad-Hoc Networks (VANET) and create significant opportunities for the deployment of a wide variety of vehicular applications and services. In this paper, ... Keywords: location-based services, middleware, vehicular computing

Marios D. Dikaiakos; Saif Iqbal; Tamer Nadeem; Liviu Iftode

2005-09-01T23:59:59.000Z

44

An ATM Adaptation Layer for Reliable Transfers  

Science Conference Proceedings (OSTI)

There has been much attention given to ATM Adaptation Layers (AAL) over the ten-year history of ATM standardization. Yet none of the existing standards include a retransmission protocol to ensure reliability of the transfers. In this paper we propose ...

Gunnar Karlsson

1996-09-01T23:59:59.000Z

45

Oblivious transfer with complex attribute-based access control  

Science Conference Proceedings (OSTI)

In this paper, we present oblivious transfer with complex attribute-based access control policies. The protocol allows a database server to directly enforce "and" and "or" access control policies (c11 ? c12 ... Keywords: access control, attribute-based encryption, oblivious transfer

Lingling Xu; Fangguo Zhang

2010-12-01T23:59:59.000Z

46

Network File System (NFS) version 4 Protocol  

Science Conference Proceedings (OSTI)

The Network File System (NFS) version 4 is a distributed filesystem protocol which owes heritage to NFS protocol version 2, RFC 1094, and version 3, RFC 1813. Unlike earlier versions, the NFS version 4 protocol supports traditional file access while ...

S. Shepler; B. Callaghan; D. Robinson; R. Thurlow; C. Beame; M. Eisler; D. Noveck

2003-04-01T23:59:59.000Z

47

Protocols and Systems Services  

E-Print Network (OSTI)

Current data-centers rely on TCP/IP over Fast- and Gigabit-Ethernet for data communication even within the cluster environment for costeffective designs, thus limiting their maximum capacity. Together with raw performance, such data-centers also lack in efficient support for intelligent services, such as requirements for caching documents, managing limited physical resources, load-balancing, controlling overload scenarios, and prioritization and QoS mechanisms, that are becoming a common requirement today. On the other hand, the System Area Network (SAN) technology is making rapid advances during the recent years. Besides high performance, these modern interconnects are providing a range of novel features and their support in hardware (e.g., RDMA, atomic operations, QoS support). In this paper, we address the capabilities of these current generation SAN technologies in addressing the limitations of existing data-centers. Specifically, we present a novel framework comprising of three layers (communication protocol support, data-center service primitives and advanced data-center services) that work together to tackle the issues associated with existing data-centers. We also present preliminary results in the various aspects of the framework, which demonstrate close to an order of magnitude performance benefits achievable by our framework as compared to existing data-centers in several cases.

Balaji Vaidyanathan Narravula; P. Balaji; K. Vaidyanathan; S. Narravula; H. -w. Jin; D. K. Panda

2006-01-01T23:59:59.000Z

48

Don't optimize existing protocols, design optimizable protocols  

Science Conference Proceedings (OSTI)

As networks grow in size and complexity, network management has become an increasingly challenging task. Many protocols have tunable parameters, and optimization is the process of setting these parameters to optimize an objective. In recent years, optimization ...

Jiayue He; Jennifer Rexford; Mung Chiang

2007-07-01T23:59:59.000Z

49

RadNet: Open network protocol for radiation data  

SciTech Connect

Safeguards instrumentation is increasingly being incorporated into remote monitoring applications. In the past, vendors of radiation monitoring instruments typically provided the tools for uploading the monitoring data to a host. However, the proprietary nature of communication protocols lends itself to increased computer support needs and increased installation expenses. As a result, a working group of suppliers and customers of radiation monitoring instruments defined an open network protocol for transferring packets on a local area network from radiation monitoring equipment to network hosts. The protocol was termed RadNet. While it is now primarily used for health physics instruments, RadNet`s flexibility and strength make it ideal for remote monitoring of nuclear materials. The incorporation of standard, open protocols ensures that future work will not render present work obsolete; because RadNet utilizes standard Internet protocols, and is itself a non-proprietary standard. The use of industry standards also simplifies the development and implementation of ancillary services, e.g. E-main generation or even pager systems.

Rees, B.; Olson, K. [Los Alamos National Lab., NM (United States); Beckes-Talcott, J.; Kadner, S.; Wenderlich, T.; Hoy, M.; Doyle, W. [Aquila Technologies Group, Inc., Albuquerque, NM (United States); Koskelo, M. [Canberra Industries, Meriden, CT (United States)

1998-12-31T23:59:59.000Z

50

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocols Report This image shows a cover of a report titled "Building America House Simulation Protocols." The Building America logo is shown in the lower left corner of...

51

Evaluation of replacement protocols and modifications to TCP to enhance ASC Wide Area Network performance.  

SciTech Connect

Historically, TCP/IP has been the protocol suite used to transfer data throughout the Advanced Simulation and Computing (ASC) community. However, TCP was developed many years ago for an environment very different from the ASC Wide Area Network (WAN) of today. There have been numerous publications that hint of better performance if modifications were made to the TCP algorithms or a different protocol was used to transfer data across a high bandwidth, high delay WAN. Since Sandia National Laboratories wants to maximize the ASC WAN performance to support the Thor's Hammer supercomputer, there is strong interest in evaluating modifications to the TCP protocol and in evaluating alternatives to TCP, such as SCTP, to determine if they provide improved performance. Therefore, the goal of this project is to test, evaluate, compare, and report protocol technologies that enhance the performance of the ASC WAN.

Romero, Randy L. Jr.

2004-09-01T23:59:59.000Z

52

Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Efficiency & Renewable and Energy - Commercialization Energy Efficiency & Renewable and Energy - Commercialization Deployment SBIR/STTR - Small Business Innovation Research and Small Business Technology Transfer USEFUL LINKS Contract Opportunities: FBO.gov FedConnect.net Grant Opportunities DOE Organization Chart Association of University Technology Managers (AUTM) Federal Laboratory Consortium (FLC) Feedback Contact us about Tech Transfer: Mary.McManmon@science.doe.gov Mary McManmon, 202-586-3509 link to Adobe PDF Reader link to Adobe Flash player Licensing Guide and Sample License The Technology Transfer Working Group (TTWG), made up of representatives from each DOE Laboratory and Facility, recently created a Licensing Guide and Sample License [762-KB PDF]. The Guide will serve to provide a general understanding of typical contract terms and provisions to help reduce both

53

Simulatable security for quantum protocols  

E-Print Network (OSTI)

The notion of simulatable security (reactive simulatability, universal composability) is a powerful tool for allowing the modular design of cryptographic protocols (composition of protocols) and showing the security of a given protocol embedded in a larger one. Recently, these methods have received much attention in the quantum cryptographic community. We give a short introduction to simulatable security in general and proceed by sketching the many different definitional choices together with their advantages and disadvantages. Based on the reactive simulatability modelling of Backes, Pfitzmann and Waidner we then develop a quantum security model. By following the BPW modelling as closely as possible, we show that composable quantum security definitions for quantum protocols can strongly profit from their classical counterparts, since most of the definitional choices in the modelling are independent of the underlying machine model. In particular, we give a proof for the simple composition theorem in our framework.

Dominique Unruh

2004-09-18T23:59:59.000Z

54

FORMAL MODELING AND ANALYSIS OF THE MODBUS PROTOCOL  

E-Print Network (OSTI)

the SCADA networks protocols. Here the critical features of some common SCADA protocols will be presented

Dutertre, Bruno

55

An empirical study of TCP/IP performance over ATM1This paper was also presented at the Transport Protocols for High Speed Broadband Networks Workshop, at Globecom'96, in Westminster, London, UK, on 22 November, 1996. 1  

Science Conference Proceedings (OSTI)

This paper outlines some basic performance characteristics of the Transmission Control Protocol/Internet Protocol (TCP/IP) over Asynchronous Transfer Mode (ATM). It also discusses a few solutions to assure acceptable TCP/IP performance over ATM which ... Keywords: ATM, Physical layer convergence protocol, TCP/IP performance

Is?L SebKtekin; Tony J Bogovic; Padma Krishnaswamy

1998-08-01T23:59:59.000Z

56

Formal apparatus for measurement of lightweight protocols  

Science Conference Proceedings (OSTI)

Lightweight protocols are an important topic in the area of computer communications. With the proliferation of security services not only ordinary communication protocols, but also cryptographic protocols, i.e. security services, have become a subject ... Keywords: Lightweight protocols, Security, Security services metrics, Standardization, Ubiquitous computing

Denis Tr?ek; Damjan Kova?

2009-02-01T23:59:59.000Z

57

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

58

Building Technologies Office: House Simulation Protocols Report  

NLE Websites -- All DOE Office Websites (Extended Search)

House Simulation House Simulation Protocols Report to someone by E-mail Share Building Technologies Office: House Simulation Protocols Report on Facebook Tweet about Building Technologies Office: House Simulation Protocols Report on Twitter Bookmark Building Technologies Office: House Simulation Protocols Report on Google Bookmark Building Technologies Office: House Simulation Protocols Report on Delicious Rank Building Technologies Office: House Simulation Protocols Report on Digg Find More places to share Building Technologies Office: House Simulation Protocols Report on AddThis.com... About Take Action to Save Energy Partner With DOE Activities Solar Decathlon Building America Research Innovations Research Tools Building Science Education Climate-Specific Guidance Solution Center

59

Summary Protocol: Identification, Characterization, Designation, Remedial  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary Protocol: Identification, Characterization, Designation, Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) Summary Protocol: Identification, Characterization, Designation, Remedial Action, Certification (January 1986) More Documents & Publications Supplement No. 1 to the FUSRAP Summary Protocol - Designation/Elimination Protocol Pre-MARSSIM Surveys in a MARSSIM World: Demonstrating How Pre-MARSSIM Radiological Data Demonstrate Protectiveness at Formerly Utilized Sites Remedial Action Program Sites U.S. Department of Energy Guidelines for Residual Radioactive Material at

60

Optimal bounds for quantum weak oblivious transfer  

E-Print Network (OSTI)

Oblivious transfer is a fundamental cryptographic primitive in which Bob transfers one of two bits to Alice in such a way that Bob cannot know which of the two bits Alice has learned. We present an optimal security bound for quantum oblivious transfer protocols under a natural and demanding definition of what it means for Alice to cheat. Our lower bound is a smooth tradeoff between the probability B with which Bob can guess Alice's bit choice and the probability A with which Alice can guess both of Bob's bits given that she learns one of the bits with certainty. We prove that 2B + A is greater than or equal to 2 in any quantum protocol for oblivious transfer, from which it follows that one of the two parties must be able to cheat with probability at least 2/3. We prove that this bound is optimal by exhibiting a family of protocols whose cheating probabilities can be made arbitrarily close to any point on the tradeoff curve.

Andr Chailloux; Gus Gutoski; Jamie Sikora

2013-10-11T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Electron Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

3 3 Pierre Kennepohl1,2 and Edward Solomon1* 1Department of Chemistry, Stanford University, Stanford, CA 94305 Electron transfer, or the act of moving an electron from one place to another, is amongst the simplest of chemical processes, yet certainly one of the most critical. The process of efficiently and controllably moving electrons around is one of the primary regulation mechanisms in biology. Without stringent control of electrons in living organisms, life could simply not exist. For example, photosynthesis and nitrogen fixation (to name but two of the most well-known biochemical activities) are driven by electron transfer processes. It is unsurprising, therefore, that much effort has been placed on understanding the fundamental principles that control and define the simple act of adding and/or removing electrons from chemical species.

62

TECHNOLOGY TRANSFER  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

404-NOV. 1, 2000 404-NOV. 1, 2000 TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 VerDate 11-MAY-2000 04:52 Nov 16, 2000 Jkt 089139 PO 00000 Frm 00001 Fmt 6579 Sfmt 6579 E:\PUBLAW\PUBL404.106 APPS27 PsN: PUBL404 114 STAT. 1742 PUBLIC LAW 106-404-NOV. 1, 2000 Public Law 106-404 106th Congress An Act To improve the ability of Federal agencies to license federally owned inventions. Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled, SECTION 1. SHORT TITLE. This Act may be cited as the ''Technology Transfer Commer- cialization Act of 2000''. SEC. 2. FINDINGS. The Congress finds that- (1) the importance of linking our unparalleled network of over 700 Federal laboratories and our Nation's universities with United States industry continues to hold great promise

63

NETL: Technology Transfer - History of Technology Transfer  

History of Technology Transfer Technology transfer differs from providing services or products (e.g., acquisition) and financial assistance (e.g., ...

64

Partnership in key exchange protocols  

Science Conference Proceedings (OSTI)

In this paper, we investigate the notion of partnership as found in security models for key exchange protocols. Several different approaches have been pursued to define partnership, with varying degrees of success. We aim to provide an overview and criticism ... Keywords: key exchange, partnership, session identifier

Kazukuni Kobara; Seonghan Shin; Mario Strefler

2009-03-01T23:59:59.000Z

65

IPv6 Advanced Protocols Implementation  

Science Conference Proceedings (OSTI)

This book is the second installment of a two-volume series on IPv6 and the KAME implementation. This book discusses those protocols that are found in more capable IPv6 devices, are commonly deployed in more complex IPv6 network environments, or are not ...

Qing Li; Jinmei Tatuya; Keiichi Shima

2007-04-01T23:59:59.000Z

66

Implementing Network File System Protocol for Highly Available Clustered Applications on Network Attached Storage  

Science Conference Proceedings (OSTI)

This paper introduces method for implementing NFS protocol for larger block/network packets transfer over to NAS [Network Attached Storage] from Highly Available clients. NAS storage scalability is habitually inadequate to the volume of the appliance. ... Keywords: NAS, NFS, RPC, RAID

K. J. Latesh Kumar

2013-09-01T23:59:59.000Z

67

Former Worker Program Medical Protocol | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Medical Protocol Former Worker Program Medical Protocol April 2013 The medical protocol is intended to identify work-related health outcomes of relevance to DOE workers for which...

68

Cryptographic voting protocols: a systems perspective  

Science Conference Proceedings (OSTI)

Cryptographic voting protocols offer the promise of verifiable voting without needing to trust the integrity of any software in the system. However, these cryptographic protocols are only one part of a larger system composed of voting machines, software ...

Chris Karlof; Naveen Sastry; David Wagner

2005-07-01T23:59:59.000Z

69

Improving Accelerated Weathering Protocols to Anticipate ...  

Science Conference Proceedings (OSTI)

... Step # Water Spray Irradiance ... water sprays during the dark cycle augmented with numerous shorter sprays ? New Protocol correctly ...

2013-04-19T23:59:59.000Z

70

Deriving Efficient Cache Coherence Protocols Through Refinement  

Science Conference Proceedings (OSTI)

We address the problem of developing efficient cache coherence protocols for use in distributed systems implementing distributed shared memory (DSM) using message passing. A serious drawback of traditional approaches to this problem is that the users ... Keywords: DSM protocols, communication protocols, refinement

Ratan Nalumasu; Ganesh Gopalakrishnan

2002-01-01T23:59:59.000Z

71

Independent Oversight Appraisal Process Protocols  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

72

Independent Oversight Appraisal Process Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF ENFORCEMENT AND OVERSIGHT INDEPENDENT OVERSIGHT PROGRAM APPRAISAL PROCESS PROTOCOLS November 2012 Office of Health, Safety and Security U.S. Department of Energy Independent Oversight Program Appraisal Process Protocols Preface November 2012 i Preface The Office of Enforcement and Oversight, within the Office of Health, Safety and Security (HSS), is responsible for implementing an Independent Oversight Program for safety and security within the U.S. Department of Energy (DOE) in accordance with DOE Orders 227.1, Independent Oversight Program, and 226.1B, Implementation of Department of Energy Oversight Policy. Effective oversight, including independent oversight, of DOE Federal and contractor operations is an integral element of the

73

Analyzing the effect of routing protocols on media access control protocols in radio networks  

SciTech Connect

We study the effect of routing protocols on the performance of media access control (MAC) protocols in wireless radio networks. Three well known MAC protocols: 802.11, CSMA, and MACA are considered. Similarly three recently proposed routing protocols: AODV, DSR and LAR scheme 1 are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of our experiments was to study how the routing protocols affect the performance of the MAC protocols when the underlying network and traffic parameters are varied. The performance of the protocols was measured w.r.t. five important parameters: (i) number of received packets, (ii) average latency of each packet, (iii) throughput (iv) long term fairness and (v) number of control packets at the MAC layer level. Our results show that combinations of routing and MAC protocols yield varying performance under varying network topology and traffic situations. The result has an important implication; no combination of routing protocol and MAC protocol is the best over all situations. Also, the performance analysis of protocols at a given level in the protocol stack needs to be studied not locally in isolation but as a part of the complete protocol stack. A novel aspect of our work is the use of statistical technique, ANOVA (Analysis of Variance) to characterize the effect of routing protocols on MAC protocols. This technique is of independent interest and can be utilized in several other simulation and empirical studies.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, A. (Achla); Marathe, M. V. (Madhav V.)

2002-01-01T23:59:59.000Z

74

Transferring Data at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transferring Data Advice and Overview NERSC provides many facilities for storing data and performing analysis. However, transfering data - whether over the wide area network...

75

Jefferson Lab Technology Transfer  

What is Technology Transfer at Jefferson Lab? The transfer of technology (intellectual property) developed at JLab to the private sector is an ...

76

Accelerating the transfer in Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Accelerating the transfer in Technology Transfer Accelerating the transfer in Technology Transfer Community Connections: Our link to Northern New Mexico Communities Latest Issue:Dec. 2013 - Jan. 2014 All Issues » submit Accelerating the transfer in Technology Transfer Express Licensing fast tracks commercialization. May 1, 2013 Division Leader Dave Pesiri Division Leader Dave Pesiri. Contact Editor Linda Anderman Email Community Programs Office Kurt Steinhaus Email Express Licensing program To better serve its partners, one of the first improvements the Lab's Technology Transfer Division (TT) has made is through its new Express Licensing initiative. Standardized license agreements and fee structures will remove long and complicated negotiations and decrease the time required to get patented Lab technology and software into the hands of

77

Scaling HEP to Web size with RESTful protocols: The frontier example  

SciTech Connect

The World-Wide-Web has scaled to an enormous size. The largest single contributor to its scalability is the HTTP protocol, particularly when used in conformity to REST (REpresentational State Transfer) principles. High Energy Physics (HEP) computing also has to scale to an enormous size, so it makes sense to base much of it on RESTful protocols. Frontier, which reads databases with an HTTP-based RESTful protocol, has successfully scaled to deliver production detector conditions data from both the CMS and ATLAS LHC detectors to hundreds of thousands of computer cores worldwide. Frontier is also able to re-use a large amount of standard software that runs the Web: on the clients, caches, and servers. I discuss the specific ways in which HTTP and REST enable high scalability for Frontier. I also briefly discuss another protocol used in HEP computing that is HTTP-based and RESTful, and another protocol that could benefit from it. My goal is to encourage HEP protocol designers to consider HTTP and REST whenever the same information is needed in many places.

Dykstra, Dave; /Fermilab

2011-01-01T23:59:59.000Z

78

Transportation Protocols Working Group First Conference Call...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

79

Field Monitoring Protocol: Heat Pump Water Heaters  

NLE Websites -- All DOE Office Websites (Extended Search)

Field Monitoring Protocol: Heat Pump Water Heaters B. Sparn, L. Earle, D. Christensen, J. Maguire, and E. Wilson National Renewable Energy Laboratory C.E. Hancock Mountain Energy...

80

California Energy Efficiency Evaluation Protocols | Building...  

NLE Websites -- All DOE Office Websites (Extended Search)

bpCaliforniaEnergyEfficiencyEvaluationProtocols.pdf Document Details Affiliation: California Public Utilities Commission Focus: Adoption Compliance Building Type: Commercial...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network (OSTI)

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

82

Capture Effect of Randomly Addressed Polling Protocol  

Science Conference Proceedings (OSTI)

The capture effect, discussed in this paper, is generally considered to enhance the systems performance in a wireless network. This paper also considers the Randomly Addressed Polling (RAP) protocol in the presence of a fading mobile radio ... Keywords: capture effect, noiseless, randomly addressed polling protocol

Jiang-Whai Dai

1999-06-01T23:59:59.000Z

83

RTP Control Protocol Extended Reports (RTCP XR)  

Science Conference Proceedings (OSTI)

This document defines the Extended Report (XR) packet type for the RTP Control Protocol (RTCP), and defines how the use of XR packets can be signaled by an application if it employs the Session Description Protocol (SDP). XR packets are composed of ...

T. Friedman; R. Caceres; A. Clark

2003-11-01T23:59:59.000Z

84

Security protocols, properties, and their monitoring  

Science Conference Proceedings (OSTI)

This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verification framework introduced in [5] to monitor complex, history-based security-properties ... Keywords: language-based security, monitoring of history-based properties, runtime verification, security automata, security protocols, temporal logic

Andreas Bauer; Jan Juerjens

2008-05-01T23:59:59.000Z

85

Proof-Based design of security protocols  

Science Conference Proceedings (OSTI)

We consider the refinement-based process for the development of security protocols. Our approach is based on the Event B refinement, which makes proofs easier and which makes the design process faithfull to the structure of the protocol as the designer ...

Nazim Benaissa; Dominique Mry

2010-06-01T23:59:59.000Z

86

Final report for the protocol extensions for ATM Security Laboratory Directed Research and Development Project  

SciTech Connect

This is the summary report for the Protocol Extensions for Asynchronous Transfer Mode project, funded under Sandia`s Laboratory Directed Research and Development program. During this one-year effort, techniques were examined for integrating security enhancements within standard ATM protocols, and mechanisms were developed to validate these techniques and to provide a basic set of ATM security assurances. Based on our experience during this project, recommendations were presented to the ATM Forum (a world-wide consortium of ATM product developers, service providers, and users) to assist with the development of security-related enhancements to their ATM specifications. As a result of this project, Sandia has taken a leading role in the formation of the ATM Forum`s Security Working Group, and has gained valuable alliances and leading-edge experience with emerging ATM security technologies and protocols.

Tarman, T.D.; Pierson, L.G.; Brenkosh, J.P. [and others

1996-03-01T23:59:59.000Z

87

Design and Implementation of IEEE 802.15.4 Mac Protocol on FPGA  

E-Print Network (OSTI)

The IEEE 802.15.4 is a wireless standard introduced for low power, low cost wireless communication with moderate data rates. In the next few years, it is expected that Low Rate Wireless Personal Area Networks (LR-WPAN) will be used in a wide variety of embedded applications, including home automation, industrial sensing and control, environmental monitoring and sensing. In these applications, numerous embedded devices running on batteries are distributed in an area communicating via wireless radios. This work presents a method which can be used for comparing current consumption of wireless data transfer embedded systems. This paper implements a small subset of the IEEE 802.15.4 protocol to achieve a point to point communication. The implemented protocol uses 802.15.4 MAC compliant data and acknowledgment packets. Current consumption is measured while doing one data packet transmission. Measurements are compared with existing work. IEEE 802.15.4 protocol implementation is done using Verilog language. Code impl...

Bhat, Naagesh S

2012-01-01T23:59:59.000Z

88

House Simulation Protocols Report | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Residential Buildings » Building America » House Simulation Residential Buildings » Building America » House Simulation Protocols Report House Simulation Protocols Report This image shows a cover of a report titled Building America House Simulation Protocols. The Building America logo is shown in the lower left corner of the report cover. Building America's House Simulation Protocols report is designed to assist researchers in tracking the progress of multiyear, whole-building energy reduction against research goals for new and existing homes. These protocols are preloaded into BEopt and use a consistent approach for defining a reference building, so that all projects can be compared to each other. The steps involved in conducting performance analysis include: Defining the appropriate reference building Various climate regions, house sizes, and house ages require slightly

89

Routing Protocols and Concepts, CCNA Exploration Companion Guide  

Science Conference Proceedings (OSTI)

Routing Protocols and Concepts CCNA Exploration Companion Guide Routing Protocols and Concepts, CCNA Exploration Companion Guide is the official supplemental textbook for the Routing Protocols and Concepts course in the Cisco Networking Academy CCNA ...

Rick Graziani; Allan Johnson

2007-12-01T23:59:59.000Z

90

NERSC's Data Transfer Nodes  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Nodes Data Transfer Nodes Data Transfer Nodes Overview The data transfer nodes are NERSC servers dedicated to performing transfers between NERSC data storage resources such as HPSS and the NERSC Global Filesystem (NGF), and storage resources at other sites including the Leadership Computing Facility at ORNL (Oak Ridge National Laboratory). These nodes are being managed (and monitored for performance) as part of a collaborative effort between ESnet, NERSC, and ORNL to enable high performance data movement over the high-bandwidth 10Gb ESnet wide-area network (WAN). Restrictions In order to keep the data transfer nodes performing optimally for data transfers, we request that users restrict interactive use of these systems to tasks that are related to preparing data for transfer or are directly

91

SRNL - Technology Transfer - Home  

Technology Transfer. Research and Development Savannah River Nuclear Solutions, LLC (SRNS) scientists and engineers develop technologies designed to improve ...

92

Tech Transfer Report 2000  

Science Conference Proceedings (OSTI)

Page 1. Summary Report on Federal Laboratory Technology Transfer FY 2003 Activity Metrics and Outcomes 2004 Report ...

2010-07-27T23:59:59.000Z

93

Federal Laboratory Technology Transfer  

Science Conference Proceedings (OSTI)

... Department of Energy (DOE) ... and business development involved in successful technology transfer. 8. Government-industry interactions. ...

2012-11-14T23:59:59.000Z

94

Overview of the InterGroup protocols  

SciTech Connect

Existing reliable ordered group communication protocols have been developed for local-area networks and do not, in general, scale well to large numbers of nodes and wide-area networks. The InterGroup suite of protocols is a scalable group communication system that introduces a novel approach to handling group membership, and supports a receiver-oriented selection of service. The protocols are intended for a wide-area network, with a large number of nodes, that has highly variable delays and a high message loss rate, such as the Internet. The levels of the message delivery service range from unreliable unordered to reliable group timestamp ordered.

Berket, Karlo; Agarwal, Deborah A.; Melliar-Smith, P. Michael; Moser, Louise E.

2001-03-01T23:59:59.000Z

95

High Performance Computing Data Center Metering Protocol | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance Computing Data Center Metering Protocol High Performance Computing Data Center Metering Protocol Guide details the methods for measurement in High Performance...

96

Event:GHG Protocol Latin America and Caribbean Regional Training...  

Open Energy Info (EERE)

GHG Protocol Latin America and Caribbean Regional Training: How to Establish a National Corporate Emissions Reporting Program Jump to: navigation, search Calendar.png GHG Protocol...

97

The Greenhouse Gas Protocol Initiative: Allocation of Emissions...  

Open Energy Info (EERE)

Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Name The Greenhouse Gas Protocol Initiative: Allocation...

98

U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service Vulnerability U-062: Pidgin SILC (Secure Internet Live Conferencing) Protocol Denial of Service...

99

Heat transfer system  

DOE Patents (OSTI)

A heat transfer system for a nuclear reactor. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

McGuire, Joseph C. (Richland, WA)

1982-01-01T23:59:59.000Z

100

Heat transfer system  

DOE Patents (OSTI)

A heat transfer system for a nuclear reactor is described. Heat transfer is accomplished within a sealed vapor chamber which is substantially evacuated prior to use. A heat transfer medium, which is liquid at the design operating temperatures, transfers heat from tubes interposed in the reactor primary loop to spaced tubes connected to a steam line for power generation purposes. Heat transfer is accomplished by a two-phase liquid-vapor-liquid process as used in heat pipes. Condensible gases are removed from the vapor chamber through a vertical extension in open communication with the chamber interior.

Not Available

1980-03-07T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

STANDARD OPERATING PROTOCOLS FOR DECOMMISSIONING  

SciTech Connect

Decommissioning projects at Comprehensive Environmental Response, Compensation, and Liability Act (CERCLA) sites are conducted under project-specific decision documents, which involve extensive preparation time, public comment periods, and regulatory approvals. Often, the decision documents must be initiated at least one year before commencing the decommissioning project, and they are expensive and time consuming to prepare. The Rocky Flats Environmental Technology Site (RFETS) is a former nuclear weapons production plant at which hazardous substances and wastes were released or disposed during operations. As a result of the releases, RFETS was placed on the National Priorities List in 1989, and is conducting cleanup activities under a federal facilities compliance agreement. Working closely with interested stakeholders and state and federal regulatory agencies, RFETS has developed and implemented an improved process for obtaining the approvals. The key to streamlining the approval process has been the development of sitewide decision documents called Rocky Flats Cleanup Agreement Standard Operating Protocols or ''RSOPs.'' RSOPs have broad applicability, and could be used instead of project-specific documents. Although no two decommissioning projects are exactly the same and they may vary widely in contamination and other hazards, the basic steps taken for cleanup are usually similar. Because of this, using RSOPs is more efficient than preparing a separate project-specific decision documents for each cleanup action. Over the Rocky Flats cleanup life cycle, using RSOPs has the potential to: (1) Save over 5 million dollars and 6 months on the site closure schedule; (2) Eliminate preparing one hundred and twenty project-specific decision documents; and (3) Eliminate writing seventy-five closure description documents for hazardous waste unit closure and corrective actions.

Foss, D. L.; Stevens, J. L.; Gerdeman, F. W.

2002-02-25T23:59:59.000Z

102

The Kyoto Protocol and developing countries  

E-Print Network (OSTI)

Under the Kyoto Protocol, the world's wealthier countries assumed binding commitments to reduce greenhouse gas emissions. The agreement requires these countries to consider ways to minimize adverse effects on developing ...

Babiker, Mustafa H.M.; Reilly, John M.; Jacoby, Henry D.

103

A decision maker for transport protocol configuration  

Science Conference Proceedings (OSTI)

This paper proposes an approach, called Protocol Configuration Decision Maker, for TCP to dynamically adapt to a network environment. The proposed mechanism monitors the network condition with parameters like loss rate. Then it consults a knowledge ...

Jae-Hyun Hwang; Jin-Hee Choi; Chuck Yoo

2006-05-01T23:59:59.000Z

104

Making sensornet MAC protocols robust against interference  

Science Conference Proceedings (OSTI)

Radio interference may lead to packet losses, thus negatively affecting the performance of sensornet applications. In this paper, we experimentally assess the impact of external interference on state-of-the-art sensornet MAC protocols. Our experiments ...

Carlo Alberto Boano; Thiemo Voigt; Nicolas Tsiftes; Luca Mottola; Kay Rmer; Marco Antonio Ziga

2010-02-01T23:59:59.000Z

105

Data Link Switching Client Access Protocol  

Science Conference Proceedings (OSTI)

This memo describes the Data Link Switching Client Access Protocol that is used between workstations and routers to transport SNA/ NetBIOS traffic over TCP sessions. Any questions or comments should be sent to dcap@cisco.com.

S. Chiang; J. Lee; H. Yasuda

1997-02-01T23:59:59.000Z

106

Proactive key management protocol for multicast services  

Science Conference Proceedings (OSTI)

A group key management is essential scheme guaranteeing data confidentiality in multicast. To provide the strict secrecy in group communication, the rekeying delay has to be minimized. In this paper, we propose a new group key management protocol, called ...

Dong-Hyun Je; Seung-Woo Seo

2009-06-01T23:59:59.000Z

107

NREL Test-to-Failure Protocol (Presentation)  

DOE Green Energy (OSTI)

The presentation describes the test-to-failure protocol that was developed and piloted at NREL, stressing PV modules with multiple applications of damp heat (with bias) and thermal cycling until they fail.

Hacke, P.

2012-03-01T23:59:59.000Z

108

Entanglement Distillation Protocols and Number Theory  

E-Print Network (OSTI)

We show that the analysis of entanglement distillation protocols for qudits of arbitrary dimension $D$ benefits from applying basic concepts from number theory, since the set $\\zdn$ associated to Bell diagonal states is a module rather than a vector space. We find that a partition of $\\zdn$ into divisor classes characterizes the invariant properties of mixed Bell diagonal states under local permutations. We construct a very general class of recursion protocols by means of unitary operations implementing these local permutations. We study these distillation protocols depending on whether we use twirling operations in the intermediate steps or not, and we study them both analitically and numerically with Monte Carlo methods. In the absence of twirling operations, we construct extensions of the quantum privacy algorithms valid for secure communications with qudits of any dimension $D$. When $D$ is a prime number, we show that distillation protocols are optimal both qualitatively and quantitatively.

H. Bombin; M. A. Martin-Delgado

2005-03-01T23:59:59.000Z

109

Kyoto Protocol Response (Alabama) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) Kyoto Protocol Response (Alabama) < Back Eligibility Commercial Developer Fed. Government Industrial Local Government Program Info State Alabama Program Type Climate Policies Environmental Regulations Effective immediately, the Director of the Alabama Department of Environmental Management shall refrain from proposing or promulgating any new regulations intended in whole or in part to reduce emissions of greenhouse gases, as such gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors unless such reductions are required under existing statutes. In the absence of a resolution or other act of the Legislature of the State of Alabama approving same, the Director of the Alabama Department of

110

Transfer Credit Approval Form For Transfer Terms and Exchange Programs  

E-Print Network (OSTI)

Transfer Credit Approval Form For Transfer Terms and Exchange Programs CONTINUED Student/transfer term is not a Dartmouth-sponsored program. ______ The regulations for exchange/transfer terms of the COI will review my transfer term application and I may only receive Dartmouth credit for a transfer

Myers, Lawrence C.

111

Quantum Key Distribution Protocol with User Authentication  

E-Print Network (OSTI)

We propose a quantum key distribution protocol with quantum based user authentication. User authentication is executed by validating the correlation of GHZ states. Alice and Bob can distribute a secure key using the remaining GHZ states after authentication. This secret key does not leak even to the arbitrator by the properties of the entanglement. We will show that our protocol is secure against the cloning attack.

Lee, H; Lee, D; Lim, J; Yang, H J; Lee, Hwayean; Lee, Sangjin; Lee, Donghoon; Lim, Jongin; Yang, HyungJin

2005-01-01T23:59:59.000Z

112

Field Monitoring Protocol: Heat Pump Water Heaters  

SciTech Connect

This document provides a standard field monitoring protocol for evaluating the installed performance of Heat Pump Water Heaters in residential buildings. The report is organized to be consistent with the chronology of field test planning and execution. Research questions are identified first, followed by a discussion of analysis methods, and then the details of measuring the required information are laid out. A field validation of the protocol at a house near the NREL campus is included for reference.

Sparn, B.; Earle, L.; Christensen, D.; Maguire, J.; Wilson, E.; Hancock, E.

2013-02-01T23:59:59.000Z

113

The security of Ping-Pong protocol  

E-Print Network (OSTI)

Ping-Pong protocol is a type of quantum key distribution which makes use of two entangled photons in the EPR state. Its security is based on the randomization of the operations that Alice performs on the travel photon (qubit), and on the anti-correlation between the two photons in the EPR state. In this paper, we study the security of this protocol against some known quantum attacks, and present a scheme that may enhance its security to some degree.

Jian-Chuan Tan; An Min Wang

2008-08-28T23:59:59.000Z

114

Transition from Legacy Protocols to IEC 61850  

Science Conference Proceedings (OSTI)

Implementation of International Electrotechnical Commission (IEC) standard 61850, Substation Automation, within a utility is not necessarily easy or straightforward, especially when it is carried out within existing substations. During the transition, it is usually necessary to operate with both older devices supporting only legacy protocols and new, intelligent electronic devices, which now come with the IEC 61850 protocol. Both must coexist for a certain period in a substation ...

2012-12-31T23:59:59.000Z

115

Strategy for Verifying Security Protocols with Unbounded Message Size  

Science Conference Proceedings (OSTI)

We present a system for automatically verifying cryptographic protocols. This system manages the knowledge of principals and checks if the protocol is runnable. In this case, it outputs a set of rewrite rules describing the protocol itself, the strategy ... Keywords: automatic strategies, flaw detection, intruder model, security protocols, verification

Y. Chevalier; L. Vigneron

2004-04-01T23:59:59.000Z

116

Towards automated design of MAC protocols for underwater wireless networks  

Science Conference Proceedings (OSTI)

We present a framework for the automated design of MAC protocols for underwater acoustic wireless networks. We formulate a protocol optimization problem in which the exchange of control packets is explicitly modeled. A protocol optimization program generates ... Keywords: automation, mac, network, wireless underwater protocol

Volkan Rodoplu; Amir Aminzadeh Gohari; Wei Tang

2008-09-01T23:59:59.000Z

117

Fuel transfer system  

DOE Patents (OSTI)

A nuclear fuel bundle fuel transfer system includes a transfer pool containing water at a level above a reactor core. A fuel transfer machine therein includes a carriage disposed in the transfer pool and under the water for transporting fuel bundles. The carriage is selectively movable through the water in the transfer pool and individual fuel bundles are carried vertically in the carriage. In a preferred embodiment, a first movable bridge is disposed over an upper pool containing the reactor core, and a second movable bridge is disposed over a fuel storage pool, with the transfer pool being disposed therebetween. A fuel bundle may be moved by the first bridge from the reactor core and loaded into the carriage which transports the fuel bundle to the second bridge which picks up the fuel bundle and carries it to the fuel storage pool.

Townsend, Harold E. (Campbell, CA); Barbanti, Giancarlo (Cupertino, CA)

1994-01-01T23:59:59.000Z

118

Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text  

NLE Websites -- All DOE Office Websites (Extended Search)

Hydrogen Refueling Hydrogen Refueling Protocols Webinar (Text Version) to someone by E-mail Share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Facebook Tweet about Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Twitter Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Google Bookmark Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Delicious Rank Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on Digg Find More places to share Fuel Cell Technologies Office: Hydrogen Refueling Protocols Webinar (Text Version) on AddThis.com... Publications Program Publications Technical Publications Educational Publications

119

Memristive Transfer Matrices  

E-Print Network (OSTI)

An electrical analysis is performed for a memristor crossbar array integrated with operational amplifiers including the effects of parasitic or contact resistances. It is shown that the memristor crossbar array can act as a transfer matrix for a multiple input-multiple output signal processing system. Special cases of the transfer matrix are described related to reconfigurable analog filters, waveform generators, analog computing, and pattern similarity. Keywords: transfer matrix, memristor, analog electronics, crossbar, operational amplifier, reconfigurable electronics

Mouttet, Blaise

2010-01-01T23:59:59.000Z

120

NREL: Technology Transfer - About Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

About Technology Transfer About Technology Transfer Through technology partnerships, NREL seeks to reduce private sector risk and enable investment in the adoption of renewable energy and energy efficiency technologies. The transfer of these technologies to the marketplace helps displace oil, reduce carbon emissions, and increase U.S. industry competitiveness. Principles NREL develops and implements technology partnerships based on the standards established by the following principles: Balancing Public and Private Interest Form partnerships that serve the public interest and advance U.S. Department of Energy goals. Demonstrate appropriate stewardship of publicly funded assets, yielding national benefits. Provide value to the commercial partner. Focusing on Outcomes Develop mutually beneficial collaborations through processes, which are

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Technology Transfer: About the Technology Transfer Department  

NLE Websites -- All DOE Office Websites (Extended Search)

About the Technology Transfer and Intellectual Property Management About the Technology Transfer and Intellectual Property Management Department The Technology Transfer Department helps move technologies from the Lab to the marketplace to benefit society and the U. S. economy. We accomplish this through developing and managing an array of partnerships with the private and public sectors. What We Do We license a wide range of cutting-edge technologies to companies that have the financial, R & D, manufacturing, marketing, and managerial capabilities to successfully commercialize Lab inventions. In addition, we manage lab-industry research partnerships, ensure that inventions receive appropriate patent or copyright protection, license technology to start-up companies, distribute royalties to the Lab and to inventors and serve as

122

A class-chest for deriving transport protocols  

SciTech Connect

Development of new transport protocols or protocol algorithms suffers from the complexity of the environment in which they are intended to run. Modeling techniques attempt to avoid this by simulating the environment. Another approach to promoting rapid prototyping of protocols and protocol algorithms is to provide a pre-built infrastructure that is common to transport protocols, so that the focus is placed on the protocol-specific aspects. The Meta-Transport Library is a library of C++ base classes that implement or abstract out the mundane functions of a protocol, new protocol implementations are derived from base classes. The result is a fully viable user- level transport protocol implementation, with emphasis on modularity. The collection of base classes form a ``class-chest`` of tools .from which protocols can be developed and studied with as little change to a normal UNIX environment as possible.

Strayer, W.T.

1996-10-01T23:59:59.000Z

123

Partnerships and Technology Transfer  

Economic Development Overview. ORNL's Partnerships Staff works with a number of partners in the region, State, and across the nation to help transfer ORNL-developed ...

124

MATERIALS TRANSFER AGREEMENT  

NLE Websites -- All DOE Office Websites (Extended Search)

MTAXX-XXX 1 MATERIAL TRANSFER AGREEMENT for Manufacturing Demonstration Facility and Carbon Fiber Technology Facility In order for the RECIPIENT to obtain materials, the RECIPIENT...

125

Jefferson Lab Technology Transfer  

This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? Technology Transfer.

126

Convection Heat Transfer  

Science Conference Proceedings (OSTI)

...Heat-Transfer Equations, Fundamentals of Modeling for Metals Processing, Vol 22A, ASM Handbook, ASM International, 2009, p 625??658...

127

Heat transfer dynamics  

Science Conference Proceedings (OSTI)

As heat transfer technology increases in complexity, it becomes more difficult for those without thermal dynamics engineering training to choose between competitive heat transfer systems offered to meet their drying requirements. A step back to the basics of heat transfer can help professional managers and papermakers make informed decisions on alternative equipment and methods. The primary forms of heat and mass transfer are reviewed with emphasis on the basics, so a practical understanding of each is gained. Finally, the principles and benefits of generating infrared energy by combusting a gaseous hydrocarbon fuel are explained.

Smith, T.M. (Marsden, Inc., Pennsauken, NJ (United States))

1994-08-01T23:59:59.000Z

128

Facility Survey & Transfer  

Energy.gov (U.S. Department of Energy (DOE))

As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning.

129

Technology Transfer: For Industry  

NLE Websites -- All DOE Office Websites (Extended Search)

Available Technologies Licensing Berkeley Lab Technologies Partnering with Berkeley Lab Contact Us Receive Customized Tech Alerts Tech Transfer Site Map Last updated: 09172009...

130

NETL: Technology Transfer - DOE  

Home > Technology Transfer. ... and cheaper to design future power plants. ... we welcome the opportunity to build mutually beneficial partnerships with industry, ...

131

NREL: Technology Transfer - Contacts  

National Renewable Energy Laboratory Technology Transfer Contacts. Here you'll find contact information and resources to help answer any questions you may have about ...

132

SRNL - Technology Transfer - Ombudsman  

... complete fairness in the transfer of federally funded technologies into the marketplace for the benefit of the U.S. economy.

133

The queue protocol: a deadlock-free, homogeneous, non-two-phase locking protocol  

Science Conference Proceedings (OSTI)

The M-pitfall protocol (MPP) is the most general homogeneous non-two-phase locking protocol which supports shared and exclusive locks. It has two major disadvantages: it is not deadlock-free and it has the paradoxical property that concurrency is often ...

Udo Kelter

1988-03-01T23:59:59.000Z

134

Interpolation of recurrence and hashing entanglement distillation protocols  

E-Print Network (OSTI)

We construct new entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method how entanglement-assisted distillation protocols can be converted into non-entanglement-assisted protocols with the same yield.

Karl Gerd H. Vollbrecht; Frank Verstraete

2004-04-20T23:59:59.000Z

135

Interpolation of recurrence and hashing entanglement distillation protocols  

Science Conference Proceedings (OSTI)

We construct interesting entanglement distillation protocols by interpolating between the recurrence and hashing protocols. This leads to asymptotic two-way distillation protocols, resulting in an improvement of the distillation rate for all mixed Bell diagonal entangled states, even for the ones with very high fidelity. We also present a method for how entanglement-assisted distillation protocol can be converted into nonentanglement-assisted protocols with the same yield.

Vollbrecht, Karl Gerd H.; Verstraete, Frank [Max-Planck-Institut fuer Quantenoptik, Hans-Kopfermann-Str. 1, D-85748 Garching (Germany)

2005-06-15T23:59:59.000Z

136

Knowledge transfer frameworks  

Science Conference Proceedings (OSTI)

While theories abound concerning knowledge transfer in organisations, little empirical work has been undertaken to assess any possible relationship between repositories of knowledge and those responsible for the use of knowledge. This paper develops ... Keywords: hybrid approach, knowledge administration, knowledge management, knowledge storage, knowledge transfer framework

Sajjad M Jasimuddin; Nigel Connell; Jonathan H Klein

2012-05-01T23:59:59.000Z

137

Routing Protocols to Maximize Battery Efficiency  

E-Print Network (OSTI)

In this paper we propose a routing protocol for wireless ad hoc networks whose nodes are largely battery powered. The battery capacity of the nodes is viewed as a common resource of the system and its use is to be optimized. Results from a previous study on battery management have shown that: (1) pulsed current discharge outperforms constant current discharge, (2) battery capacity can be improved by using a bursty discharge pattern due to charge recovery effects that take place during idle periods, (3) given a certain value of current drawn off the battery, higher current impulses degrade battery performance, even if the percentage of higher current impulses is relatively small. We develop a network protocol based on these findings. This protocol favors routes whose links have a low energy cost. We also distribute multihop traffic in a manner that allows all nodes a good chance to recover their battery energy reserve.

Carla F. Chiasserini; Ramesh R. Rao

2000-01-01T23:59:59.000Z

138

Multinucleon transfer reactions  

SciTech Connect

The development of higher energies and better resolution in heavy-ion beams has led to a resurgence of interest in transfer reactions at energies well above the Coulomb barrier. Direct reactions with heavy ions are discussed in some detail. Heavy-ion reactions open up the possibility of new methods of spectroscopy, e.g., elastic transfer. Differential cross sections for heavy-ion ' transfer reactions are often featureless; however, some data show diffractive effects. The high angular momenta associated with recoil effects in heavy-ion reactions can be exploited to perform selective spectroscopy on light nuclei. Although most heavy-iontransfer data suggest that reactions proceed in a direct fashion, recent experiments indicate the presence of second-order multistep processes. Correlated nucleon transfer and transfer of many nucleons (e.g., (12C, alpha )) are also being investigated. (20 figures, 3 tables, 93 references) (RWR)

Scott, D.K.

1973-08-01T23:59:59.000Z

139

Transfers | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transfers Transfers Transfers Transfer means a change of an employee, from one Federal government branch (executive, legislative, judicial) to another or from one agency to another without a break in service of 1 full work day. Below are a few tips to better assist you when you transer agencies: If you have any dependents you must complete a standard Form 2809 during new employee orientation as this information does not transfer over automatically. You will not be able to change your coverage until open season or a life changing event occurs. At the time of new employee orientation you must provide your most recent leave and earning statement (LES) so that your leave may be updated accordingly. If you do not provide us with this document it will take approximately 6 weeks before your annual and sick leave is updated.

140

Data Transfer Examples  

NLE Websites -- All DOE Office Websites (Extended Search)

» Data Transfer Examples » Data Transfer Examples Data Transfer Examples Moving data to Projectb Projectb is where data should be written from jobs running on the cluster or Gpints. There are intermediate files or bad results from a run that didn't work out that don't need to be saved. By running these jobs in the SCRATCH areas, these files will be deleted for you by the puge. If you run in the SANDBOX, you will have to clean up after yourselves. Batch Scheduled Transfers Use any queues to schedule jobs that move data to Projectb. A basic transfer script is here: kmfagnan@genepool12 ~ $ cat data_to_projb.sh #!/bin/bash -l #$ -N data2projb /projectb/scratch// kmfagnan@genepool12 ~ $ qsub data_to_projb.sh

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Technology transfer 1994  

SciTech Connect

This document, Technology Transfer 94, is intended to communicate that there are many opportunities available to US industry and academic institutions to work with DOE and its laboratories and facilities in the vital activity of improving technology transfer to meet national needs. It has seven major sections: Introduction, Technology Transfer Activities, Access to Laboratories and Facilities, Laboratories and Facilities, DOE Office, Technologies, and an Index. Technology Transfer Activities highlights DOE`s recent developments in technology transfer and describes plans for the future. Access to Laboratories and Facilities describes the many avenues for cooperative interaction between DOE laboratories or facilities and industry, academia, and other government agencies. Laboratories and Facilities profiles the DOE laboratories and facilities involved in technology transfer and presents information on their missions, programs, expertise, facilities, and equipment, along with data on whom to contact for additional information on technology transfer. DOE Offices summarizes the major research and development programs within DOE. It also contains information on how to access DOE scientific and technical information. Technologies provides descriptions of some of the new technologies developed at DOE laboratories and facilities.

1994-01-01T23:59:59.000Z

142

Secure SCADA Communication ProtocolPerformance Test Results | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SCADA Communication ProtocolPerformance Test Results SCADA Communication ProtocolPerformance Test Results Secure SCADA Communication ProtocolPerformance Test Results The Pacific Northwest National Laboratory (PNNL) was tasked to evaluate the cryptographic implementation and performance impact of the Secure SCADA Communication Protocol (SSCP) upon supervisory control and data acquisition (SCADA) communications. This report presents performance test data derived from proof of concept implementations of the SSCP. Secure SCADA Communication Protocol Performance Test Results More Documents & Publications AGA-12, Part 2 Performance Test Results AGA 12, Part 2 Performance Test Plan Hallmark Project Commercialization of the Secure SCADA Communications Protocol, a cryptographic security solution for device-to-device

143

Protocol, Small Team Oversight Activities - June 2012 | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Small Team Oversight Activities - June 2012 Small Team Oversight Activities - June 2012 Protocol, Small Team Oversight Activities - June 2012 June 2012 Protocol for Small Team Oversight Activities The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing an Office of Health, Safety and Security (HSS) small team oversight activity. These activities are the primary means of gathering independent performance data to support the independent oversight function. This protocol further discusses and categorizes these activities as oversight and operational awareness activities. Protocol, Small Team Oversight Activities - June 2012 More Documents & Publications Protocol, Site Leads - May 2011 Independent Oversight Assessment, Waste Treatment and Immobilization Plant

144

https://pals.doe.gov/rptserver.asp  

NLE Websites -- All DOE Office Websites (Extended Search)

Current FY 2013 Annualized CR FY 2014 Request Laboratory Table 50 Naval Petroleum and Oil Shale Reserves Naval Petroleum and Oil Shale Reserves Productions Operations 8,827 3,315...

145

https://pals.doe.gov/rptserver.asp  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1 1 Department of Energy FY 2014 Congressional Budget Request Laboratory Tables y Preliminary April 2013 Office of Chief Financial Officer DOE/CF-0091 Department of Energy FY 2014 Congressional Budget Request Laboratory Tables P li i Preliminary The numbers depicted in this document represent the gross level of DOE budget authority for the years displayed. The figures include both the discretionary and mandatory funding in the budget They do not consider The figures include both the discretionary and mandatory funding in the budget. They do not consider revenues/receipts, use of prior year balances, deferrals, rescissions, or other adjustments appropriated as offsets to the DOE appropriations by the Congress. FY 2013 amounts shown reflect the P.L. 112 175 continuing resolution level annualized to a full year. These

146

Self-Protecting Session Initiation Protocol Stack  

Science Conference Proceedings (OSTI)

We present the Self-Protecting Session Initiation Protocol Stack capable of recognizing malicious SIP messages and protecting itself in high-load conditions. The stack model is based on the two-step processing and uses hash lookup tables and cellular ... Keywords: Cellular automata, Denial of Service, SIP, Self-protecting

Zoran Rusinovic; Nikola Bogunovic

2008-09-01T23:59:59.000Z

147

On communication protocols for tactical navigation assistance  

Science Conference Proceedings (OSTI)

Using tactical navigation systems is popular for military as well as search and rescue applications. For such applications, the significance of the tactical navigation systems arises especially when groups with the same goal move together on the terrain. ... Keywords: C-TRAMAF, Gossip-based ad hoc routing, N-Gossip, communication protocols, cross layer, digital battlefield, tactical navigation

Evren Onem; H. Birkan Yilmaz; Fatih Alagz; Tuna Tugcu

2008-02-01T23:59:59.000Z

148

Measurement Protocols for Optimized Fuel Assembly Tags  

Science Conference Proceedings (OSTI)

This report describes the measurement protocols for optimized tags that can be applied to standard fuel assemblies used in light water reactors. This report describes work performed by the authors at Pacific Northwest National Laboratory for NA-22 as part of research to identify specific signatures that can be developed to support counter-proliferation technologies.

Gerlach, David C.; Mitchell, Mark R.; Reid, Bruce D.; Gesh, Christopher J.; Hurley, David E.

2008-11-01T23:59:59.000Z

149

Power-Save Protocols Corey Andalora  

E-Print Network (OSTI)

rate, etc. Outputs Average routing time per packet Overall power consumption of network #12;Project-84, July 2001. #12;BECA Nodes independently transition to the idle state and back to the sleep state. WhenOff By One Power-Save Protocols Corey Andalora Keith Needels #12;Agenda Topic explanation Problem

Kaminsky, Alan

150

Test Purpose Generation for Timed Protocol Testing  

Science Conference Proceedings (OSTI)

Test purposes are requirements, usually constructed by hand, which aim at testing critical properties on implementations. These ones are then used by testing methods to generate test cases. Writing them manually is a heavy task, this is why we propose ... Keywords: Timed protocols, conformance testing, test purpose, testability

Sbastien Salva; Antoine Rollet

2009-07-01T23:59:59.000Z

151

Interaction protocols for cross-organisational workflows  

Science Conference Proceedings (OSTI)

Workflow technologies are widely used in industry and commerce to assist in the specification, execution and completion of well defined processes within organisations. As industrial and commercial relations have evolved, based on advances on information ... Keywords: Cross-organisational workflows, Hierarchical Petry nets, Interaction protocols, Knowledge-based systems, Workflow integration

FlVio Soares CorrA Da Silva; Mirtha Lina FernNdez Venero; Diego Mira David; Mohammad Saleem; Paul W. H. Chung

2013-01-01T23:59:59.000Z

152

Calibrating embedded protocols on asynchronous systems  

Science Conference Proceedings (OSTI)

Embedding is a method of projecting one topology into another. In one-to-one node embedding, paths in the target topology correspond to links in the original topology. A protocol running on the original topology can be modified to be executed on a target ... Keywords: Asynchronous system, Channel system, Distributed system, Fault tolerance, Graph embedding, Transient fault, Virtual topology

Yukiko Yamauchi; Doina Bein; Toshimitsu Masuzawa; Linda Morales; I. Hal Sudborough

2010-05-01T23:59:59.000Z

153

Community-Aware Scheduling Protocol for Grids  

Science Conference Proceedings (OSTI)

Much work has been done to exploit the effectiveness and efficiency of job scheduling upon distributed computationalresources. With regard to existing resource topology and administrative constraints, scheduling approaches are designed ... Keywords: Community-Aware Scheduling Protocol, CASP, Grid, Scheduling, SmartGRID, MaGate

Ye Huang; Amos Brocco; Nik Bessis; Pierre Kuonen; Beat Hirsbrunner

2010-04-01T23:59:59.000Z

154

A Simulation Model of the DOCSIS Protocol  

Science Conference Proceedings (OSTI)

The number of households and businesses using hybrid fiber coaxial cable networks for Internet access is rapidly approaching 40 million in the United States. The cable industry has standardized on a single medium access control (MAC) and physical layer ... Keywords: Data Over Cable Service Interface Specification (DOCSIS), Simulation methods, Transmission Control Protocol (TCP) performance, broadband access, hybrid fiber coaxial cable networks

Jim Martin; James Westall

2007-02-01T23:59:59.000Z

155

Symbolic protocol analysis for monoidal equational theories  

Science Conference Proceedings (OSTI)

We are interested in the design of automated procedures for analyzing the (in)security of cryptographic protocols in the Dolev-Yao model for a bounded number of sessions when we take into account some algebraic properties satisfied by the operators involved ...

Stphanie Delaune; Pascal Lafourcade; Denis Lugiez; Ralf Treinen

2008-02-01T23:59:59.000Z

156

Russia's role in the Kyoto Protocol  

E-Print Network (OSTI)

As a result of the allocation of emissions reductions, and the differential willingness of countries to ratify, it turns out that Russia is a central player in the Kyoto Protocol. With the U.S. out and Japan and the EU ...

Bernard, Alain.

157

NREL: Technology Transfer - Ombuds - National Renewable Energy ...  

National Renewable Energy Laboratory Technology Transfer Technology Transfer Ombuds. NREL's Technology Transfer Ombuds offers an informal process to ...

158

ITL Staff Members Receive Tech Transfer Award  

Science Conference Proceedings (OSTI)

ITL Staff Members Receive Tech Transfer Award. ... Regional "Excellence in Technology Transfer" Award for ... the process of transferring a technology ...

2010-10-05T23:59:59.000Z

159

Developmental issues in environmental reporting protocols  

SciTech Connect

In this paper, we review the policy differences and associated reporting and verification protocols between three energy and/or environmental reporting programs in the United States, specifically the Conservation Verification Protocols (CVP) - a voluntary set of procedures for reporting acid rain reductions from energy conservation, the Greenhouse Gas Voluntary Reporting Program (GGVRP) to acknowledge greenhouse gas-reducing activities, and a national database on energy efficiency programs (DEEP) an informational database on utility demand-side management (DSM) programs. The most important lesson learned in developing these reporting programs is that the accuracy of the program for reporting energy savings activities is dependent upon both the estimation and verification protocols used in the program and the mapping procedures used to generate emission impacts from energy savings. Additionally, the types of protocols that may be used in the program depend upon who is participating in the program. The free market can also be a useful tool in determining how much money reporting entities want to spend on energy savings and emissions reductions estimation and verification protocols by placing a dollar value on atmospheric emissions. After such programs are implemented, the program managers should ensure that an iterative, quality control process is utilized. The reporters of such information must be made aware that their numbers will be reviewed carefully and will be questioned for accuracy. Finally, the accuracy and confidence of the reported information should be reviewed on a periodic basis to ensure that the goals and expectations of the program and the reporting entities are being met.

Schrock, D.W.; Stoops, J.L. [Pacific Northwest Lab., Richland, WA (United States); Meier, A.K.; Vine, E.L. [Lawrence Berkeley Lab., CA (United States); Solomon, B.D. [Environmental Protection Agency (United States)

1994-08-01T23:59:59.000Z

160

Multiscale photosynthetic exciton transfer  

E-Print Network (OSTI)

Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest s...

Ringsmuth, A K; Stace, T M; 10.1038/nphys2332

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Transfer reactions at ATLAS  

NLE Websites -- All DOE Office Websites (Extended Search)

Transfer reactions before, and with, HELIOS Or - "...seems like an awful lot of work just to do (d,p)..." Congratulations ATLAS Happy 25 th Prologue: Long before ATLAS... 11...

162

Technology Transfer: Success Stories  

NLE Websites -- All DOE Office Websites (Extended Search)

Lawrence Berkeley National Laboratory masthead A-Z Index Berkeley Lab masthead U.S. Department of Energy logo Phone Book Jobs Search Tech Transfer Tech Index For Industry For...

163

VOLUNTARY LEAVE TRANSFER PROGRAM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VOLUNTARY LEAVE TRANSFER PROGRAM VOLUNTARY LEAVE TRANSFER PROGRAM (Eligible employees are listed at the end of this narrative) Under the Voluntary Leave Transfer Program you can apply, based on a medical emergency, to receive annual leave donated by other employees. A medical emergency is generally defined as a medical condition of the employee or family member that is likely to keep you (the employee) away from work and cause a loss of pay of at least 24 hours. You are required to submit an Office of Personnel Management (OPM) Form 630, Application to Become A Leave Recipient Under the Voluntary Leave Transfer Program, through your supervisor to be considered for the program. The application must include an explanation of the reason the donation is needed (including a brief description of the

164

Technology Transfer Summit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Agenda as of April 9, 2012 Agenda as of April 9, 2012 Technology Transfer Summit April 16, 2012 IMC - Trinity Ballroom 4 8:00 - 8:10 Welcome & Introduction Pete Tseronis, DOE Chief Technology Officer 8:10 - 8:50 Accelerating Transfer Within an Innovation Ecosystem Debra M. Amidon, Founder and Chief Strategist, ENTOVATION International, and Author, The Innovation SuperHighway 8:50 - 9:20 Tech Transfer - Predicaments, Perplexities, and Possible Panaceas Rex Northen, Executive Director, Cleantech Open 9:20 - 9:50 A Systems Approach to Innovation Mike Schwenk, Vice President and Director Technology Deployment and Outreach, Pacific Northwest National Laboratory (PNNL) 9:50 - 10:15 DOE's Online Tech Transfer Ecosystem - aka...Stop Building Moai! Robert Bectel, Senior Policy Advisor / Chief Technology Officer

165

Jefferson Lab Technology Transfer - JLab  

What is Technology Transfer at Jefferson Lab? The transfer of technology (intellectual property) developed at JLab to the private sector is an important element of ...

166

Technology Transfer Awards 2012  

Science Conference Proceedings (OSTI)

EPRI's 2012 Technology Transfer Awards recognize the leaders and the innovators who have transferred research into applied results. The 2012 award winners have shown exceptional application of EPRI research and technology to solve a problem of size and significance, to champion a technology both within their companies and across the industry, to drive progress in the electricity sector, and to provide meaningful benefits for stakeholders and for society.

2013-01-23T23:59:59.000Z

167

Multiscale photosynthetic exciton transfer  

E-Print Network (OSTI)

Photosynthetic light harvesting provides a natural blueprint for bioengineered and biomimetic solar energy and light detection technologies. Recent evidence suggests some individual light harvesting protein complexes (LHCs) and LHC subunits efficiently transfer excitons towards chemical reaction centers (RCs) via an interplay between excitonic quantum coherence, resonant protein vibrations, and thermal decoherence. The role of coherence in vivo is unclear however, where excitons are transferred through multi-LHC/RC aggregates over distances typically large compared with intra-LHC scales. Here we assess the possibility of long-range coherent transfer in a simple chromophore network with disordered site and transfer coupling energies. Through renormalization we find that, surprisingly, decoherence is diminished at larger scales, and long-range coherence is facilitated by chromophoric clustering. Conversely, static disorder in the site energies grows with length scale, forcing localization. Our results suggest sustained coherent exciton transfer may be possible over distances large compared with nearest-neighbour (n-n) chromophore separations, at physiological temperatures, in a clustered network with small static disorder. This may support findings suggesting long-range coherence in algal chloroplasts, and provides a framework for engineering large chromophore or quantum dot high-temperature exciton transfer networks.

A. K. Ringsmuth; G. J. Milburn; T. M. Stace

2012-06-14T23:59:59.000Z

168

Configuring Networks and Devices with Simple Network Management Protocol (SNMP)  

Science Conference Proceedings (OSTI)

This document is written for readers interested in the Internet Standard Management Framework and its protocol, the Simple Network Management Protocol (SNMP). In particular, it offers guidance in the effective use of SNMP for configuration management. ...

M. MacFaden; D. Partain; J. Saperia; W. Tackabury

2003-04-01T23:59:59.000Z

169

Teapot: language support for writing memory coherence protocols  

Science Conference Proceedings (OSTI)

Recent shared-memory parallel computer systems offer the exciting possibility of customizing memory coherence protocols to fit an application's semantics and sharing patterns. Custom protocols have been used to achieve message-passing performance---while ...

Satish Chandra; Brad Richards; James R. Larus

1996-05-01T23:59:59.000Z

170

A compositional logic for proving security properties of protocols  

Science Conference Proceedings (OSTI)

We present a logic for proving security properties of protocols that use nonces (randomly generated numbers that uniquely identify a protocol session) and public-key cryptography. The logic, designed around a process calculus with actions for each possible ...

Nancy Durgin; John Mitchell; Dusko Pavlovic

2003-07-01T23:59:59.000Z

171

Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol  

NLE Websites -- All DOE Office Websites (Extended Search)

DOE Webinar Light Duty Fuel Cell Electric Vehicle Hydrogen Fueling Protocol U.S. DOE WEBINAR ON H2 FUELING PROTOCOLS: PARTICIPANTS Rob Burgess Moderator Jesse Schneider TIR J2601,...

172

Quorum-Oriented Multicast Protocols for Data Replication  

E-Print Network (OSTI)

this paper we have presented a family of quorum multicast protocols, called naive, reschedule, retry, and count. We have shown that these protocols provide good availability while using fewer messages and requiring less latency than a simple multicast

H. Garcia-molina; Darrell Long; Richard A. Golding; R. M. Metcalfe

1991-01-01T23:59:59.000Z

173

Exploring Virtual Network Selection Algorithms in DSM Cache Coherence Protocols  

E-Print Network (OSTI)

lines in the modified state. In a home-based directory protocol, every cache line is assigned a home

Heinrich, Mark

174

Quantum state transfer through a spin chain in a multiexcitation subspace  

SciTech Connect

We investigate the quality of quantum state transfer through a uniformly coupled antiferromagnetic spin chain in a multiexcitation subspace. The fidelity of state transfer using multiexcitation channels is found to compare well with communication protocols based on the ground state of a spin chain with ferromagnetic interactions. Our numerical results support the conjecture that the fidelity of state transfer through a multiexcitation subspace only depends on the number of initial excitations present in the chain and is independent of the excitation ordering. Based on these results, we describe a communication scheme which requires little effort for preparation.

Wang, Zhao-Ming [Department of Physics, Ocean University of China, Qingdao; Ma, Rui-Song [Institute of Physics, Chinese Academy of Sciences, Beijing 100190, China; Bishop, Clifford A [ORNL; Gu, Yong-Jian [Department of Physics, Ocean University of China, Qingdao

2012-01-01T23:59:59.000Z

175

Using CSP for protocol analysis: the Needham-Schroeder  

E-Print Network (OSTI)

Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol Steve Schneider Royal approach for analysis and veri cation of authentication properties in CSP. It is illustrated to the analysis of authentication protocols, built on top of the general CSP semantic framework. This approach

Doran, Simon J.

176

RFID authentication protocol for low-cost tags  

Science Conference Proceedings (OSTI)

In this paper, we investigate the possible privacy and security threats to RFID systems, and consider whether previously proposed RFID protocols address these threats. We then propose a new authentication protocol which provides the identified privacy ... Keywords: privacy, rfid authentication protocol, security

Boyeon Song; Chris J. Mitchell

2008-03-01T23:59:59.000Z

177

A lightweight, high performance communication protocol for grid computing  

Science Conference Proceedings (OSTI)

This paper describes a lightweight, high-performance communication protocol for the high-bandwidth, high-delay networks typical of computational Grids. One unique feature of this protocol is that it incorporates an extremely accurate classification mechanism ... Keywords: Bayesian analysis, Classification mechanisms, Grid computing, High-performance communication protocols, High-performance networking

Phillip M. Dickens

2010-03-01T23:59:59.000Z

178

ATM Forum signalling protocols and their interworking  

Science Conference Proceedings (OSTI)

The ATM Forum is a key body which has been developing specifications for asynchronous transfer mode (ATM) technology over the past six years. It has produced a number of signalling specifications covering the user network interface, the inter-carrier ...

N. J. P. Cooper

1998-04-01T23:59:59.000Z

179

Protocol for laboratory research on degradation, interaction, and fate of wastes disposed by deep-well injection: Final report  

Science Conference Proceedings (OSTI)

The objective of this research investigation was to develop a laboratory protocol for use in determining degradation, interaction, and fate of organic wastes disposed in deep subsurface reservoirs via disposal wells. Knowledge of the ultimate fate of deep-well disposed wastes is important because provisions of the Resource Conservation and Recovery Act (RCRA) require that by August 1988, the Environmental Protection Agency (EPA) must show that the disposal of specified wastes by deep-well injection is safe to human health and the environment, or the practice must be stopped. The National Institute for Petroleum and Energy Research (NIPER) developed this protocol primarily by transferring some of its expertise and knowledge of laboratory protocol relevant to improved recovery of petroleum. Phenol, because it is injected into deep, subsurface reservoirs for disposal, was selected for study by the EPA. Phenol is one waste product that has been injected into the Frio formation; therefore, a decision was made to use phenol and sedimentary rock from the Frio formation for a series of laboratory experiments to demonstrate the protocol. This study investigates the adsorption properties of a specific reservoir rock which is representative of porous sedimentary geologic formations used as repositories for hazardous organic wastes. The developed protocol can be used to evaluate mobility, adsorption, and degradation of an organic hazardous waste under simulated subsurface reservoir conditions. 22 refs., 13 figs., 16 tabs.

Collins, A.G.; Crocker, M.E.

1987-12-01T23:59:59.000Z

180

Investigating the limits of randomized benchmarking protocols  

E-Print Network (OSTI)

In this paper, we analyze the performance of randomized benchmarking protocols on gate sets under a variety of realistic error models that include systematic rotations, amplitude damping, leakage to higher levels, and 1/f noise. We find that, in almost all cases, benchmarking provides better than a factor-of-two estimate of average error rate, suggesting that randomized benchmarking protocols are a valuable tool for verification and validation of quantum operations. In addition, we derive new models for fidelity decay curves under certain types of non-Markovian noise models such as 1/f and leakage errors. We also show that, provided the standard error of the fidelity measurements is small, only a small number of trials are required for high confidence estimation of gate errors.

Jeffrey M. Epstein; Andrew W. Cross; Easwar Magesan; Jay M. Gambetta

2013-08-13T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Building America House Simulation Protocols (Revised)  

Science Conference Proceedings (OSTI)

The House Simulation Protocol document was developed to track and manage progress toward Building America's multi-year, average whole-building energy reduction research goals for new construction and existing homes, using a consistent analytical reference point. This report summarizes the guidelines for developing and reporting these analytical results in a consistent and meaningful manner for all home energy uses using standard operating conditions.

Hendron, R.; Engebrecht, C.

2010-10-01T23:59:59.000Z

182

View-Oriented Update Protocol with Integrated Diff for View-based Consistency  

E-Print Network (OSTI)

with a traditional diff-based protocol and an existing home-based protocol. Experimen- tal results demonstrate the performance of the proposed protocol is significantly better than the diff-based protocol and the home-based

Werstein, Paul

183

Partnerships and Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

Cooperative Research and Development Agreement Cooperative Research and Development Agreement visualization scientist A Cooperative Research and Development Agreement (CRADA) is a mechanism whereby non-federal entities (industry, universities, non-profits, etc.) can collaborate with federal laboratories on research and development projects. CRADAs are specifically technology transfer agreements; technologies developed under CRADAs are expected to be transferred to the private sector for commercial exploitation, either by the non-federal partner or another licensee of such technologies. CRADAs were authorized by the Stevenson-Wydler Technology Innovation Act of 1980 (Public Law 96-480); the authority for government-owned, contractor-operated laboratories such as ORNL to enter into CRADAs was granted by the National Competitiveness Technology Transfer Act of 1989

184

NREL: Technology Transfer - Webmaster  

NLE Websites -- All DOE Office Websites (Extended Search)

Webmaster Webmaster To report any problems on or ask a question about the NREL Technology Transfer Web site, you may contact the Webmaster using the online form below. If you have a question or concern that's not related to this Web site, please see our list of contacts for assistance. To contact the Webmaster, please provide your name, e-mail address, and message below. When you are finished, click "Send Message." NOTE: If you enter your e-mail address incorrectly, we will be unable to reply. Your name: Your email address: Your message: Send Message Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News

185

NREL: Technology Transfer - Ombuds  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Transfer Ombuds Technology Transfer Ombuds NREL's Technology Transfer Ombuds offers an informal process to help resolve issues and concerns regarding the laboratory's technology partnership, patent, and licensing activities. As a designated neutral party, our ombuds provides confidential, resolution-focused services. Through the ombuds process, we encourage collaborative techniques such as mediation to facilitate the speedy and low-cost resolution of complaints and disputes, when appropriate. The NREL Ombuds does not: Handle contract negotiation or other legal issues Act as a decision maker or draw conclusions Investigate or make formal recommendations on findings of fact. The ombuds also does not replace, override, or influence formal review or appeal mechanisms, or serve as an intermediary when legal action is

186

Technology Transfer: Available Technologies  

NLE Websites -- All DOE Office Websites (Extended Search)

Software and Information Technologies Software and Information Technologies Algorithm for Correcting Detector Nonlinearites Chatelet: More Accurate Modeling for Oil, Gas or Geothermal Well Production Collective Memory Transfers for Multi-Core Processors Energy Efficiency Software EnergyPlus:Energy Simulation Software for Buildings Tools, Guides and Software to Support the Design and Operation of Energy Efficient Buildings Flexible Bandwidth Reservations for Data Transfer Genomic and Proteomic Software LABELIT - Software for Macromolecular Diffraction Data Processing PHENIX - Software for Computational Crystallography Vista/AVID: Visualization and Allignment Software for Comparative Genomics Geophysical Software Accurate Identification, Imaging, and Monitoring of Fluid Saturated Underground Reservoirs

187

Technology transfer issue  

Science Conference Proceedings (OSTI)

Testimony by Lawrence J. Brady, Commerce Assistant Secretary for Trade Administration, at Congressional hearings on the national security issues of technology transfers to the Soviet Union identified steps the US needs to take to deal effectively with the problem. These steps include an understanding of how the Soviet Union has and will benefit militarily by acquiring Western technology and efforts to work with other countries, counterintelligence agencies, and industries to stem the flow of technological information. Brady outlined changes in technology development that complicate the enforcement of transfer rules, and emphasized the importance of a close relationship between the business community and the Commerce Department. (DCK)

Jacobson, C.

1982-05-31T23:59:59.000Z

188

Applied heat transfer  

Science Conference Proceedings (OSTI)

Heat transfer principles are discussed with emphasis on the practical aspects of the problems. Correlations for heat transfer and pressure drop from several worldwide sources for flow inside and outside of tubes, including finned tubes are presented, along with design and performance calculations of heat exchangers economizers, air heaters, condensers, waste-heat boilers, fired heaters, superheaters, and boiler furnaces. Vibration analysis for tube bundles and heat exchangers are also discussed, as are estimating gas-mixture properties at atmospheric and elevated pressures and life-cycle costing techniques. (JMT)

Ganapathy, V.

1982-01-01T23:59:59.000Z

189

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

190

Building Technologies Office: Open-Protocol Platform for Commercial  

NLE Websites -- All DOE Office Websites (Extended Search)

Open-Protocol Platform Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project to someone by E-mail Share Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Facebook Tweet about Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Twitter Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Google Bookmark Building Technologies Office: Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Research Project on Delicious Rank Building Technologies Office: Open-Protocol Platform for

191

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared  

E-Print Network (OSTI)

Lazy Home-Based Protocol: Combining Homeless and Home-Based Distributed Shared Memory Protocols. The protocol com- bines the advantages of homeless and home-based protocols. During lock synchronization a home-based page-based memory update using the invalidation coherence protocol. The protocol is called

Werstein, Paul

192

SRNL - Technology Transfer - Ombudsman  

NLE Websites -- All DOE Office Websites (Extended Search)

Ombudsman Ombudsman Ombudsman Program Policy The Department of Energy and its management and operating contractors (M & O Contractors) engaging in technology partnership activities, share a mutual objective to ensure complete fairness in the transfer of federally funded technologies into the marketplace for the benefit of the U.S. economy. This includes an interest in open lines of communication and the early identification of issues, complaints and disputes between contractors and their existing or potential partners. The Technology Transfer Ombudsman Program provides an independent point of contact for concerns about technology transfer i SRS Sign ssues, complaints and disputes. The mission of the Ombudsman Program is to elevate to the appropriate SRNS officials the information needed to identify and resolve problems thereby improving satisfaction with SRNS practices and reducing the occasion for formal disputes and litigation. The Ombudsman will not be involved in the merits of cases that are the subject of ongoing dispute resolution or litigation, or investigation incidents thereto. The Ombudsman is not established to be a super-administrator, re-doing what specialized officials have already done. Rather, the Ombudsman is to ensure that appropriate SRNS officials consider all pertinent information when deciding the company's position on a technology transfer complaint. To request forms or acquire additional information contact: Michael Wamstad, 803-725-3751 or mike.wamstad@srs.gov.

193

FACILITY SURVEY & TRANSFER Facility Survey & Transfer Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SURVEY & TRANSFER SURVEY & TRANSFER Facility Survey & Transfer Overview Transfer Activities Checklist Pre-Survey Information Request Survey Report Content Detailed Walkdown Checklist Walkdown Checklist Clipboard Aids S & M Checklist Survey Report Example - Hot Storage Garden Survey Report Example - Tritium System Test Assembly Survey Report Example - Calutron Overview As DOE facilities become excess, many that are radioactively and/or chemically contaminated will become candidate for transfer to DOE-EM for deactivation and decommissioning. Requirements and guidance for such transfers are contained in:  DOE Order 430.1B Chg. 2, REAL PROPERTY & ASSET MANAGEMENT  DOE Guide 430.1-5, TRANSITION IMPLEMENTATION GUIDE The transfer process is illustrated in the Transfer Process figure. The purpose here is to provide examples of methods and

194

A protocol for instruction stream processing  

E-Print Network (OSTI)

The behaviour produced by an instruction sequence under execution is a behaviour to be controlled by some execution environment: each step performed actuates the processing of an instruction by the execution environment and a reply returned at completion of the processing determines how the behaviour proceeds. In this paper, we are concerned with the case where the processing takes place remotely. We describe a protocol to deal with the case where the behaviour produced by an instruction sequence under execution leads to the generation of a stream of instructions to be processed and a remote execution unit handles the processing of that stream of instructions.

Bergstra, J A

2009-01-01T23:59:59.000Z

195

Advanced Technology and Knowledge Transfer  

Science Conference Proceedings (OSTI)

This paper reports on a specific food and agribusiness industry project, employing new technological capabilities to better transfer expert knowledge. Knowledge transfer and technical support are key components of this project. VisIT, which stands for ...

Geetanjali Tandon; Steven T. Sonka

2003-01-01T23:59:59.000Z

196

Technology Transfer Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Advanced Research Projects Agency-Energy (ARPA-E) Advanced Research Projects Agency-Energy (ARPA-E) Oil & Gas Technology Transfer Initiatives USEFUL LINKS Association of University Technology Managers (AUTM) Federal Laboratory Consortium (FLC) FLC Technology Locator Feedback Contact us about Tech Transfer: Mary.McManmon@science.doe.gov Mary McManmon, 202-586-3509 link to Adobe PDF Reader link to Adobe Flash player Reports Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set Autoinduction Autoinduction System The award winning Overnight Express(tm) Autoinduction System developed at BNL simplifies protein production in the widely used T7 gene expression system. Decontamination Foam-based decontamination

197

NREL: Technology Transfer - Events  

NLE Websites -- All DOE Office Websites (Extended Search)

Events Events February 2014 NASEO Energy Outlook Conference February 4 - 7, 2014 Washington , DC Add to calendar Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News Contacts Did you find what you needed? Yes 1 No 0 Thank you for your feedback. Would you like to take a moment to tell us how we can improve this page? Submit We value your feedback. Thanks! We've received your feedback. Something went wrong. Please try again later. NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. NREL U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Alliance for Sustainable Energy, LLC

198

Technology Transfer: Site Map  

NLE Websites -- All DOE Office Websites (Extended Search)

Site Map Site Map About Us About Technology Transfer Contact Us Available Technologies Advanced Materials Biofuels Biotechnology and Medicine Developing World Energy Environmental Technologies Imaging and Lasers Ion Sources and Beam Technologies Nanotechnology and Microtechnology Software and Information Technology For Industry Licensing Overview Frequently Asked Questions Partnering with Berkeley Lab Licensing Interest Form Receive New Tech Alerts For Researchers What You Need to Know and Do The Tech Transfer Process Forms Record of Invention (Word doc -- please do not use earlier PDF version of the form) Software Disclosure and Abstract (PDF, use Adobe Acrobat or Adobe Reader 9 and up ONLY to complete the form) Policies Conflict of Interest Outside Empolyment Export Control FAQs for Researchers

199

The Pilgrim: A New Consistency Protocol for Distributed Shared Memory  

E-Print Network (OSTI)

We propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at each site. This protocol was developed for the cooperative platform called CAliF: Cooperative Application Framework. This system uses the DSM to allow programmers to share objects or variables without having to manage the exchange. We present an algorithm which uses the token technique. The token is data structure which contains the updates of shared data. These data are carried through the ring on the token, named Pilgrim. Pilgrim protocol provides both reliable consistency and guaranteed performance according to the type of application described. The protocol is discussed and proved, and we demonstrate its qualities. Key words: consistency protocol, cooperative work, distributed shared memory, virtual ring. 1 Introduction In this paper, we propose a new consistency protocol for distributed shared memory (DSM) where different shared objects are replicated at eac...

H. Guyennet; J-c. Lapayre; M. Trhel

1997-01-01T23:59:59.000Z

200

The Greenhouse Gas Protocol Initiative: Sector Specific Tools | Open Energy  

Open Energy Info (EERE)

Gas Protocol Initiative: Sector Specific Tools Gas Protocol Initiative: Sector Specific Tools Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Sector Specific Tools Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Industry, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity[1] The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion[2] The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources[3]

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Heat Transfer Fluids Containing Nanoparticles  

commercial and industrial heat-transfer applications. ... Refrigeration and other cooling systems Nuclear reactors Aerospace Defense Grinding and ...

202

NREL: Technology Transfer - Licensing Agreements  

National Renewable Energy Laboratory Technology Transfer Licensing Agreements. Through licensing agreements, NREL provides industry with an opportunity to ...

203

Argonne TDC: Material Transfer Agreements  

Material Transfer Agreements. Materials produced by researchers at Argonne National Laboratory are often of interest to the private sector.

204

LANL | Partnering | Material Transfer Agreement  

Contacts Event Calendar Maps Organization Phonebook Policy Center Emergency. NEWS. LIBRARY. JOBS. Technology Transfer, TT . Division Home; About Us; ...

205

Decentralized Decision-making and Protocol Design for Recycled ...  

E-Print Network (OSTI)

Nov 14, 2006 ... Optimization Online. Decentralized Decision-making and Protocol Design for Recycled Material Flows. I-Hsuan Hong (ihong ***at***...

206

DOE Transportation Protocols Topic Group Conference Call Summary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TECWG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the...

207

DOE Transportation Protocols Topic Group Summary of Second Conference  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Summary of Second Conference Call April 8, 1999 The second conference call of the Transportation External Coordination Working Group (TECWG) DOE Transportation Protocols Working...

208

MAC and Routing Protocols for Mobile Underwater Acoustic Sensor Swarms  

E-Print Network (OSTI)

Pressure Routing for Underwater Sensor Networks . . . . . .of Aloha Protocols for Underwater Acoustic Sensor Networks.Critical Applications in Underwater Sensor Networks. In

Noh, Young Tae

2012-01-01T23:59:59.000Z

209

Communication Protocols and Data Standards for Energy-Related...  

NLE Websites -- All DOE Office Websites (Extended Search)

Development Contact Us Department Contacts Media Contacts Communication Protocols and Data Standards for Energy-Related Purposes Speaker(s): Bruce Nordman Date: January 13,...

210

Analysis of limiting information characteristics of quantum-cryptography protocols  

SciTech Connect

The problem of increasing the critical error rate of quantum-cryptography protocols by varying a set of letters in a quantum alphabet for space of a fixed dimensionality is studied. Quantum alphabets forming regular polyhedra on the Bloch sphere and the continual alphabet equally including all the quantum states are considered. It is shown that, in the absence of basis reconciliation, a protocol with the tetrahedral alphabet has the highest critical error rate among the protocols considered, while after the basis reconciliation, a protocol with the continual alphabet possesses the highest critical error rate. (quantum optics and quantum computation)

Sych, D V; Grishanin, Boris A; Zadkov, Viktor N [Department of Physics, M.V. Lomonosov Moscow State University, Moscow (Russian Federation)

2005-01-31T23:59:59.000Z

211

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks  

Science Conference Proceedings (OSTI)

UVOC-MAC: a MAC protocol for outdoor ultraviolet networks. Yiyang Li Jianxia Ning Zhengyuan Xu . Srikanth V. Krishnamurthy Gang Chen. Springer...

212

The Greenhouse Gas Protocol Initiative: Measurement and Estimation...  

Open Energy Info (EERE)

a quantitative and qualitative estimation of uncertainty associated with a GHG inventory. Overview The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a...

213

APPENDIX J: STATEMENT OF COMPLIANCE WITH DOE SEISMICITY PROTOCOL  

NLE Websites -- All DOE Office Websites (Extended Search)

compliance with the "Protocol for Induced Seismicity Associated with Enhanced Geothermal Systems". Calpine Corporation and other Geysers geothermal operators have long been...

214

Protocol, Appraisal Process Guide - April 2008 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Appraisal Process Guide - April 2008 Protocol, Appraisal Process Guide - April 2008 April 2008 Emergency Management Oversight Appraisal Process Guide Emergency Management Oversight...

215

Qubit-string-based bit commitment protocols with physical security  

E-Print Network (OSTI)

Several kinds of qubit-string-based(QS-based) bit commitment protocols are presented, and a definition of information-theoretic concealing is given. All the protocols presented here are proved to be secure under this definition. We suggest an attack algorithm to obtain the local unitary transformation introduced in no-go theorem, which is used to attack the binding condition, then study the security of our QS-based bit commitment protocols under this attack via introducing a new concept "physical security of protocol". At last we present a practical QS-based bit commitment scheme against channel loss and error.

Li Yang; Chong Xiang; Bao Li

2010-11-23T23:59:59.000Z

216

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Stationary Combustion Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Stationary Combustion Guidance[1] The Greenhouse Gas Protocol tool for stationary combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

217

Tech Transfer Summit Agenda | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Tech Transfer Summit Agenda Tech Transfer Summit Agenda Tech Transfer Technology Summit Agenda 4.9.12.pdf More Documents & Publications Risk Management II Summit Agenda Special...

218

Technology Transfer Reporting Form | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Transfer Reporting Form Technology Transfer Reporting Form Technology Transfer Reporting Form More Documents & Publications DOE F 3230.6A Technology Partnership...

219

FAQs for Survey Forms 809 and 819  

Gasoline and Diesel Fuel Update (EIA)

9 and 819 9 and 819 EIA-809 (Weekly Oxygenate Report) How do I submit the form? There are four ways to submit the EIA-809 form. Secure File Transfer: https://signon.eia.doe.gov/upload/noticeoog.jsp The Secure File Transfer System uses the secure hypertext transfer protocol (HTTPS), an industry standard method to send information over the web using secure, encrypted processes. Electronic Filing Option: The PC Electronic Data Reporting Option (PEDRO) is a Windows-based application that will enable you to enter data interactively, import data from your own database, validate your data online, and transmit the encrypted data electronically to EIA via the Internet or a dial-up modem. To receive this free software call (202) 586-9659. Email: oog.surveys@eia.gov Fax forms to: (202) 586-1076

220

A simulation of the FASTBUS protocols  

E-Print Network (OSTI)

FASTBUS is a standard bus system being developed for high speed data acquisition and processing in the next generation of large scale physics experiments. Prototypes are being built according to a draft specification. The FASTBUS protocols have been simulated using a powerful software tool which is a computer description language. This Instruction Set Processor Specification language, ISPS, has been used in the design and development of several microprocessor systems. Its applications are diverse, including automated design and the generation of machine relative software, as well as simulation. The results of the FASTBUS simulation are presented, with an overview of the ISPS hardware description language. An additional facility is discussed, which supplements the simulation by providing a visual presentation of the FASTBUS signals, that is, a timing-graph generator.

Booth, A W

1981-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Building America House Simulation Protocols (Revised)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

House House Simulation Protocols Robert Hendron and Cheryn Engebrecht National Renewable Energy Laboratory Revised October 2010 Prepared by the National Renewable Energy Laboratory For the U.S. Department of Energy Building Technologies Program ii NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process,

222

AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AVIATION BOARD OF DIRECTORS AVIATION BOARD OF DIRECTORS BYLAWS AND PROTOCOLS The Department of Energy strives to manage its Aviation Program toward the highest standards of safety, efficiency, fairness in contracting, preservation of competition in the private sector, open communication, prudent property management, and the best examples of resource management. Toward these ends, the Department has established a management structure led by a Board of Directors comprising active Federal employee aviation managers from the Department. AUTHORITY: The following authorities serve as basis for this structure and system: Office of Management and Budget Circular A-126, FMR 102.33, DEAR 109, DOE Order 440.2B, Aviation Management Review Team Report, March 1999, and Secretary of Energy Appointment and Delegation of Authority, April 15, 1999.

223

High Performance Computing Data Center Metering Protocol  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Performance High Performance Computing Data Center Metering Protocol Prepared for: U.S. Department of Energy Office of Energy Efficiency and Renewable Energy Federal Energy Management Program Prepared by: Thomas Wenning Michael MacDonald Oak Ridge National Laboratory September 2010 ii Introduction Data centers in general are continually using more compact and energy intensive central processing units, but the total number and size of data centers continues to increase to meet progressive computing requirements. In addition, efforts are underway to consolidate smaller data centers across the country. This consolidation is resulting in a growth of high-performance computing facilities (i.e. - supercomputers) which consume large amounts of energy to support the numerically intensive

224

HIGEE Mass Transfer  

E-Print Network (OSTI)

Distillation, absorption, and gas stripping have traditionally been performed in tall columns utilizing trays or packing. Columns perform satisfactorily, but have characteristics which may be disadvantages in some applications: Large size, particularly height; high weight; high cost of installation; difficulty in modularization; foaming for certain systems; must be vertical, especially for trayed towers; large liquid inventory; difficulty in modifying column internals once installed; start up time to reach steady state conditions in excessive. Many of these disadvantages can be overcome by use of HIGEE, an innovative vapor-liquid mass transfer system which utilizes a rotating bed of packing to achieve high efficiency separations, and consequent reduction in size and weight.

Mohr, R. J.; Fowler, R.

1986-06-01T23:59:59.000Z

225

Manipulator mounted transfer platform  

DOE Patents (OSTI)

This invention is comprised of a transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed fame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control. 5 figs.

Dobbins, J.C.; Hoover, M.A.; May, K.W.; Ross, M.J.

1988-10-12T23:59:59.000Z

226

Manipulator mounted transfer platform  

Science Conference Proceedings (OSTI)

A transfer platform for the conveyance of objects by a manipulator includes a bed frame and saddle clamp secured along an edge of the bed frame and adapted so as to secure the bed frame to a horizontal crosspiece of the manipulator. The platform may thus move with the manipulator in a reciprocal linear path defined by a guide rail. A bed insert may be provided for the support of conveyed objects and a lifting bail may be provided to permit the manipulator arm to install the bed frame upon the crosspiece under remote control.

Dobbins, James C. (Idaho Falls, ID); Hoover, Mark A. (Idaho Falls, ID); May, Kay W. (Idaho Falls, ID); Ross, Maurice J. (Pocatello, ID)

1990-01-01T23:59:59.000Z

227

Manipulator mounted transfer platform  

Science Conference Proceedings (OSTI)

The patent describes in a manipulator system for use in hazardous environments including a manipulator adapted for reciprocal movement upon a guide device, a transfer platform. It comprises: a bed frame defining a generally horizontal bed projecting outwardly from the manipulator; and frame mounting means securing the bed frame to the manipulator in a generally cantilevered fashion, thereby essentially minimizing the structure necessary to support the platform outwardly of the manipulator while enhancing operator visibility of the platform and the manipulator during use of the manipulator system.

Dobbins, J.C.; Hoover, M.A.; May, K.W.; Ross, M.J.

1990-01-23T23:59:59.000Z

228

Parallel data transfer network controlled by a dynamically reconfigurable serial network  

DOE Patents (OSTI)

This patent is a real time high density data communication system designed to operate efficiently in a dynamically configurable, multiprocessor parallel processing environment. In this design a serial communication network is utilized to disseminate commands from a master processor to the slave processors, to control transmission of high density data, to effect communication protocol, and to monitor the status of each slave processor. A parallel channel communication network is utilized in conjunction with two triple port memories at each processor node in the system to efficiently transmit high density data for sustained or burst intervals without having to interleave communication control messages. Each processor node includes a transputer, a digital signal processor, a parallel transfer controller. A very low software overhead time for starting and ending the transfer of data is incurred using this design in contrast with a scalable coherent interface system in which 25% of transmission time is devoted to the communication protocol.

Crosetto, D.B.

1992-01-01T23:59:59.000Z

229

An Experimental Implementation of Oblivious Transfer in the Noisy Storage Model  

E-Print Network (OSTI)

Cryptography's importance in our everyday lives continues to grow in our increasingly digital world. Oblivious transfer (OT) has long been a fundamental and important cryptographic primitive since it is known that general two-party cryptographic tasks can be built from this basic building block. Here we show the experimental implementation of a 1-2 random oblivious transfer (ROT) protocol by performing measurements on polarization-entangled photon pairs in a modified entangled quantum key distribution system, followed by all of the necessary classical post-processing including one-way error correction. We successfully exchange a 1,366 bits ROT string in ~3 min and include a full security analysis under the noisy storage model, accounting for all experimental error rates and finite size effects. This demonstrates the feasibility of using today's quantum technologies to implement secure two-party protocols.

C. Erven; N. Ng; N. Gigov; R. Laflamme; S. Wehner; G. Weihs

2013-08-23T23:59:59.000Z

230

Cryptography and game theory: designing protocols for exchanging information  

Science Conference Proceedings (OSTI)

The goal of this paper is finding fair protocols for the secret sharing and secure multiparty computation (SMPC) problems, when players are assumed to be rational. It was observed by Halpern and Teague (STOC 2004) that protocols with bounded number of ...

Gillat Kol; Moni Naor

2008-03-01T23:59:59.000Z

231

A Protocol for Multimedia CDMA Personal Communication Networks  

Science Conference Proceedings (OSTI)

In this paper, a joint CDMA/TDMA protocol has been proposed for integrated video-phone/voice/data traffic in personal communication networks (PCN). The videophone service is implemented according to H.261 standard. The concept of dynamic boundary ... Keywords: CDMA, MAC, multimedia, personal communication networks, protocol

P. Xie; E. Gunawan; B. H. Soong; C. B. Soh

2000-09-01T23:59:59.000Z

232

A secure and efficient strong-password authentication protocol  

Science Conference Proceedings (OSTI)

Password authentication protocols are divided into two types. One employs the easy-to-remember password while the other requires the strong password. In 2001, Lin et al. proposed an optimal strong-password authentication protocol (OSPA) to resist the ... Keywords: denial-of-service attack, mutual authentication, password authentication, smart card, stolen-verifier attack, strong password

Ya-Fen Chang; Chin-Chen Chang

2004-07-01T23:59:59.000Z

233

Sound Multi-party Business Protocols for Service Networks  

E-Print Network (OSTI)

on the transitions. The states of the protocol are mapped to states in the DFA, and the protocol evolves transitions. All transitions outgoing the initial state are message-based, and their associated time to the considerations stated in Section 2.1 regarding when a transition can be traversed according to its time condition

Politécnica de Madrid, Universidad

234

A scalable wireless routing protocol secure against route truncation attacks  

Science Conference Proceedings (OSTI)

Wireless routing protocols allow transmitting nodes to have some knowledge of the topology in order to decide when to forward a packet (via broadcast) and when to drop it. Since a routing protocol forms the backbone of any network, it is a lucrative ...

Amitabh Saxena; Ben Soh

2010-05-01T23:59:59.000Z

235

A hierarchical multicast protocol in mobile IPv6 networks  

Science Conference Proceedings (OSTI)

In this paper, we propose a hierarchical multicast protocol in Mobile IPv6 networks (HMoM), which utilizes the advantages of hierarchical mobility management in handling unicast routing. The multicast agent is selected dynamically and can be located ... Keywords: Mobile IP, Mobile multicast, Protocol, Routing

Ping Wang; Yunze Cai; Jinjie Huang; Xiaoming Xu

2006-12-01T23:59:59.000Z

236

Performance evaluation of Atomic Commit Protocols for mobile transactions  

Science Conference Proceedings (OSTI)

The commitment of a distributed transaction is ensured with the use of an Atomic Commit Protocol (ACP). Due to their great importance for transaction systems, the recent advances in mobile computing development have renewed the interest in the ... Keywords: atomic commit protocols, mobile ACPs, mobile databases, mobile networks, mobile transaction processing, performance evaluation, simulation, wireless networks

Nadia Nouali-Taboudjemat; Lynda Boukantar; Habiba Drias

2007-08-01T23:59:59.000Z

237

Analysis of DSR protocol in event-B  

Science Conference Proceedings (OSTI)

This paper presents an incremental formal development of the Dynamic Source Routing (DSR) protocol in Event-B. DSR is a reactive routing protocol, which finds a route for a destination on demand, whenever communication is needed. Route discovery is an ... Keywords: abstract model, ad hoc network, event-b, event-driven approach, proof-based development, refinement

Dominique Mry; Neeraj Kumar Singh

2011-10-01T23:59:59.000Z

238

Energy-Efficient Networking Energy-Aware Routing Protocol  

E-Print Network (OSTI)

from to a physical server in another DC, when, the second DC has access to the renewable energy sourcesEnergy-Efficient Networking Energy-Aware Routing Protocol Minimum Power Topology Energy-Aware Admission Control Management of Resources in the Liquid Network Summary Energy Efficient Protocols in Self

Tobagi, Fouad

239

Statistical estimation of the quality of quantum-tomography protocols  

SciTech Connect

We present a complete methodology for testing the performances of quantum tomography protocols. The theory is validated by several numerical examples and by the comparison with experimental results achieved with various protocols for whole families of polarization states of qubits and ququarts including pure, mixed, entangled, and separable.

Bogdanov, Yu. I.; Bukeev, I. D. [Institute of Physics and Technology, Russian Academy of Sciences, 117218, Moscow (Russian Federation); Brida, G.; Genovese, M.; Shurupov, A. P. [INRIM, Strada delle Cacce 91 I-10135, Torino (Italy); Kravtsov, K. S. [Prokhorov General Physics Institute, Russian Academy of Sciences, Moscow, 119991 (Russian Federation); Kulik, S. P.; Soloviev, A. A. [Faculty of Physics, Moscow State University, 119992, Moscow (Russian Federation); Moreva, E. V. [Moscow National Research Nuclear University ' ' MEPHI' ' , 115409, Moscow (Russian Federation)

2011-10-15T23:59:59.000Z

240

Self-stabilizing multicast protocols for ad hoc networks  

Science Conference Proceedings (OSTI)

We propose two distributed algorithms to maintain respectively the minimum weight spanning tree (MST) based multi-cast tree and the shortest path (SPST) multi-cast tree in a given ad hoc network for a given multi-cast group; our algorithms are fault ... Keywords: convergence, distributed system, fault tolerance, multi-cast protocol, self-stabilizing protocol, system graph

Sandeep K. S. Gupta; Pradip K. Srimani

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Cryptanalysis of two three-party encrypted key exchange protocols  

Science Conference Proceedings (OSTI)

Due to the simplicity of maintaining human memorable passwords without any assistant storage device, password-based three-party encrypted key exchange (3PEKE) protocol has become one of the most promising research fields on user authentication and secure ... Keywords: Authentication, Cryptanalysis, Security, Three-party encrypted key exchange (3PEKE) protocol, Undetectable on-line password guessing attacks

N. W. Lo; Kuo-Hui Yeh

2009-11-01T23:59:59.000Z

242

Internet Printing Protocol/1.1: Model and Semantics  

Science Conference Proceedings (OSTI)

This document is one of a set of documents, which together describe all aspects of a new Internet Printing Protocol (IPP). IPP is an application level protocol that can be used for distributed printing using Internet tools and technologies. This document ...

R. Herriot; R. deBry; S. Isaacson; P. Powell / T. Hastings

2000-09-01T23:59:59.000Z

243

HLP: a next generation inter-domain routing protocol  

Science Conference Proceedings (OSTI)

It is well-known that BGP, the current inter-domain routing protocol, has many deficiencies. This paper describes a hybrid link-state and path-vector protocol called HLP as an alternative to BGP that has vastly better scalability, isolation and convergence ... Keywords: BGP, convergence, inter-domain routing, scalability

Lakshminarayanan Subramanian; Matthew Caesar; Cheng Tien Ee; Mark Handley; Morley Mao; Scott Shenker; Ion Stoica

2005-08-01T23:59:59.000Z

244

On the Security of the Ping-Pong Protocol  

E-Print Network (OSTI)

We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

Kim Bostroem; Timo Felbinger

2007-08-22T23:59:59.000Z

245

About Technology Transfer - National Renewable Energy ...  

National Renewable Energy Laboratory Technology Transfer About Technology Transfer. Through technology partnerships, NREL seeks to reduce private sector risk and ...

246

Polarization transfer NMR imaging  

DOE Patents (OSTI)

A nuclear magnetic resonance (NMR) image is obtained with spatial information modulated by chemical information. The modulation is obtained through polarization transfer from a first element representing the desired chemical, or functional, information, which is covalently bonded and spin-spin coupled with a second element effective to provide the imaging data. First and second rf pulses are provided at first and second frequencies for exciting the imaging and functional elements, with imaging gradients applied therebetween to spatially separate the nuclei response for imaging. The second rf pulse is applied at a time after the first pulse which is the inverse of the spin coupling constant to select the transfer element nuclei which are spin coupled to the functional element nuclei for imaging. In a particular application, compounds such as glucose, lactate, or lactose, can be labeled with .sup.13 C and metabolic processes involving the compounds can be imaged with the sensitivity of .sup.1 H and the selectivity of .sup.13 C.

Sillerud, Laurel O. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM)

1990-01-01T23:59:59.000Z

247

Interline transfer CCD camera  

DOE Patents (OSTI)

An interline CCD sensing device for use in a camera system, includes an imaging area sensitive to impinging light, for generating charges corresponding to the intensity of the impinging light. Sixteen independent registers R1 - R16 sequentially receive the interline data from the imaging area, corresponding to the generated charges. Sixteen output amplifiers S1 - S16 and sixteen ports P1 - P16 for sequentially transferring the interline data, one pixel at a time, in order to supply a desired image transfer speed. The imaging area is segmented into sixteen independent imaging segments A1 - A16, each of which corresponds to one register, on output amplifier, and one output port. Each one of the imaging segments A1 - A16 includes an array of rows and columns of pixels. Each pixel includes a photogate area, an interline CCD channel area, and an anti-blooming area. The anti-blooming area is, in turn, divided into an anti-blooming barrier and an anti-blooming drain.

Prokop, M.S.; McCurnin, T.W.; Stump, C.J.; Stradling, G.L.

1993-12-31T23:59:59.000Z

248

Heisenberg Spin Bus as a Robust Transmission Line for Perfect State Transfer  

E-Print Network (OSTI)

We study the protocol known as quantum state transfer for a strongly coupled antiferromagnetic spin chain or ring (acting as a spin bus), with weakly coupled external qubits. By treating the weak coupling as a perturbation, we find that perfect state transfer (PST) is possible when second order terms are included in the expansion. We also show that PST is robust against variations in the couplings along the spin bus and between the bus and the qubits. As evidence of the quantum interference which mediates PST, we show that the optimal time for PST can be smaller with larger qubit separations, for an even-size chain or ring.

Sangchul Oh; Lian-Ao Wu; Yun-Pil Shim; Mark Friesen; Xuedong Hu

2011-02-03T23:59:59.000Z

249

Modeling Routing Overhead Generated by Wireless Reactive Routing Protocols  

E-Print Network (OSTI)

In this paper, we have modeled the routing over- head generated by three reactive routing protocols; Ad-hoc On-demand Distance Vector (AODV), Dynamic Source Routing (DSR) and DYnamic MANET On-deman (DYMO). Routing performed by reactive protocols consists of two phases; route discovery and route maintenance. Total cost paid by a protocol for efficient routing is sum of the cost paid in the form of energy consumed and time spent. These protocols majorly focus on the optimization performed by expanding ring search algorithm to control the flooding generated by the mechanism of blind flooding. So, we have modeled the energy consumed and time spent per packet both for route discovery and route maintenance. The proposed framework is evaluated in NS-2 to compare performance of the chosen routing protocols.

Javaid, Nadeem; Javaid, Akmal; Malik, Shahzad A

2011-01-01T23:59:59.000Z

250

Protocol, Site Leads - May 2011 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Site Leads - May 2011 Site Leads - May 2011 Protocol, Site Leads - May 2011 May 2011 Protocol for Site Leads The purpose of this protocol is to establish the requirements and responsibilities for the Office of Safety and Emergency Management Evaluations Site Leads. The Site Lead's primary responsibility is to perform independent safety oversight at their assigned site(s). Site Leads are assigned to Department of Energy (DOE) sites with nuclear facilities to maintain operational awareness, establish and implement a prioritized set of oversight activities focused on high hazard nuclear facilities and tailored to site conditions, activities and issues. Protocol, Site Leads - May 2011 More Documents & Publications Appraisal Process Protocols, Independent Oversight - November 2012

251

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

252

U-268: Oracle Database Authentication Protocol Discloses Session Key  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Oracle Database Authentication Protocol Discloses Session 8: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users U-268: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users September 26, 2012 - 6:00am Addthis PROBLEM: Oracle Database Authentication Protocol Discloses Session Key Information to Remote Users PLATFORM: Oracle Database 11g Releases 1 and 2 ABSTRACT: A vulnerability was reported in Oracle Database. reference LINKS: Darkreading Threatpost Arstechnica Oracle Security Alerts SecurityTracker Alert ID: 1027558 CVE-2012-3137 IMPACT ASSESSMENT: Medium Discussion: The authentication protocol in Oracle Database 11g 1 and 2 allows remote attackers to obtain the session key and salt for arbitrary users, which leaks information about the cryptographic hash and makes it easier to

253

Protective Force Protocols for ESS Supported Performance Tests and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protective Force Protocols for ESS Supported Performance Tests and Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 Protective Force Protocols for ESS Supported Performance Tests and Exercises, March 12, 2007 This document presents the protocols and ROE to be followed for both limited-scope and large-scale FOF performance tests. It sets forth basic procedures and responsibilities for planning, conducting, and evaluating such tests. The intent is to provide a standard framework to govern the conduct of such tests in connection with Independent Oversight inspections at NNSA and ESE sites and to ensure consistent approaches for all other FOF applications, approaches designed to enable program management to compare results from site to site. Protective Force Protocols for ESS Supported Performance Tests and

254

Heat transfer. [heat transfer roller employing a heat pipe  

SciTech Connect

A heat transfer roller embodying a heat pipe is disclosed. The heat pipe is mounted on a shaft, and the shaft is adapted for rotation on its axis.

Sarcia, D.S.

1978-05-23T23:59:59.000Z

255

Prospects for Money Transfer Models  

E-Print Network (OSTI)

Recently, in order to explore the mechanism behind wealth or income distribution, several models have been proposed by applying principles of statistical mechanics. These models share some characteristics, such as consisting of a group of individual agents, a pile of money and a specific trading rule. Whatever the trading rule is, the most noteworthy fact is that money is always transferred from one agent to another in the transferring process. So we call them money transfer models. Besides explaining income and wealth distributions, money transfer models can also be applied to other disciplines. In this paper we summarize these areas as statistical distribution, economic mobility, transfer rate and money creation. First, money distribution (or income distribution) can be exhibited by recording the money stock (flow). Second, the economic mobility can be shown by tracing the change in wealth or income over time for each agent. Third, the transfer rate of money and its determinants can be analyzed by tracing t...

Wang, Y; Xi, N; Wang, Yougui; Ding, Ning; Xi, Ning

2005-01-01T23:59:59.000Z

256

Exploring Shared Memory Protocols in FLASH  

SciTech Connect

ABSTRACT The goal of this project was to improve the performance of large scientific and engineering applications through collaborative hardware and software mechanisms to manage the memory hierarchy of non-uniform memory access time (NUMA) shared-memory machines, as well as their component individual processors. In spite of the programming advantages of shared-memory platforms, obtaining good performance for large scientific and engineering applications on such machines can be challenging. Because communication between processors is managed implicitly by the hardware, rather than expressed by the programmer, application performance may suffer from unintended communication communication that the programmer did not consider when developing his/her application. In this project, we developed and evaluated a collection of hardware, compiler, languages and performance monitoring tools to obtain high performance on scientific and engineering applications on NUMA platforms by managing communication through alternative coherence mechanisms. Alternative coherence mechanisms have often been discussed as a means for reducing unintended communication, although architecture implementations of such mechanisms are quite rare. This report describes an actual implementation of a set of coherence protocols that support coherent, non-coherent and write-update accesses for a CC-NUMA shared-memory architecture, the Stanford FLASH machine. Such an approach has the advantages of using alternative coherence only where it is beneficial, and also provides an evolutionary migration path for improving application performance. We present data on two computations, RandomAccess from the HPC Challenge benchmarks and a forward solver derived from LS-DYNA, showing the performance advantages of the alternative coherence mechanisms. For RandomAccess, the non-coherent and write-update versions can outperform the coherent version by factors of 5 and 2.5, respectively. In LS-DYNA, we obtain improvements of 18% on average using the non-coherent version. We also present data on the SpecOMP benchmarks, showing that the protocols have a modest overhead of less than 3% in applications where the alternative mechanisms are not needed. In addition to the selective coherence studies on the FLASH machine, in the last six months of this project ISI performed research on compiler technology for the transactional memory (TM) programming model being developed at Stanford. As part of this research ISI developed a compiler that recognizes transactional memory pragmas and automatically generates parallel code for the TM programming model

Horowitz, Mark; Kunz, Robert; Hall, Mary; Lucas, Robert; Chame, Jacqueline

2007-04-01T23:59:59.000Z

257

Transfer and Archive Data  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Management Please remove ALL data from /house! Do you still have data in /house/homedirs? Do you know if you have data in /house/homedirs? Please check now and make a plan for moving that data to the archiver or one of the NERSC file systems (for more information on these filesystems go to File storage and I/O). Moving data from house to DnA The DnA file system is primarily for finished projects, data that is ready to be archived, or data that is shared between groups. It is mounted read-only on the cluster, but you can write to directories on this file system in a few ways: Data Transfer Nodes until December 1, 2013 (examples here) xfer queue on the Genepool cluster until December 1, 2013 (examples here) Moving data from house to Projectb Projectb is where compute jobs run and output both intermediate files as

258

HEAT TRANSFER METHOD  

DOE Patents (OSTI)

A method is given for increasing burn-out heat fluxes under nucleate boiling conditions in heat exchanger tubes without incurring an increase in pumping power requirements. This increase is achieved by utilizing a spinning flow having a rotational velocity sufficient to produce a centrifugal acceleration of at least 10,000 g at the tube wall. At this acceleration the heat-transfer rate at burn out is nearly twice the rate which can be achieved in a similar tube utilizing axial flow at the same pumping power. At higher accelerations the improvement over axial flow is greater, and heat fluxes in excess of 50 x 10/sup 6/ Btu/hr/sq ft can be achieved.

Gambill, W.R.; Greene, N.D.

1960-08-30T23:59:59.000Z

259

Technology transfer 1995  

Science Conference Proceedings (OSTI)

Technology Transfer 1995 is intended to inform the US industrial and academic sectors about the many opportunities they have to form partnerships with the US Department of Energy (DOE) for the mutual advantage of the individual institutions, DOE, and the nation as a whole. It also describes some of the growing number of remarkable achievements resulting from such partnerships. These partnership success stories offer ample evidence that Americans are learning how to work together to secure major benefits for the nation--by combining the technological, scientific, and human resources resident in national laboratories with those in industry and academia. The benefits include more and better jobs for Americans, improved productivity and global competitiveness for technology-based industries, and a more efficient government laboratory system.

Not Available

1995-01-01T23:59:59.000Z

260

Technology Transfer Reporting Form  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

form is to be completed by the TTO for individual inquiry/case activity during the quarter as required form is to be completed by the TTO for individual inquiry/case activity during the quarter as required by the Technology Transfer Commercialization Act of 2000. Mouse over definitions and descriptions appear over text/check boxes where appropriate. After completing this form, click on the submit button. *If you have no TTO activity for the quarter, please fill in your name, FY and quarter, lab or facility and check the box "No Quarterly Activity". Initial Ombuds Contact: ____________________ Type: Inquiry Case Ombuds Name: __________________________ Time Spent: (Hours) ______________ Final Ombuds Involvement: _________________ Laboratory or Facility: AMES ANL BNL LBNL INL KCP LANL NREL LLNL NBL NETL PNNL NNSS ORNL PXSO SRNL

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

NREL: Technology Transfer - Contacts  

NLE Websites -- All DOE Office Websites (Extended Search)

Contacts Contacts Here you'll find contact information and resources to help answer any questions you may have about NREL's technology transfer and commercialization opportunities. Agreement for Commercializing Technology For more information about NREL's agreements for commercializing technology, contact Anne Miller, 303-384-7353. Financial and Funding Assistance NREL does not provide financial or funding assistance for any research projects. If you're a startup company, small business, or an inventor, visit the following Web sites: Grants.gov Small Business Administration. Industry Growth Forum Visit the NREL Industry Growth Forum website or contact Kate Cheesbrough for more information about this event. Investors and Entrepreneurs For more information about NREL's Innovation and Entrepreneurship Center,

262

Frame Heat Transfer Research  

NLE Websites -- All DOE Office Websites (Extended Search)

Developing Low-Conductance Window Frames: Capabilities and Developing Low-Conductance Window Frames: Capabilities and Limitations of Current Window Heat Transfer Design Tools Arild Gustavsen 1,* , Dariush Arasteh 2 , Bjørn Petter Jelle 3,4 , Charlie Curcija 5 and Christian Kohler 2 1 Department of Architectural Design, History and Technology, Norwegian University of Science and Technology, Alfred Getz vei 3, NO-7491 Trondheim, Norway 2 Windows and Daylighting Group, Lawrence Berkeley National Laboratory, 1 Cyclotron Road Mail Stop 90R3111, Berkeley, CA 94720- 8134, USA 3 Department of Civil and Transport Engineering, Norwegian University of Science and Technology, Høgskoleringen 7A, NO-7491 Trondheim, Norway 4 Department of Building Materials and Structures, SINTEF Building and Infrastructure, Høgskoleringen 7B,NO-7465 Trondheim, Norway

263

MOLTEN SALT HEAT TRANSFER FLUID  

thermal energy storage tanks Sandia has developed a heat transfer fluid (HTF) for use at elevated temperatures that has a lower freezing point

264

Handbook of heat transfer fundamentals  

SciTech Connect

This handbook is on the fundamentals of heat transfer. It provides coverage on conduction, convection, and radiation and on thermophysical properties of materials.

Rohsenow, W.M.; Hartnett, J.P.; Ganic, E.N.

1985-01-01T23:59:59.000Z

265

Jefferson Lab Technology Transfer - JLab  

Grants and cooperative agreements are entered into solely by the government with a recipient whereby money or property is transferred to the recipient to support ...

266

Theory of Spin Transfer Torque  

Science Conference Proceedings (OSTI)

... In the phenomenon known as spin transfer torque, a current can give a jolt to thin magnetic layers sandwiched between nonmagnetic materials. ...

2013-06-28T23:59:59.000Z

267

NREL: Technology Transfer Home Page  

The National Renewable Energy Laboratory (NREL) works with industry and organizations to transfer renewable energy and energy efficiency technologies into the ...

268

Partnering Today: Technology Transfer Highlights  

THE LLNL TECHNOLOGY COMPANY PRODUCTS Partnering Today: Technology Transfer Highlights 10 Ametek-Ortec: High-precision Radiation Detectors ORTEC, a unit of AMETEK, is ...

269

Electrohydrodynamically enhanced condensation heat transfer.  

E-Print Network (OSTI)

??In a condenser the thickness of the liquid condensate film covering the cooled surface constitutes a resistance to the heat transfer. By establishing a non (more)

Wawzyniak, Markus

2012-01-01T23:59:59.000Z

270

Ombuds Services for Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

To learn about other Laboratory resources for businesses, please go to: BusinessTech Transfer Small Business Office Community Outreach Procurement, Vendor Information For...

271

Fostering Technology Transfer and Entrepreneurship  

Science Conference Proceedings (OSTI)

... agencies to take steps to enhance successful technology innovation networks ... is one of the partners working with NIST to foster tech transfer and its ...

2013-08-16T23:59:59.000Z

272

NREL: Technology Transfer - Nondisclosure Agreements  

Technology Transfer ... Experience suggests that the fastest means to reach an agreement is through direct communications to create understanding and agree on actions. 1.

273

Technology Transfer | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

by facilitating development, transfer, and use of federally owned or originated technology to industry for public benefit and to leverage DOE resources through partnering with...

274

Partnerships and Technology Transfer - ORNL  

Carbon Fiber Consortium; Oak Ridge Science and Technology Park; Contact; Staff; Oak Ridge National Laboratory. Partnerships and Technology Transfer. User Facilities ...

275

Analysing the WAP class 2 wireless transaction protocol using coloured Petri nets  

Science Conference Proceedings (OSTI)

Coloured Petri nets (CPNs) are used to specify and analyse the Class 2 Wireless Transaction Protocol (WTP). The protocol provides a reliable request/response service to the Session layer in the Wireless Application Protocol (WAP) architecture. When only ...

Steven Gordon; Jonathan Billington

2000-06-01T23:59:59.000Z

276

RADCAL Operations Manual Radiation Calibration Laboratory Protocol  

SciTech Connect

The Life Sciences Division (LSD) of Oak Ridge National Laboratory (ORNL) has a long record of radiation dosimetry research, primarily using the Health Physics Research Reactor (HPRR) and the Radiation Calibration Laboratory (RADCAL) in its Dosimetry Applications Research (DOSAR) Program. These facilities have been used by a broad segment of the research community to perform a variety of experiments in areas including, but not limited to, radiobiology, radiation dosimeter and instrumentation development and calibration, and the testing of materials in a variety of radiation environments. Operations of the HPRR were terminated in 1987 and the reactor was moved to storage at the Oak Ridge Y-12 Plant; however, RADCAL will continue to be operated in accordance with the guidelines of the National Institute of Standards and Technology (NIST) Secondary Calibration Laboratory program and will meet all requirements for testing dosimeters under the National Voluntary Laboratory Accreditation Program (NVLAP). This manual is to serve as the primary instruction and operation manual for the Oak Ridge National Laboratory's RADCAL facility. Its purpose is to (1) provide operating protocols for the RADCAL facility, (2) outline the organizational structure, (3) define the Quality Assurance Action Plan, and (4) describe all the procedures, operations, and responsibilities for the safe and proper operation of all routine aspects of the calibration facility.

Bogard, J.S.

1998-12-01T23:59:59.000Z

277

Protocol for maximizing energy savings and indoor environmental quality  

NLE Websites -- All DOE Office Websites (Extended Search)

Protocol for maximizing energy savings and indoor environmental quality Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Title Protocol for maximizing energy savings and indoor environmental quality improvements when retrofitting apartments Publication Type Journal Article LBNL Report Number LBNL-6147E Year of Publication 2013 Authors Noris, Federico, William W. Delp, Kimberly Vermeer, Gary Adamkiewicz, Brett C. Singer, and William J. Fisk Journal Energy and Buildings Volume 61 Pagination 378-386 Date Published 06/2013 Keywords apartments, buildings, costs, energy, indoor environmental quality, Protocol, retrofits, Selection Abstract The current focus on building energy retrofit provides an opportunity to simultaneously improve indoor environmental quality (IEQ). Toward this end, we developed a protocol for selecting packages of retrofits that both save energy and improve IEQ in apartments. The protocol specifies the methodology for selecting retrofits from a candidate list while addressing expected energy savings, IEQ impacts, and costs in an integrated manner. Interviews, inspections and measurements are specified to collect the needed input information. The protocol was applied to 17 apartments in three buildings in two different climates within California. Diagnostic measurements and surveys conducted before and after retrofit implementation indicate enhanced apartment performance.

278

How to Implement a Protocol for Babel RMI  

Science Conference Proceedings (OSTI)

RMI support in Babel has two main goals: transparency & flexibility. Transparency meaning that the new RMI features are entirely transparent to existing Babelized code; flexibility meaning the RMI capability should also be flexible enough to support a variety of RMI transport implementations. Babel RMI is a big success in both areas. Babel RMI is completely transparent to already Babelized implementation code, allowing painless upgrade, and only very minor setup changes are required in client code to take advantage of RMI. The Babel RMI transport mechanism is also extremely flexible. Any protocol that implements Babel's minimal, but complete, interface may be used as a Babel RMI protocol. The Babel RMI API allows users to select the best protocol and connection model for their application, whether that means a WebServices-like client-server model for use over a WAP, or a faster binary peer-to-peer protocol for use on different nodes in a leadership-class supercomputer. Users can even change protocols without recompiling their code. The goal of this paper is to give network researchers and protocol implementors the information they need to develop new protocols for Babel RMI. This paper will cover both the high-level interfaces in the Babel RMI API, and the low level details about how Babel RMI handles RMI objects.

Kumfert, G; Leek, J

2006-03-30T23:59:59.000Z

279

Urban Sewage Delivery Heat Transfer System (2): Heat Transfer  

E-Print Network (OSTI)

The thimble delivery heat-transfer (TDHT) system is one of the primary modes to utilize the energy of urban sewage. Using the efficiency-number of transfer units method ( ), the heat-transfer efficiencies of the parallel-flow and reverse-flow TDTH forms are analyzed and the calculation formulas and characteristic are also given. The results indicate that the efficiency of the parallel-flow form is greater than that of the reverse-flow, so the TDTH system must choose the parallel-flow form. The distance-load ratio (DLR) is defined and the minimum DLR is obtained by the technical and economic feasibility analysis. The paper will provide references for heat-transfer calculation and schematic determination of urban sewage cool or heat source applied delivery heat transfer methods.

Zhang, C.; Wu, R.; Li, X.; Li, G.; Zhuang, Z.; Sun, D.

2006-01-01T23:59:59.000Z

280

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantum discord as a resource in quantum protocols  

E-Print Network (OSTI)

We show quantum discord to be a resource in quantum information processing. This is accomplished by proving a relation between quantum discord and the yield of the quantum protocols. Our results are derived by studying the fully quantum Slepian-Wolf protocol -- a unification of all bipartite, unidirectional and memoryless quantum communication protocols -- in the presence of noise. As examples, we elucidate the significance of quantum discord in quantum teleportation, superdense coding, and entanglement distillation. Finally, we provide the first quantitative relation between quantum discord and the query complexity of quantum computations.

Madhok, Vaibhav

2012-01-01T23:59:59.000Z

282

Internet voting protocol based on implicit data security  

E-Print Network (OSTI)

This paper presents a new protocol for Internet voting based on implicit data security. This protocol allows recasting of votes, which permits a change of mind by voters either during the time window over which polling is open or during a shorter period over which recasting is permitted. The security of votes depends on multiple servers such that each vote is divided into partitions and these partitions are distributed among the servers, all of which need to be brought together to reconstruct the votes. Such a protocol has potential applications in bargaining and electronic commerce.

Parakh, Abhishek

2010-01-01T23:59:59.000Z

283

Kyoto Protocol: Enforcement Prohibitions (West Virginia) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) Kyoto Protocol: Enforcement Prohibitions (West Virginia) < Back Eligibility Utility Fed. Government Commercial Agricultural Investor-Owned Utility State/Provincial Govt Industrial Construction Municipal/Public Utility Local Government Residential Installer/Contractor Rural Electric Cooperative Tribal Government Low-Income Residential Schools Retail Supplier Institutional Multi-Family Residential Systems Integrator Fuel Distributor Nonprofit General Public/Consumer Transportation Program Info State West Virginia Program Type Climate Policies The West Virginia division of environmental protection shall refrain from proposing or promulgating any new rule intended, in whole or in part, to reduce emissions of greenhouse gases from the residential, commercial,

284

T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions September 27,...

285

A Stream-Oriented Power Management Protocol for Low Duty Cycle Sensor Network Applications  

E-Print Network (OSTI)

These protocols waste energy through radio switching, idlePacket-based protocols also waste energy through neighborrouting table may be a waste of energy. In this instance, a

Ramanathan, Nithya; Yarvis, Mark D; Chhabra, Jasmeet; Kushalnagar, Nandakishore; Krishnamurthy, Lakshman; Estrin, D

2005-01-01T23:59:59.000Z

286

Cooper pair transfer in nuclei  

E-Print Network (OSTI)

The second order DWBA implementation of two-particle transfer direct reactions which includes simultaneous and successive transfer, properly corrected by non-orthogonality effects is tested with the help of controlled nuclear structure and reaction inputs against data spanning the whole mass table, and showed to constitute a quantitative probe of nuclear pairing correlations.

G. Potel; A. Idini; F. Barranco; E. Vigezzi; R. A. Broglia

2013-04-09T23:59:59.000Z

287

Argonne TDC: Material Transfer Agreements  

NLE Websites -- All DOE Office Websites (Extended Search)

Material Transfer Agreements Material Transfer Agreements Materials produced by researchers at Argonne National Laboratory are often of interest to the private sector. Depending on the circumstances under which the material was developed, such material may be transferred to industry for a number of reasons (e.g., testing, feasibility studies, etc.). This transfer is usually temporary and can initiate a more formal working arrangement. At this time, TDC, in conjunction with Argonne's Legal Department, provides such agreements on an as-needed basis. If you would like to acquire material produced by Argonne researchers during the course of a federally funded research project, please contact TDC or fill out a Material Transfer Agreement request form. Printed or electronically downloaded copies may become obsolete. Before using such a copy for work direction, employees must verify that it is current by comparing its revision number with that of the online version. Obsolete forms will be rejected.

288

Open-Protocol Platform for Commercial Building Operations and Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Open-Protocol Platform for Commercial Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm Open-Protocol Platform for Commercial Building Operations and Energy Management Algorithm The U.S. Department of Energy (DOE) is currently conducting research into an open-protocol platform for commercial buildings and an algorithm to manage energy use. Project Description This project seeks to develop a situational analysis algorithm that characterizes the classes and capabilities of existing building automation and energy information systems, as well as the types of commercial buildings that typically use each class of equipment. Project Partners Research is being undertaken by DOE and Navigant Consulting. Project Goals The goal is to use the situational analysis algorithm to determine whether

289

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Refrigeration and Air Conditioning Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Refrigerant Guide[1] The Greenhouse Gas Protocol tool for refrigeration is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

290

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Allocation of Emissions from a Combined Heat and Power Plant Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Climate Focus Area: - Central Plant, Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: CHP Guidance v1.0[1] The Greenhouse Gas Protocol tool for allocation of GHG emissions from a combined heat and power (CHP) plant is a free Excel spreadsheet calculator

291

Nuclear Energy Protocol for Research Isotopes Owen Lowe  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol for Protocol for Research Isotopes Owen Lowe Office of Isotopes for Medicine and Science Office of Nuclear Energy, Science and Technology April 16, 2002 Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology Lowe/April16_02 NEPRI to NERAC.ppt (2) Nuclear Energy Protocol For Research Isotopes Nuclear Energy Protocol For Research Isotopes Why NEPRI? 6 NEPRI implements DOE funding priorities for fiscal year 2003 6 NEPRI will * Bring order to DOE's responses to requests for research isotopes * Introduce a high-quality peer review to the selection of research isotopes * Enable DOE to concentrate on operating its unique isotope production facilities Isotopes for Life Isotopes for Life Isotopes for Life Office of Nuclear Energy, Science and Technology

292

Protocol to co-operation agreement with Iran  

E-Print Network (OSTI)

A Co-operation Agreement between CERN and Iran will be signed in the coming weeks within the framework of the decisions taken by the Committee of Council and Council in June 1989. In view of implementing this Agreement, a Protocol between CERN and the International Scientific Meetings Office of the Ministry of Science of the Islamic Republic of Iran has been drawn up. It concerns the participation of scientific Institutions of Iran in the CMS Collaboration where CERN is acting on behalf of this Collaboration. This Protocol incorporates the agreement between CMS and ISMO on the Iranese contribution. It does not involve any financial commitment for CERN. The Protocol mainly addresses the status of the Iranese scientists at CERN, the supply by ISMO of the support tables for CMS, as well as the usual provisions concerning delivery and customs, guarantees, responsibilities, intellectual property and disputes. This Protocol is submitted to the Finance Committee for information.

2001-01-01T23:59:59.000Z

293

Toward a Standardized Metadata Protocol for Urban Meteorological Networks  

Science Conference Proceedings (OSTI)

With the growing number and significance of urban meteorological networks (UMNs) across the world, it is becoming critical to establish a standard metadata protocol. Indeed, a review of existing UMNs indicate large variations in the quality, quantity, and ...

Catherine L. Muller; Lee Chapman; C.S.B. Grimmond; Duick T. Young; Xiao-Ming Cai

2013-08-01T23:59:59.000Z

294

Typhoon: a reliable data dissemination protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

We present Typhoon, a protocol designed to reliably deliver large objects to all the nodes of a wireless sensor network (WSN). Typhoon uses a combination of spatially-tuned timers, prompt retransmissions, and frequency diversity to reduce contention ...

Chieh-Jan Mike Liang; R?zvan Mus?loiu-E.; Andreas Terzis

2008-01-01T23:59:59.000Z

295

SSO password-based multi-server authentication protocol  

Science Conference Proceedings (OSTI)

User's password verification information stored on the server is main point of vulnerability and remains attractive target for attacker. Proposed protocol uses two-server architecture so that password verification information is distributed between ...

Sandeep K. Sood; Anil K. Sarje; Kuldip Singh

2012-07-01T23:59:59.000Z

296

Exploiting home automation protocols for load monitoring in smart buildings  

Science Conference Proceedings (OSTI)

Monitoring and controlling electrical loads is crucial for demand-side energy management in smart grids. Home automation (HA) protocols, such as X10 and Insteon, have provided programmatic load control for many years, and are being widely deployed in ...

David Irwin; Sean Barker; Aditya Mishra; Prashant Shenoy; Anthony Wu; Jeannie Albrecht

2011-11-01T23:59:59.000Z

297

A Simple Protocol to Communicate Channels over Channels  

Science Conference Proceedings (OSTI)

In this paper we present the communication protocol that we use to implement first class channels. Ordinary channels allow data communication (like CSP/Occam); first class channels allow communicating channel ends over a channel. This enables processes ...

Henk L. Muller; David May

1998-09-01T23:59:59.000Z

298

The Cost of Kyoto Protocol Targets: The Case of Japan  

E-Print Network (OSTI)

This paper applies the MIT Emissions Prediction and Policy Analysis (EPPA) model to analysis of the cost of the Kyoto Protocol targets, with a special focus on Japan. The analysis demonstrates the implications of the use ...

Paltsev, Sergey.

299

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 USChina Electric Vehicle Initiative Meeting August 23-24, 2012...

300

A scalable protocol for the synthesis and use of neomenthyldiphenylphosphine.  

E-Print Network (OSTI)

A scalable and reproducible protocol has been developed for the preparation of (-)- neomenthyldiphenylphosphine ((-)-1) from inexpensive starting materials. This ligand was then utilized in the nickel-catalyzed reductive ...

Van Dyke, Aaron R. (Aaron Robert)

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Terrestrial Photovoltaic Module Accelerated Test-To-Failure Protocol  

SciTech Connect

This technical report documents a test-to-failure protocol that may be used to obtain quantitative information about the reliability of photovoltaic modules using accelerated testing in environmental temperature-humidity chambers.

Osterwald, C. R.

2008-03-01T23:59:59.000Z

302

TDM MAC protocol design and implementation for wireless mesh networks  

Science Conference Proceedings (OSTI)

We present the design, implementation, and evaluation of a Time Division Multiplex (TDM) MAC protocol for multi-hop wireless mesh networks using a programmable wireless platform. Extensive research has been devoted to optimal scheduling algorithms for ...

Dimitrios Koutsonikolas; Theodoros Salonidis; Henrik Lundgren; Pascal LeGuyadec; Y. Charlie Hu; Irfan Sheriff

2008-12-01T23:59:59.000Z

303

A Study of Transport Protocols for Wide Area Scientific Applications  

SciTech Connect

This is the final project report of award "A Study of Transport Protocols for Wide Area Scientific Applications", given by DOE in 2003 to Vishal Misra at Columbia University.

Vishal Misra

2011-03-01T23:59:59.000Z

304

Implementation of a cluster based routing protocol for mobile networks  

Science Conference Proceedings (OSTI)

We show the implementation and the simulation results of a hierarchical, cluster based routing protocol for mobile ad hoc networks using Parallel Virtual Machine (PVM). The network represented by a graph is partitioned into clusters by a graph ...

Geoffrey Marshall; Kayhan Erciyes

2005-05-01T23:59:59.000Z

305

New cryptographic protocols With side-channel attack security  

E-Print Network (OSTI)

Cryptographic protocols implemented in real world devices are subject to tampering attacks, where adversaries can modify hardware or memory. This thesis studies the security of many different primitives in the Related-Key ...

Miller, Rachel A., S.M. (Rachel Ann). Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

306

Office of Safety and Emergency Management Evaluations Protocol...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

<: iisS Offlct of Hulth , S.ftly ind St curity OFFICE OF SAFETY AND EMERGENCY MANAGEMENT EVALUATIONS PROTOCOL FOR THE DEVELOPMENT AND MAINTENANCE OF CRITERIA AND REVIEW APPROACH...

307

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Purchased Electricity Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Buildings, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: Electricity Heat, and Steam Purchase Guidance v1.2[1] The Greenhouse Gas Protocol tool for purchased electricity is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically

308

Kyoto Protocol Act of 1998 (Illinois) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) Kyoto Protocol Act of 1998 (Illinois) < Back Eligibility State/Provincial Govt Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Program Info State Illinois Program Type Climate Policies Environmental Regulations Provider Illinois Pollution Control Board Effective immediately, the Illinois Environmental Protection Agency and the Pollution Control Board shall not propose or adopt any new rule for the intended purpose of addressing the adverse effects of climate change which in whole or in part reduces emissions of greenhouse gases, as those gases are defined by the Kyoto Protocol, from the residential, commercial, industrial, electric utility, or transportation sectors. In the absence of

309

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of  

Open Energy Info (EERE)

The Greenhouse Gas Protocol Initiative: Measurement and Estimation of The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Greenhouse Gas Protocol Initiative: Measurement and Estimation of Uncertainty of GHG Emissions Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free References: GHG Uncertainty Guide[1] The Greenhouse Gas Protocol Uncertainty Tool is designed to facilitate a quantitative and qualitative estimation of uncertainty associated with a

310

Protocol for Laboratory Testing of SCR Catalyst: 2nd Edition  

Science Conference Proceedings (OSTI)

With the widespread deployment of selective catalytic NOx reduction (SCR) throughout the U.S. fleet of coal fired utility boilers, there was a need to establish standardized protocols to test catalyst. In 2006, EPRI issued a protocol that provided a uniform basis for testing SCR catalyst. In 2007, a wide range of industry representatives, including members of the Post-Combustion NOx Control Program, catalyst vendors, an independent catalyst testing laboratory, a catalyst reconditioner, and a provider of ...

2007-12-21T23:59:59.000Z

311

ASHRAE's New Performance Measurement Protocols for Commercial Buildings  

E-Print Network (OSTI)

ASHRAE, CIBSE and USGBC are developing a standardized, consistent set of protocols to facilitate the comparison of the measured performance of buildings, especially those claimed to be green, sustainable, and/or high performance. Such protocols are needed because claims of high performance cannot be credible without such standardized protocols being applied consistently in the U.S. as well as internationally. The protocols will identify what is to be measured, how it is to be measured (instrumentation and spatial resolution), and how often it is to be measured. They will address both the use and reporting of the measured data, as well as appropriate benchmarks for each of the following characteristics: Energy Use (site, and source), Indoor Environmental Quality (IEQ)-Thermal Comfort, IEQ-Indoor Air Quality, IEQ-Lighting/ Daylighting Quality, IEQ-Acoustics and Water Use. The primary users of the protocols document will be building owners and facility managers, rating and labeling system developers, government officials, as well as architects and design engineers. To date, a scoping document has been developed, an extensive literature review has been performed (available on ASHRAEs web site), and a committee formed to write the protocols, which are intended for publication in January 2009.

Haberl, J.; Davies, H.; Owens, B.; Hunn, B.

2008-10-01T23:59:59.000Z

312

Prospects for Money Transfer Models  

E-Print Network (OSTI)

Summary. Recently, in order to explore the mechanism behind wealth or income distribution, several models have been proposed by applying principles of statistical mechanics. These models share some characteristics, such as consisting of a group of individual agents, a pile of money and a specific trading rule. Whatever the trading rule is, the most noteworthy fact is that money is always transferred from one agent to another in the transferring process. So we call them money transfer models. Besides explaining income and wealth distributions, money transfer models can also be applied to other disciplines. In this paper we summarize these areas as statistical distribution, economic mobility, transfer rate and money creation. First, money distribution (or income distribution) can be exhibited by recording the money stock (flow). Second, the economic mobility can be shown by tracing the change in wealth or income over time for each agent. Third, the transfer rate of money and its determinants can be analyzed by tracing the transferring process of each one unit of money. Finally, money creation process can also be investigated by permitting agents go into debts. Some future extensions to these models are anticipated to be structural improvement and generalized mathematical analysis.

Yougui Wang; Ning Ding; Ning Xi

2005-01-01T23:59:59.000Z

313

Engineering directed excitonic energy transfer  

E-Print Network (OSTI)

We provide an intuitive platform for engineering exciton transfer dynamics. We show that careful consideration of the spectral density, which describes the system-bath interaction, leads to opportunities to engineer the transfer of an exciton. Since excitons in nanostructures are proposed for use in quantum information processing and artificial photosynthetic designs, our approach paves the way for engineering a wide range of desired exciton dynamics. We carefully describe the validity of the model and use experimentally relevant material parameters to show counter-intuitive examples of a directed exciton transfer in a linear chain of quantum dots.

Perdomo, Alejandro

2010-01-01T23:59:59.000Z

314

NREL: Technology Transfer Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Transfer Technology Transfer Search More Search Options Site Map The National Renewable Energy Laboratory (NREL) works with industry and organizations to transfer renewable energy and energy efficiency technologies into the marketplace. Working with Us We offer many opportunities and ways for you to partner with us. Learn more about our technology partnership agreements and services: Agreements for Commercializing Technology Cooperative Research and Development Agreements Technologies Available for Licensing Technology Partnerships Work for Others Research Facilities NREL follows its principles for establishing mutually beneficial technology partnerships. Through our commercialization programs, we work to stimulate the market for clean energy technologies and foster the growth of clean energy start-ups.

315

Heat and moisture transfer through clothing  

E-Print Network (OSTI)

R. C. Eberhart (ed), Heat transfer in medicine and biology.Convective and radiative heat transfer coefficients for2008. Study of heat and moisture transfer within multi-layer

Voelker, Conrad; Hoffmann, Sabine; Kornadt, Oliver; Arens, Edward; Zhang, Hui; Huizenga, Charlie

2009-01-01T23:59:59.000Z

316

Los Alamos Lab: Technology Transfer | Home Page  

NLE Websites -- All DOE Office Websites (Extended Search)

Phone 505-665-9090 Address 2237 Trinity Dr., Bldg. 1 TA-00, Bldg. 1325 Map to TT (pdf) Tech Transfer Ombuds Technology Transfer The Laboratory's Technology Transfer Division...

317

Performance optimization of the go-back-N ARQ protocols over broadcast channels  

Science Conference Proceedings (OSTI)

Keywords: broadcast channels, go-back-N ARQ, performance optimization, point-to-multipoint communication, protocols

Jonathan L. Wang; John A. Silvester

1991-09-01T23:59:59.000Z

318

BGP-S: a protocol for terrestrial and satellite network integration in network layer  

Science Conference Proceedings (OSTI)

To accomplish network layer integration of terrestrial and satellite IP networks, special exterior gateway protocols are needed. In this work, a new exterior gateway protocol called Border Gateway Protocol-Satellite version (BGP-S) is introduced that ... Keywords: BGP-4, IP-based routing, exterior gateway protocol, satellite networks

Eylem Ekici; Chao Chen

2004-09-01T23:59:59.000Z

319

Proof of Security of a High-Capacity Quantum Key Distribution Protocol  

E-Print Network (OSTI)

We prove the security of a high-capacity quantum key distribution protocol over noisy channels. By using entanglement purification protocol, we construct a modified version of the protocol in which we separate it into two consecutive stages. We prove their securities respectively and hence the security of the whole protocol.

Xiao-Wei Zhang; Kai Wen; Gui Lu Long

2005-12-25T23:59:59.000Z

320

Data Transfer Nodes Yield Results!  

NLE Websites -- All DOE Office Websites (Extended Search)

DTN DTN Data Transfer Nodes Yield Results August 1, 2011 | Tags: Accelerator Science, Data Transfer, ESnet Linda Vu, +1 510 495 2402, lvu@lbl.gov The ability to reliably move and share data around the globe is essential to scientific collaboration, that's why three Department of Energy (DOE) Scientific Computing Centers-Argonne and Oak Ridge Leadership Computing Facilities, and the National Energy Research Scientific Computing Center (NERSC)-have teamed up to focus on optimizing wide area network (WAN) transfers. This ongoing effort began several years ago when each site deployed dedicated transfer nodes (DTNs), optimized for carrying data between the DOE facilities. Today, engineers from each site continue to meet regularly with DOE's Energy Sciences Network staff (ESnet) to develop strategies

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Method Of Transferring Strained Semiconductor Structures  

NLE Websites -- All DOE Office Websites (Extended Search)

Of Transferring Strained Semiconductor Structures Of Transferring Strained Semiconductor Structures Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having surface contaminants. June 25, 2013 Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having surface contaminants. Available for thumbnail of Feynman Center (505) 665-9090 Email Method Of Transferring Strained Semiconductor Structures The transfer of strained semiconductor layers from one substrate to another substrate involves depositing a multilayer structure on a substrate having

322

NREL: Technology Transfer - Webmaster - National Renewable ...  

National Renewable Energy Laboratory Technology Transfer Webmaster. To report any problems on or ask a question about the NREL Technology Transfer Web ...

323

Fermilab | Office of Partnerships and Technology Transfer ...  

Quantum Diaries; Office of Partnerships and Technology Transfer. Feature. Tech Transfer at Fermilab. In an effort to fuel the economy and foster ...

324

Heat Transfer Enhancement in Thermoelectric Power Generation.  

E-Print Network (OSTI)

??Heat transfer plays an important role in thermoelectric (TE) power generation because the higher the heat-transfer rate from the hot to the cold side of (more)

Hu, Shih-yung

2009-01-01T23:59:59.000Z

325

Technology Transfer Commercialization Act of 2000 | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Transfer Commercialization Act of 2000 Technology Transfer Commercialization Act of 2000 PUBLIC LAW 106-404-NOV. 1, 2000 To improve the ability of Federal agencies to...

326

Smart Lawrence Berkeley National Laboratory Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

From Berkeley Lab to the Marketplace Smart Lawrence Berkeley National Laboratory Technology Transfer with Partner Lawrence Berkeley National Laboratory Technology Transfer at...

327

Comments on ORNL Tech transfer.txt - Notepad | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

on ORNL Tech transfer.txt - Notepad Comments on ORNL Tech transfer.txt - Notepad Comments on ORNL Tech transfer.txt - Notepad More Documents & Publications TECHNOLOGY TRANSFER...

328

Technology_Transfer_Memo.pdf | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TechnologyTransferMemo.pdf TechnologyTransferMemo.pdf TechnologyTransferMemo.pdf More Documents & Publications PolicyStatementonTechnologyTransfer.pdf...

329

Contact NETL Technology Transfer Group  

NLE Websites -- All DOE Office Websites (Extended Search)

NETL Technology Transfer Group techtransfer@netl.doe.gov May 2012 Significance * Applicable to subcritical and supercritical air-fired boiler designs * Eliminates the need to mimic air-fired heat transfer characteristics in order to meet existing dry steam load demands * Reduces retrofit complexity, time, and cost Applications * Retrofitting of conventional air-fired boilers Opportunity Research is active on the patent-pending technology, titled "Temperature

330

Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Hazard Nuclear Facility Project Oversight - November High Hazard Nuclear Facility Project Oversight - November 2012 Protocol, High Hazard Nuclear Facility Project Oversight - November 2012 November 2012 Protocol for High Hazard Nuclear Facility Project Oversight The purpose of this protocol is to establish the requirements and responsibilities for managing and conducting Office of Health, Safety and Security (HSS) independent oversight of high-hazard nuclear facility projects. As part of the Department of Energy's (DOE) self regulatory framework for safety and security, DOE Order 227.1, Independent Oversight Program, assigns HSS the responsibility for implementing an independent oversight program. It also requires the HSS Office of Enforcement and Oversight to conduct independent evaluations of safety and security. This

331

Protocols for BNCT of glioblastoma multiforme at Brookhaven: Practical considerations  

SciTech Connect

In this report we discuss some issues considered in selecting initial protocols for boron neutron capture therapy (BNCT) of human glioblastoma multiforme. First the tolerance of normal tissues, especially the brain, to the radiation field. Radiation doses limits were based on results with human and animal exposures. Estimates of tumor control doses were based on the results of single-fraction photon therapy and single fraction BNCT both in humans and experimental animals. Of the two boron compounds (BSH and BPA), BPA was chosen since a FDA-sanctioned protocol for distribution in humans was in effect at the time the first BNCT protocols were written and therapy studies in experimental animals had shown it to be more effective than BSH.

Chanana, A.D.; Coderre, J.A.; Joel, D.D.; Slatkin, D.N.

1996-12-31T23:59:59.000Z

332

Protocol, Test Inspectors Guide - March 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Test Inspectors Guide - March 2008 Test Inspectors Guide - March 2008 Protocol, Test Inspectors Guide - March 2008 March 2008 Emergency Management Limited Scope Performance Test Inspectors Guide Emergency Management Limited Scope Performance Tests Inspectors Guide provides detailed information and tools to assist inspectors assigned to evaluate the capabilities and performance of emergency responders in DOE/NNSA. Although this guide is designed specifically for the HS-63 inspector, it is made available to the field and may be useful to field element and facility contractor personnel who conduct surveys or self-assessments of emergency management programs. Protocol, Test Inspectors Guide - March 2008 More Documents & Publications Protocol, Appraisal Process Guide - April 2008 Independent Oversight Review, Los Alamos National Laboratory - April 2012

333

Greenhouse Gas Regional Inventory Protocol (GRIP) Website | Open Energy  

Open Energy Info (EERE)

Greenhouse Gas Regional Inventory Protocol (GRIP) Website Greenhouse Gas Regional Inventory Protocol (GRIP) Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Greenhouse Gas Regional Inventory Protocol (GRIP) Website Focus Area: Other Crosscutting Topics: Potentials & Scenarios Website: www.getagriponemissions.com/index-cycle.html Equivalent URI: cleanenergysolutions.org/content/greenhouse-gas-regional-inventory-pro Language: English Policies: Deployment Programs DeploymentPrograms: "Lead by Example" is not in the list of possible values (Audit Programs, Demonstration & Implementation, Green Power/Voluntary RE Purchase, High Performance Buildings, Industry Codes & Standards, Project Development, Public Tenders, Procurement, & Lead Examples, Public-Private Partnerships, Retrofits, Ride Share, Bike Share, etc., Technical Assistance, Training & Education, Voluntary Appliance & Equipment Labeling, Voluntary Industry Agreements) for this property.

334

Transportation Protocols Working Group First Conference Call March 1, 1999  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocols Working Group First Conference Call March 1, 1999 Protocols Working Group First Conference Call March 1, 1999 Conference Call Summary The first conference call of the Transportation External Coordination Working Group (TEC/WG) DOE Transportation Protocols Working Group was held at 3:00 p.m. Eastern time on Monday March 1, 1999. The session was led by Mona Williams, DOE/NTP-Albuquerque. Other participants included Bill Lemeshewsky, DOE/RW; Ellen Ott, DOE/GC; Elizabeth Helvey, JK Research Associates; Chris Wells, SSEB; Lisa Sattler, CSG-MW, Elissa Turner, DOE/RW; Chris Wentz, New Mexico; Carl Guidice, DOE/EM; Jim Cruickshank, DOE/EM, Elmer Naples, DOE/NR; Fred Butterfield, DOE/EM; and Alex Thrower, UETC. Ms. Williams first indicated that notes from the Jacksonville meeting had been prepared and circulated for comment. She asked if there were

335

Protocol, Required Reading - June 2012 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Required Reading - June 2012 Required Reading - June 2012 Protocol, Required Reading - June 2012 June 2012 Protocol for Required Reading The purpose of this protocol is to establish the requirements and responsibilities for conducting and managing the Office of Safety and Emergency Management Evaluations (HS-45) required reading program. The required reading program provides a methodology to ensure that the HS-45 staff members are informed and up-to-date with Department of Energy (DOE), the Office of Health, Safety and Security (HSS), and office-specific requirements, processes, and guidance as well as to support continuous improvement. The required reading program will also be used to supplement staff training. This required reading program is based on DOE 0 422.1 Conduct of Operations Attachment 2, Appendix A and DOE-STD-1033-92 Guide to

336

Protocol, Development and Maintenance of Criteria and Review Approach  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Maintenance of Criteria and Review Development and Maintenance of Criteria and Review Approach Documents - July 2013 Protocol, Development and Maintenance of Criteria and Review Approach Documents - July 2013 July 2013 Protocol for the Development and Maintenance of Criteria and Review Approach Documents The purpose of this protocol is to establish the requirements and responsibilities for the development and maintenance of Criteria and Review Approach Documents (CRADs) used by the Office of Safety and Emergency Management Evaluations (HS-45). The HS-45 CRADS are carefully selected, modified (if required), and referenced in HS-45 appraisal plans. These plans are used to provide an outline of the activities planned to assess the effectiveness of safety and emergency management processes and

337

Transferability of Data Related to the Underground Test Area Project, Nevada Test Site, Nye County, Nevada: Revision 0  

SciTech Connect

This document is the collaborative effort of the members of an ad hoc subcommittee of the Underground Test Area (UGTA) Technical Working Group (TWG). The UGTA Project relies on data from a variety of sources; therefore, a process is needed to identify relevant factors for determining whether material-property data collected from other areas can be used to support groundwater flow, radionuclide transport, and other models within a Corrective Action Unit (CAU), and for documenting the data transfer decision and process. This document describes the overall data transfer process. Separate Parameter Descriptions will be prepared that provide information for selected specific parameters as determined by the U.S. Department of Energy (DOE) UGTA Project Manager. This document and its accompanying appendices do not provide the specific criteria to be used for transfer of data for specific uses. Rather, the criteria will be established by separate parameter-specific and model-specific Data Transfer Protocols. The CAU Data Documentation Packages and data analysis reports will apply the protocols and provide or reference a document with the data transfer evaluations and decisions.

Stoller-Navarro Joint Venture

2004-06-24T23:59:59.000Z

338

Canister Transfer System Description Document  

SciTech Connect

The Canister Transfer System receives transportation casks containing large and small disposable canisters, unloads the canisters from the casks, stores the canisters as required, loads them into disposal containers (DCs), and prepares the empty casks for re-shipment. Cask unloading begins with cask inspection, sampling, and lid bolt removal operations. The cask lids are removed and the canisters are unloaded. Small canisters are loaded directly into a DC, or are stored until enough canisters are available to fill a DC. Large canisters are loaded directly into a DC. Transportation casks and related components are decontaminated as required, and empty casks are prepared for re-shipment. One independent, remotely operated canister transfer line is provided in the Waste Handling Building System. The canister transfer line consists of a Cask Transport System, Cask Preparation System, Canister Handling System, Disposal Container Transport System, an off-normal canister handling cell with a transfer tunnel connecting the two cells, and Control and Tracking System. The Canister Transfer System operating sequence begins with moving transportation casks to the cask preparation area with the Cask Transport System. The Cask Preparation System prepares the cask for unloading and consists of cask preparation manipulator, cask inspection and sampling equipment, and decontamination equipment. The Canister Handling System unloads the canister(s) and places them into a DC. Handling equipment consists of a bridge crane/hoist, DC loading manipulator, lifting fixtures, and small canister staging racks. Once the cask has been unloaded, the Cask Preparation System decontaminates the cask exterior and returns it to the Carrier/Cask Handling System via the Cask Transport System. After the DC is fully loaded, the Disposal Container Transport System moves the DC to the Disposal Container Handling System for welding. To handle off-normal canisters, a separate off-normal canister handling cell is located adjacent to the canister transfer cell and is interconnected to the transfer cell by means of the off-normal canister transfer tunnel. All canister transfer operations are controlled by the Control and Tracking System. The system interfaces with the Carrier/Cask Handling System for incoming and outgoing transportation casks. The system also interfaces with the Disposal Container Handling System, which prepares the DC for loading and subsequently seals the loaded DC. The system support interfaces are the Waste Handling Building System and other internal Waste Handling Building (WHB) support systems.

NONE

2000-10-12T23:59:59.000Z

339

Polarisation Transfer in Proton Compton Scattering at High Momentum Transfer  

DOE Green Energy (OSTI)

The Jefferson Lab Hall A experiment E99-114 comprised a series of measurements to explore proton Compton scattering at high momentum transfer. For the first time, the polarisation transfer observables in the p (~ 0 ~ p) reaction were measured in the GeV energy range, where it is believed that quark-gluon degrees of freedom begin to dominate. The experiment utilised a circularly polarised photon beam incident on a liquid hydrogen target, with the scattered photon and recoil proton detected in a lead-glass calorimeter and a magnetic spectrometer, respectively.

David Hamilton

2004-12-31T23:59:59.000Z

340

Bio-Imaging Technology Transfer and Commercialization ...  

Science Conference Proceedings (OSTI)

Bio-Imaging Technology Transfer and Commercialization Showcase. For Immediate Release: August 25, 2009. ...

2010-12-29T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

NREL: Technology Transfer - President Obama Unveils Climate ...  

National Renewable Energy Laboratory Technology Transfer President Obama Unveils Climate Action Plan

342

Nanoscale heat transfer - from computation to experiment  

E-Print Network (OSTI)

Heat transfer can differ distinctly at the nanoscale from that at the macroscale. Recent advancement in

Luo, Tengfei

2013-04-09T23:59:59.000Z

343

DOE Transportation Protocols Topic Group Jacksonville, Florida January 20,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Jacksonville, Florida January 20, Jacksonville, Florida January 20, 1999 Meeting Notes and Action Items: The first meeting of the Transportation External Coordination Working Group (TEC/WG) Department of Energy (DOE) Transportation Protocols Topic Group was held at the Radisson Riverwalk Hotel in Jacksonville, FL on January 20, 1999. Mona Williams, Director of DOE's National Transportation Program, Albuquerque Office, welcomed the participants and asked them to introduce themselves (a list of participants with affiliations and addresses is attached). Following the roundtable introductions, Ms. Williams briefly stated the meeting's purpose, which was to discuss the process of protocols development and how review and input from TEC/WG participants could enhance

344

The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or  

Open Energy Info (EERE)

Transport or Transport or Mobil Sources Jump to: navigation, search Tool Summary Name: The Greenhouse Gas Protocol Initiative: GHG Emissions from Transport or Mobil Sources Agency/Company /Organization: World Resources Institute, World Business Council for Sustainable Development Sector: Energy, Climate Focus Area: Transportation, Greenhouse Gas Phase: Determine Baseline, Evaluate Effectiveness and Revise as Needed Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.ghgprotocol.org/calculation-tools/all-tools Cost: Free The Greenhouse Gas Protocol tool for mobile combustion is a free Excel spreadsheet calculator designed to calculate GHG emissions specifically from mobile combustion sources, including vehicles under the direct control

345

Protocol, Inspection Criteria - April 23, 2008 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Inspection Criteria - April 23, 2008 Inspection Criteria - April 23, 2008 Protocol, Inspection Criteria - April 23, 2008 April 23, 2008 Inspection Criteria, Activities, and Lines of Inquiry, April 23, 2008 Emergency planning includes the identification of hazards and threats. A hazards survey is the qualitative portion of the hazards identification process. It briefly describes the potential impacts of emergency events or conditions and summarizes the planning and preparedness requirements that apply. If determined to be required, an EPHA includes the identification and characterization of hazardous materials specific to a facility/site, analyses of potential accidents or events, and evaluation of potential consequences. Protocol, Inspection Criteria - April 23, 2008 More Documents & Publications

346

An experiment using Mec: Eurotri, Physical Layer Protocol Implemented Version  

E-Print Network (OSTI)

This work describes a part of a cooperation between LaBRI and Schlumberger Industries for developping eletricity meters. This part deals with the design and the conception of communication protocols to provide a distributed kernel with safe rendezvous primitives. The implemented version of the protocol is detailed and its safety proven using Mec. Contents 1 Industrial Environment 2 2 Hardware and Inter-Processor Communication 2 2.1 Physical Aspects : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2 Potential Problems and Solutions : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.1 Loss of data due to polling rate : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 2 2.2.2 Loss or spontaneous creation of data on the line : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : : 3 2.2.3 Transmission errors : : : : : : : : : : : : : : : : : : : : :...

Didier Egay Paul; Alain Griffault; Jean-pierre Radoux

1994-01-01T23:59:59.000Z

347

Numerical analysis of decoy state quantum key distribution protocols  

SciTech Connect

Decoy state protocols are a useful tool for many quantum key distribution systems implemented with weak coherent pulses, allowing significantly better secret bit rates and longer maximum distances. In this paper we present a method to numerically find optimal three-level protocols, and we examine how the secret bit rate and the optimized parameters are dependent on various system properties, such as session length, transmission loss, and visibility. Additionally, we show how to modify the decoy state analysis to handle partially distinguishable decoy states as well as uncertainty in the prepared intensities.

Harrington, Jim W [Los Alamos National Laboratory; Rice, Patrick R [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

348

DOE Transportation Protocols Topic Group Conference Call Summary May 13,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Conference Call Summary May 13, Conference Call Summary May 13, 1999 The Transportation External Coordination Working Group (TEC/WG) Protocols Topic Group held a conference call on May 13, 1999, to discuss the status of U.S. Department of Energy (DOE) transportation protocols currently under development, and related issues. Participants on the call included: Mona Williams, DOE National Transportation Program-Albuquerque; Ken Niles, Oregon representative, Western Interstate Energy Board; Phillip Paull, Council of State Governments-Northeastern Conference; Ron Ross, Western Governors' Association; Lisa Sattler, Council of State Governments-Midwestern Office; Alex Thrower, Urban Energy & Transportation Corporation (UETC); and Elissa Turner, DOE-Office of Civilian Radioactive Waste Management.

349

"S" Glass Manufacturing Technology Transfer  

SciTech Connect

A glass-ceramic-to metal sealing technology patented by Sandia National Laboratories, Albuquerque (SNLA) was developed by MRC-Mound for use in the manufacture of weapon components. Successful implementation attracted increasingly widespread weapon use of this technology. "S-glass" manufacturing technology was transferred to commercial vendors to ensure that weapons production schedules would be met in the coming years. Such transfer also provided sources of this fledgling technology for the Department of Defense (DOD), aerospace and other commercial uses. The steps involved in the technology transfer are described, from the initial cooperative development work of Sandia and Mound scientists and technologists to the final phase of qualifying commercial vendors for component manufacture.

Buckner, Dean, A.; McCollister, Howard, L.

1988-06-01T23:59:59.000Z

350

Reaction mechanisms of pair transfer  

E-Print Network (OSTI)

The mechanisms of nuclear transfer reactions are described for the transfer of two nucleons from one nucleus to another. Two-nucleon overlap functions are defined in various coordinate systems, and their transformation coefficients given between coordinate systems. Post and prior couplings are defined for sequential transfer mechanisms, and it is demonstrated that the combination of `prior-post' couplings avoids non-orthogonality terms, but does not avoid couplings that do not have good zero-range approximations. The simultaneous and sequential mechanisms are demonstrated for the $^{124}$Sn(p,t)$^{122}$Sn reaction at 25 MeV using shell-model overlap functions. The interference between the various simultaneous and sequential amplitudes is shown.

Ian J. Thompson

2012-04-13T23:59:59.000Z

351

Resource Center Workforce SBIR/STTR Technology Transfer ...  

Science Conference Proceedings (OSTI)

... Students in Today's Global Marketplace Technology Transfer Benefits to Academia from Tech Transfer Partnerships RESOURCE CENTER ...

2013-08-21T23:59:59.000Z

352

NREL: Technology Transfer - 22nd Industry Growth Forum ...  

22nd Industry Growth Forum Presentations. ... Technology: Energy storage ... Technology Transfer Home; About Technology Transfer;

353

Technology transfer | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology transfer Technology transfer Technology available for licensing: CURLSNovember 21, 2013 Containment Unidirectional Resource Loading System expands flexibility of glove boxes and other containment systems. Read more about Technology available for licensing: CURLS Rhodobacter System for the Expression of Membrane Proteins Using photosynthetic bacteria (Rhodobacter) for the expression of heterologous membrane proteins Read more about Rhodobacter System for the Expression of Membrane Proteins Synthesizing Membrane Proteins Using In Vitro Methodology This in vitro, cell-free expression system caters to the production of protein types that are challenging to study: membrane proteins, membrane-associated proteins, and soluble proteins that require complex redox cofactors.

354

Biomolecular free energy profiles by a shootingumbrella sampling protocol, ``BOLAS''  

E-Print Network (OSTI)

Biomolecular free energy profiles by a shooting?umbrella sampling protocol, ``BOLAS'' Ravi an efficient technique for computing free energies corresponding to conformational transitions in complex. This makes possible computation of free energy profiles along complex reaction coordinates for biomolecular

Schlick, Tamar

355

Man-in-the-middle in tunnelled authentication protocols  

Science Conference Proceedings (OSTI)

John Ioannidis: I have to interrupt here and be even more offensive than usual. But you are using the worst rackets in industry as a justification for what you're doing. There are all sorts of people just generating garbage protocols, a couple ...

N. Asokan

2003-04-01T23:59:59.000Z

356

A faster distributed protocol for constructing a minimum spanning tree  

Science Conference Proceedings (OSTI)

This paper studies the problem of constructing a minimum-weight spanning tree (MST) in a distributed network. This is one of the most important problems in the area of distributed computing. There is a long line of gradually improving protocols ...

Michael Elkin

2004-01-01T23:59:59.000Z

357

Cross-platform protocol development for sensor networks: lessons learned  

Science Conference Proceedings (OSTI)

Protocols for sensor networks are commonly coupled to the specific operating system (OS), for instance TinyOS, involving some drawbacks. First, programmers must learn OS architecture, programming guidelines, sometimes a new programming language, etc. ... Keywords: cross-platform, embedded systems, sensor networks

Marcin Brzozowski; Hendrik Salomon; Krzysztof Piotrowski; Peter Langendoerfer

2011-05-01T23:59:59.000Z

358

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

359

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network (OSTI)

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

360

Hello again: Stabilization of the Hello protocol in OSPF  

Science Conference Proceedings (OSTI)

The Hello protocol in OSPF allows each router in a network to check whether it can exchange messages with neighboring routers in its network. This check is carried out by making each router periodically send hello messages to every neighboring router ...

Jorge A. Cobb; Mohamed G. Gouda; Deepinder Sidhu

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Parallel and concurrent security of the HB and HB+ protocols  

Science Conference Proceedings (OSTI)

Juels andWeis (building on prior work of Hopper and Blum) propose and analyze two shared-key authentication protocols - HB and HB+ - whose extremely low computational cost makes them attractive for low-cost devices such as radio-frequency ...

Jonathan Katz; Ji Sun Shin

2006-05-01T23:59:59.000Z

362

Private Session Initiation Protocol (SIP) Extensions for Media Authorization  

Science Conference Proceedings (OSTI)

This document describes the need for Quality of Service (QoS) and media authorization and defines a Session Initiation Protocol (SIP) extension that can be used to integrate QoS admission control with call signaling and help guard against denial of ...

W. Marshall

2003-01-01T23:59:59.000Z

363

An efficient synchronisation protocol for wireless sensor network  

Science Conference Proceedings (OSTI)

Time synchronisation is a critical topic in wireless sensor networks for its wide applications, such as data fusion, TDMA scheduling and cooperated sleeping, etc. In this paper, we present an Accurate Time Synchronisation (ATS) protocol based on ... Keywords: WSNs, drift, linear least squares, offset, time synchronisation, wireless networks, wireless sensor networks

Liusheng Huang; Hongli Xu; Yingyu Wan; Junmin Wu; Hong Li

2007-04-01T23:59:59.000Z

364

Moving routing protocols to the user space in MANET middleware  

Science Conference Proceedings (OSTI)

Mobile Ad Hoc Network (MANET) middleware must be aware of the underlying multi-hop topology to self-adapt and to improve its communication efficiency. For this reason, many approaches rely on specific cross-layer communications to interact with the network ... Keywords: Group communication, Middleware, Mobile Ad Hoc Networks, Routing protocols

Pedro Garca Lpez; Ral Gracia Tinedo; Josep M. Bans Alsina

2010-09-01T23:59:59.000Z

365

The intergroup protocols: Scalable group communication for the internet  

SciTech Connect

Reliable group ordered delivery of multicast messages in a distributed system is a useful service that simplifies the programming of distributed applications. Such a service helps to maintain the consistency of replicated information and to coordinate the activities of the various processes. With the increasing popularity of the Internet, there is an increasing interest in scaling the protocols that provide this service to the environment of the Internet. The InterGroup protocol suite, described in this dissertation, provides such a service, and is intended for the environment of the Internet with scalability to large numbers of nodes and high latency links. The InterGroup protocols approach the scalability problem from various directions. They redefine the meaning of group membership, allow voluntary membership changes, add a receiver-oriented selection of delivery guarantees that permits heterogeneity of the receiver set, and provide a scalable reliability service. The InterGroup system comprises several components, executing at various sites within the system. Each component provides part of the services necessary to implement a group communication system for the wide-area. The components can be categorized as: (1) control hierarchy, (2) reliable multicast, (3) message distribution and delivery, and (4) process group membership. We have implemented a prototype of the InterGroup protocols in Java, and have tested the system performance in both local-area and wide-area networks.

Berket, K.

2000-11-01T23:59:59.000Z

366

Packet Drop Avoidance for High-speed network transmission protocol  

SciTech Connect

As network bandwidth continues to grow and longer paths are used to exchange large scientific data between storage systems and GRID computation, it has become increasingly obvious that there is a need to deploy a packet drop avoidance mechanism into network transmission protocols. Current end-to-end congestion avoidance mechanisms used in Transmission Control Protocol (TCP) have worked well on low bandwidth delay product networks, but with newer high-bandwidth delay networks they have shown to be inefficient and prone to unstable. This is largely due to increased network bandwidth coupled with changes in internet traffic patterns. These changes come from a variety of new network applications that are being developed to take advantage of the increased network bandwidth. This paper will examine the end-to-end congestion avoidance mechanism and perform a step-by-step analysis of its theory. In addition we will propose an alternative approach developed as part of a new network transmission protocol. Our alternative protocol uses a packet drop avoidance (PDA) mechanism built on top of the maximum burst size (MBS) theory combined with a real-time available bandwidth algorithm.

Jin, Guojun

2004-05-01T23:59:59.000Z

367

Using standard Internet Protocols and applications in space  

Science Conference Proceedings (OSTI)

This paper discusses approaches for using standard Internet technologies to meet the communication needs of future space missions. It summarizes work done by the Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC since 1997. That ... Keywords: Internet in space, Internet space missions, Space communication protocols, Space shuttle STS-107, Spacecraft networking

Keith Hogie; Ed Criscuolo; Ron Parise

2005-04-01T23:59:59.000Z

368

A lightweight idempotent messaging protocol for faulty networks  

Science Conference Proceedings (OSTI)

As parallel machines scale to one million nodes and beyond, it becomes increasingly difficult to build a reliable network that is able to guarantee packet delivery. Eventually large systems will need to employ fault-tolerant messaging protocols that ... Keywords: block-structured traces, idempotence, source-reliable messaging

Jeremy Brown; J. P. Grossman; Tom Knight

2002-08-01T23:59:59.000Z

369

Laboratory Protocol to Demonstrate Equivalency for Plant Wastewater Cotreatment  

Science Conference Proceedings (OSTI)

Adding chemical metal-cleaning wastes to ash ponds can be an inexpensive, effective method for removing contaminant metals from both wastes and ponds.This proposed laboratory protocol defines steps for determining the usefulness of ash pond comixing on a case-by-case basis and for demonstrating the equivalency of comixing with dedicated waste treatment, as required by EPA.

1987-08-26T23:59:59.000Z

370

Minimalist object oriented service discovery protocol for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper presents a new Service Discovery Protocol (SDP) suitable for Wireless Sensor Networks (WSN). The restrictions that are imposed by ultra low-cost sensor and actuators devices (basic components of a WSN) are taken into account to reach a minimal ...

D. Villa; F. J. Villanueva; F. Moya; F. Rincn; J. Barba; J. C. Lpez

2007-05-01T23:59:59.000Z

371

Modelling protocols for multiagent interaction by F-logic  

Science Conference Proceedings (OSTI)

This paper proposes a method to represent agent Unified Modelling Language (AUML) in logic form using F-logic that provides deductive capability and uniform knowledge integration base. The AUML is used to differentiate relevant interaction more precisely ... Keywords: AUML, F-logic, interaction protocols, message route, multiagent system

Hong Feng Lai

2007-12-01T23:59:59.000Z

372

Synapse: a scalable protocol for interconnecting heterogeneous overlay networks  

Science Conference Proceedings (OSTI)

This paper presents Synapse, a scalable protocol for information retrieval over the inter-connection of heterogeneous overlay networks. Applications on top of Synapse see those intra-overlay networks as a unique inter-overlay network. Scalability in ... Keywords: information retrieval, overlay networks, peer-to-peer

Luigi Liquori; Cdric Tedeschi; Laurent Vanni; Francesco Bongiovanni; Vincenzo Ciancaglini; Bojan Marinkovi?

2010-05-01T23:59:59.000Z

373

Distributed Network Protocol (DNP3) Security Interoperability Testing 2012  

Science Conference Proceedings (OSTI)

This project encourages the adoption of the Distributed Network Protocol (DNP3) Secure Authentication specification through three approaches:Supporting development and review of the specification by industry experts in supervisory control and data acquisition (SCADA) and cryptographyAligning the specification with international standards performing similar functions, so that there is a common industry-wide approach to SCADA securityDeveloping ...

2012-12-31T23:59:59.000Z

374

Protocols for processes: programming in the large for open systems  

Science Conference Proceedings (OSTI)

The modeling and enactment of business processes is being recognized as key to modern information managment. The expansion of Web services has increased the attention given to processes, because processes are how services are composed and put to good ... Keywords: business processes, interaction protocols, open systems

Munindar P. Singh; Amit K. Chopra; Nirmit Desai; Ashok U. Mallya

2004-12-01T23:59:59.000Z

375

Multi-gas assessment of the Kyoto protocol  

E-Print Network (OSTI)

The Kyoto Protocol is an international agreement aimed at limiting emissions of several greenhouse gases (GHGs; specifically: CO2, CH4, N2O, PFCs, HFCs, and SF6), and allows credit for approved sinks for CO2. It does not ...

Reilly, John M.; Prinn, Ronald G.; Harnisch, Jochen.; Fitzmaurice, Jean.; Jacoby, Henry D.; Kicklighter, David W.; Stone, Peter H.; Sokolov, Andrei P.; Wang, Chien.

376

A survey on secure multipath routing protocols in WSNs  

Science Conference Proceedings (OSTI)

Routing protocols in wireless sensor networks (WSN) have been substantially investigated by researches. Most state-of-the-art surveys have focused on reviewing the different routing schemes that have been proposed for WSN and classifying them based on ... Keywords: Multipath routing, Secure multipath routing, Security, Wireless sensor networks

Eliana Stavrou; Andreas Pitsillides

2010-09-01T23:59:59.000Z

377

Microsoft Word - Protocol for HSS Site Leads.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safety and Safety and Emergency Management Evaluations Protocol for Site Leads May 2011 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy i Table of Contents 1.0 Purpose .....................................................................................................................1 2.0 Applicability ............................................................................................................1 3.0 Requirements ...........................................................................................................1 4.0 Responsibilities ........................................................................................................2 5.0 References ................................................................................................................4

378

Simulation of a VPN implementation based on MPLS protocol, a case study: VPN-MPLS for MSN-AT  

Science Conference Proceedings (OSTI)

In this paper, we present the implementation of a Virtual Private Network (VPN) using a Multi-Protocol Label Switching (MPLS) protocol. Because this protocol is very promising, economically and technologically, we have adopted it as the basic protocol ... Keywords: MPLS, VPN, network, protocol, security

N. Djenane; A. Benaouda; S Harous

2009-12-01T23:59:59.000Z

379

UNFINISHED BUSINESS: The Economics of The Kyoto Protocol  

SciTech Connect

The Kyoto Protocol to the Framework Convention on Climate Change (FCCC) was completed on the morning of December 11, 1997, following over two years of negotiations. The product of these deliberations is a complex and incomplete document knitting together the diversity of interests and perspectives represented by the more than 150 delegations. Because the document is complex, its implications are not immediately obvious. If it enters into force, the Kyoto Protocol will have far-reaching implications for all nations--both nations with obligations under the Protocol and those without obligations. National energy systems, and the world's energy system, could be forever changed. In this paper the authors develop an assessment of the energy and economic implications of achieving the goals of the Kyoto Protocol. They find that many of the details of the Protocol that remain to be worked out introduce critical uncertainties affecting the cost of compliance. There are also a variety of uncertainties that further complicate the analysis. These include future non-CO{sub 2} greenhouse gas emissions and the cost of their mitigation. Other uncertainties include the resolution of negotiations to establish rules for determining and allocating land-use emissions rights, mechanisms for Annex 1 trading, and participation by non-Annex 1 members in the Clean Development Mechanism. In addition, there are economic uncertainties, such as the behavior of Eastern Europe and the former Soviet Union in supplying emissions credits under Annex 1 trading. These uncertainties in turn could affect private sector investments in anticipation of the Protocol's entrance into force. The longer the nature of future obligations remains unclear, the less able decision makers will be to incorporate these rules into their investment decisions. They find that the cost of implementing the Protocol in the US can vary by more than an order of magnitude. The marginal cost could be as low as $26 per tonne of carbon if a global system of emissions mitigation could be quickly and effectively implemented. But it could also exceed $250 per tonne of carbon if the US must meet its emissions limitations entirely through domestic actions, and if mitigation obligations are not adequately anticipated by decision-makers.

JA Edmonds; CN MacCracken; RD Sands; SH Kim

2000-07-06T23:59:59.000Z

380

NIH Technology Transfer Prepared by  

E-Print Network (OSTI)

Institutes of Health U.S. Department of Health & Human Services February 2013 #12;Table of Contents 2013 Federal Laboratory Consortium | National Award | Excellence in Technology Transfer Glybera®: First Gene.......................................................................................................................... 3 2012 National Institutes of Health | Inventors on NIH Patents Issued in FY 2012 Congratulations

Bandettini, Peter A.

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Semiclassical aspects of transfer reactions  

SciTech Connect

Semiclassical analysis of heavy ion induced transfer reactions are discussed for the quasielastic region. Some unique aspects of these reactions are shown, the variety of features which can be understood semiclassically is demonstrated, and some open problems are indicated. 28 refs., 16 figs. (LEW)

Bond, P.D.

1985-01-01T23:59:59.000Z

382

Submersible canned motor transfer pump  

DOE Patents (OSTI)

A transfer pump used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass therethrough, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank.

Guardiani, Richard F. (Ohio Township, Allegheny County, PA); Pollick, Richard D. (Sarver, PA); Nyilas, Charles P. (Monroeville, PA); Denmeade, Timothy J. (Lower Burrell, PA)

1997-01-01T23:59:59.000Z

383

Data Transfer | Argonne Leadership Computing Facility  

NLE Websites -- All DOE Office Websites (Extended Search)

Data Transfer Data Transfer The Blue Gene/P connects to other research institutions using a total of 20 GBs of public network connectivity. This allows scientists to transfer datasets to and from other institutions over fast research networks such as the Energy Science Network (ESNet) and the Metropolitan Research and Education Network (MREN). Data Transfer Node Overview Two data transfer nodes are available to all Intrepid users, that provide the ability to perform wide and local area data transfers. dtn01.intrepid.alcf.anl.gov (alias for gs1.intrepid.alcf.anl.gov) dtn02.intrepid.alcf.anl.gov (alias for gs2.intrepid.alcf.anl.gov) Data Transfer Utilities HSI/HTAR HSI and HTAR allow users to transfer data to and from HPSS Using HPSS on Intrepid GridFTP GridFTP provides the ability to transfer data between trusted sites such

384

Geo energy research and development: technology transfer  

DOE Green Energy (OSTI)

Sandia Geo Energy Programs related to geothermal, coal, oil and gas, and synfuel resources have provided a useful mechanism for transferring laboratory technologies to private industry. Significant transfer of hardware, computer programs, diagnostics and instrumentation, advanced materials, and in situ process understanding has occurred through US/DOE supported programs in the past five years. The text briefly reviews the technology transfer procedures and summarizes 32 items that have been transferred and another 20 technologies that are now being considered for possible transfer to industry. A major factor in successful transfer has been personal interactions between Sandia engineers and the technical staff from private industry during all aspects of the technology development.

Traeger, R.K.

1982-03-01T23:59:59.000Z

385

Design and Development of a Multi-Hop Routing Protocol for Distributed Sensing Applications  

E-Print Network (OSTI)

for various applications such as habitat monitoring, agriculture, nuclear reactor control, security, etc that draws on current protocol theories. The protocol uses a hybrid network structure to achieve scalability

Faloutsos, Christos

386

To reach consensus using uninorm aggregation operator: A gossip-based protocol  

Science Conference Proceedings (OSTI)

Gossip-based protocols for group communication have attractive scalability and reliability properties. This paper presents a gossip-based protocol that enables agents to reach a consensus based on a specific uninorm aggregation operator. We theoretically ...

Zhixing Huang; Qiaoli Huang

2012-04-01T23:59:59.000Z

387

Automated Formal Verification of the DHCP Failover Protocol Using Timeout Order Abstraction  

E-Print Network (OSTI)

In this paper, we present automated formal verification of the DHCP Failover protocol. We conduct bounded model-checking for the protocol using Timeout Order Abstraction (TO-Abstraction), a technique to abstract a given ...

Umeno, Shinya

388

Advanced MAC protocol with energy-efficiency for wireless sensor networks  

Science Conference Proceedings (OSTI)

This paper proposes E2-MAC, a contention-based energy-efficient Medium Access Control (MAC) Protocol for wireless sensor networks. Energy efficiency is primary goal in wireless sensor networks. Existing MAC protocols for sensor networks attempt ...

Jae-Hyun Kim; Ho-Nyeon Kim; Seog-Gyu Kim; Seung-Jun Choi; Jai-Yong Lee

2005-01-01T23:59:59.000Z

389

A generalized binding framework for the Low Level Reader Protocol (LLRP)  

E-Print Network (OSTI)

This Master of Engineering Thesis describes the design, implementation and testing of an XML binding framework for the RFID Low Level Reader Protocol (LLRP). LLRP is a recently released protocol which standardizes the ...

Poulopoulos, Dimitrios

2008-01-01T23:59:59.000Z

390

Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population  

E-Print Network (OSTI)

In this paper, we propose an HB-like protocol for privacy-preserving authentication of RFID tags, whereby a tag can remain anonymous and untraceable to an adversary during the authentication process. Previous proposals of such protocols were based on PRF computations. Our protocol can instead be used on low-cost tags that may be incapable of computing standard PRFs. Moreover, since the underlying computations in HB protocols are very efficient, our protocol also reduces reader load compared to PRF-based protocols. We suggest a tree-based approach that replaces the PRF-based authentication from prior work with a procedure such as HB+ or HB#. We optimize the tree- traversal stage through usage of a "light version" of the underlying protocol and shared random challenges across all levels of the tree. This provides significant reduction of the communication resources, resulting in a privacy-preserving protocol almost as efficient as the underlying HB+ or HB#

Halevi, Tzipora; Halevi, Shai

2009-01-01T23:59:59.000Z

391

Test and Evaluation Protocols for ANSI/IEEE N42 Standards  

Science Conference Proceedings (OSTI)

... The test and evaluation protocols provide data sheets for data collection of test results obtained when testing radiation detection instruments ...

2012-06-27T23:59:59.000Z

392

Trials BioMed Central Study protocol The Leeds Evaluation of Efficacy of Detoxification Study (LEEDS)  

E-Print Network (OSTI)

prisons project pilot study: protocol for a randomised controlled trial comparing dihydrocodeine and buprenorphine for opiate detoxification

Laura Sheard; Clive E Adams; Hany El-sayeh

2007-01-01T23:59:59.000Z

393

Disabling equational theories in unification for cryptographic protocol analysis through tagging  

E-Print Network (OSTI)

In this paper, we show a new tagging scheme for cryptographic protocol messages. Under this tagging, equational theories of operators such as exclusive-or, binary addition etc. are effectively disabled, when terms are unified. We believe that this result has a significant impact on protocol analysis and security, since unification is at the heart of symbolic protocol analysis. Hence, disabling equational theories in unification implies disabling them altogether in protocol analysis for most operators and theories.

Malladi, Sreekanth

2010-01-01T23:59:59.000Z

394

Test Protocol Document, Hydrogen Safety Sensor Testing; Phase I: Non-Flammable Mixtures  

DOE Green Energy (OSTI)

This test protocol document includes an overview of hydrogen sensor technologies, test hardware requrements, and an outline of potential testing.

Burgess, R.; Blake, C.; Tracy, C. E.

2008-09-01T23:59:59.000Z

395

A formal model of rational exchange and its application to the analysis of Syverson's protocol  

Science Conference Proceedings (OSTI)

We propose a formal model of rational exchange and exchange protocols in general, which is based on game theory. In this model, an exchange protocol is represented as a set of strategies in a game that is played by the protocol parties and the network ...

Levente Buttyn; Jean-Pierre Hubaux; Srdjan ?apkun

2004-05-01T23:59:59.000Z

396

A Methodology for SIP and SOAP Integration Using Application-Specific Protocol Conversion  

Science Conference Proceedings (OSTI)

In recent years, the ubiquitous demands for cross-protocol application access are driving the need for deeper integration between SIP and SOAP. In this article we present a novel methodology for integrating these two protocols. Through an analysis of ... Keywords: Protocol conversion, SIP, SOAP, design concepts, middleware, specialized application languages

Goran Delac; Ivan Budiselic; Ivan Zuzak; Ivan Skuliber; Tomislav Stefanec

2012-11-01T23:59:59.000Z

397

CONFab: component based optimization of WSN protocol stacks using deployment feedback  

Science Conference Proceedings (OSTI)

Wireless sensor networks are characterized by a large number of non-standardized protocols and varying application requirements. This creates need for a systematic approach to rapidly design and optimize deployment specific protocol stacks. We employ ... Keywords: components-based design, deployment feedback, knowledge base, ontology, protocol stack composition

Junaid Ansari; Elena Meshkova; Wasif Masood; Arham Muslim; Janne Riihijrvi; Petri Mhnen

2012-10-01T23:59:59.000Z

398

Supporting bursty traffic in wireless sensor networks through a distributed advertisement-based TDMA protocol (ATMA)  

Science Conference Proceedings (OSTI)

Nodes in wireless sensor networks (WSNs) are battery powered and oftentimes deployed in remote and hostile locations. Energy conservation is, therefore, one of the primary goals of MAC protocols designed for these networks. Contention-based protocols ... Keywords: Bursty traffic, Data advertisements, Hybrid, MAC protocol, TDMA, WSN

Surjya Ray; Ilker Demirkol; Wendi Heinzelman

2013-05-01T23:59:59.000Z

399

Verified implementations of the information card federated identity-management protocol  

Science Conference Proceedings (OSTI)

We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card Profile V1.0. Our code can interoperate with existing implementations of the roles of the protocol (client, identity ... Keywords: CardSpace, cryptographic protocol verification, federated identity management, verified implementations, web services security

Karthikeyan Bhargavan; Cdric Fournet; Andrew D. Gordon; Nikhil Swamy

2008-03-01T23:59:59.000Z

400

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory  

E-Print Network (OSTI)

Homeless and Home-based Lazy Release Consistency Protocols on Distributed Shared Memory Byung and home-based Lazy Release Consistency (LRC) protocols which are used to implement Distributed Shared on homeless and home-based LRC protocols. We compared the performance between Tread- Marks, which uses

Huang, Zhiyi

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Performance analysis of session initiation protocol based call set-up over satellite-UMTS network  

Science Conference Proceedings (OSTI)

Session Initiation Protocol (SIP) has been selected as the official end-to-end signalling protocol for establishing multimedia sessions in the IP-based Universal Mobile Telecommunication Systems (UMTS) network. Since a satellite component has been identified ... Keywords: Radio link control acknowledged mode, Satellite UMTS, Session initiation protocol, Session set-up

Victor Y. H. Kueh; Rahim Tafazolli; Barry G. Evans

2005-07-01T23:59:59.000Z

402

A Global Diagnostic of Interocean Mass Transfers  

Science Conference Proceedings (OSTI)

An objective and quantitative estimate of all mean annual interocean mass transfers together with a picture of the associated mean pathways is presented. The global ocean circulation transfers mass, heat, and salinity between the various ocean ...

B. Blanke; S. Speich; G. Madec; K. Ds

2001-06-01T23:59:59.000Z

403

Power transfer through strongly coupled resonances  

E-Print Network (OSTI)

Using self-resonant coils in a strongly coupled regime, we experimentally demonstrate efficient non-radiative power transfer over distances of up to eight times the radius of the coils. We use this system to transfer 60W ...

Kurs, Andr

2007-01-01T23:59:59.000Z

404

Transfer Rate vs. I/O Units  

NLE Websites -- All DOE Office Websites (Extended Search)

O Units Transfer Rate vs. IO Units These plots show the transfer rate from the IO benchmarks as a function of the number of elizaio units in use for each particular eliza at the...

405

Adaptive file transfers for diverse environments  

Science Conference Proceedings (OSTI)

This paper presents dsync, a file transfer system that can dynamically adapt to a wide variety of environments. While many transfer systems work well in their specialized ontext, their performance comes at the cost of generality, and they perform poorly ...

Himabindu Pucha; Michael Kaminsky; David G. Andersen; Michael A. Kozuch

2008-06-01T23:59:59.000Z

406

Transfer in Reinforcement Learning via Shared Features  

E-Print Network (OSTI)

We present a framework for transfer in reinforcement learning based on the idea that related tasks share some common features, and that transfer can be achieved via those shared features. The framework attempts to capture ...

Konidaris, George

407

Attn Technology Transfer Questions.txt - Notepad  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attn Technology Transfer Questions.txt From: eschaput esandc@prodigy.net Sent: Monday, January 26, 2009 10:31 PM To: GC-62 Subject: Attn: Technology Transfer Questions We have...

408

Authorized Signature Title Asset Transfer Authorization  

E-Print Network (OSTI)

of CREF, simply indicate "TIAA-CREF" below. For all other transfers, please provide the company's address separate forms. (This form cannot be used for TIAA Basic RA transfers. Please contact TIAA for form F6969

McGaughey, Alan

409

N-Stream Approximations to Radiative Transfer  

Science Conference Proceedings (OSTI)

Schuster's two-stream approximation is first derived from Chandrasekhar's radiative transfer equation, and then generalized to an arbitrary number of streams. The resulting technique for solving the transfer equation that is similar to the ...

Charles Acquista; Frederick House; James Jafolla

1981-07-01T23:59:59.000Z

410

Please transfer ALL data off /house  

NLE Websites -- All DOE Office Websites (Extended Search)

Please transfer ALL data off house before 1212013 Please transfer ALL data off house September 3, 2013 by Kjiersten Fagnan (0 Comments) We are happy to announce that all the...

411

NREL: Technology Transfer - Research Facilities  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Facilities Research Facilities Photo of Solar Energy Research Facility building at NREL. NREL's Solar Energy Research Facility is one of many world-class facilities available to public and private agencies. For developing commercially viable energy products, organizations may partner with NREL to use our state-of-the-art laboratories, and testing and user facilities. Visit NREL's Research Facilities Web site to learn more about them. We typically develop technology partnership agreements for using our facilities and/or working with our researchers. Printable Version Technology Transfer Home About Technology Transfer Technology Partnership Agreements Licensing Agreements Nondisclosure Agreements Research Facilities Commercialization Programs Success Stories News Contacts Did you find what you needed?

412

Enhanced heat transfer using nanofluids  

DOE Patents (OSTI)

This invention is directed to a method of and apparatus for enhancing heat transfer in fluids such as deionized water. ethylene glycol, or oil by dispersing nanocrystalline particles of substances such as copper, copper oxide, aluminum oxide, or the like in the fluids. Nanocrystalline particles are produced and dispersed in the fluid by heating the substance to be dispersed in a vacuum while passing a thin film of the fluid near the heated substance. The fluid is cooled to control its vapor pressure.

Choi, Stephen U. S. (Lisle, IL); Eastman, Jeffrey A. (Naperville, IL)

2001-01-01T23:59:59.000Z

413

Submersible canned motor transfer pump  

DOE Patents (OSTI)

A transfer pump is described which is used in a waste tank for transferring high-level radioactive liquid waste from a waste tank and having a column assembly, a canned electric motor means, and an impeller assembly with an upper impeller and a lower impeller connected to a shaft of a rotor assembly. The column assembly locates a motor housing with the electric motor means adjacent to the impeller assembly which creates an hydraulic head, and which forces the liquid waste, into the motor housing to cool the electric motor means and to cool and/or lubricate the radial and thrust bearing assemblies. Hard-on-hard bearing surfaces of the bearing assemblies and a ring assembly between the upper impeller and electric motor means grind large particles in the liquid waste flow. Slots in the static bearing member of the radial bearing assemblies further grind down the solid waste particles so that only particles smaller than the clearances in the system can pass there through, thereby resisting damage to and the interruption of the operation of the transfer pump. The column assembly is modular so that sections can be easily assembled, disassembled and/or removed. A second embodiment employs a stator jacket which provides an alternate means for cooling the electric motor means and lubricating and/or cooling the bearing assemblies, and a third embodiment employs a variable level suction device which allows liquid waste to be drawn into the transfer pump from varying and discrete levels in the waste tank. 17 figs.

Guardiani, R.F.; Pollick, R.D.; Nyilas, C.P.; Denmeade, T.J.

1997-08-19T23:59:59.000Z

414

NREL: Technology Transfer - Materials Exposure Testing Market ...  

National Renewable Energy Laboratory Technology Transfer Materials Exposure Testing Market Expands with Ultra-Accelerated Weathering System

415

PNNL: Doing Business - Technology Transfer Contacts  

Search PNNL. PNNL Home; About; Research; Publications; Jobs; News; Contacts; PNNL's Technology Transfer team represents more than a century of ...

416

Available Technologies: Heat Transfer Interface for Thermo ...  

Refrigeration systems; Internal combustion engines; ... The components of the technology could be used to improve heat transfer in industrial, ...

417

Transfer function identification in power system applications  

Science Conference Proceedings (OSTI)

This paper presents an introduction to concepts and applications of transfer function identification in power systems. The paper begins with a brief introduction to transfer function identification methods using least-squares approaches and then discusses applications which include SVC's, model validation applications, and software validation. A comparison is also made between eigenvalues obtained from transfer function identification and small signal analysis. Methods for testing the validity of identified transfer functions are also discussed.

Smith, J.R.; Fatehi, F.; Woods, C.S. (Montana State Univ., Bozeman, MT (United States)); Hauer, J.F. (Bonneville Power Administration, Portland, OR (United States)); Trudnowski, D.J. (Battelle Pacific Northwest Labs., Richland, WA (United States))

1993-08-01T23:59:59.000Z

418

NREL: Technology Transfer - Commercialization Assistance Program  

National Renewable Energy Laboratory Technology Transfer Commercialization Assistance Program. The NREL Commercialization Assistance Program (NCAP) helps emerging ...

419

NREL: Technology Transfer - Agreements for Commercializing ...  

National Renewable Energy Laboratory Technology Transfer Agreements for Commercializing Technology. NREL uses Agreements for Commercializing Technology (ACT) when a ...

420

NREL: Technology Transfer - Cooperative Research and ...  

National Renewable Energy Laboratory Technology Transfer Cooperative Research and Development Agreements. NREL uses a cooperative research and development agreement ...

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

NREL: Technology Transfer - Solar Policy and Program ...  

National Renewable Energy Laboratory Technology Transfer ... Unbiased analysis of economic and market impacts related to policy changes;

422

Heat Transfer & Alternative Energy Systems Group Staff ...  

Science Conference Proceedings (OSTI)

Heat Transfer and Alternative Energy Systems Group Staff. Staff Listing. Dr. William M. Healy, Leader, Supervisory Mechanical ...

2013-08-07T23:59:59.000Z

423

Sandia National Laboratories : Licensing/Technology Transfer  

Search; About Sandia; Mission Areas; Newsroom; Careers; Doing Business; Education; Contact Us; Licensing and Technology Transfer. IP Home; Search ...

424

Partnering Today: Technology Transfer Highlights Reactive ...  

THE LLNL TECHNOLOGY COMPANY PRODUCT Partnering Today: Technology Transfer Highlights Reactive NanoTechnologies Inc.: Temperature-controlled Precision Bonding

425

Los Alamos Lab: Technology Transfer | Home Page  

Contacts Event Calendar Maps Organization Phonebook Policy Center Emergency. NEWS. LIBRARY. JOBS. Technology Transfer, TT . Division Home; About Us; Organization;

426

FY 2008 Summary Federal Tech Transfer  

Science Conference Proceedings (OSTI)

Summary Report on Federal Laboratory Technology Transfer FY2008. For Immediate Release: April 30, 2010. Contact: Cathleen ...

2013-06-26T23:59:59.000Z

427

Jefferson Lab Technology Transfer - Thomas Jefferson National ...  

JSA Invention Disclosure; Technology Transfer Issues (Ombudsman) Programs and Facilities. Free-Electron Laser Program (FEL) Applied Research Center ...

428

NREL: Technology Transfer - NREL Launches Renewable Energy ...  

The National Renewable Energy Laboratory's (NREL's) ... For more information about REopt, visit the new website. Printable Version. Technology Transfer Home;

429

Modelling Carbon with Transferable Empirical Potentials  

Science Conference Proceedings (OSTI)

Complexities associated with hybridization and anisotropy meant that transferable potentials for carbon were slow to emerge, lagging decades behind similar...

430

Energy Innovation Portal Bridging Technology Transfer ...  

Call the Energy Innovation Portal (the Portal) a Craigslist for technology transfer, aimed at entrepreneurs, investors, and corporate technology scouts.

431

Argonne National Laboratory - Office of Technology Transfer  

argonne national laboratory's office of technology transfer offers licensable technologies developed at the Laboratory and oversees other agreements with research ...

432

NREL: Technology Transfer - Clean Energy Investors Directory  

National Renewable Energy Laboratory Technology Transfer NREL is no longer maintaining the Clean Energy Investors Directory due to widely accessible ...

433

NREL: Technology Transfer - NREL Electrode Innovation ...  

National Renewable Energy Laboratory Technology Transfer NREL Electrode Innovation Poised to Shake Up the Li-ion Battery Industry

434

NETL: Technology Transfer - Available Technologies for Partnership  

Technology Transfer Available Technologies for Partnership Software and Modeling. Month Posted. Partnership Opportunity. Patent Information. 12/2011: ...

435

Intermodal transfer of spent fuel  

Science Conference Proceedings (OSTI)

As a result of the international standardization of containerized cargo handling in ports around the world, maritime shipment handling is particularly uniform. Thus, handier exposure parameters will be relatively constant for ship-truck and ship-rail transfers at ports throughout the world. Inspectors' doses are expected to vary because of jurisdictional considerations. The results of this study should be applicable to truck-to-rail transfers. A study of the movement of spent fuel casks through ports, including the loading and unloading of containers from cargo vessels, afforded an opportunity to estimate the radiation doses to those individuals handling the spent fuels with doses to the public along subsequent transportation routes of the fuel. A number of states require redundant inspections and for escorts over long distances on highways; thus handlers, inspectors, escort personnel, and others who are not normally classified as radiation workers may sustain doses high enough to warrant concern about occupational safety. This paper addresses the question of radiation safety for these workers. Data were obtained during, observation of the offloading of reactor spent fuel (research reactor spent fuel, in this instance) which included estimates of exposure times and distances for handlers, inspectors and other workers during offloading and overnight storage. Exposure times and distance were also for other workers, including crane operators, scale operators, security personnel and truck drivers. RADTRAN calculational models and parameter values then facilitated estimation of the dose to workers during incident-free ship-to-truck transfer of spent fuel.

Neuhauser, K.S. (Sandia National Labs., Albuquerque, NM (United States)); Weiner, R.F. (Western Washington Univ., Bellingham, WA (United States))

1991-01-01T23:59:59.000Z

436

Licklider Transmission Protocol- Security Extensions Status of This Memo  

E-Print Network (OSTI)

This memo defines an Experimental Protocol for the Internet community. It does not specify an Internet standard of any kind. Discussion and suggestions for improvement are requested. Distribution of this memo is unlimited. IESG Note This RFC is not a candidate for any level of Internet Standard. It represents the consensus of the Delay Tolerant Networking (DTN) Research Group of the Internet Research Task Force (IRTF). It may be considered for standardization by the IETF in the future, but the IETF disclaims any knowledge of the fitness of this RFC for any purpose and in particular notes that the decision to publish is not based on IETF review for such things as security, congestion control, or inappropriate interaction with deployed protocols. See RFC 3932 for more information.

S. Farrell; M. Ramadas; S. Burleigh

2008-01-01T23:59:59.000Z

437

An adaptive synchronization protocol for parallel discrete event simulation  

SciTech Connect

Simulation, especially discrete event simulation (DES), is used in a variety of disciplines where numerical methods are difficult or impossible to apply. One problem with this method is that a sufficiently detailed simulation may take hours or days to execute, and multiple runs may be needed in order to generate the desired results. Parallel discrete event simulation (PDES) has been explored for many years as a method to decrease the time taken to execute a simulation. Many protocols have been developed which work well for particular types of simulations, but perform poorly when used for other types of simulations. Often it is difficult to know a priori whether a particular protocol is appropriate for a given problem. In this work, an adaptive synchronization method (ASM) is developed which works well on an entire spectrum of problems. The ASM determines, using an artificial neural network (ANN), the likelihood that a particular event is safe to process.

Bisset, K.R.

1998-12-01T23:59:59.000Z

438

Protocols for conducting Environmental Management Assessments of DOE organizations  

SciTech Connect

To assess the effectiveness of DOE`s environmental programs, the Office of Environmental Audit conducts Environmental Management Assessments of DOE programs and facilities. These assessments take a broad programmatic view of environmental systems which may cover multiple sites. The focus of the assessment is on the infrastructure, systems, programs, and tools to manage environmental issues, not on the compliance issues themselves. Protocols have been developed to assist in the conduct of Environmental Management Assessments. The protocols are, based on and serve as implementing guidelines for the Environmental Management Section of ``Performance Objectives and Criteria for Conducting DOE Environmental Audits`` (DOE/EH-022). They are intended to provide guidance to the Assessment Team in conducting these reviews.

1993-08-01T23:59:59.000Z

439

Parameterized Verification of Safety Properties in Ad Hoc Network Protocols  

E-Print Network (OSTI)

We summarize the main results proved in recent work on the parameterized verification of safety properties for ad hoc network protocols. We consider a model in which the communication topology of a network is represented as a graph. Nodes represent states of individual processes. Adjacent nodes represent single-hop neighbors. Processes are finite state automata that communicate via selective broadcast messages. Reception of a broadcast is restricted to single-hop neighbors. For this model we consider a decision problem that can be expressed as the verification of the existence of an initial topology in which the execution of the protocol can lead to a configuration with at least one node in a certain state. The decision problem is parametric both on the size and on the form of the communication topology of the initial configurations. We draw a complete picture of the decidability and complexity boundaries of this problem according to various assumptions on the possible topologies.

Delzanno, Giorgio; Zavattaro, Gianluigi; 10.4204/EPTCS.60.4

2011-01-01T23:59:59.000Z

440

SEEC- Regional Energy Baselines and Measurement and Verification Protocols  

E-Print Network (OSTI)

The Southern Energy Efficiency Center (SEEC) was established to substantially increase the deployment of high-performance beyond-code buildings across the southern region of the U.S, funded by the U.S. Department of Energy (DOE) Building Technologies Program and is administered by the National Energy Technology Laboratory. During its first 18-month phase, to address efficiency goals of states, utilities, and various energy-efficiency programs; project efforts include defining the baseline energy patterns within the project region and the measurement and verification (M&V) protocols for use in determining the efficiency improvements SEEC, state and USDOE efforts with respect to that baseline. This work is defined under the SEEC Subtask 3.1 Define Regional Baselines and Measurement & Verification Protocols. This report presents preliminary deliverables of this subtask developed and documented by the Energy Systems Laboratory (ESL) for use by the SEEC member state region.

Kim, H.; Haberl, J. S.; Verdict, M.

2009-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Protocol, Qualification Standard for the Site Lead Program - May 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Qualification Standard for the Site Lead Program - May Qualification Standard for the Site Lead Program - May 2011 Protocol, Qualification Standard for the Site Lead Program - May 2011 May 2011 Qualification Standard for the Site Lead Program This Qualification Standard establishes common functional area competency requirements for personnel assigned as Site Leads in the Office of Safety and Emergency Management Evaluations. Satisfactory and documented completion of the competency requirements contained in this Standard ensures that employees possess the minimum requisite competence to fulfill their functional area duties and responsibilities. This Standard is integrated with existing qualification standards developed by DOE in accordance with DOE Order 426.1, Federal Technical Capability. Protocol, Qualification Standard for the Site Lead Program - May 2011

442

A Comparison of US and Chinese EV Battery Testing Protocols  

NLE Websites -- All DOE Office Websites (Extended Search)

US and Chinese EV US and Chinese EV Battery Testing Protocols: Results D. Robertson, 1 J. Christophersen, 2 Fang Wang, 3 Fan Bin, 3 I. Bloom 1 US/China Electric Vehicle Initiative Meeting August 23-24, 2012 Boston, MA 1 Argonne National Laboratory 2 Idaho National Laboratory 3 CATARC A Comparison of US and Chinese Battery Testing Protocols  Battery testing is a time-consuming and costly process  There are parallel testing efforts, such as those in the US and China  These efforts may be better leveraged through international collaboration  The collaboration may establish standardized, accelerated testing procedures and will allow battery testing organizations to cooperate in the analysis of the resulting data  In turn, the collaboration may accelerate electric vehicle development and

443

Policy 1305 Cost Transfers Involving Sponsored Projects  

E-Print Network (OSTI)

Policy 1305 Cost Transfers Involving Sponsored Projects Responsible Office Office of Grant transfer of payroll and other direct costs associated with sponsored projects. Purpose of the Policy are responsible for ensuring that transfers of costs to sponsored projects which represent corrections of errors

444

Understanding slow BGP routing table transfers  

Science Conference Proceedings (OSTI)

Researchers and network operators often say that BGP table transfers are slow. Despite this common knowledge, the reasons for slow BGP transfers are not well understood. This paper explains BGP table transfer delays by combining BGP messages collected ... Keywords: bgp, route propagation, routing convergence

Zied Ben Houidi; Mickael Meulle; Renata Teixeira

2009-11-01T23:59:59.000Z

445

Office of Technology Transfer TES MICROBOLOMETER IMPROVED  

E-Print Network (OSTI)

in key areas for UW TechTransfer. UW researchers, faculty and staff reported 335 innovations, which TechTransfer programs like the Technology Gap Innovation Fund and LaunchPad continue to demonstrate and dedication of an exceptional team assembled at UW TechTransfer. This past year we have added staff in key

Kemner, Ken

446

Guidelines for Designing Effective Energy Information Feedback Pilots: Research Protocols  

Science Conference Proceedings (OSTI)

Enhanced and timely information regarding consumers electricity use and costs, known as feedback, may significantly influence their behavior across a broad spectrum of usage and acquisition decisions. Such information feedback has become increasingly important in light of widespread investments in Smart Grid technologies. This report identifies protocols for three phases of energy information feedback pilotsresearch design, analysis, and reportingalong with three example applications. When used as the co...

2010-04-23T23:59:59.000Z

447

A control protocol of finite dimensional quantum systems  

E-Print Network (OSTI)

An exact and analytic control protocol of two types of finite dimensional quantum systems is proposed. The system can be drive to an arbitrary target state using cosine classical fields in finite cycles. The control parameters which are time periods of interaction between systems and control fields in each cycles are connected with the probability amplitudes of target states via triangular functions and can be determined analytically.

Jianju Tang; H. C. Fu

2012-12-11T23:59:59.000Z

448

Standard Language Protocols for Photovoltaic and Storage Grid Integration  

Science Conference Proceedings (OSTI)

In mid-2009, a collaborative industry project was formed to address communication integration of distributed photovoltaic and storage systems. The project was designed to engage stakeholders from inverter manufacturers, system integrators, communication system providers, and utilities. These stakeholders have been working together to identify a set of common functions that can be supported by advanced grid-tied inverters. Standardized communication protocols are being developed to exercise these function...

2010-05-14T23:59:59.000Z

449

HEAT TRANSFER IN UNDERGROUND HEATING EXPERIMENTS IN GRANITE, STRIPA, SWEDEN  

E-Print Network (OSTI)

Analysis of. Nonlinear Heat Transfer Problems." Report no.Berkeley, Ca. , APPENDIX A. HEAT TRANSFER BY CONDUCTION ANDMeeting, Technical Session on Heat Transfer in Nuclear Waste

Chan, T.

2010-01-01T23:59:59.000Z

450

Optimization of Phase Change Heat Transfer in Biporous Media  

E-Print Network (OSTI)

Aspectcs of Boiling Heat Transfer. PhD Thesis dissertation,Celled Foams. Numerical Heat Transfer, Vol. 54, issue 1,Dimensional Fluid Flow and Heat Transfer. Numerical Heat

Reilly, Sean

2013-01-01T23:59:59.000Z

451

Heat transfer via dropwise condensation on hydrophobic microstructured surfaces  

E-Print Network (OSTI)

Dropwise condensation has the potential to greatly increase heat transfer rates. Heat transfer coefficients by dropwise condensation and film condensation on microstructured silicon chips were compared. Heat transfer ...

Ruleman, Karlen E. (Karlen Elizabeth)

2009-01-01T23:59:59.000Z

452

TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad TECHNOLOGY TRANSFER QUESTIONS..txt - Notepad More Documents & Publications Attn Technology...

453

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFERCOMMERCIALIZATION ACT OF 2000 TECHNOLOGY TRANSFER...

454

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY TRANSFER COMMERCIALIZATION ACT OF 2000 PDF TECHNOLOGY...

455

Attn Technology Transfer Questions.txt - Notepad | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Attn Technology Transfer Questions.txt - Notepad Attn Technology Transfer Questions.txt - Notepad Attn Technology Transfer Questions.txt - Notepad More Documents & Publications...

456

An FDD Wideband CDMA MAC Protocol for Wireless Multimedia Networks  

E-Print Network (OSTI)

A medium access control (MAC) protocol is developed for wireless multimedia networks based on frequency division duplex (FDD) wideband code division multiple access (CDMA). In this protocol, the received power levels of simultaneously transmitting users are controlled by a minimum-power allocation algorithm such that the heterogeneous bit error rates (BERs) of multimedia traffic are guaranteed. With minimumpower allocation, a multimedia wideband CDMA generalized processor sharing (GPS) scheduling scheme is proposed. It provides fair queueing to multimedia traffic with different QoS constraints. It also takes into account the limited number of code channels for each user and the variable system capacity due to interference experienced by users in a CDMA network. The admission of real-time connections is determined by a new effective bandwidth connection admission control (CAC) algorithm in which the minimum-power allocation is also considered. Simulation results show that the new MAC protocol guarantees QoS requirements of both real-time and non-real-time traffic in an FDD wideband CDMA network.

Xudong Wang

2003-01-01T23:59:59.000Z

457

Detecting Relay Attacks with Timing-Based Protocols  

E-Print Network (OSTI)

Abstract. Distance bounding protocols have been proposed as means of detecting relay attacks, also known as mafia fraud. In this paper we present the first symmetric key based distance bounding protocol that is also resistant to so-called terrorist fraud, a variant of mafia fraud. Relay attacks present a serious threat to RF security devices (contactless smart cards, RFID tags and the like) because they undermine the implicit assumption that the device is physically close to the reader when it is operating. In applications such as physical access control this assumption of physical proximity is all-important. Distance bounding protocols require a communication channel that can exchange single bits with extremely low latency. This unconventional communication requirement has prompted Hancke and Kuhn to assert in a recent publication [12] that ultra wide band (UWB) radio is necessary to achieve a useful distance bounding resolution. We analyse this assertion and present a alternative, novel communication approach that leverages the phenomena of side channel leakage to deliver a low latency channel. Our proposal is capable of detecting sophisticated relay attacks without resorting to the considerable expense and complexity of UWB radio. We present experimental results to support our arguments. 1

Jason Reid; Juan M. Gonzlez Nieto; Tee Tang; Bouchra Senadji

2007-01-01T23:59:59.000Z

458

Protocols for implementing DOE authorized release of radioactive scrap metals  

SciTech Connect

A process to implement the US Department of Energy`s (DOE) policy for authorized release of radioactive materials from DOE facilities is provided in the Draft Handbook for Controlling Release for Reuse or Recycle of Property Containing Residual Radioactive Material, published by DOE in 1997 and distributed to DOE field offices for interim use and implementation. The authorized release of such property is intended to permit its beneficial use across the entire DOE complex. A computerized management tool--P2Pro(RSM)--has been developed to aid in carrying out the release process for radioactive metals. It contains protocols for the authorized release process and relevant information to facilitate the evaluation of scrap metals for reuse and recycle. The P2Pro(RSM) protocols provide DOE and its contractors with an effective, user-friendly tool for managing authorized release activities P2Pro(RSM) is designed to be used in the Windows{sup {trademark}} environment. The protocols incorporate a relational database coupled with a graphic-user interface to guide the user through the appropriate steps so authorized release limits can be developed. With the information provided in the database, an as-low-as-reasonably-achievable (ALARA) optimization process can be easily set up and run for up to 10 alternatives for disposition of radioactive scrap metals. The results of the ALARA optimization process can be printed in a series of reports and submitted as part of the application for the authorized release of the radioactive scrap metals.

Chen, S.Y.; Arnish, J.; Kamboj, S.; Nieves, L.A. [Argonne National Lab., IL (United States). Environmental Assessment Div.

1999-11-01T23:59:59.000Z

459

Vibrational energy transfer in a diesel engine  

Science Conference Proceedings (OSTI)

The paths of vibrational energy transfer in a diesel engine were investigated in order to obtain insight into ways of reducing this transfer to the exterior surfaces and thereby reduce the radiated noise. The engine was tested in a nonrunning condition with simulated internal forces in order to study the different transfer paths separately. Vibration response measurements were made of individual engine components and lumped?parameter models were developed to simulate this response. These models were then used to determine component design changes that would reduce the energy transfer. Two design changes were implemented in the engine and a reduction of the energy transfer was achieved as predicted.

R. G. DeJong; R. H. Lyon

1977-01-01T23:59:59.000Z

460

Dry Transfer Systems for Used Nuclear Fuel  

Science Conference Proceedings (OSTI)

The potential need for a dry transfer system (DTS) to enable retrieval of used nuclear fuel (UNF) for inspection or repackaging will increase as the duration and quantity of fuel in dry storage increases. This report explores the uses for a DTS, identifies associated general functional requirements, and reviews existing and proposed systems that currently perform dry fuel transfers. The focus of this paper is on the need for a DTS to enable transfer of bare fuel assemblies. Dry transfer systems for UNF canisters are currently available and in use for transferring loaded canisters between the drying station and storage and transportation casks.

Brett W. Carlsen; Michaele BradyRaap

2012-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Technology Transfer Ombudsman Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technology Technology Transfer Ombudsman Program Technology Transfer Ombudsman Program The Technology Transfer Commercialization Act of 2000, Public Law 106-404 (PDF) was enacted in November 2000. Pursuant to Section 11, Technology Partnerships Ombudsman, each DOE national laboratory and research facility has appointed a technology partnership ombudsman (ombuds). The role of the ombuds is prevention and early resolution of disputes between the lab and inventors or private companies over technology transfer issues such as infringement, intellectual property rights, royalties and licensing, etc. The Director, Office of Conflict Prevention and Resolution, coordinates this program and compiles data for quarterly reports. See the Department of Energy Technology Transfer Ombuds (PDF).

462

DOE Technology Transfer Website Features New Tool to Search Tech Transfer  

Office of Scientific and Technical Information (OSTI)

Technology Transfer Website Features New Tool to Search Tech Transfer Technology Transfer Website Features New Tool to Search Tech Transfer Information from DOE National Laboratories December 3, 2012 DOE Technology Transfer Website Features New Tool to Search Tech Transfer Information from DOE National Laboratories The Department of Energy (DOE) Technology Transfer website has a new search feature that for the first time allows searching of technology transfer information across the DOE national laboratories. The new tool enables users to search all of DOE's technology transfer information, including inventions, patents and other applied research, available from DOE's national laboratories in real time. Using web-crawling technology, the search capability allows users to enter a single query for a technology transfer term; the search feature returns a

463

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

464

Definition: Available Transfer Capability | Open Energy Information  

Open Energy Info (EERE)

Transfer Capability Transfer Capability Jump to: navigation, search Dictionary.png Available Transfer Capability A measure of the transfer capability remaining in the physical transmission network for further commercial activity over and above already committed uses. It is defined as Total Transfer Capability less existing transmission commitments (including retail customer service), less a Capacity Benefit Margin, less a Transmission Reliability Margin.[1] Related Terms transfer capability, transmission lines, transmission line, capacity benefit margin, smart grid References ↑ Glossary of Terms Used in Reliability Standards An inli LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ne Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Available_Transfer_Capability&oldid=502496

465

Definition: Transfer Capability | Open Energy Information  

Open Energy Info (EERE)

Transfer Capability Transfer Capability The measure of the ability of interconnected electric systems to move or transfer power in a reliable manner from one area to another over all transmission lines (or paths) between those areas under specified system conditions. The units of transfer capability are in terms of electric power, generally expressed in megawatts (MW). The transfer capability from 'Area A' to 'Area B' is not generally equal to the transfer capability from 'Area B' to 'Area A.'[1] Related Terms transmission lines, power, electricity generation, transmission line References ↑ Glossary of Terms Used in Reliability Standards An inl LikeLike UnlikeLike You like this.Sign Up to see what your friends like. ine Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Transfer_Capability&oldid=480565"

466

Technology Transfer Overview | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Services » Technology Transfer and Procurement » Technology Services » Technology Transfer and Procurement » Technology Transfer & Intellectual Property » Technology Transfer Overview Technology Transfer Overview Through strategic investments in science and technology, the U.S. Department of Energy (DOE) helps power and secure America's future. DOE's capabilities, and the innovations it supports, help ensure the country's role as a leader in science and technology. In particular, technology transfer supports the maturation and deployment of DOE discoveries, providing ongoing economic, security and environmental benefits for all Americans. "Technology transfer" refers to the process by which knowledge, intellectual property, or capabilities developed at the Department of Energy's National Laboratories, single-purpose research facilities, plants,

467

NREL: Technology Transfer - Commercialization Programs  

NLE Websites -- All DOE Office Websites (Extended Search)

Commercialization Programs Commercialization Programs Through our commercialization programs, we help accelerate the transfer of renewable energy and energy efficiency technologies into the marketplace. Clean Energy Alliance The Clean Energy Alliance is an alliance of the nation's top business incubators that provide business services to nascent clean energy entrepreneurs. NREL partners with these elite business incubators to help foster the growth of robust clean energy businesses and commercialize their technologies. Colorado Center for Renewable Energy Economic Development Formerly the Colorado Cleantech Initiative program, the Colorado Center for Renewable Energy Economic Development (CREED) is a joint effort between NREL, the State of Colorado, and affiliated stakeholders to provide

468

NREL: Technology Transfer Home Page - National Renewable Energy ...  

National Renewable Energy Laboratory Technology Transfer The National Renewable Energy Laboratory (NREL) works with industry and organizations to transfer renewable ...

469

HEAT TRANSFER IN UNDERGROUND HEATING EXPERIMENTS IN GRANITE, STRIPA, SWEDEN  

E-Print Network (OSTI)

standing of the heat transfer processes associated withto investigate the heat transfer and related processes in an

Chan, T.

2010-01-01T23:59:59.000Z

470

Heat transfer pathways in underfloor air distribution (UFAD) systems  

E-Print Network (OSTI)

the following heat transfer processes: conduction throughtudes of the major heat transfer processes in a typical room

Bauman, F.; Jin, H.; Webster, T.

2006-01-01T23:59:59.000Z

471

New Study Examines Methods for Technology Transfer from ...  

Science Conference Proceedings (OSTI)

... news announcement, Study Highlights Diversity in Agency Technology Transfer Approaches at www.nist.gov/director/tech-transfer-063011.cfm. ...

2012-05-08T23:59:59.000Z

472

Photoinduced Charge-Transfer Materials For Nonlinear Optical...  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Technology & Communications Photoinduced Charge-Transfer Materials For Nonlinear Optical Applications Photoinduced Charge-Transfer Materials For Nonlinear Optical...

473

NREL Successfully Transfers VSHOT Technology to Solar Industry  

NREL Successfully Transfers VSHOT Technology to Solar Industry ... The increasing demand for concentrating solar power, ... Technology Transfer Home;

474

A Comparative experimental study of media access protocols for wireless radio networks  

SciTech Connect

We conduct a comparative experimental analysis of three well known media access protocols: 802.11, CSMA, and MACA for wireless radio networks. Both fixed and ad-hoc networks are considered. The experimental analysis was carried out using GloMoSim: a tool for simulating wireless networks. The main focus of experiments was to study how (i) the size of the network, (ii) number of open connections, (iii) the spatial location of individual connections, (iv) speed with which individual nodes move and (v) protocols higher up in the protocol stack (e,g. routing layer) affect the performance of the media access sublayer protocols. The performance of the protocols was measured w.r.t. three important parameters: (1) number of received packets, (2) average latency of each packet, and (3) throughput. The following general qualitative conclusions were obtained; some of the conclusions reinforce the earlier claims by other researchers. (1) Although 802.11 performs better than the other two protocols with respect to fairness of transmission, packets dropped, and latency, its performance is found to (i) show a lot of variance with changing input parameters and (ii) the overall performance still leaves a lot of room for improvement. (2) CSMA does not perform too well under the fairness criteria, however, was the best in terms of the latency criteria. (3) MACA also shows fairness problems and has poor performance at high packet injection rates. (4) Protocols in the higher level of the protocol stack affect the MAC layer performance. The main general implications of our work is two folds: (1) No single protocol dominated the other protocols across various measures of efficiency. This motivates the design of a new class of parameterized protocols that adapt to changes in the network connectivity and loads. We refer to these class of protocols as parameterized dynamically adaptive efficient protocols and as a first step suggest key design requirements for such a class of protocols. (2) Performance analysis of protocols at a given level in the protocol stack need to be studied not locally in isolation but as a part of the complete protocol stack. The results suggest that in order to improve the performance of a communication network, it will be important to study the entire protocol stuck as a single algorithmic construct; optimizing individual layers in the 7 layer OSI stack will not yield performance improvements beyond a point.

Barrett, C. L. (Christopher L.); Drozda, M. (Martin); Marathe, M. V. (Madhav V.)

2001-05-24T23:59:59.000Z

475

Handbook of heat transfer applications (2nd edition)  

Science Conference Proceedings (OSTI)

The applications of heat transfer in engineering problems are considered. Among the applications discussed are: mass transfer cooling; heat exchangers; and heat pipes. Consideration is also given to: heat transfer in nonNewtonian fluids; fluidized and packed beds; thermal energy storage; and heat transfer in solar collectors. Additional topics include: heat transfer in buildings; cooling towers and ponds; and geothermal heat transfer.

Rohsenow, W.M.; Hartnett, J.P.; Ganic, E.N.

1985-01-01T23:59:59.000Z

476

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

477

Entanglement Sharing Protocol via Quantum Error Correcting Codes  

E-Print Network (OSTI)

We introduce a new multiparty cryptographic protocol, which we call `entanglement sharing schemes', wherein a dealer retains half of a maximally-entangled bipartite state and encodes the other half into a multipartite state that is distributed among multiple players. In a close analogue to quantum secret sharing, some subsets of players can recover maximal entanglement with the dealer whereas other subsets can recover no entanglement (though they may retain classical correlations with the dealer). We find a lower bound on the share size for such schemes and construct two non-trivial examples based on Shor's $[[9,1,3

Ran Hee Choi; Ben Fortescue; Gilad Gour; Barry C. Sanders

2012-12-18T23:59:59.000Z

478

Formal hardware specification languages for protocol compliance verification  

Science Conference Proceedings (OSTI)

The advent of the system-on-chip and intellectual property hardware design paradigms makes protocol compliance verification increasingly important to the success of a project. One of the central tools in any verification project is the modeling language, ... Keywords: Esterel, Heterogeneous Hardware Logic, Hierarchical Annotated Action Diagrams, Java, Lava, Live Sequence Charts, Message Sequence Charts, Objective VHDL, OpenVera, Property Specification Language, SpecC, Specification and Description Language, Statecharts, SystemC, SystemVerilog, The Unified Modeling Language, e, hardware monitors, timing diagrams

Annette Bunker; Ganesh Gopalakrishnan; Sally A. Mckee

2004-01-01T23:59:59.000Z

479

Addendum to the Building America House Simulation Protocols  

SciTech Connect

As Building America (BA) has grown to include a large and diverse cross-section of the home building and retrofit industries, it has become more important to develop accurate, consistent analysis techniques to measure progress towards the program's goals. The House Simulation Protocols (HSP) provides guidance to program partners and managers so that energy savings for new construction and retrofit projects can be compared alongside each other. The HSP provides the program with analysis methods that are proven to be effective and reliable in investigating the energy use of advanced energy systems and of entire houses.

Engebrecht-Metzger, C.; Wilson, E.; Horowitz, S.

2012-12-01T23:59:59.000Z

480

Verifying a Simplified Fuel Oil Flow Field Measurement Protocol  

Science Conference Proceedings (OSTI)

The Better Buildings program is a U.S. Department of Energy program funding energy efficiency retrofits in buildings nationwide. The program is in need of an inexpensive method for measuring fuel oil consumption that can be used in evaluating the impact that retrofits have in existing properties with oil heat. This project developed and verified a fuel oil flow field measurement protocol that is cost effective and can be performed with little training for use by the Better Buildings program as well as other programs and researchers.

Henderson, H.; Dentz, J.; Doty, C.

2013-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "transfer protocol https" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Protocol, Technical Qualification Program - October 22, 2003 | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Technical Qualification Program - October 22, 2003 Technical Qualification Program - October 22, 2003 Protocol, Technical Qualification Program - October 22, 2003 October 22, 2003 Technical Qualification Program Procedure (OA-50-TQP-1) This procedure implements the Office of ES&H Evaluations Technical Qualification Program (TQP) per the criteria contained in DOE Manual 426.1-1 "Federal Technical Capability Manual". Key elements of the program include: identifying personnel required to participate in the TQP, identifying, developing, approving, revising and updating individual qualification requirements, evaluating staff members against the assigned Technical Qualification Standards and documenting the approval of equivalencies, establishing and updating individual development plans, training

482

NERSC HPSS Bandwidth and Transfer Activity  

NLE Websites -- All DOE Office Websites (Extended Search)

Activity Activity Bandwidth and Transfer Activity Data Rate vs. File Size The graph below shows the bandwidth for individual file transfers for one day. The graph also gives a quick overview of the traffic and maximum bandwidth and file size for a given day. Historical yearly peak days. Daily Rate vs. Size Aggregate Transfer Bandwidth This graph shows the aggregate transfer rate to the storage systems as a function of time of day. The red line is the peak bandwidth observed within each one minute interval. The green line is the average over ten minute intervals. Graphs for the last 8 days. Historical yearly peak days. Daily Aggregate Bandwidth Concurrent Transfers The third graph shows the number of concurrent transfers to the storage systems. The peak within each minute is shown, as well as a ten minute

483

Displacement Transfer Zone | Open Energy Information  

Open Energy Info (EERE)

Displacement Transfer Zone Displacement Transfer Zone Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Print PDF Displacement Transfer Zone Dictionary.png Displacement Transfer Zone: Displacement transfer zones facilitate the transfer of strain between normal and strike-slip faults. Intersections between strike-slip faults in the Walker Lane and N- to NNE-striking normal faults commonly host geothermal systems, focused along the normal faults proximal to their dilational intersections with nearby strike-slip faults. Other definitions:Wikipedia Reegle Controlling Structures List of controlling structures typically associated with geothermal systems: Major Normal Fault Termination of a Major Normal Fault Stepover or Relay Ramp in Normal Fault Zones Apex or Salient of Normal Fault

484

Transfer Entropy Analysis of the Stock Market  

E-Print Network (OSTI)

In terms of transfer entropy, we investigated the strength and the direction of information transfer in the US stock market. Through the directionality of the information transfer, the more influential company between the correlated ones can be found and also the market leading companies are selected. Our entropy analysis shows that the companies related with energy industries such as oil, gas, and electricity influence the whole market.

Baek, S K; Kwon, O; Moon, H T; Baek, Seung Ki; Jung, Woo-Sung; Kwon, Okyu; Moon, Hie-Tae

2005-01-01T23:59:59.000Z

485

Sitewide Categorical Exclusion for Property Transfers,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Sitewide Categorical Exclusion for Property Transfers, Sitewide Categorical Exclusion for Property Transfers, Pacific Northwest National Laboratory, Richland, Washington Proposed Action The U.S. Department of Energy (DOE), Pacific Northwest Site Office (PNSO) proposes to transfer, lease, disposition, or acquire interests in personal property or real property. Location of Action The proposed action would occur on the Pacific Northwest National Laboratory (PNNL) site and the Marine Sciences Laboratory and in the vicinity of PNNL facilities in the State of Washington.

486

Acoustically Enhanced Boiling Heat Transfer  

E-Print Network (OSTI)

An acoustic field is used to increase the critical heat flux (CHF) of a flat-boiling-heat-transfer surface. The increase is a result of the acoustic effects on the vapor bubbles. Experiments are performed to explore the effects of an acoustic field on vapor bubbles in the vicinity of a rigid-heated wall. Work includes the construction of a novel heater used to produce a single vapor bubble of a prescribed size and at a prescribed location on a flatboiling surface for better study of an individual vapor bubble's reaction to the acoustic field. Work also includes application of the results from the single-bubble heater to a calibrated-copper heater used for quantifying the improvements in CHF.

Z. W. Douglas; M. K. Smith; A. Glezer

2008-01-07T23:59:59.000Z

487

Manipulability of Single Transferable Vote  

E-Print Network (OSTI)

For many voting rules, it is NP-hard to compute a successful manipulation. However, NP-hardness only bounds the worst-case complexity. Recent theoretical results suggest that manipulation may often be easy in practice. We study empirically the cost of manipulating the single transferable vote (STV) rule. This was one of the first rules shown to be NP-hard to manipulate. It also appears to be one of the harder rules to manipulate since it involves multiple rounds and since, unlike many other rules, it is NP-hard for a single agent to manipulate without weights on the votes or uncertainty about how the other agents have voted. In almost every election in our experiments, it was easy to compute how a single agent could manipulate the election or to prove that manipulation by a single agent was impossible. It remains an interesting open question if manipulation by a coalition of agents is hard to compute in practice.

Walsh, Toby

2009-01-01T23:59:59.000Z

488

NREL: Technology Transfer - Technologies Available for Licensing  

National Renewable Energy Laboratory Technology Transfer New Amber LEDs for High-Efficiency Solid-State Lighting. NREL is closing the LED "green gap" ...

489

Heat Transfer In Turbine Mid Structures.  

E-Print Network (OSTI)

??In order to estimate the life time of a cooled gas turbine component, knowledge of the heat transfer is essential in order to predict the (more)

Abou-Taouk, Abdallah

2006-01-01T23:59:59.000Z

490

Containment condensing heat transfer. [PWR; BWR  

SciTech Connect

This report presents a mechanistic heat-transfer model that is valid for large scale containment heat sinks. The model development is based on the determination that the condensation is controlled by mass diffusion through the vapor-air boundary layer, and the application of the classic Reynolds' analogy to formulate expressions for the transfer of heat and mass based on hydrodynamic measurements of the momentum transfer. As a result, the analysis depends on the quantification of the shear stress (momentum transfer) at the interface between the condensate film and the vapor-air boundary layer. In addition, the currently used Tagami and Uchida test observations and their range of applicability are explained.

Gido, R.G.; Koestel, A.

1983-01-01T23:59:59.000Z

491

Heat transfer and heat exchangers reference handbook  

Science Conference Proceedings (OSTI)

The purpose of this handbook is to provide Rocky Flats personnel with an understanding of the basic concepts of heat transfer and the operation of heat exchangers.

Not Available

1991-01-15T23:59:59.000Z

492

Materials Licenses Available | Tech Transfer | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

in Liquid-Salt Cooled Energy Systems 201202989 Rapid Non-contact Energy Transfer for Additive Manufacturing Driven High Intensity Electromagnetic Fields 201302995 Low...

493

Enhanced Heat Transfer in Composite Materials.  

E-Print Network (OSTI)

??Many composite materials are composed of a matrix reinforced with fibers. Carbon fiber composites are currently being used for high heat transfer applications. Carbon fibers (more)

Pathak, Sayali V.

2013-01-01T23:59:59.000Z

494

Peptide-Mediated Intramolecular Electron Transfer Complexes  

NLE Websites -- All DOE Office Websites (Extended Search)

Abstract: Electron transfer is one of the fundamental reactions in biological photosynthesis, respiration, and redox-mediated enzyme catalysis. Understanding the role of...

495

Fermilab | Office of Partnerships and Technology Transfer ...  

Quantum Diaries; Technology transfer at Fermilab. In an effort to fuel the economy and foster innovation, President Obama recently issued a directive ...

496

Electrostatic transfer of epitaxial graphene to glass.  

SciTech Connect

We report on a scalable electrostatic process to transfer epitaxial graphene to arbitrary glass substrates, including Pyrex and Zerodur. This transfer process could enable wafer-level integration of graphene with structured and electronically-active substrates such as MEMS and CMOS. We will describe the electrostatic transfer method and will compare the properties of the transferred graphene with nominally-equivalent 'as-grown' epitaxial graphene on SiC. The electronic properties of the graphene will be measured using magnetoresistive, four-probe, and graphene field effect transistor geometries [1]. To begin, high-quality epitaxial graphene (mobility 14,000 cm2/Vs and domains >100 {micro}m2) is grown on SiC in an argon-mediated environment [2,3]. The electrostatic transfer then takes place through the application of a large electric field between the donor graphene sample (anode) and the heated acceptor glass substrate (cathode). Using this electrostatic technique, both patterned few-layer graphene from SiC(000-1) and chip-scale monolayer graphene from SiC(0001) are transferred to Pyrex and Zerodur substrates. Subsequent examination of the transferred graphene by Raman spectroscopy confirms that the graphene can be transferred without inducing defects. Furthermore, the strain inherent in epitaxial graphene on SiC(0001) is found to be partially relaxed after the transfer to the glass substrates.

Ohta, Taisuke; Pan, Wei; Howell, Stephen Wayne; Biedermann, Laura Butler; Beechem Iii, Thomas Edwin; Ross, Anthony Joseph, III

2010-12-01T23:59:59.000Z

497

Partnerships and Technology Transfer - Oak Ridge National ...  

Disclaimer; Oak Ridge National Laboratory; Ombudsman; Partnerships and Technology Transfer. P.O. Box 2008, Oak Ridge, TN 37831. Office: 865-574-4180 ...

498

Technology Transfer at Berkeley Lab: Ombuds  

NLE Websites -- All DOE Office Websites (Extended Search)

Technology Transfer Contact Us See Also Partner Smart with Berkeley Lab (Downloadable Copy, 1.4MB, PDF) Licensing Interest Form Receive New Tech Alerts Ombudsman Complaint...

499

Tech Transfer Event to Showcase NIST Microfluidics ...  

Science Conference Proceedings (OSTI)

From NIST Tech Beat: September 13, 2007. ... cooperation with the MIT Enterprise Forum and TEDCO, will host a technology transfer workshop on ...

2013-07-08T23:59:59.000Z

500

Argonne National Laboratory - Office of Technology Transfer  

NLE Websites -- All DOE Office Websites (Extended Search)

at Argonne on or before November 15, 2013. Download the commercialization plan worksheet Tech Transfer Information for Employees Technology Corner Recent News Report an invention...