Powered by Deep Web Technologies
Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

T-593: Microsoft Internet Explorer unspecified code execution  

Broader source: Energy.gov [DOE]

Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

2

U-137: HP Performance Manager Unspecified Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

3

T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

4

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

5

T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code  

Broader source: Energy.gov [DOE]

Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

6

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

7

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

8

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

9

V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

Code V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code March 5, 2013 - 12:53am Addthis PROBLEM: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code...

10

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

11

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct...

12

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Office of Environmental Management (EM)

165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May...

13

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs...

14

U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and...  

Broader source: Energy.gov (indexed) [DOE]

4: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges U-264: Apple OS X Lets Remote Users Execute Arbitrary Code and Local Users Gain...

15

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

16

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

17

System for loading executable code into volatile memory in a downhole tool  

DOE Patents [OSTI]

A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

2007-09-25T23:59:59.000Z

18

U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks  

Broader source: Energy.gov [DOE]

Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

19

MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real  

E-Print Network [OSTI]

: information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

Turletti, Thierry

20

U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

22

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

23

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

24

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222:...

25

U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

26

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

27

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

28

U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause the target application to execute arbitrary code on the target user's system.

29

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

30

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

31

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

32

U-120: RSA SecurID Software Token Converter Unspecified Buffer...  

Broader source: Energy.gov (indexed) [DOE]

Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-066: Adobe Acrobat...

33

Classification of Code Annotations and Discussion of Compiler-Support for Worst-Case Execution Time Analysis  

E-Print Network [OSTI]

of energy consumption, resource-aware code generation, or re- targetable code generators. Program execution providing explicit sup- port for WCET analysis would have on usage of these code annotations is discussed

34

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

35

The role of the PIRT process in identifying code improvements and executing code development  

SciTech Connect (OSTI)

In September 1988, the USNRC issued a revised ECCS rule for light water reactors that allows, as an option, the use of best estimate (BE) plus uncertainty methods in safety analysis. The key feature of this licensing option relates to quantification of the uncertainty in the determination that an NPP has a {open_quotes}low{close_quotes} probability of violating the safety criteria specified in 10 CFR 50. To support the 1988 licensing revision, the USNRC and its contractors developed the CSAU evaluation methodology to demonstrate the feasibility of the BE plus uncertainty approach. The PIRT process, Step 3 in the CSAU methodology, was originally formulated to support the BE plus uncertainty licensing option as executed in the CSAU approach to safety analysis. Subsequent work has shown the PIRT process to be a much more powerful tool than conceived in its original form. Through further development and application, the PIRT process has shown itself to be a robust means to establish safety analysis computer code phenomenological requirements in their order of importance to such analyses. Used early in research directed toward these objectives, PIRT results also provide the technical basis and cost effective organization for new experimental programs needed to improve the safety analysis codes for new applications. The primary purpose of this paper is to describe the generic PIRT process, including typical and common illustrations from prior applications. The secondary objective is to provide guidance to future applications of the process to help them focus, in a graded approach, on systems, components, processes and phenomena that have been common in several prior applications.

Wilson, G.E. [Idaho National Engineering Lab., Idaho Falls, ID (United States); Boyack, B.E. [Los Alamos National Lab., NM (United States)

1997-07-01T23:59:59.000Z

36

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

37

U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

38

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

39

T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code  

Broader source: Energy.gov [DOE]

Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

40

U-177: Lotus Quickr for Domino ActiveX Control Buffer Overflow Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Lotus Quickr for Domino. A remote user can cause arbitrary code to be executed on the target user's system.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification  

E-Print Network [OSTI]

SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software ­ for software integrity protection and authentication and presents performance results. Our system architecture

Simha, Rahul

42

T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

43

T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

44

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

45

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code  

Broader source: Energy.gov [DOE]

PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

46

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters and

47

LADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises  

E-Print Network [OSTI]

and Van Dijk (1996) studied several stock market indexes by AR(1)-GJR(1, 1) models, Zhu and Ling (2011) fitted a MA(3)-GARCH(1, 1) model to the world oil prices, see also Tsay (2005) for more empiricalLADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

Ling, Shiqing

48

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

49

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code| Department

50

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

51

V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...  

Broader source: Energy.gov (indexed) [DOE]

Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

52

U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code

53

Self-assembled software and method of overriding software execution  

DOE Patents [OSTI]

A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

Bouchard, Ann M.; Osbourn, Gordon C.

2013-01-08T23:59:59.000Z

54

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

3: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary...

55

T-529: Apple Mac OS PackageKit Distribution Script Remote Code...  

Broader source: Energy.gov (indexed) [DOE]

29: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability January...

56

Executive Officer  

Broader source: Energy.gov [DOE]

THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

57

V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

6: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service...

58

U-071:HP Database Archiving Software Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

59

T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

84: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code T-684: Apple QuickTime Buffer Overflows Let Remote Users Execute Arbitrary Code August 4, 2011 - 3:33pm...

60

V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 27, 2013 - 12:23am...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

62

T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

63

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive4

64

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director RichExecutive45

65

Executive Order 1083 Attachment C  

E-Print Network [OSTI]

Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

Eirinaki, Magdalini

66

FEI Program Session: Date: CHRIS Code: Session Number:  

Broader source: Energy.gov (indexed) [DOE]

OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

67

Virtual Private Environments for Multiphysics Code Validation on Computing Grids  

E-Print Network [OSTI]

Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

Paris-Sud XI, Université de

68

Executive Director  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich Marquez,

69

Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

70

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers [EERE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

71

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

72

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

remote user can cause the Firefox installer to load a DLL from the default downloads directory and execute arbitrary code. Only Windows-based systems are affected. A remote user...

73

Chip Laingen Executive Director  

E-Print Network [OSTI]

Link 3) MilTech · Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

Levinson, David M.

74

Unspecified technologies | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revisionEnvReviewNonInvasiveExplorationUT-gTagusparkCalculator JumpUnited States:Delaware JumpNewfor

75

Experience with Remote Job Execution  

SciTech Connect (OSTI)

The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

2008-01-01T23:59:59.000Z

76

ISO 14001: An Executive Report  

E-Print Network [OSTI]

Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

Simon, Richard

1998-01-01T23:59:59.000Z

77

Shared prefetching to reduce execution skew in multi-threaded systems  

DOE Patents [OSTI]

Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

Eichenberger, Alexandre E; Gunnels, John A

2013-07-16T23:59:59.000Z

78

Data processing with microcode designed with source coding  

DOE Patents [OSTI]

Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

McCoy, James A; Morrison, Steven E

2013-05-07T23:59:59.000Z

79

Code Description Code Description  

E-Print Network [OSTI]

Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

80

Carrie Takeyasu Executive Director  

E-Print Network [OSTI]

Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

Burg, Theresa

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

STEP Participant Survey Executive Summary  

Broader source: Energy.gov [DOE]

STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

82

Detection of malicious computer executables  

DOE Patents [OSTI]

A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

2009-04-14T23:59:59.000Z

83

E-Print Network 3.0 - alpha coding sequence Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

will generate conservative Alpha code sequences for unaligned memory access. If the profile does not indicate... Pentium or a 200-MHz Pentium Pro when executing translated...

84

Conservation Focus and Executive  

E-Print Network [OSTI]

Northwest Power and Conservation Council Focus and Executive Summary Background Power Committee Walla Walla May 12, 2009 #12;Northwest Power and Conservation Council Conditions Facing the Region and Conservation Council Resource Alternatives · Increased cost-effective efficiency potential ­ Technological

85

Sustainability Initiative Executive Summary  

E-Print Network [OSTI]

UW­Madison Sustainability Initiative Executive Summary October 2010 #12;2 We are pleased to present the final report of the campus Sustainability Task Force. This report fulfills the charge we gave to sustainability for consideration by UW­Madison's leadership and campus community. There are many reasons why

Sheridan, Jennifer

86

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute...  

Broader source: Energy.gov (indexed) [DOE]

issue does not affect Mac OS X systems. Viewing an image in a maliciously prepared directory may lead to arbitrary code execution. A path searching issue exists in QuickTime...

87

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Environmental Management (EM)

data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to reload...

88

Business Model Guide Executive Summary  

Broader source: Energy.gov [DOE]

The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

89

Spinal codes  

E-Print Network [OSTI]

Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

Perry, Jonathan, S.M. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

90

National Ignition Facility project execution plan  

SciTech Connect (OSTI)

This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

Paisner, J., LLNL

1997-08-01T23:59:59.000Z

91

Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR  

E-Print Network [OSTI]

Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 · K. Crary and S. Sarkar the executable code is accompanied

Goldstein, Seth Copen

92

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive Committee

93

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive

94

Executives & Structure  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director

95

CEES Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearchCASL Symposium: Celebrating the Past -Executive Committee photo

96

NCAI Executive Council Winter Session  

Broader source: Energy.gov [DOE]

National Congress of American Indians (NCAI) is hosting the 2015 Executive Council Winter Session in Washington, DC, Feb. 23-25, 2015.

97

Building Relationships with Executive Search Firms Building Relationships with Executive Search Firms  

E-Print Network [OSTI]

Relationships Similar Searches Alumni Organizations Education Company Team - Sports Job Hunting / NetworkingBuilding Relationships with Executive Search Firms for Building Relationships with Executive Search Firms for Weiner & Associates, Inc. Executive Search Partners Weiner & Associates, Inc. Executive Search

Ferrari, Silvia

98

Introduction to Algebraic Codes  

E-Print Network [OSTI]

codes. Since the elementary coding theory is assumed to be of interest only to ... the algebraic codes, mainly BCH codes, Reed-Solomon codes and classical...

99

Executive Order 13423: Strengthening Federal Environmental, Energy...  

Broader source: Energy.gov (indexed) [DOE]

text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

100

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...  

Office of Environmental Management (EM)

SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP  

E-Print Network [OSTI]

JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

Peak, Derek

102

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Latorre, Jose I

2015-01-01T23:59:59.000Z

103

Holographic codes  

E-Print Network [OSTI]

There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

Jose I. Latorre; German Sierra

2015-02-23T23:59:59.000Z

104

A PVM Executive Program for Use with RELAP5-3D  

SciTech Connect (OSTI)

A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

2002-04-01T23:59:59.000Z

105

Regulatory constraints on executive compensation  

E-Print Network [OSTI]

This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

Joskow, Paul L.

1993-01-01T23:59:59.000Z

106

Executive Summary By Blake Johnson  

E-Print Network [OSTI]

Executive Summary By Blake Johnson Creating Business Value with Analytics and Big Data A one and Teradata Corporation, and was led by Blake Johnson, consulting professor in the Department of Management

Straight, Aaron

107

Extension Program Council's Executive Board.  

E-Print Network [OSTI]

~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

Marshall, Mary G.; Richardson, Burl B.

1986-01-01T23:59:59.000Z

108

GridRun: A lightweight packaging and execution environment forcompact, multi-architecture binaries  

SciTech Connect (OSTI)

GridRun offers a very simple set of tools for creating and executing multi-platform binary executables. These ''fat-binaries'' archive native machine code into compact packages that are typically a fraction the size of the original binary images they store, enabling efficient staging of executables for heterogeneous parallel jobs. GridRun interoperates with existing distributed job launchers/managers like Condor and the Globus GRAM to greatly simplify the logic required launching native binary applications in distributed heterogeneous environments.

Shalf, John; Goodale, Tom

2004-02-01T23:59:59.000Z

109

Caltech campus executive LDRD.  

SciTech Connect (OSTI)

The environment most brain systems of humans and other animals are almost constantly confronted with is complex and continuously changing, with each time step updating a potentially bewildering set of opportunities and demands for action. Far from the controlled, discrete trials used in most neuro- and psychological investigations, behavior outside the lab at Caltech is a seamless and continuous process of monitoring (and error correction) of ongoing action, and of evaluating persistence in the current activity with respect to opportunities to switch tasks as alternatives become available. Prior work on frontopolar and prefrontal task switching, use tasks within the same modality (View a stream of symbols on a screen and perform certain response mappings depending on task rules). However, in thesetask switches' the effector is constant: only the mapping of visual symbols to the specific button changes. In this task, the subjects are choosing what kinds of future action decisions they want to perform, where they can control either which body part will act, or which direction they will orient an instructed body action. An effector choice task presents a single target and the subject selects which effector to use to reach the target (eye or hand). While the techniques available for humans can be less spatially resolved compared to non-human primate neural data, they do allow for experimentation on multiple brain areas with relative ease. Thus, we address a broader network of areas involved in motor decisions. We aim to resolve a current dispute regarding the specific functional roles of brain areas that are often co-activated in studies of decision tasks, dorsal premotor cortex(PMd) and posterior parietal cortex(PPC). In one model, the PPC distinctly drives intentions for action selection, whereas PMd stimulation results in complex multi-joint movements without any awareness of, nor subjective feeling of, willing the elicited movement, thus seems to merely help execute the chosen action.

Shepodd, Timothy J.; Knudsen, Tamara

2013-01-01T23:59:59.000Z

110

High Performance Reach Codes  

E-Print Network [OSTI]

Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

Edelson, J.

2011-01-01T23:59:59.000Z

111

Speech coding  

SciTech Connect (OSTI)

Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

Ravishankar, C., Hughes Network Systems, Germantown, MD

1998-05-08T23:59:59.000Z

112

Faculty of Engineering Executive Committee  

E-Print Network [OSTI]

is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

Petriu, Emil M.

113

Project Description Executive Summary Report  

E-Print Network [OSTI]

$Total Project Cost: 1,000,000Auxillary Enterprises Balances $ 9,400,000Revenue Financing System Bonds $ 1Project Description Executive Summary Report Project Information Project Budget Project Funding 302-680 Parking Structure Phase I This project consists of a 750 space parking garage of approximately 251

O'Toole, Alice J.

114

Executive Order 1083 Attachment C  

E-Print Network [OSTI]

Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

de Lijser, Peter

115

DISCOVER YOURS MBA FOR EXECUTIVES  

E-Print Network [OSTI]

you to earn an MBA? Where is the starting point? What is the return on investment for you and your-suite view on building a robust corporate culture, protecting ethical business foundations, and managing the organization in change ¥ Executive Forum IV--an international management off-site intensive caps the global

Richards-Kortum, Rebecca

116

Executive Summary By Blake Johnson  

E-Print Network [OSTI]

Executive Summary By Blake Johnson Creating Business Value with Enterprise Data and Analytics A one Corporation and was led by Blake Johnson, a consulting professor in the Department of Management Science the discussion of each of these topics are summarized below Framing the Day's Discussion Blake Johnson began

Straight, Aaron

117

Northwest Energy Efficiency Taskforce Executive Committee  

E-Print Network [OSTI]

#12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

118

UCSF Sustainability Action Plan: Executive Summary  

E-Print Network [OSTI]

UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

Yamamoto, Keith

119

ByteCode 2011 LCT: An Open Source Concolic Testing Tool  

E-Print Network [OSTI]

recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K¨ahk¨onen, Tuomas

Heljanko, Keijo

120

Executive Order 13423- Strengthening Federal Environmental, Energy...  

Energy Savers [EERE]

423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Executive Director Carleton Sustainable Energy Research Centre  

E-Print Network [OSTI]

Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

Dawson, Jeff W.

122

Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA  

E-Print Network [OSTI]

Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

Pasareanu, Corina

123

Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations  

DOE Patents [OSTI]

Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

Gschwind, Michael K

2013-07-23T23:59:59.000Z

124

Implementation of Executive Order 13514, Federal Leadership in...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of Executive Order 13514, Federal Leadership in Environmental, Energy, and Economic Performance Implementation of Executive Order 13514, Federal Leadership in...

125

Executive Secretariat | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehicles »Exchange Visitors Program Exchange Visitors Program TheExecutive

126

Automatic generation of executable communication specifications from parallel applications  

SciTech Connect (OSTI)

Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

2011-01-19T23:59:59.000Z

127

Generalized concatenated quantum codes  

E-Print Network [OSTI]

We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

Grassl, Markus

128

Concatenated Conjugate Codes  

E-Print Network [OSTI]

A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

Mitsuru Hamada

2006-10-31T23:59:59.000Z

129

Executive Committee | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive Committee

130

STEP Participant Survey Executive Summary  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energy fromCommentsRevolving STATEMENT OF MELANIE KENDERDINE7 (07/03)Executive

131

ExecutiveBios2012.indd  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director www.sandia.gov

132

2009 Wind Technologies Market Report: Executive Summary  

SciTech Connect (OSTI)

This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

Wiser, R.; Bolinger, M.

2010-08-01T23:59:59.000Z

133

Federal Executive Institute (FEI) | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

together managers and executives from 25 to 30 Federal agencies for a unique, residential learning experience. The objective is to help agencies in the development of their career...

134

Budget Execution Funds Distribution and Control  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

2006-01-09T23:59:59.000Z

135

Senior Executive Service Candidate Development Program | Department...  

Broader source: Energy.gov (indexed) [DOE]

Program Senior Executive Service Candidate Development Program The Office of Learning and Workforce Development coordinates applications for all DOE Federal Employees. Overview The...

136

A multiple sphere T-matrix Fortran code for use on parallel computer clusters  

E-Print Network [OSTI]

calculate maps of the electric field both interior and exterior to the spheres. The code is written- based algorithm ­ is not in a form readily adaptable to high-performance, parallel-based computational execution of the code for large-scale ensembles on both parallel and serial machines. To meet this end we

137

Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *  

E-Print Network [OSTI]

, and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

Pereira, Fernando

138

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for  

E-Print Network [OSTI]

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

Corbalan, Julita

139

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for  

E-Print Network [OSTI]

Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

Corbalan, Julita

140

Homological stabilizer codes  

SciTech Connect (OSTI)

In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

2013-03-15T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Hans M. Amman Executive Board Utrecht University  

E-Print Network [OSTI]

Hans M. Amman Executive Board Utrecht University Current Positions 2006­present Executive Board Member (lid College van Bestuur), Utrecht University, Utrecht, the Netherlands. 2006­present Professor of Economics and Management, Utrecht School of Economics, Utrecht University, Utrecht, the Netherlands

Utrecht, Universiteit

142

IBM Global Business Services Executive Report  

E-Print Network [OSTI]

-based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

143

Advanced Fuels Campaign Execution Plan  

SciTech Connect (OSTI)

The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

Kemal Pasamehmetoglu

2011-09-01T23:59:59.000Z

144

Insertion of operation-and-indicate instructions for optimized SIMD code  

SciTech Connect (OSTI)

Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

2013-06-04T23:59:59.000Z

145

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 1 October 6, 2011 Submitted by: R. Strykowsky NSTX Upgrade Project Manager _____________________________ M. Williams Associate Director, PPPL

Princeton Plasma Physics Laboratory

146

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan National Spherical Torus Experiment (NSTX) Upgrade Project Execution Plan Revision 3 October 12, 2012 Administrative Change Submitted by: ______________________________ R. Strykowsky NSTX Upgrade Project Manager Anthony Indelicato

Princeton Plasma Physics Laboratory

147

The Minimum Assumed Incentive Effect of Executive Share Options  

E-Print Network [OSTI]

In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

2003-01-01T23:59:59.000Z

148

PREREM: an interactive data preprocessing code for INREM II. Part I: user's manual. Part II: code structure  

SciTech Connect (OSTI)

PREREM is an interactive computer code developed as a data preprocessor for the INREM-II (Killough, Dunning, and Pleasant, 1978a) internal dose program. PREREM is intended to provide easy access to current and self-consistent nuclear decay and radionuclide-specific metabolic data sets. Provision is made for revision of metabolic data, and the code is intended for both production and research applications. Documentation for the code is in two parts. Part I is a user's manual which emphasizes interpretation of program prompts and choice of user input. Part II stresses internal structure and flow of program control and is intended to assist the researcher who wishes to revise or modify the code or add to its capabilities. PREREM is written for execution on a Digital Equipment Corporation PDP-10 System and much of the code will require revision before it can be run on other machines. The source program length is 950 lines (116 blocks) and computer core required for execution is 212 K bytes. The user must also have sufficient file space for metabolic and S-factor data sets. Further, 64 100 K byte blocks of computer storage space are required for the nuclear decay data file. Computer storage space must also be available for any output files produced during the PREREM execution. 9 refs., 8 tabs.

Ryan, M.T.; Fields, D.E.

1981-05-01T23:59:59.000Z

149

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

Grassl, Markus

150

Guam- Building Energy Code  

Broader source: Energy.gov [DOE]

NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

151

Codeword Stabilized Quantum Codes  

E-Print Network [OSTI]

We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

2007-09-27T23:59:59.000Z

152

Generalized Concatenated Quantum Codes  

E-Print Network [OSTI]

We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

2009-01-09T23:59:59.000Z

153

Encoding Subsystem Codes  

E-Print Network [OSTI]

In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

Pradeep Kiran Sarvepalli; Andreas Klappenecker

2008-06-30T23:59:59.000Z

154

Renewable Energy Requirement Guidance for EPAct 2005 and Executive...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies...

155

Richard Lazarus Named as Executive Director of National Commission...  

Office of Environmental Management (EM)

Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National Commission on the BP...

156

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

157

New Executive Order Establishes a Federal Flood Risk Management...  

Energy Savers [EERE]

New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

158

PIA - Savannah River Operations Office Executive Commitment Action...  

Energy Savers [EERE]

Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations Office Executive Commitment Action Tracking System PIA - Savannah River Operations...

159

American Indian Policy and Relevant DOE and Executive Orders...  

Energy Savers [EERE]

Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

160

President Issues Executive Order Aimed at Preparing for the Impacts...  

Broader source: Energy.gov (indexed) [DOE]

President Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Eastern Wind Integration and Transmission Study: Executive Summary...  

Office of Environmental Management (EM)

Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This...

162

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...  

Office of Environmental Management (EM)

OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy...

163

SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES  

E-Print Network [OSTI]

SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb utilities. · Lackofnaturallight

Delene, David J.

164

FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...  

Broader source: Energy.gov (indexed) [DOE]

6 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

165

On optimal constacyclic codes  

E-Print Network [OSTI]

In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

Giuliano G. La Guardia

2013-11-11T23:59:59.000Z

166

Project Execution Plan, Rev. 3  

SciTech Connect (OSTI)

This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

IT Corporation, Las Vegas

2002-08-01T23:59:59.000Z

167

Stateless and stateful implementations of faithful execution  

DOE Patents [OSTI]

A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

2014-12-16T23:59:59.000Z

168

Account Executive Account Manager of Sales  

E-Print Network [OSTI]

Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

169

Microsoft Word - CTF Executive Summary 001.doc  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Test Loop Pre-Conceptual Design Executive Summary December 2008 BEA Contract No. 000 75310 Disclaimer This report was prepared as an account of work sponsored by an agency of the...

170

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii Table of Contents 1 ..............................................................................................................................1 1.2.1 DOE-approved project documents

Princeton Plasma Physics Laboratory

171

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record/schedule baseline updates #12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan ii ..............................................................................................................................1 1.2.1 DOE-approved project documents

Princeton Plasma Physics Laboratory

172

Generalized Concatenation for Quantum Codes  

E-Print Network [OSTI]

We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

Markus Grassl; Peter W. Shor; Bei Zeng

2009-05-04T23:59:59.000Z

173

Graph concatenation for quantum codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

Beigi, Salman

174

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

Wong, Tan F.

175

Joint Source-Channel Coding via Turbo Codes  

E-Print Network [OSTI]

Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

Alajaji, Fady

176

The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report  

SciTech Connect (OSTI)

This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

Not Available

2006-09-01T23:59:59.000Z

177

Unfolding the color code  

E-Print Network [OSTI]

The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

Aleksander Kubica; Beni Yoshida; Fernando Pastawski

2015-03-06T23:59:59.000Z

178

List decoding of subspace codes and rank-metric codes  

E-Print Network [OSTI]

2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

Mahdavifar, Hessam

2012-01-01T23:59:59.000Z

179

Building Energy Code  

Broader source: Energy.gov [DOE]

Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

180

Building Energy Code  

Broader source: Energy.gov [DOE]

''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Model Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

182

Compiling Codes on Euclid  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

183

Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

184

Homological Product Codes  

E-Print Network [OSTI]

Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

Sergey Bravyi; Matthew B. Hastings

2013-11-04T23:59:59.000Z

185

Sustainable Acquisition Coding System | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System Sustainable Acquisition Coding System More Documents &...

186

Understanding Perception Through Neural 'Codes'  

E-Print Network [OSTI]

Perception Through Neural Codes. In: Special Issue on Perception Through Neural Codes. In: Special Issue on Perception Through Neural Codes. In: Special Issue on

Freeman, Walter J III

2011-01-01T23:59:59.000Z

187

Shortened Turbo Codes  

E-Print Network [OSTI]

Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

David J.C. MacKay

188

Unspecified Journal Volume 00, Number 0, Pages 000000  

E-Print Network [OSTI]

0000 (copyright holder) 1 #12;2 W.S. CHEUNG, XUHUA LIU AND T.Y. TAM Theorem 1.1. ([9, p.50-51]) Let, BOUNDARY POINTS, AND JOINT NUMERICAL RANGES WAI-SHUN CHEUNG, XUHUA LIU AND TIN-YAU TAM Abstract

Tam, Tin-Yau

189

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Broader source: Energy.gov (indexed) [DOE]

PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP...

190

V-218: HP Service Manager Unspecified Flaw Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

191

T-622: Adobe Acrobat and Reader Unspecified Memory Corruption...  

Broader source: Energy.gov (indexed) [DOE]

versions 8.2.5 and prior Acrobat Professional Extended versions 9.4.1 and prior Acrobat 3D versions 8.2.5 and prior Adobe Flash Player versions 10.2.159.1 and prior for Windows,...

192

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

193

Code Red 2 kills off Code Red 1  

E-Print Network [OSTI]

#12;#12;Code Red 2 kills off Code Red 1 Code Red 2 settles into weekly pattern Nimda enters the ecosystem Code Red 2 dies off as programmed CR 1 returns thanks to bad clocks #12;Code Red 2 dies off as programmed Nimda hums along, slowly cleaned up With its predator gone, Code Red 1 comes back, still

Paxson, Vern

194

Scott Shreeve, MD Chief Executive Officer  

E-Print Network [OSTI]

is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

Rose, Michael R.

195

A Market Feasibility Study Executive Summary  

E-Print Network [OSTI]

popular areblack,green,andoolongteas.Lesswellknowntypesincludewhiteand Puer tea. There is a high levelA Market Feasibility Study Executive Summary Hawai`i-Grown Tea Pacific Asian Center for Entrepreneurship #12;Overview This report is a feasibility study for developing tea into a viable and sustainable

196

Executive Education Program Freight Transportation and  

E-Print Network [OSTI]

Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

Bustamante, Fabián E.

197

February 1, 2006 Emmett Brown, Executive Director  

E-Print Network [OSTI]

February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

Arnold, Douglas N.

198

NSTX Upgrade Project Project Execution Plan  

E-Print Network [OSTI]

NSTX Upgrade Project Project Execution Plan 6 PPPL Laboratory Director S.Prager Deputy Director.Gentile Centerstack Dsgn & Fab J. Chrzanowski NSTX Upgrade Project Manager R. Strykowsky Deputy and Construction Manager E. Perry Project Controls S. Langish NSTXCenterstack Manager L. Dudek NSTXNeutral Beam Manager T

Princeton Plasma Physics Laboratory

199

NSTX Upgrade Project Project Execution Plan  

E-Print Network [OSTI]

NSTX Upgrade Project Project Execution Plan Appendix 1 - WBS Dictionary 25 Appendix 1 - NSTX Upgrade Project Work Breakdown Structure This Work Breakdown Structure (WBS) organizes and defines the scope of the NSTX Upgrade using the WBS as established by the original NSTX project and modified

Princeton Plasma Physics Laboratory

200

Executive Vice President La-Verna Fountain  

E-Print Network [OSTI]

construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

Kim, Philip

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Academic Integrity Task Force Report Executive Summary  

E-Print Network [OSTI]

. For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

Roy, Subrata

202

Hawaii energy strategy: Executive summary, October 1995  

SciTech Connect (OSTI)

This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

NONE

1995-10-01T23:59:59.000Z

203

Curtin University Organisational Chart * Executive Managers  

E-Print Network [OSTI]

Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

204

TABLE OF CONTENTS 3 Executive Summary  

E-Print Network [OSTI]

. JISAO's four major research themes, Fisheries Recruitment (Marine Ecosystems), Climate, Environmental Ecosystems 34 Climate 60 Environmental Chemistry 70 Coastal Oceanography 75 Appendices 75 Appendix 1 Senior;3 EXECUTIVE SUMMARY The Joint Institute for the Study of the Atmosphere and Ocean (JISAO) fosters

Rigor, Ignatius G.

205

How to Apply for Senior Executive positions  

Broader source: Energy.gov [DOE]

To apply vacancies for SENIOR EXECUTIVE SERVICE (SES) , SENIOR LEVEL (SL), SCIENTIFIC AND PROFESSIONAL (ST) positions within the Department of Energy please visit OPM's website: http://www.usajobs.gov. From this site, you may download announcements for vacancies of interest to you.

206

Darden Executive Education Management Development Program  

E-Print Network [OSTI]

, or will soon undergo, the transition from a functional to a general management role. They may alsoDarden Executive Education Management Development Program: Driving Vision, Action, and Results ... Change the Way You Think! #12;The Program Organizations globally need to prepare middle management

Acton, Scott

207

A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY  

E-Print Network [OSTI]

12.02.2006 1 A HIFI AND FLORIDA COOS EXECUTIVE SUMMARY A GULF OF MEXICO AND OCS ENERGY DISCUSSION) AND THE FLORIDA COASTAL OCEAN OBSERVING SYSTEMS (FLORIDA COOS) AS AN IOOS INITIATIVE · The Gulf of Mexico Energy necessary to protect and sustain the Gulf of Mexico's natural resources. · Failing to share qualified OCS

208

EXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS  

E-Print Network [OSTI]

, and implementation of the program. a. Multiple new programs were enhanced and added to make New Student OrientationEXECUTIVE SUMMARY NEW STUDENT & OWL FAMILY PROGRAMS 2012-2013 Overview The Office of New Student and Owl Family Programs plays an integral role within the University by offering a supportive, innovative

Fernandez, Eduardo

209

Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM  

E-Print Network [OSTI]

Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

210

Executive Summaries for the Hydrogen Storage Materials Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

211

Executive Function and Pediatric Overweight: A Problem-Solving Framework  

E-Print Network [OSTI]

. The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

Johnson, Audrea

2012-10-19T23:59:59.000Z

212

A Hybrid Procedural Deductive Executive For Autonomous Spacecraft  

E-Print Network [OSTI]

autonomy, including robust plan execution Pell et al. 1997b. Since aborting a plan and taking time to re of robust plans, which incorpo- rate exibility to be used by the execution system in case problems

Williams, Brian C.

213

A Principal Components Analysis of Executive Processes: Exploring the Structure of Executive Functions using Neuropsychological Tests  

E-Print Network [OSTI]

, Dual-Tasking and Planning) and their relationship to Intelligence. The separability of these executive functions was explored. Ten neuropsychological tests were administered to young and healthy participants (N =103). Correlations between tests...

Maner, Safir

2011-11-23T23:59:59.000Z

214

The Implementation of a Hybrid-Execute-In-Place Architecture to Reduce the Embedded System Memory Footprint and Minimize Boot Time  

E-Print Network [OSTI]

Footprint and Minimize Boot Time Tony Benavides, Justin Treon, Jared Hulbert, and Willie Chang1 Flash Memory effectiveness and performance. The ability for an operating system to boot quickly combined with speedy-system where the code gets copied to RAM at boot time and executes out of the RAM. This paper explores

Chang, Weide

215

NSTX Upgrade Project Execution Plan NSTX Upgrade Project  

E-Print Network [OSTI]

#12;NSTX Upgrade Project Execution Plan NSTX Upgrade Project Project Execution Plan i Record 10/12/2012 Update to WBS Level 2 Threshold (top of page 20), Change DOE Federal Project Director and Deputy Federal Project Director. Various OBS changes. #12;NSTX Upgrade Project Execution Plan NSTX

Princeton Plasma Physics Laboratory

216

Contracts for Model Execution Verification Eric Cariou1  

E-Print Network [OSTI]

Contracts for Model Execution Verification Eric Cariou1 , Cyril Ballagny2 , Alexandre Feugas3 a contract-based approach to specify an execution semantics for a meta-model. We show that an execution model transformation contracts for controlling the dynamic con- sistent evolution of a model during its

Paris-Sud XI, Université de

217

Mechanical code comparator  

DOE Patents [OSTI]

A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

2002-01-01T23:59:59.000Z

218

A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages  

SciTech Connect (OSTI)

The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

2014-01-01T23:59:59.000Z

219

Difficulties in vector-parallel processing of Monte Carlo codes  

SciTech Connect (OSTI)

Experiences with vectorization of production-level Monte Carlo codes such as KENO-IV, MCNP, VIM, and MORSE have shown that it is difficult to attain high speedup ratios on vector processors because of indirect addressing, nests of conditional branches, short vector length, cache misses, and operations for realization of robustness and generality. A previous work has already shown that the first, second, and third difficulties can be resolved by using special computer hardware for vector processing of Monte Carlo codes. Here, the fourth and fifth difficulties are discussed in detail using the results for a vectorized version of the MORSE code. As for the fourth difficulty, it is shown that the cache miss-hit ratio affects execution times of the vectorized Monte Carlo codes and the ratio strongly depends on the number of the particles simultaneously tracked. As for the fifth difficulty, it is shown that remarkable speedup ratios are obtained by removing operations that are not essential to the specific problem being solved. These experiences have shown that if a production-level Monte Carlo code system had a capability to selectively construct source coding that complements the input data, then the resulting code could achieve much higher performance.

Higuchi, Kenji; Asai, Kiyoshi [Japan Atomic Energy Research Inst., Tokyo (Japan). Center for Promotion of Computational Science and Engineering; Hasegawa, Yukihiro [Research Organization for Information Science and Technology, Tokai, Ibaraki (Japan)

1997-09-01T23:59:59.000Z

220

Stimulation at Desert Peak -modeling with the coupled THM code FEHM  

SciTech Connect (OSTI)

Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

kelkar, sharad

2013-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Stimulation at Desert Peak -modeling with the coupled THM code FEHM  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

kelkar, sharad

222

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner  

E-Print Network [OSTI]

Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

223

Graph Concatenation for Quantum Codes  

E-Print Network [OSTI]

Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

2010-02-03T23:59:59.000Z

224

TESLA Technical Design Report Executive Summary  

E-Print Network [OSTI]

TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

225

Budget Formulation & Execution | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution Budget

226

Budget Formulation and Execution | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orA BRIEFAprilBudget Formulation & Execution

227

Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms  

E-Print Network [OSTI]

Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

Kapralova, Olga

2013-01-01T23:59:59.000Z

228

Universal space-time codes from demultiplexed trellis codes  

E-Print Network [OSTI]

and A. R. Calderbank, Space-time codes for high data ratePerformance criteria and code construction, IEEE Trans.of spacetime trellis codes, IEEE Trans. Commun. , vol. 51,

Kose, Cenk; Wesel, R D

2006-01-01T23:59:59.000Z

229

Relation Between Surface Codes and Hypermap-Homology Quantum Codes  

E-Print Network [OSTI]

Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

Pradeep Sarvepalli

2014-03-14T23:59:59.000Z

230

Report number codes  

SciTech Connect (OSTI)

This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

Nelson, R.N. (ed.)

1985-05-01T23:59:59.000Z

231

Runtime Detection of C-Style Errors in UPC Code  

SciTech Connect (OSTI)

Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

2011-09-29T23:59:59.000Z

232

Quantum convolutional stabilizer codes  

E-Print Network [OSTI]

constructions of good quantum error-correcting codes were given by Steane [2] and Calderbank and Shor [3]. These codes protect the quantum information using additional qubits and make it possible to reverse the eects of the most likely errors. 10 Encouraged... is that accurate computation does not require perfect physical devices. B. Background The rst quantum error correcting codes were discovered independently by Shor [1] and Steane [2], as mentioned in the previous section. Shor proved that 9 qubits could be used...

Chinthamani, Neelima

2004-09-30T23:59:59.000Z

233

Quantum stabilizer codes and beyond  

E-Print Network [OSTI]

The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

Pradeep Kiran Sarvepalli

2008-10-14T23:59:59.000Z

234

Unequal Error Protection Turbo Codes  

E-Print Network [OSTI]

Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

Henkel, Werner

235

Rateless Codes for AVC Models  

E-Print Network [OSTI]

2004. [7] M. Luby, LT codes, in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, Fountain codes, in Proc. 41st AllertonChannel capacities for list codes, J. Appl. Probabil. ,

Sarwate, A D; Gastpar, M

2010-01-01T23:59:59.000Z

236

Climate Code Foundation  

E-Print Network [OSTI]

Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

Barnes, Nick; Jones, David

2011-07-05T23:59:59.000Z

237

No Code: Null Programs  

E-Print Network [OSTI]

To continue the productive discussion of uninscribed artworks in Craig Dworkins No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

Montfort, Nick

2014-06-05T23:59:59.000Z

238

Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes  

E-Print Network [OSTI]

The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

Dave Bacon; Andrea Casaccino

2006-10-17T23:59:59.000Z

239

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

240

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...  

Office of Environmental Management (EM)

have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergy IBM

242

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment ofDepartment of

243

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &AppleDepartment

244

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities |

245

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08:Energy 94: IBMof8:

246

T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystemsForgery Attacks and|

247

T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple | Department|Conduct

248

U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian|| Department of

249

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||

250

V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA document

251

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitraryprinters andCross-Site

252

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address Bar, Conduct

253

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address| DepartmentObtain

254

U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURLDepartment ofDepartment of|

255

Executive Positions | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4:Epitaxial Thin Film XRDEvanExecutive Director Rich

256

Executive Order 13007 Indian Sacred Sites (1996)  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResources DOEElectricalonJusticeEnergy Efficiency|Friday,Executive|6771 Federal

257

Quantum error control codes  

E-Print Network [OSTI]

QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Abdelhamid Awad Aly Ahmed, Sala

2008-10-10T23:59:59.000Z

258

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-25T23:59:59.000Z

259

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A.; Smith, Brian E.

2013-01-29T23:59:59.000Z

260

Runtime optimization of an application executing on a parallel computer  

DOE Patents [OSTI]

Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

Faraj, Daniel A; Smith, Brian E

2014-11-18T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

A New Project Execution Methodology; Integrating Project Management Principles with Quality Project Execution Methodologies  

E-Print Network [OSTI]

On an annual basis, there are numerous reports in regards to a particular company or functions inability to execute on a large number of projects. The reasons vary widely from a lack of an initial understanding of what the customer was really...

Schriner, Jesse J.

2008-07-25T23:59:59.000Z

262

V-152: Cisco Unified Customer Voice Portal (CVP) Multiple Vulnerabilit...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

administrative access. 3) An unspecified error within the configuration of the Tomcat Web Management component can be exploited to execute otherwise unauthorised user-supplied...

263

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network [OSTI]

May 12, 2011 ... Indeed price impact of large trades have been considered as one of the ... Investment performance is substantially related to the execution cost...

2012-08-13T23:59:59.000Z

264

NREL: News - NREL Announces Participants in National Executive...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

NREL Announces Participants in National Executive Education Program May 12, 2014 The Energy Department's National Renewable Energy Laboratory (NREL) has selected 17 leaders to...

265

assessment program executive: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

266

Optimal Execution Under Jump Models For Uncertain Price Impact  

E-Print Network [OSTI]

Aug 13, 2012 ... A major source of the execution cost comes from price impacts of both the investor's own trades and other concurrent institutional trades.

Somayeh Moazeni

2012-08-13T23:59:59.000Z

267

The Health Benefits of Tackling Climate Change: An Executive...  

Open Energy Info (EERE)

Benefits of Tackling Climate Change: An Executive Summary for The Lancet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Health Benefits of Tackling Climate...

268

DOE executes a diverse portfolio of capital asset projects supporting...  

Broader source: Energy.gov (indexed) [DOE]

impacting the project must be endorsed by the project's Acquisition Executive per DOE Order 413.3B (the Order). Selecting an appropriate acquisition strategy, establishing a...

269

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

SciTech Connect (OSTI)

This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

Haase, S.

2009-11-01T23:59:59.000Z

270

CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture  

E-Print Network [OSTI]

CINTRAFOR's Executive Board: Peter Anderson, President, Anderson & Anderson Architecture Paul Resources and Envir. Tom Ossinger, President, Bottomline Construction Consultants. Mark Calhoon, Program

271

Engaging Non-IT Executives in IT Infrastructure Decisions  

E-Print Network [OSTI]

This case study describes how information technology (IT) managers from Insurance Co. successfully engaged non-IT executives in IT infrastructure investment decisions. This

Fonstad, Nils O.

2008-07-01T23:59:59.000Z

272

Nested Quantum Error Correction Codes  

E-Print Network [OSTI]

The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

2009-09-28T23:59:59.000Z

273

Code: A Lightweight and Flexible Mobile Code Toolkit  

E-Print Network [OSTI]

evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of clientserver and mobile code in reducing the network traffic generated by management. The theoreticalCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

Picco, Gian Pietro

274

Trusted Computing Technologies, Intel Trusted Execution Technology.  

SciTech Connect (OSTI)

We describe the current state-of-the-art in Trusted Computing Technologies - focusing mainly on Intel's Trusted Execution Technology (TXT). This document is based on existing documentation and tests of two existing TXT-based systems: Intel's Trusted Boot and Invisible Things Lab's Qubes OS. We describe what features are lacking in current implementations, describe what a mature system could provide, and present a list of developments to watch. Critical systems perform operation-critical computations on high importance data. In such systems, the inputs, computation steps, and outputs may be highly sensitive. Sensitive components must be protected from both unauthorized release, and unauthorized alteration: Unauthorized users should not access the sensitive input and sensitive output data, nor be able to alter them; the computation contains intermediate data with the same requirements, and executes algorithms that the unauthorized should not be able to know or alter. Due to various system requirements, such critical systems are frequently built from commercial hardware, employ commercial software, and require network access. These hardware, software, and network system components increase the risk that sensitive input data, computation, and output data may be compromised.

Guise, Max Joseph; Wendt, Jeremy Daniel

2011-01-01T23:59:59.000Z

275

A Fault-Oblivious Extreme-Scale Execution Environment (FOX)  

SciTech Connect (OSTI)

IBM Researchs contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPAs HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energys FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBMs approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

2013-03-15T23:59:59.000Z

276

MHD Generation Code  

E-Print Network [OSTI]

A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

Frutos-Alfaro, Francisco

2015-01-01T23:59:59.000Z

277

Extended quantum color coding  

SciTech Connect (OSTI)

The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

2005-01-01T23:59:59.000Z

278

Coding for Cooperative Communications  

E-Print Network [OSTI]

develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c... modulation. The CF strategy is implemented with low-density parity-check (LDPC) and irregular repeat- accumulate codes and is found to operate within 0.34 dB of the theoretical limit. For the quasi-static fading relay channel, we assume that no channel...

Uppal, Momin Ayub

2011-10-21T23:59:59.000Z

279

Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control  

SciTech Connect (OSTI)

COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

1995-12-31T23:59:59.000Z

280

11/24/13 Committee Reports Executive Report  

E-Print Network [OSTI]

Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

Royer, Dana

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Project Execution Plan Electron Beam Ion Source Project  

E-Print Network [OSTI]

Project Execution Plan for the Electron Beam Ion Source Project (EBIS) Project # 07-SC-02 at Brookhaven National Laboratory Upton, NY For the U.S. Department of Energy Office of Science Office of Nuclear Physics (SC ­ 26) Rev. 1 May 2008 #12;#12;#12;4 Project Execution Plan for the Electron Beam Ion

282

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi  

E-Print Network [OSTI]

Execution-Less Performance Modeling Roman Iakymchuk and Paolo Bientinesi AICES, RWTH Aachen occurring in higher- level algorithms--like a matrix factorization--is then pre- dicted by combining a priori; the prediction of performance therefore reduces to the pre- diction of Execution time. Our

283

Developing and Executing Goal-Based, Adjustably Autonomous Procedures  

E-Print Network [OSTI]

Developing and Executing Goal-Based, Adjustably Autonomous Procedures David Kortenkamp, R. Peter@jsc.nasa.gov This paper describes an approach to representing, authoring and executing procedures during human spaceflight missions. The approach allows for the explicit incorporation of goals into procedures. The approach also

Kortenkamp, David

284

Software Pipelined Execution of Stream Programs on GPUs  

E-Print Network [OSTI]

Software Pipelined Execution of Stream Programs on GPUs Abhishek Udupa, R. Govindarajan, Matthew J task, data and pipeline parallelism which can be exploited on modern Graphics Processing Units (GPUsIt to GPUs and propose an efficient technique to software pipeline the execution of stream programs on GPUs

Plotkin, Joshua B.

285

Certifying Program Execution with Secure Processors Benjie Chen Robert Morris  

E-Print Network [OSTI]

for Computer Science {benjie,rtm}@lcs.mit.edu Abstract Cerium is a trusted computing architecture that protects computing architecture, Cerium, that uses a se- cure processor to protect a program's execution, so. Instead, Cerium tells a user what pro- gram executed and what hardware and software envir- onment

286

Executive Budget Support Team Office of the President  

E-Print Network [OSTI]

Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

Jacobs, Laurence J.

287

NARSTO Quality Planning and Data Management Handbooks Executive Summary  

E-Print Network [OSTI]

'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

288

Robert D. Kimble Deputy Program Executive Officer for Strike  

E-Print Network [OSTI]

and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

289

The Woodland Carbon Code  

E-Print Network [OSTI]

The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

290

Course Code: Course Title  

E-Print Network [OSTI]

- Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

Painter, Kevin

291

Hydrogen Production CODES & STANDARDS  

E-Print Network [OSTI]

Hydrogen Production DELIVERY FUEL CELLS STORAGE PRODUCTION TECHNOLOGY VALIDATION CODES & STANDARDS for 2010 · Reduce the cost of distributed production of hydrogen from natural gas and/or liquid fuels to $1 SYSTEMS INTEGRATION / ANALYSES SAFETY EDUCATION RESEARCH & DEVELOPMENT Economy Pete Devlin #12;Hydrogen

292

Chaotic Turbo Codes  

E-Print Network [OSTI]

This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

293

Minor Codes Accounting 1100  

E-Print Network [OSTI]

Minor Codes Accounting 1100 Adult/Extension Education 1220 Aerospace Studies 1225 Agricultural Business Management 1250 Agricultural Mechanization and Business 1600 American Sign Language Studies 5650 and Policy 3790 Equine Business 4690 Film Studies 7756 Financial Management 3900 Food Science 4100 Forest

Bolding, M. Chad

294

Erasure Techniques in MRD codes  

E-Print Network [OSTI]

This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

2012-05-03T23:59:59.000Z

295

20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...  

Broader source: Energy.gov (indexed) [DOE]

1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

296

REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES  

E-Print Network [OSTI]

AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

Wong, Tan F.

297

Optimized Generation of Data-Path from C Codes for FPGAs  

E-Print Network [OSTI]

FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

Guo, Zhi; Najjar, Walid; Vissers, Kees

2011-01-01T23:59:59.000Z

298

Adaptive code generators for tree coding of speech  

E-Print Network [OSTI]

Tree coding is a promising way of obtaining good performance for medium-to-low rate speech coding. The key part of a tree coder is the code generator which consists of a short-term predictor and a long-term predictor. The best predictor designed...

Dong, Hui

1998-01-01T23:59:59.000Z

299

Nevada Energy Code for Buildings  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

300

Matlab-Kinect Interface Code  

E-Print Network [OSTI]

This .zip file contains code and installation instructions for acquiring 3d arm movements in Matlab using the Microsoft Kinect 3d camera. The provided code has been validated in 32-bit and 64-bit Matlab with 32-bit and ...

Kowalski, Kevin

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

City of Austin- Zoning Code  

Broader source: Energy.gov [DOE]

The Zoning Code (Chapter 25-2) of the Austin City Code provides a height limitation exemption for solar installations. Solar installations may exceed the zoning district height limit by 15% or the...

302

Code of Practice Research Degrees  

E-Print Network [OSTI]

........................................................................ 15 Section Ten: FacilitiesCode of Practice For Research Degrees 2014/15 #12;2 Contents Section One: Preface ­ the purpose of the Code........................................................ 3 Section Two: Context

Evans, Paul

303

MELCOR computer code manuals  

SciTech Connect (OSTI)

MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

1995-03-01T23:59:59.000Z

304

What's coming in 2012 codes  

E-Print Network [OSTI]

Administration Why Building Energy Codes Matter Why Building Energy Codes Matter ? Buildings account for 70% of electricity use ? Buildings account for 38% of CO2 emissions (Source: US Green Building Council) Residential Progress Commercial Progress... ? Southeast Energy Efficiency Alliance ? Southwest Energy Efficiency Project Why Building Energy Codes Matter Why Building Energy Codes Matter ? Share of Energy Consumed by Major Sectors of the Economy (2010) Source: U.S. Energy Information...

Lacey, E

2011-01-01T23:59:59.000Z

305

Energy Codes and Standards: Facilities  

SciTech Connect (OSTI)

Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

2007-01-01T23:59:59.000Z

306

Design of proximity detecting codes  

E-Print Network [OSTI]

class of codes called Proximity Detecting Codes can be used to overcome this problem associated with asynchronous channels. A t-proximity detecting (t-PD) code can detect when a received word is within distance t from the transmitted codeword, when using...

Perisetty, Srinivas

1997-01-01T23:59:59.000Z

307

Code for Hydrogen Hydrogen Pipeline  

E-Print Network [OSTI]

#12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

308

PERFORMANCE EVALUATION OF TURBO CODES  

E-Print Network [OSTI]

PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

Alajaji, Fady

309

Travel Codes Traveler Is Employee  

E-Print Network [OSTI]

Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

Arnold, Jonathan

310

Southeast Energy Efficiency Alliance's Building Energy Codes...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

311

2013 Reporting Unit Codes | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

312

Renewable Energy Executive Summary High-Yield Scenario  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Efficiency & Renewable Energy Executive Summary High-Yield Scenario Workshop Series Report INLEXT-10-18930 December 2009 The 2005 Billion-Ton Study a (BTS) esti- mates the...

313

Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary  

Office of Energy Efficiency and Renewable Energy (EERE)

This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

314

Robust Execution of Bipedal Walking Tasks From Biomechanical Principles  

E-Print Network [OSTI]

Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

Hofmann, Andreas

2006-04-28T23:59:59.000Z

315

Continuous execution : improving user feedback in the development cycle  

E-Print Network [OSTI]

Programming environments are increasing the amount of feedback given to users during the development cycle. This work continues with this trend by exploring continuous execution, a programming environment where the result ...

Su, Kevin

2007-01-01T23:59:59.000Z

316

Nuclear Energy In the United States Executive Summary  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

0 Status and Outlook for Nuclear Energy In the United States Executive Summary The U.S. nuclear power industry continues to make pro- gress toward the construction of new nuclear...

317

Robust execution of bipedal walking tasks from biomechanical principles  

E-Print Network [OSTI]

Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

Hofmann, Andreas G. (Andreas Gunther)

2006-01-01T23:59:59.000Z

318

Summary of Differences in Approach to Executing the NGNP Project  

SciTech Connect (OSTI)

The following discuss the summary differences between the NGNP Industry Alliances approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOEs Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

P.C. Hildebrandt

2010-08-01T23:59:59.000Z

319

Robust, goal-directed plan execution with bounded risk  

E-Print Network [OSTI]

There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

2012-01-01T23:59:59.000Z

320

PROGRAM INFORMATION This executive master's program with a  

E-Print Network [OSTI]

, they have helped healthcare facilities improve total-quality management, scheduling and sequencingPROGRAM INFORMATION This executive master's program with a health systems concentration: takes and construction firms Management consulting firms Health insurance companies Research and planning

Suzuki, Masatsugu

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Error Floors of LDPC Codes and Related Topics  

E-Print Network [OSTI]

Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

Butler, Brian K.

322

Energy Codes at a Glance  

SciTech Connect (OSTI)

Feeling dim from energy code confusion? Read on to give your inspections a charge. The U.S. Department of Energys Building Energy Codes Program addresses hundreds of inquiries from the energy codes community every year. This article offers clarification for topics of confusion submitted to BECP Technical Support of interest to electrical inspectors, focusing on the residential and commercial energy code requirements based on the most recently published 2006 International Energy Conservation Code and ANSI/ASHRAE/IESNA1 Standard 90.1-2004.

Cole, Pamala C.; Richman, Eric E.

2008-09-01T23:59:59.000Z

323

Wyner-Ziv coding based on TCQ and LDPC codes and extensions to multiterminal source coding  

E-Print Network [OSTI]

to approach the Wyner-Ziv distortion limit D??W Z(R), the trellis coded quantization (TCQ) technique is employed to quantize the source X, and irregular LDPC code is used to implement Slepian-Wolf coding of the quantized source input Q(X) given the side...

Yang, Yang

2005-11-01T23:59:59.000Z

324

A Study of Execution Environments for Software Kung-Kiu Lau and Vladyslav Ukis  

E-Print Network [OSTI]

A Study of Execution Environments for Software Components Kung-Kiu Lau and Vladyslav Ukis School-kiu,vukis}@cs.man.ac.uk Abstract. Software components are deployed into an execution environment be- fore runtime. The execution environment influences the runtime execution of a component. Therefore, it is important to study existing

Lau, Kung-Kiu

325

Forest Research Executive Board Meeting 16 April 2008 by video conference  

E-Print Network [OSTI]

Forest Research Executive Board Meeting ­ 16 April 2008 by video conference Present: NRS Alice Holt

326

Job submission system and its execution monitoring for improving data processing in high energy physics experiments  

E-Print Network [OSTI]

Job submission system and its execution monitoring for improving data processing in high energy physics experiments

Jurkowski, Igor; Czekierda, ?ukasz

327

CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment  

E-Print Network [OSTI]

CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment Document Number 003-001/002.01 DRAFT-Mellon University Schenley Park Pittsburgh, PA 15213 #12;The ICE Execution Environment DRAFT 003- 001/002.01 U ncla ssified ( 2 The ICE Execution Environment #12;The ICE Execution Environment DRAFT 003

328

Midwest Energy Codes Project  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F S i DOE TribaltheMy nameMid-LevelMidwest Energy Codes Project 2014

329

Quantum serial turbo-codes  

E-Print Network [OSTI]

We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.

David Poulin; Jean-Pierre Tillich; Harold Ollivier

2009-06-10T23:59:59.000Z

330

Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on  

E-Print Network [OSTI]

Statement of the Exploratory Plasma Research (EPR) Executive Committee The members of the EPR (formerly ICC) Executive Committee urge the FESAC subcommittee on MFE Priorities to consider the following high-level recommendations: 1. The EPR

331

Turbo and LDPC Codes: Implementation, Simulation,  

E-Print Network [OSTI]

1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes ­ the MAP algorithm Turbo codes ­ Standard binary turbo codes: UMTS and cdma2000 ­ Duobinary CRSC turbo codes: DVB

Valenti, Matthew C.

332

Conjugate Codes and Applications to Cryptography  

E-Print Network [OSTI]

A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

Mitsuru Hamada

2006-10-23T23:59:59.000Z

333

AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution time of scientificreduce the execution time of scientific  

E-Print Network [OSTI]

AutoAuto--tuned nested parallelism: a way totuned nested parallelism: a way to reduce the execution problems AutoAuto--tuned nested parallelism: a way to reduce the execution time of scientific software in NUMA systemstuned nested parallelism: a way to reduce the execution time of scientific software in NUMA

Giménez, Domingo

334

Clark County- Energy Conservation Code  

Broader source: Energy.gov [DOE]

In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

335

Nonbinary Codeword Stabilized Quantum Codes  

E-Print Network [OSTI]

The codeword stabilized (CWS) quantum codes formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes (arXiv:0708.1021 [quant-ph]), but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimension) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

Xie Chen; Bei Zeng; Isaac L. Chuang

2008-08-22T23:59:59.000Z

336

Marin County- Solar Access Code  

Broader source: Energy.gov [DOE]

Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

337

SHEAN (Simplified Human Error Analysis code) and automated THERP  

SciTech Connect (OSTI)

One of the most widely used human error analysis tools is THERP (Technique for Human Error Rate Prediction). Unfortunately, this tool has disadvantages. The Nuclear Regulatory Commission, realizing these drawbacks, commissioned Dr. Swain, the author of THERP, to create a simpler, more consistent tool for deriving human error rates. That effort produced the Accident Sequence Evaluation Program Human Reliability Analysis Procedure (ASEP), which is more conservative than THERP, but a valuable screening tool. ASEP involves answering simple questions about the scenario in question, and then looking up the appropriate human error rate in the indicated table (THERP also uses look-up tables, but four times as many). The advantages of ASEP are that human factors expertise is not required, and the training to use the method is minimal. Although not originally envisioned by Dr. Swain, the ASEP approach actually begs to be computerized. That WINCO did, calling the code SHEAN, for Simplified Human Error ANalysis. The code was done in TURBO Basic for IBM or IBM-compatible MS-DOS, for fast execution. WINCO is now in the process of comparing this code against THERP for various scenarios. This report provides a discussion of SHEAN.

Wilson, J.R.

1993-06-01T23:59:59.000Z

338

Quantum Quasi-Cyclic LDPC Codes  

E-Print Network [OSTI]

In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.

Manabu Hagiwara; Hideki Imai

2010-08-28T23:59:59.000Z

339

Super Special Codes using Super Matrices  

E-Print Network [OSTI]

The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

W. B. Vasantha Kandasamy; Florentin Smarandache; K. Ilanthenral

2010-06-30T23:59:59.000Z

340

On the logical operators of quantum codes  

E-Print Network [OSTI]

I show how applying a symplectic Gram-Schmidt orthogonalization to the normalizer of a quantum code gives a different way of determining the code's logical operators. This approach may be more natural in the setting where we produce a quantum code from classical codes because the generator matrices of the classical codes form the normalizer of the resulting quantum code. This technique is particularly useful in determining the logical operators of an entanglement-assisted code produced from two classical binary codes or from one classical quaternary code. Finally, this approach gives additional formulas for computing the amount of entanglement that an entanglement-assisted code requires.

Mark M. Wilde

2009-03-30T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Rate-Adaptive Codes for Distributed Source Coding David Varodayan  

E-Print Network [OSTI]

S with respect to a channel code C. Upon receipt of the syndrome, the distributed source decoder can narrow down- proach with their DISCUS framework [7]. The distributed source encoder compresses X into its syndrome is an at- tractive solution. The encoder transmits a short syndrome based on an aggressive code

Girod, Bernd

342

FOUNDATION REVENUE OBJECT CODES LSU Foundation Revenue Object Codes  

E-Print Network [OSTI]

FOUNDATION REVENUE OBJECT CODES 4 page 1 LSU Foundation Revenue Object Codes 0F00 Foundation - Balance Forward 0F01 Foundation - Other Contributions 0F02 Foundation - State of Louisiana 0F03 Foundation - Corporate Contributions 0F04 Foundation - Corporate Match Contributions 0F05 Foundation - Individual

Harms, Kyle E.

343

Non-Residential Energy Code National and Regional Codes  

E-Print Network [OSTI]

Non-Residential Energy Code Comparison National and Regional Codes David Baylon Mike Kennedy #12 2003 · ASHRAE 90.1 2001 & addenda · E-Benchmark Guidelines (NBI) #12;Approach · Comparison of the State;Approach (cont.) · Provisions compared ­ Lighting power ­ Lighting controls ­ Mechanical systems ­ Building

344

Building and Facility Codes Code Building Location Bldg # Coordinates  

E-Print Network [OSTI]

Building and Facility Codes Code Building Location Bldg # Coordinates APM Applied Physics & Mathematics Building Muir 249 F7 ASANT Asante Hall Eleanor Roosevelt 446 F5 BIO Biology Building Muir 259 F7 BIRCH Birch Aquarium SIO 2300 S-D7 BONN Bonner Hall Revelle 131 G8 BSB Biomedical Sciences Building

Russell, Lynn

345

Space time coded code division multiplexing on SC140 DSP  

E-Print Network [OSTI]

The aim of this research is to design a high data rate wireless communication system for multi-path fading channels. Code-division multiplexing is proposed as a modulation scheme for a space-time coded multiple antenna system that would guarantee...

Menon, Murali P

2001-01-01T23:59:59.000Z

346

VOLTTRON: An Agent Execution Platform for the Electric Power System  

SciTech Connect (OSTI)

Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

2012-06-05T23:59:59.000Z

347

LFSC - Linac Feedback Simulation Code  

SciTech Connect (OSTI)

The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

Ivanov, Valentin; /Fermilab

2008-05-01T23:59:59.000Z

348

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

349

Stabilizer Codes over Frobenius Rings  

E-Print Network [OSTI]

now, the methods for quantum error correction were mainly based on quantum codes that rely on the arithmetic in finite fields. In contrast, this thesis aims to develop a basic framework for quantum error correcting codes over a class of rings known...

Nadella, Sushma

2012-07-16T23:59:59.000Z

350

CODE OF PRACTICE HYDROGEN SULFIDE  

E-Print Network [OSTI]

CODE OF PRACTICE HYDROGEN SULFIDE 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas. It outlines responsibilities, safe procedure requirements. All work areas where hydrogen sulfide is used within the University of Alberta must

Machel, Hans

351

CODE OF PRACTICE HYDROGEN SULFIDE  

E-Print Network [OSTI]

CODE OF PRACTICE HYDROGEN SULFIDE Rev January 2013 1 The following generic Code of Practice applies to all work areas within the University of Alberta that use hydrogen sulfide gas or where hydrogen response procedure requirements. All work areas where hydrogen sulfide is used or may be present within

Machel, Hans

352

Weight Distribution of a Class of Binary Linear Block Codes Formed from RCPC Codes  

E-Print Network [OSTI]

formed from convolutional codes, IEEE Trans. Commun. , vol.terminated convolutional codes, IEEE Trans. Inform. Theory,decoding of linear block codes and related soft- decision

Shen, Yushi Dr.; Cosman, Pamela C; Milstein, Laurence B

2006-01-01T23:59:59.000Z

353

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space-Time Coding for Multi-Antenna  

E-Print Network [OSTI]

Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space 2007 #12;Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures notes on Space Time Coding

Veeravalli, Venugopal

354

Entanglement boosts quantum turbo codes  

E-Print Network [OSTI]

One of the unexpected breakdowns in the existing theory of quantum serial turbo coding is that a quantum convolutional encoder cannot simultaneously be recursive and non-catastrophic. These properties are essential for a quantum turbo code to have an unbounded minimum distance and for its iterative decoding algorithm to converge, respectively. Here, we show that the entanglement-assisted paradigm gives a theoretical and practical "turbo boost" to these codes, in the sense that an entanglement-assisted quantum (EAQ) convolutional encoder can possess both of the aforementioned desirable properties, and simulation results indicate that entanglement-assisted turbo codes can operate reliably in a noise regime 5.5 dB beyond that of standard quantum turbo codes. Entanglement is the resource that enables a convolutional encoder to satisfy both properties because an encoder acting on only information qubits, classical bits, gauge qubits, and ancilla qubits cannot simultaneously satisfy them. We give several examples o...

Wilde, Mark M

2010-01-01T23:59:59.000Z

355

Remarkable Degenerate Quantum Stabilizer Codes Derived from Duadic Codes  

E-Print Network [OSTI]

Good quantum codes, such as quantum MDS codes, are typically nondegenerate, meaning that errors of small weight require active error-correction, which is--paradoxically--itself prone to errors. Decoherence free subspaces, on the other hand, do not require active error correction, but perform poorly in terms of minimum distance. In this paper, examples of degenerate quantum codes are constructed that have better minimum distance than decoherence free subspaces and allow some errors of small weight that do not require active error correction. In particular, two new families of [[n,1,>= sqrt(n)

Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

2006-01-18T23:59:59.000Z

356

On Quantum and Classical BCH Codes  

E-Print Network [OSTI]

Classical BCH codes that contain their (Euclidean or Hermitian) dual codes can be used to construct quantum stabilizer codes; this correspondence studies the properties of such codes. It is shown that a BCH code of length n can contain its dual code only if its designed distance d=O(sqrt(n)), and the converse is proved in the case of narrow-sense codes. Furthermore, the dimension of narrow-sense BCH codes with small design distance is completely determined, and - consequently - the bounds on their minimum distance are improved. These results make it possible to determine the parameters of quantum BCH codes in terms of their design parameters.

Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

2006-04-14T23:59:59.000Z

357

San Francisco Building Code Amendments to the  

E-Print Network [OSTI]

Green Building Standards Code 2010 California Residential Code Operative date: January 1, 2011 #12;2 #121 2010 San Francisco Building Code Amendments to the 2010 California Building Code 2010 California;3 CHAPTER 1 SCOPE AND ADMINISTRATION DIVISION I CALIFORNIA ADMINISTRATION No San Francisco Building Code

358

The Specification and Execution of Heterogeneous Synchronous Reactive Systems  

E-Print Network [OSTI]

The Specification and Execution of Heterogeneous Synchronous Reactive Systems by Stephen Anthony in Engineering---Electrical Engineering and Computer Sciences in the GRADUATE DIVISION of the UNIVERSITY of Heterogeneous Synchronous Reactive Systems Copyright ã 1997 by Stephen Anthony Edwards #12; Abstract

359

Executive Summary Critique Air Products and Chemicals, Inc.  

E-Print Network [OSTI]

ME440W Executive Summary Critique Air Products and Chemicals, Inc. Low Fin Tube Heat Exchanger as compared to the bare tubes. However, contrary to Air Products' argument that the heat exchangers were to reduce turbulence of the air before it reaches the fan. The inline fan pulls the air through the test

Demirel, Melik C.

360

EXECUTIVE SUMMARY A Review of Water Conservation Planning for the  

E-Print Network [OSTI]

to maintain critical water flows for downstream ecosystems, the Florida Department of Environmental Protection by incorporating the full benefits of water recycling and reuse. Analysis underestimates economic valueEXECUTIVE SUMMARY A Review of Water Conservation Planning for the Atlanta, Georgia Region (August

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Project Management and Analysis Project Conception and Execution  

E-Print Network [OSTI]

TD 608 Project Management and Analysis Part I Project Conception and Execution Milind Sohoni of the paper? How does the author compare India and Pakistan? Do you agree with the cost-benefit analysis? What are your criticisms? Compare the CBA with our 6-goat system. Comment on the viability of the project

Sohoni, Milind

362

Project Management and Analysis Project Conception and Execution  

E-Print Network [OSTI]

by the World Bank at a cost of $ 600,000. The objectives of the project are: Analyze the supply and demandTD 608 Project Management and Analysis Part I Project Conception and Execution Milind Sohoni Discussion () January 29, 2008 1 / 3 #12;The K-East Ward Water Project Proceed to the web location: www

Sohoni, Milind

363

Executive Summaries Hydrogen Storage Materials Centers of Excellence  

E-Print Network [OSTI]

Executive Summaries for the Hydrogen Storage Materials Centers of Excellence Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Period of Performance: 2005 of Energy April 2012 #12;2 #12;3 Primary Authors: Chemical Hydrogen Storage (CHSCoE): Kevin Ott, Los

364

Furlough or Reduction in Force in the Senior Executive Service  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish requirements and assign responsibilities for furlough and reduction in force (RIF) of the Senior Executive Service (SES) in the Department of Energy (DOE) and the National Nuclear Security Administration (NNSA). Cancels O DOE 3350.1 Chg 1 and DOE 3351.2 Chg 1.

2003-05-15T23:59:59.000Z

365

Executive Vice Chancellor & Jeffrey A. Bluestone, PhD.  

E-Print Network [OSTI]

Service Center Suzanne Murphy Dir. LARC Jame Wilkerson, DVM,JD Director CCF Linda Reilly, PhD. MultipleExecutive Vice Chancellor & Provost Jeffrey A. Bluestone, PhD. Assoc. VC Research Susanne Hildebrand- Zanki, PhD. AVC OTIIP VACANT ED-RRP (Cores) Julie Auger Dir. Admin & Fin. EVC&P Business & HR

Lim, Wendell

366

Reducing Electricity Demand Charge for Data Centers with Partial Execution  

E-Print Network [OSTI]

. INTRODUCTION Data centers are the powerhouse behind many Internet services today. A modern data centerReducing Electricity Demand Charge for Data Centers with Partial Execution Hong Xu Department@eecg.toronto.edu ABSTRACT Data centers consume a large amount of energy and incur substantial electricity cost

Li, Baochun

367

Synergistic Execution of Stream Programs on Multicores with Accelerators  

E-Print Network [OSTI]

Synergistic Execution of Stream Programs on Multicores with Accelerators Abhishek Udupa R be exploited on accelerators such as Graphics Processing Units (GPUs) or CellBE which support abundantIt program on a multicore platform equipped with an accelerator. The proposed approach identifies, using

Plotkin, Joshua B.

368

Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda  

E-Print Network [OSTI]

Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

Chiueh, Tzi-cker

369

Federated Clusters Using the Transparent Remote Execution (TREx) Environment  

E-Print Network [OSTI]

Federated Clusters Using the Transparent Remote Execution (TREx) Environment Richert Wang1 University of California, Irvine 442 Computer Science Building Irvine, CA 92697-3435 rkwang@ics.uci.edu Enrique Cauich University of California, Irvine 442 Computer Science Building Irvine, CA 92697

Scherson, Isaac D.

370

Reducing Execution Overhead in a Data Stream Manager , Uur etintemel  

E-Print Network [OSTI]

is designed to take advantage of our overhead reducing techniques. We also discuss the specific overheads1 Reducing Execution Overhead in a Data Stream Manager Don Carney , Uur ?etintemel , Alex Rasin applications include sensor networks, position tracking, fabrication line management, network management

Cherniack, Mitch

371

FWP executive summaries: Basic energy sciences materials sciences programs  

SciTech Connect (OSTI)

This report provides an Executive Summary of the various elements of the Materials Sciences Program which is funded by the Division of Materials Sciences, Office of Basic Energy Sciences, U.S. Department of Energy at Sandia National Laboratories, New Mexico.

Samara, G.A.

1996-02-01T23:59:59.000Z

372

UITV 2005 Annual Report Executive Summary ITS VIDEO SERVICES  

E-Print Network [OSTI]

UITV 2005 Annual Report Executive Summary ITS VIDEO SERVICES 1 Telecommunication and Network Services ITS Video Services 23 Lindquist Center 319-335-5898 UITV (University of Iowa Cable TelevisionBride, Video Services Program Manager INTRODUCTION 2005 could be called "The Year of the Student Producer

373

UITV 2004 Annual Report Executive Summary ITS VIDEO SERVICES  

E-Print Network [OSTI]

UITV 2004 Annual Report Executive Summary ITS VIDEO SERVICES 1 Telecommunication and Network Services ITS Video Services 23 Lindquist Center 319-335-5898 UITV (University of Iowa Cable TelevisionBride, Video Services Program Manager UITV, University of Iowa Cable Television, is the cable television

374

Executive Summary Joint Proposal of the Northwest Utilities  

E-Print Network [OSTI]

1 Executive Summary Joint Proposal of the Northwest Utilities The Future Role of BPA Regarding transfer from BPA to the region's utilities much of the responsibility for securing additional electricity a slice contract, a utility receives power equal to a fixed percentage of the electricity produced

375

Nancy Rader, Executive Director California Wind Energy Association  

E-Print Network [OSTI]

Nancy Rader, Executive Director California Wind Energy Association Improving Methods for Estimating Fatality of Birds and Bats at Wind Energy Facilities California Wind Energy Association Public Webinar Wind Energy Development 2008 CEC Research "Roadmap" on Impact Assessment Methods 2008 CEC PIER RFP 2009

376

Office of Nuclear Energy, Science and Technology Executive Summary  

E-Print Network [OSTI]

Office of Nuclear Energy, Science and Technology Executive Summary Mission As we become more in this new century, the benefits of nuclear fission as a key energy source for both the near- and long method of generating energy from nuclear fission in both the United States and the world. A key mission

377

Update: March 28, 2014 EXECUTIVE SUMMARY: PEACECARE-DOMINICAN REPUBLIC  

E-Print Network [OSTI]

Update: March 28, 2014 1 EXECUTIVE SUMMARY: PEACECARE-DOMINICAN REPUBLIC A partnership between Peace Corps-Dominican Republic, the community of Guaymate, the University of Illinois) and Northwestern University (NU), Peace Corps volunteers in the Dominican Republic, and the Guaymate community

Alford, Simon

378

GROUPED'ANALYSEETDETHORIECONOMIQUELYONSTTIENNE ReininginExcessiveRiskTakingbyExecutives  

E-Print Network [OSTI]

compensation; stock-options; incentives; accountability; risk taking JEL Classification: D03, G28, G32, J33, L #12;Reining in Excessive Risk Taking by Executives: Experimental Evidence Mathieu Lefebvre. The overwhelming part of such equity compensation is currently provided in the form of stock-options. Recent events

Boyer, Edmond

379

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET  

E-Print Network [OSTI]

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C . 20503.C. 20515 Dear Mr. Speaker: Enclosed please find the Office ofManagement and Budget (OMB) Report to the Congress on the sequestration for fiscal year (FY) 2013 required by section 251A of the Balanced Budget

380

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET  

E-Print Network [OSTI]

EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 March 1 Balanced Budget and Emergency Deficit Control Act of 1985, as Amended This memorandum is to inform) in accordance with section 251A of the Balanced Budget and Emergency Deficit Control Act, as amended (BBEDCA), 2

Myers, Lawrence C.

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Robust Execution of Temporally Flexible Plans for Bipedal Walking Devices  

E-Print Network [OSTI]

walking machine. An example task for such a system is to walk to a soccer ball and kick it, as shown 02139 hofma@csail.mit.edu, williams@mit.edu Abstract Robotic wheeled rovers have been successfully controlled by activity execution systems that use plans with temporal flexibility to adapt to disturbances

Williams, Brian C.

382

MAPS Executive Board Meeting Tuesday March 5 2013  

E-Print Network [OSTI]

MAPS Executive Board Meeting Tuesday March 5 2013 MAPS Boardroom, MUSC rm 234. Call to order @5, unanimous 2. Action Items from minutes - MAPS Legal Issues - Andrew reported to the board - Last bill 11.5 k ­ Website ­ how to upload changes - MAPS email signatures - Vehicle - in parking lot ­ must do something

Hitchcock, Adam P.

383

Executive Summary 2012 -2013 Department of Housing & Residential Life  

E-Print Network [OSTI]

Executive Summary 2012 - 2013 Department of Housing & Residential Life The Department of Housing & Residential Life will strive to educate our students outside of the classroom to provide them & Residential Life has a capacity of 3,500 students on the Boca Raton Campus and 283 Jupiter campuses of Florida

Fernandez, Eduardo

384

Securing Trusted Execution Environments with PUF Generated Secret Keys  

E-Print Network [OSTI]

of New Mexico Department of Electrical and Computer Engineering Albuquerque, New Mexico, USA mareno@ece.unm.edu Jim Plusquellic University of New Mexico Department of Electrical and Computer Engineering Albuquerque, New Mexico, USA jimp@ece.unm.edu Abstract--Trusted Execution Environments are quickly becom- ing

Plusquellic, James

385

Detailed Execution Planning for Large Oil and Gas Construction Projects  

E-Print Network [OSTI]

Detailed Execution Planning for Large Oil and Gas Construction Projects Presented by James Lozon, University of Calgary There is currently 55.8 billion dollars worth of large oil and gas construction projects scheduled or underway in the province of Alberta. Recently, large capital oil and gas projects

Calgary, University of

386

Grid porting of Bhabha scattering code through a master-worker scheme  

E-Print Network [OSTI]

A program calculating Bhabha scattering at high energy colliders is considered for porting to the EGEE Grid infrastructure. The program code, which is a result of the aITALC project, is ported by using a master-worker operating scheme. The job submission, execution and monitoring are implemented using the GridWay metascheduler. The unattended execution of jobs turned out to be complete and rather efficient, even when pre-knowledge of the grid is absent. While the batch of jobs remains organized at the user's side, the actual computation was carried out within the phenogrid virtual organization. The scientific results support the use of the small angle Bhabha scattering for the luminosity measurements of the International Linear Collider project.

Alejandro Lorca; Jose Luis Vazquez-Poletti; Eduardo Huedo; Ignacio M. Llorente

2009-04-01T23:59:59.000Z

387

Executive Committee on Sustainability and Climate Change (2012-13 Charge/Membership)  

E-Print Network [OSTI]

Executive Committee on Sustainability and Climate Change (2012-13 Charge/Membership) The Chancellor's Executive Committee on Sustainability and Climate Change (ECS) provides a forum for the Chancellor campus leadership on implementation of policies and initiatives to integrate sustainability

California at Santa Cruz, University of

388

Example of Environmental Restoration Code of Accounts  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.

1997-03-28T23:59:59.000Z

389

DEPARTMENT CODE Department of Computer Science  

E-Print Network [OSTI]

DEPARTMENT CODE Department of Computer Science College of Natural Sciences Colorado State and Amendment of this Code 19 #12;1 MISSION AND OBJECTIVES 3 Preamble This Code of the Department of Computer

390

Arkansas Underground Injection Control Code (Arkansas)  

Broader source: Energy.gov [DOE]

The Arkansas Underground Injection Control Code (UIC code) is adopted pursuant to the provisions of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-5-11). It is the...

391

Entanglement-assisted codeword stabilized quantum codes  

SciTech Connect (OSTI)

Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

Shin, Jeonghwan; Heo, Jun; Brun, Todd A. [School of Electrical Engineering, Korea University, Seoul (Korea, Republic of); Communication Sciences Institute, University of Southern California, Los Angeles, California 90089 (United States)

2011-12-15T23:59:59.000Z

392

Entanglement-assisted codeword stabilized quantum codes  

E-Print Network [OSTI]

Entangled qubit can increase the capacity of quantum error correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and non-additive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common sta- bilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors the codeword stabilized quantum code framework gives rise to effective Z errors on Bob side. We use this scheme to construct new entanglement-assisted non-additive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

Jeonghwan Shin; Jun Heo; Todd A. Brun

2011-09-15T23:59:59.000Z

393

STDS91.COD: Grief and Mourning Codes  

E-Print Network [OSTI]

conflict 2000 Age of Marriage, Females (code book variable87) N Code NA Meaning Missing data Scores range from 8.2 toGRIEF AND MOURNING CODES Paul C. Rosenblatt Department of

Rosenblatt, Paul C.; Walsh, R. Patricia; Jackson, Douglas A.

2011-01-01T23:59:59.000Z

394

LDPC codes : structural analysis and decoding techniques  

E-Print Network [OSTI]

to Low-Density Parity-Check Codes 2.1 Representation of LDPC4.2 Error Floors of LDPC Codes . . . . . . . . . . . . . . .LP Decoding of LDPC Codes with Alternating Direction Method

Zhang, Xiaojie

2012-01-01T23:59:59.000Z

395

Codes for the fast SSS QR eigens  

E-Print Network [OSTI]

Fortran 90 codes (zip file); Matlab codes (zip file). Please email. A fast O(n^2) time QR eigensolver for companion matrices/polynomials. Fortran 90 codes (zip...

396

Graphical models for coding and computation  

E-Print Network [OSTI]

n, k, d ) linear code over F q , with generator matrix G andrepresents the generator matrix of a random linear code. Asrepresents the generator matrix of a random linear code. As

Santhi, Nandakishore

2006-01-01T23:59:59.000Z

397

Context-Sensitive Measurement-Based Worst-Case Execution Time Estimation Michael Zolda, Sven Bunte  

E-Print Network [OSTI]

analysis (MBTA) [1], we estimate the WCET of a given piece of software by executing it with selected input

398

E-Print Network 3.0 - aipr executive committee Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

committees Summary: Committee and Colleges' Committee Committee on Libraries Counselling Service Executive Committee Fitness... committees Senior Tutors are...

399

Budget/Object Codes -REVENUE Budget/Object Codes -REVENUE BUDGET/OBJECT BUDGET/OBJECT  

E-Print Network [OSTI]

Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET CODE DESCRIPTION BUDGET CODE DESCRIPTION 01 30 0101 On-Campus-Full Time 3001 Federal Program 0102 On APPROPRIATIONS #12;Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET

Selmic, Sandra

400

Codeword Stabilized Quantum Codes and Their Error Correction  

E-Print Network [OSTI]

5.1.4 Generic CWS codes . . . . . . . . . . .USt codes . . . . . . . . . . . . . . . . . . . . . .Quantum Codes 2.1 Notations . . . . . . . . . . . . . . 2.2

Li, Yunfan

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Algebraic list-decoding of error-correcting codes  

E-Print Network [OSTI]

Solomon codes . . . . . . . . . . . . . . . 1.2.2 Guruswami-Simple trivariate codes and theirdecoding . . . . . . . . . . . . . 3.3.1 Code parameters and

Parvaresh, Farzad

2007-01-01T23:59:59.000Z

402

Gas Code of Conduct (Connecticut)  

Broader source: Energy.gov [DOE]

The Gas Code of Conduct sets forth the standard of conduct for transactions, direct or indirect, between gas companies and their affiliates. The purpose of these regulations is to promote...

403

NFPA's Hydrogen Technologies Code Project  

SciTech Connect (OSTI)

This article discusses the development of National Fire Protection Association 2 (NFPA), a comprehensive hydrogen safety code. It analyses the contents of this document with particular attention focused on new requirements for setting hydrogen storage systems. These new requirements use computational fluid dynamic modeling and risk assessment procedures to develop requirements that are based on both technical analyses and defined risk criteria. The intent is to develop requirements based on procedures that can be replicated based on the information provided in the code document. This code will require documentation of the modeling inputs and risk criteria and analyses in the supporting information. This article also includes a description of the codes and standards that address hydrogen technologies in general.

Rivkin, C. H.

2008-12-01T23:59:59.000Z

404

Commercial Building Codes and Standards  

Broader source: Energy.gov [DOE]

Once an energy-efficient technology or practice is widely available in the market, it can become the baseline of performance through building energy codes and equipment standards. The Building...

405

Optimization of the CMDFT Code  

SciTech Connect (OSTI)

This report outlines the optimization of the CMDFT code by Xiaoguang Zhang during June-July 2006. The overall improvement in speed is nearly 40%. Possible further optimizatins are also discussed.

Zhang, Xiaoguang [ORNL; Kent, P. R. C. [University of Tennessee, Knoxville (UTK)

2011-09-01T23:59:59.000Z

406

Montana Coal Mining Code (Montana)  

Broader source: Energy.gov [DOE]

The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...

407

Edge equilibrium code for tokamaks  

SciTech Connect (OSTI)

The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China)] [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States)] [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)] [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

2014-01-15T23:59:59.000Z

408

Rotationally invariant multilevel block codes  

E-Print Network [OSTI]

ROTATIONALLY INVARIANT MULTILEVEL BLOCK CODES A Thesis by ANITA KULANDAIVELU Submitted to the Office of Graduate Studies of Texas AfjrM University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE December 1993... Major Subject: Electrical Engineering ROTATIONALLY INVARIANT MULTILEVEL BLOCK CODES A Thesis by ANITA KULANDAIVELU Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved...

Kulandaivelu, Anita

1993-01-01T23:59:59.000Z

409

Quantum stabilizer codes and beyond  

E-Print Network [OSTI]

QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major... Subject: Computer Science QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

Sarvepalli, Pradeep Kiran

2008-10-10T23:59:59.000Z

410

Program School/ Career: Descripton ISIS Program Codes  

E-Print Network [OSTI]

Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

Wisconsin at Madison, University of

411

Building Energy Codes Collaborative Technical Assistance for...  

Energy Savers [EERE]

State Energy Officials - 2014 BTO Peer Review Southeast Energy Efficiency Alliance's Building Energy Codes Project Reducing Energy Demand in Buildings Through State Energy Codes...

412

Nuclear Energy Advanced Modeling and Simulation (NEAMS) waste Integrated Performance and Safety Codes (IPSC) : gap analysis for high fidelity and performance assessment code development.  

SciTech Connect (OSTI)

This report describes a gap analysis performed in the process of developing the Waste Integrated Performance and Safety Codes (IPSC) in support of the U.S. Department of Energy (DOE) Office of Nuclear Energy Advanced Modeling and Simulation (NEAMS) Campaign. The goal of the Waste IPSC is to develop an integrated suite of computational modeling and simulation capabilities to quantitatively assess the long-term performance of waste forms in the engineered and geologic environments of a radioactive waste storage or disposal system. The Waste IPSC will provide this simulation capability (1) for a range of disposal concepts, waste form types, engineered repository designs, and geologic settings, (2) for a range of time scales and distances, (3) with appropriate consideration of the inherent uncertainties, and (4) in accordance with rigorous verification, validation, and software quality requirements. The gap analyses documented in this report were are performed during an initial gap analysis to identify candidate codes and tools to support the development and integration of the Waste IPSC, and during follow-on activities that delved into more detailed assessments of the various codes that were acquired, studied, and tested. The current Waste IPSC strategy is to acquire and integrate the necessary Waste IPSC capabilities wherever feasible, and develop only those capabilities that cannot be acquired or suitably integrated, verified, or validated. The gap analysis indicates that significant capabilities may already exist in the existing THC codes although there is no single code able to fully account for all physical and chemical processes involved in a waste disposal system. Large gaps exist in modeling chemical processes and their couplings with other processes. The coupling of chemical processes with flow transport and mechanical deformation remains challenging. The data for extreme environments (e.g., for elevated temperature and high ionic strength media) that are needed for repository modeling are severely lacking. In addition, most of existing reactive transport codes were developed for non-radioactive contaminants, and they need to be adapted to account for radionuclide decay and in-growth. The accessibility to the source codes is generally limited. Because the problems of interest for the Waste IPSC are likely to result in relatively large computational models, a compact memory-usage footprint and a fast/robust solution procedure will be needed. A robust massively parallel processing (MPP) capability will also be required to provide reasonable turnaround times on the analyses that will be performed with the code. A performance assessment (PA) calculation for a waste disposal system generally requires a large number (hundreds to thousands) of model simulations to quantify the effect of model parameter uncertainties on the predicted repository performance. A set of codes for a PA calculation must be sufficiently robust and fast in terms of code execution. A PA system as a whole must be able to provide multiple alternative models for a specific set of physical/chemical processes, so that the users can choose various levels of modeling complexity based on their modeling needs. This requires PA codes, preferably, to be highly modularized. Most of the existing codes have difficulties meeting these requirements. Based on the gap analysis results, we have made the following recommendations for the code selection and code development for the NEAMS waste IPSC: (1) build fully coupled high-fidelity THCMBR codes using the existing SIERRA codes (e.g., ARIA and ADAGIO) and platform, (2) use DAKOTA to build an enhanced performance assessment system (EPAS), and build a modular code architecture and key code modules for performance assessments. The key chemical calculation modules will be built by expanding the existing CANTERA capabilities as well as by extracting useful components from other existing codes.

Lee, Joon H.; Siegel, Malcolm Dean; Arguello, Jose Guadalupe, Jr.; Webb, Stephen Walter; Dewers, Thomas A.; Mariner, Paul E.; Edwards, Harold Carter; Fuller, Timothy J.; Freeze, Geoffrey A.; Jove-Colon, Carlos F.; Wang, Yifeng

2011-03-01T23:59:59.000Z

413

Track 4: Sustainability in National Programs I. Impact of Executive Orders on Federal Agencies  

E-Print Network [OSTI]

. Energy Conservation in Infrastructure 1. Impact of Executive Orders on Federal Agencies: Two presidential executive orders have expanded federal agencies' responsibility for energy efficiency, renewable energy1 Track 4: Sustainability in National Programs I. Impact of Executive Orders on Federal Agencies II

414

Graphical Quantum Error-Correcting Codes  

E-Print Network [OSTI]

We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

Sixia Yu; Qing Chen; C. H. Oh

2007-09-12T23:59:59.000Z

415

Codeword stabilized quantum codes on subsystems  

E-Print Network [OSTI]

Codeword stabilized quantum codes provide a unified approach to constructing quantum error-correcting codes, including both additive and non-additive quantum codes. Standard codeword stabilized quantum codes encode quantum information into subspaces. The more general notion of encoding quantum information into a subsystem is known as an operator (or subsystem) quantum error correcting code. Most operator codes studied to date are based in the usual stabilizer formalism. We introduce operator quantum codes based on the codeword stabilized quantum code framework. Based on the necessary and sufficient conditions for operator quantum error correction, we derive a error correction condition for operator codeword stabilized quantum codes. Based on this condition, the word operators of a operator codeword stabilized quantum code are constructed from a set of classical binary errors induced by generators of the gauge group. We use this scheme to construct examples of both additive and non-additive codes that encode quantum information into a subsystem.

Jeonghwan Shin; Jun Heo; Todd A. Brun

2012-08-29T23:59:59.000Z

416

Scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the nodes during execution  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the plurality of compute nodes during execution that include: identifying one or more applications for execution on the plurality of compute nodes; creating a plurality of physically discontiguous node partitions in dependence upon temperature characteristics for the compute nodes and a physical topology for the compute nodes, each discontiguous node partition specifying a collection of physically adjacent compute nodes; and assigning, for each application, that application to one or more of the discontiguous node partitions for execution on the compute nodes specified by the assigned discontiguous node partitions.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2012-10-16T23:59:59.000Z

417

Budget-based power consumption for application execution on a plurality of compute nodes  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

2013-02-05T23:59:59.000Z

418

Budget-based power consumption for application execution on a plurality of compute nodes  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

Archer, Charles J; Inglett, Todd A

2012-10-23T23:59:59.000Z

419

Architecture-Dependent Execution Time of Shor's Algorithm  

E-Print Network [OSTI]

We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

2006-05-25T23:59:59.000Z

420

Budget-based Control for Interactive Services with Adaptive Execution  

E-Print Network [OSTI]

We study the problem of managing a class of interactive services to meet a response time target while achieving high service quality. We focus here on interactive services that support adaptive execution, such as web search engines and finance servers. With adaptive execution, when a request receives more processing time, its result improves, posing new challenges and opportunities for resource management. We propose a new budget-based control model for interactive services with adaptive execution. The budget represents the amount of resources assigned to all pending requests. The budgetbased control model consists of two components: (1) a hybrid control mechanism, which combines adaptive and integral controllers and controls the budget in order to meet the response time target with small steady-state error, fast settling time and little runtime overhead, and (2) an optimization procedure, which takes advantage of adaptive execution to maximize the total response quality of all pending requests under a given budget. We implement and evaluate the budget-based control model experimentally in Microsoft Bing, a commercial web search engine. The experimental results show that it achieves more accurate control of mean response time and higher response quality than traditional static and dynamic admission control techniques that control the queue length. We also apply the model to a finance server that estimates option prices, and conduct a simulation study. The simulation results show large benefits for budget-based control. For example, under the same response time and quality requirements, the budget-based model accommodates double the system throughput compared to a traditional queuebased control model. 1.

Yuxiong He; Zihao Ye; Qiang Fu; Sameh Elnikety

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Understanding the Team Dynamics of an Executive Virtual Team  

E-Print Network [OSTI]

multinational executive virtual team best works. The findings of this study reveal that there are many ways to communicate utilizing technology, but the objective for this virtual team is to be multidimensional in use. That means that honest communication... Within This Study ????????????? 77 4 Advantages and Disadvantages of Working Virtually Associated With Technology??????????????????????... 133 1 CHAPTER I INTRODUCTION Organizations of all types are now able to operate in virtual...

Riley, Ramona Leonard

2011-10-21T23:59:59.000Z

422

An availability mechanism for the execution of distributed programs  

E-Print Network [OSTI]

, the client assumes that all the other tasks on the server are available too. In this thesis we present the design and implementation of an availability mechanism to facilitate the execution of distributed programs. This mechanism deals with the issue... 58 APPENDIX A ANALYSIS OF COMPLETENESS A. A Ancestor - Descendent Relationship A. B No Ancestor - Descendent Relationship 60 60 B SAMPLE PROGRAM - SUPPORTING PACKAGE . C SAMPLE PROGRAM - MAIN PROCEDURE. . . . 63 64 D CLIENT STUB E SERVER...

Buhariwalla, Kali Hoshi

1992-01-01T23:59:59.000Z

423

Lucas Group Executive Search, Renewable Energy | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429Lacey,(MonasterLowell Point, Alaska: Energy ResourcesLualualeiGroup Executive

424

Energy Consumption of Minimum Energy Coding in  

E-Print Network [OSTI]

Energy Consumption of Minimum Energy Coding in CDMA Wireless Sensor Networks Benigno Zurita Ares://www.ee.kth.se/control Abstract. A theoretical framework is proposed for accurate perfor- mance analysis of minimum energy coding energy consumption is analyzed for two coding schemes proposed in the literature: Minimum Energy coding

Johansson, Karl Henrik

425

Presented by Campus Services Object Code Classifications  

E-Print Network [OSTI]

) Decrease expense from the wrong object code (From) Example: Expensed a service contract that covered 12

Stephens, Graeme L.

426

Michigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045 Section Code(s): 4000 4200  

E-Print Network [OSTI]

Section Code(s): 4000 4200 PPO - HuskyCare HDHP Benefits-at-a-Glance Michigan Technological University In% after deductible Maternity Services Provided by a Physician Prenatal and Postnatal Care Visits CoveredMichigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045

427

Resilient Control System Execution Agent (ReCoSEA)  

SciTech Connect (OSTI)

In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

Craig G. Rieger; Kris Villez

2012-08-01T23:59:59.000Z

428

A simple family of nonadditive quantum codes  

E-Print Network [OSTI]

Most known quantum codes are additive, meaning the codespace can be described as the simultaneous eigenspace of an abelian subgroup of the Pauli group. While in some scenarios such codes are strictly suboptimal, very little is understood about how to construct nonadditive codes with good performance. Here we present a family of nonadditive quantum codes for all odd blocklengths, n, that has a particularly simple form. Our codes correct single qubit erasures while encoding a higher dimensional space than is possible with an additive code or, for n of 11 or greater, any previous codes.

John A. Smolin; Graeme Smith; Stephanie Wehner

2007-03-20T23:59:59.000Z

429

Parallization of Stellar Atmosphere Codes  

E-Print Network [OSTI]

Parallel computing has turned out to be the enabling technology to solve complex physical systems. However, the transition from shared memory, vector computers to massively parallel, distributed memory systems and, recently, to hybrid systems poses new challenges to the scientist. We want to present a cook-book (with a very strong, personal bias) based on our experience with parallization of our existing codes. Some of the general tools and communication libraries are discussed. Our approach includes a mixture of algorithm, domain and physical module based parallization. The advantages, scalability and limitations of each are discussed at some examples. We want show that it becomes easier to write parallel code with increasing complexity of the physical problem making stellar atmosphere codes beyond the classical assumptions very suitable.

P. Hoeflich

2002-09-19T23:59:59.000Z

430

ASME Code Efforts Supporting HTGRs  

SciTech Connect (OSTI)

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2011-09-01T23:59:59.000Z

431

ASME Code Efforts Supporting HTGRs  

SciTech Connect (OSTI)

In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

D.K. Morton

2012-09-01T23:59:59.000Z

432

THE GOVERNANCE OF CODE: CODE AS GOVERNANCE Serena Syme[1  

E-Print Network [OSTI]

by the creation of information property. The establishment of a market involves the development of a bundle of rights that both create property and define the rules under which property-based transactions might occur, proprietary licenses, and the Uniform Computer Information Transactions Act (UCITA). The open code licenses

Camp, L. Jean

433

Validation issues for SSI codes  

SciTech Connect (OSTI)

The paper describes the results of a recent work which was performed to verify computer code predictions in the SSI area. The first part of the paper is concerned with analytic solutions of the system response. The mathematical derivations are reasonably reduced by the use of relatively simple models which capture fundamental ingredients of the physics of the system motion while allowing for the response to be obtained analytically. Having established explicit forms of the system response, numerical solutions from three computer codes are presented in comparative format.

Philippacopoulos, A.J.

1995-02-01T23:59:59.000Z

434

Turbo Codes are Low Density Parity Check Codes David J. C. MacKay  

E-Print Network [OSTI]

Turbo Codes are Low Density Parity Check Codes David J. C. MacKay July 8, 1998--- Draft 0.2, not for distribution! (First draft written July 5, 1998) Abstract Turbo codes and Gallager codes (also known as low note that the parity check matrix of a Turbo code can be written as low density parity check matrix

MacKay, David J.C.

435

IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded  

E-Print Network [OSTI]

IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded and a Turbo Code (TC) as channel code. MC-CDMA is likely to be one of the most promising access technique. Then, since Turbo Coded MC-CDMA was demonstrated to be very efficient for a Single Input Single Output

Paris-Sud XI, Université de

436

A monadic interpretation of execution levels and exceptions for AOP  

E-Print Network [OSTI]

-scale applications. Originating at Xerox PARC, this observation has sparked the development of a new style piece of code can have a very rich interaction with the rest of the pro- gram, whose effect can come up

437

What Just Happened? Explaining the Past in Planning and Execution  

E-Print Network [OSTI]

, Code 5514; Washington DC; USA 1 matthew.molineaux@knexusresearch.com 2 ukuter@sift.net 3 Matthew.Klenk@parc, Institute for Advanced Computer Studies, College Park, MD 20742; USA. Now at Palo Alto Research Center (PARC

Gupta, Kalyan Moy

438

PAYMENT VOUCHER Vendor Code: L#  

E-Print Network [OSTI]

PAYMENT VOUCHER Vendor Code: L# Vendor Name: Person Picking Up Check* Addrl: Mail Stop AddR: Check#/ DESCRIPTION(20) HumanSbjt Payments ORGN (4) 0000 OBJECT(2) 30 VENDOR INVOICE# (11) AMOUNT 100.00 SUB-OBJECT(2

Hemmers, Oliver

439

Project Juno Code of Practice  

E-Print Network [OSTI]

Project Juno Code of Practice Institute of Physics Advancing women's careers in physics higher: Appointment, promotion and selection processes and procedures that encourage men and women to apply for academic posts at all levels. 2.1 Transparent processes and procedures 2.1.1 Ensure that selection criteria

Davies, Christopher

440

WESTERN MICHIGAN UNIVERSITY STUDENT CODE  

E-Print Network [OSTI]

WESTERN MICHIGAN UNIVERSITY STUDENT CODE Approved by The Western Michigan University Board Michigan University Kalamazoo, MI 49008 Effective August 2008 #12;A UNIVERSITY COMMUNITY IS... ...a for the Advancement of Teaching; Ernest L. Boyer (frwd.); Princeton, New Jersey; 1990 #12;WESTERN MICHIGAN UNIVERSITY

de Doncker, Elise

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Free Energy Code Online Discussion  

E-Print Network [OSTI]

Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 by California utility customers under the auspices of the California Public Utilities Commission and in support -- availability subject to enrollment levels: Tuesday, October 1 ­ Click here to register Wednesday, October 2

442

Degenerate Quantum Codes for Pauli Channels  

E-Print Network [OSTI]

A striking feature of quantum error correcting codes is that they can sometimes be used to correct more errors than they can uniquely identify. Such degenerate codes have long been known, but have remained poorly understood. We provide a heuristic for designing degenerate quantum codes for high noise rates, which is applied to generate codes that can be used to communicate over almost any Pauli channel at rates that are impossible for a nondegenerate code. The gap between nondegenerate and degenerate code performance is quite large, in contrast to the tiny magnitude of the only previous demonstration of this effect. We also identify a channel for which none of our codes outperform the best nondegenerate code and show that it is nevertheless quite unlike any channel for which nondegenerate codes are known to be optimal.

Graeme Smith; John A. Smolin

2006-12-23T23:59:59.000Z

443

Code Booster Award-winning research on code optimization explores multicore computing  

E-Print Network [OSTI]

May 2008 Code Booster Award-winning research on code optimization explores multicore computing paper exploring ways to make a popular scientific analysis code run smoothly on different types of multicore computers. SamuelWilliams,aresearcherfromBerkeleyLab'sComputational

Knowles, David William

444

Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error  

E-Print Network [OSTI]

We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

Zhang, Meilin

445

Bounds on Effective Hamiltonians for Stabilizer Codes  

E-Print Network [OSTI]

This manuscript introduces various notions of k-locality of stabilizer codes inherited from the associated stabilizer groups. A choice of generators for the group leads to a Hamiltonian with the code in its groundspace, while a Hamiltonian holding the code in its groundspace might be called effective if its locality is less than that of a natural choice of generators (or any choice). This paper establishes some conditions under which effective Hamiltonians for stabilizer codes do not exist. Our results simplify in the cases of Calderbank-Shor-Steane stabilizer codes and topologically-ordered stabilizer codes arising from surface cellulations.

Stephen S. Bullock; Dianne P. O'Leary

2008-02-05T23:59:59.000Z

446

Quantum Stabilizer Codes Embedding Qubits Into Qudits  

E-Print Network [OSTI]

We study, by means of the stabilizer formalism, a quantum error correcting code which is alternative to the standard block codes since it embeds a qubit into a qudit. The code exploits the non-commutative geometry of discrete phase space to protect the qubit against both amplitude and phase errors. The performance of such code is evaluated on Weyl channels by means of the entanglement fidelity as function of the error probability. A comparison with standard block codes, like five and seven qubit stabilizer codes, shows its superiority.

Carlo Cafaro; Federico Maiolini; Stefano Mancini

2012-07-30T23:59:59.000Z

447

Principles of Faithful Execution in the implementation of trusted objects.  

SciTech Connect (OSTI)

We begin with the following definitions: Definition: A trusted volume is the computing machinery (including communication lines) within which data is assumed to be physically protected from an adversary. A trusted volume provides both integrity and privacy. Definition: Program integrity consists of the protection necessary to enable the detection of changes in the bits comprising a program as specified by the developer, for the entire time that the program is outside a trusted volume. For ease of discussion we consider program integrity to be the aggregation of two elements: instruction integrity (detection of changes in the bits within an instruction or block of instructions), and sequence integrity (detection of changes in the locations of instructions within a program). Definition: Faithful Execution (FE) is a type of software protection that begins when the software leaves the control of the developer and ends within the trusted volume of a target processor. That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.) FE is a necessary quality for computing. Without it we cannot trust computations. In the early days of computing FE came for free since the software never left a trusted volume. At that time the execution environment was the same as the development environment. In some circles that environment was referred to as a ''closed shop:'' all of the software that was used there was developed there. When an organization bought a large computer from a vendor the organization would run its own operating system on that computer, use only its own editors, only its own compilers, only its own debuggers, and so on. However, with the continuing maturity of computing technology, FE becomes increasingly difficult to achieve

Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

2003-09-01T23:59:59.000Z

448

Multiprocessor system with multiple concurrent modes of execution  

DOE Patents [OSTI]

A multiprocessor system supports multiple concurrent modes of speculative execution. Speculation identification numbers (IDs) are allocated to speculative threads from a pool of available numbers. The pool is divided into domains, with each domain being assigned to a mode of speculation. Modes of speculation include TM, TLS, and rollback. Allocation of the IDs is carried out with respect to a central state table and using hardware pointers. The IDs are used for writing different versions of speculative results in different ways of a set in a cache memory.

Ahn, Daniel; Ceze, Luis H; Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin

2013-12-31T23:59:59.000Z

449

Executive Summary High-Yield Scenario Workshop Series Report  

SciTech Connect (OSTI)

To get a collective sense of the impact of research and development (R&D) on biomass resource availability, and to determine the feasibility that yields higher than baseline assumptions used for past assessments could be achieved to support U.S. energy independence, an alternate High-Yield Scenario (HYS) concept was presented to industry experts at a series of workshops held in December 2009. The workshops explored future production of corn/agricultural crop residues, herbaceous energy crops (HECs), and woody energy crops (WECs). This executive summary reports the findings of that workshop.

Leslie Park Ovard; Thomas H. Ulrich; David J. Muth Jr.; J. Richard Hess; Steven Thomas; Bryce Stokes

2009-12-01T23:59:59.000Z

450

Department of Energy Budget Execution Funds Distribution and Control Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

As a service to all Department of Energy (DOE) elements, including the National Nuclear Security Administration (NNSA), this Manual provides the user with a single source for references, definitions, and procedural requirements for distributing and controlling Department of Energy (DOE) funds. Accordingly, the Manual provides detailed requirements to supplement DOE O 135.1A, Budget ExecutionFunds Distribution and Control, dated 1-9-06. Paragraph 5, of DOE O 135.1A defines organizational responsibilities pertinent to this Manual. Cancels DOE M 135.1-1.

2006-01-09T23:59:59.000Z

451

Other utilities, not IPPs key concern for electric executives  

SciTech Connect (OSTI)

The evolving competitive electric utility world is making executives more cautious and focused on their core businesses at the expense of high-profile issues like international investment, global warming, demand side management and electric and magnetic fields, a new survey shows. The 1994 Electric Utility Outlook, conducted by the Washington International Energy Group, also shows growing concern about utility-on-utility competition and a decline of the independent power producer threat, a growing but grudging acknowledgement of retail wheeling and increasing discomfort with nuclear power.

O'Driscoll, M.

1994-01-12T23:59:59.000Z

452

Executive Order 12898: Federal Actions to Address Environmental Justice in  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive

453

Executive Order 13007 Indian Sacred Sites (1996) | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive07 Indian

454

Executive Order 13096: American Indian and Alaska Education (1998) |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) " ,"ClickPipelinesProvedDecember 2005DepartmentDecember U.S. Department of9 ExaminationExecutive07

455

National Electric Transmission Congestion Study 2006 Executive Summary  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergy Auditor U.S.ElectricEXECUTIVE SUMMARY

456

National Electric Transmission Congestion Study 2009 Executive Summary  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAXBalanced Scorecard Federal2 to:DieselEnergy Auditor U.S.ElectricEXECUTIVE

457

Regulatory Burden RFI Executive Order 13563 | Department of Energy  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015 |RebeccaRegional StandardsExecutive Order 13563 Regulatory

458

Paducah CAB Executive Board - May | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Para9 Revision:Paducah CAB Executive

459

Executive Order 13212: 66 FR 28357 (22 May 2001)  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCof EnergyHouse11 DOE Hydrogen07 Indian SacredExecutive Order

460

Executive Order 13423 Implementing Instructions | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office of Audit|Department of Energy56 EvaluationFriday,ChangeFederal RegisterExecutive

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Executive Summit on Wind Research and Development | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector General Office of Audit|Department of Energy56Executive Summit on Wind Research and Development

462

Executive Order 13096: American Indian and Alaska Education (1998)  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power SystemsResources DOEElectricalonJusticeEnergy Efficiency|Friday,Executive|6771Risks and2681

463

Quantifying the Performance of Quantum Codes  

E-Print Network [OSTI]

We study the properties of error correcting codes for noise models in the presence of asymmetries and/or correlations by means of the entanglement fidelity and the code entropy. First, we consider a dephasing Markovian memory channel and characterize the performance of both a repetition code and an error avoiding code in terms of the entanglement fidelity. We also consider the concatenation of such codes and show that it is especially advantageous in the regime of partial correlations. Finally, we characterize the effectiveness of the codes and their concatenation by means of the code entropy and find, in particular, that the effort required for recovering such codes decreases when the error probability decreases and the memory parameter increases. Second, we consider both symmetric and asymmetric depolarizing noisy quantum memory channels and perform quantum error correction via the five qubit stabilizer code. We characterize this code by means of the entanglement fidelity and the code entropy as function of the asymmetric error probabilities and the degree of memory. Specifically, we uncover that while the asymmetry in the depolarizing errors does not affect the entanglement fidelity of the five qubit code, it becomes a relevant feature when the code entropy is used as a performance quantifier.

C. Cafaro; S. L'Innocente; C. Lupo; S. Mancini

2011-01-12T23:59:59.000Z

464

An implicit Smooth Particle Hydrodynamic code  

SciTech Connect (OSTI)

An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.

Charles E. Knapp

2000-04-01T23:59:59.000Z

465

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

466

The EGS5 Code System  

SciTech Connect (OSTI)

In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version, a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.

Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

2005-12-20T23:59:59.000Z

467

CBP PHASE I CODE INTEGRATION  

SciTech Connect (OSTI)

The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was developed to link GoldSim with external codes (Smith III et al. 2010). The DLL uses a list of code inputs provided by GoldSim to create an input file for the external application, runs the external code, and returns a list of outputs (read from files created by the external application) back to GoldSim. In this way GoldSim provides: (1) a unified user interface to the applications, (2) the capability of coupling selected codes in a synergistic manner, and (3) the capability of performing probabilistic uncertainty analysis with the codes. GoldSim is made available by the GoldSim Technology Group as a free 'Player' version that allows running but not editing GoldSim models. The player version makes the software readily available to a wider community of users that would wish to use the CBP application but do not have a license for GoldSim.

Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

2011-09-30T23:59:59.000Z

468

Design of additive quantum codes via the code-word-stabilized framework  

SciTech Connect (OSTI)

We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or nonadditive) CWS code, and the lower Gilbert-Varshamov bound for the existence of additive CWS codes. We also consider additive cyclic CWS codes and show that these codes correspond to a previously unexplored class of single-generator cyclic stabilizer codes. We present several families of simple stabilizer codes with relatively good parameters.

Kovalev, Alexey A.; Pryadko, Leonid P. [Department of Physics and Astronomy, University of California, Riverside, California 92521 (United States); Dumer, Ilya [Department of Electrical Engineering, University of California, Riverside, California 92521 (United States)

2011-12-15T23:59:59.000Z

469

Evolutionary approaches toward practical network coding  

E-Print Network [OSTI]

There have been numerous studies showing various benefits of network coding. However, in order to have network coding widely deployed in real networks, it is also important to show that the amount of overhead incurred by ...

Kim, Minkyu, 1976-

2008-01-01T23:59:59.000Z

470

Reusing code by reasoning about its purpose  

E-Print Network [OSTI]

When programmers face unfamiliar or challenging tasks, code written by others could give them inspiration or reusable pieces. But how can they find code appropriate for their goals? This thesis describes a programming ...

Arnold, Kenneth Charles

2010-01-01T23:59:59.000Z

471

Efficient, transparent, and comprehensive runtime code manipulation  

E-Print Network [OSTI]

This thesis addresses the challenges of building a software system for general-purpose runtime code manipulation. Modern applications, with dynamically-loaded modules and dynamically-generated code, are assembled at runtime. ...

Bruening, Derek L. (Derek Lane), 1976-

2004-01-01T23:59:59.000Z

472

Designing Distributed Applications with Mobile Code Paradigms  

E-Print Network [OSTI]

Designing Distributed Applications with Mobile Code Paradigms Antonio Carzaniga Politecnico di code, design paradigms, distributed applica­ tions. INTRODUCTION Distributed systems have been with the design of distributed applications, that aims at identifying the distributable components

Carzaniga, Antonio

473

Designing Distributed Applications with Mobile Code Paradigms  

E-Print Network [OSTI]

Designing Distributed Applications with Mobile Code Paradigms Antonio Carzaniga Politecnico di the selection of the correct paradigm for a given distributed application. Keywords Mobile code, design with the design of distributed applications, that aims at identifying the distributable components

Carzaniga, Antonio

474

Green Codes and Programs | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Green Codes and Programs Green Codes and Programs Blue version of the EERE PowerPoint template, for use with PowerPoint 2007. Transcript Presentation More Documents & Publications...

475

Quantum error-correcting codes and devices  

DOE Patents [OSTI]

A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

Gottesman, Daniel (Los Alamos, NM)

2000-10-03T23:59:59.000Z

476

N. Mariana Islands- Building Energy Code  

Broader source: Energy.gov [DOE]

''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

477

The College Station Residential Energy Compliance Code  

E-Print Network [OSTI]

The City of College Station, Texas adopted a new residential Energy Compliance Code in January, 1988. The code, which strengthens compliance requirements in several areas, has received broadly based support and acceptance from all major constituent...

Claridge, D. E.; Schrock, D.

1988-01-01T23:59:59.000Z

478

Arkansas Air Pollution Control Code (Arkansas)  

Broader source: Energy.gov [DOE]

The Arkansas Air Pollution Control code is adopted pursuant to Subchapter 2 of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-4-101). ) By authority of the same State...

479

Transforms for prediction residuals in video coding  

E-Print Network [OSTI]

Typically the same transform, the 2-D Discrete Cosine Transform (DCT), is used to compress both image intensities in image coding and prediction residuals in video coding. Major prediction residuals include the motion ...

Kam??l?, Fatih

2010-01-01T23:59:59.000Z

480

Medical imaging with coded apertures  

SciTech Connect (OSTI)

Now algorithms were investigated for image reconstruction in emission tomography which could incorporate complex instrumental effects such as might be obtained with a coded aperture system. The investigation focused on possible uses of the wavelet transform to handle non-stationary instrumental effects and analytic continuation of the Radon transform to handle self-absorption. Neither investigation was completed during the funding period and whether such algorithms will be useful remains an open question.

Keto, E.; Libby, S.

1995-06-16T23:59:59.000Z

Note: This page contains sample records for the topic "unspecified code execution" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Executive Order 13514 Section 9 Recommendations: Federal Greenhouse Gas Accounting and Reporting  

Broader source: Energy.gov [DOE]

Presentation covers the Executive Order 13514 Section 9 Recommentdations, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

482

E-Print Network 3.0 - accelerator executive summary Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

- NONCONCURRENCE PACKAGE ON JUSTIFICATION MEMO... ON REVISION OF DOE O 5480.19, CONDUCT OF OPERATIONS REQUIREMENTS FOR DOE FACILITIES Executive Summary... , can be...

483

Oklahoma Aerospace Intellectual Capital/Educational Recommendations: an Inquiry of Oklahoma Aerospace Executives.  

E-Print Network [OSTI]

??The purpose of this qualitative study was to conduct detailed personal interviews with aerospace industry executives/managers from both the private and military sectors from across (more)

Nelson, Erin M.

2010-01-01T23:59:59.000Z

484

Reducing power consumption during execution of an application on a plurality of compute nodes  

DOE Patents [OSTI]

Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node, the power consumption directives included within the application during execution of the portions of the application corresponding to those identified power consumption directives; and reducing power, by each compute node, to one or more components of that compute node according to the identified power consumption directives during execution of the portions of the application corresponding to those identified power consumption directives.

Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

2012-06-05T23:59:59.000Z

485

Tideflow| A dataflow-inspired execution model for high performance computing programs.  

E-Print Network [OSTI]

?? Traditional programming, execution and optimization techniques have been shown to be inadequate to exploit the features of computer processors with many cores. In particular, (more)

Orozco, Daniel A.

2012-01-01T23:59:59.000Z

486

User's manual for SMACS: a family of codes for probabilistic structural analysis  

SciTech Connect (OSTI)

SMACS is a code which links the seismic input, soil-structure interaction and structural response calculations to obtain response vectors, which in turn are used as input for risk analysis. Inherently, there are uncertainties involved in various links of the seismic methodology chain. SMACS incorporates the uncertainty in the seismic input by using a suite of possible earthquakes. Uncertainties in the soil-structure interaction (SSI) are incorporated by using a range of values of soil shear modulus and soil material damping at a given site. Similarly a range of probable values of modal frequency and damping of the structure are used to account for uncertainties in structural modelling. The following pre-processor codes are available, as a package, to create necessary input files for the SMACS program: SIMQ (for generating seimic input); GLAY and CLAF (for soil-structure interaction analysis); and SAP4 (for modal analysis of the structures). The post-processor codes available are: PRESTO (to plot probability distributions for the response vectors or basic events); and CHANGO (to plot comparisons of basic events from different analyses). The code, SMACS, and the nature of the problem it solves are discussed. The way that SMACS is executed is explained. Manuals are provided that explain how to create the necessary input files for different subprograms of the SMACS family. An example problem illustrating an SSI analysis for a containment structure is presented.

Bumpus, S; Shukla, S N; O'Connell, W J; Gerhard, M A

1982-03-01T23:59:59.000Z

487

Code input alternatives John C. Wright  

E-Print Network [OSTI]

Code input alternatives John C. Wright John Wright Oct 2009 ­ CSWIM Workshop@ORNL Extensible markup

Wright, John C.

488

San Francisco Building Code Amendments to the  

E-Print Network [OSTI]

1 2010 San Francisco Building Code Amendments to the 2010 California Green Building Standards Code not pertain to energy) Operative date: January 1, 2011 #12;139 Chapter 13C GREEN BUILDING REQUIREMENTS shall be known as the California San Francisco Green Building Standards Code and may be cited

489

Ultra-narrow bandwidth voice coding  

DOE Patents [OSTI]

A system of removing excess information from a human speech signal and coding the remaining signal information, transmitting the coded signal, and reconstructing the coded signal. The system uses one or more EM wave sensors and one or more acoustic microphones to determine at least one characteristic of the human speech signal.

Holzrichter, John F. (Berkeley, CA); Ng, Lawrence C. (Danville, CA)

2007-01-09T23:59:59.000Z

490

CARD No. 23 Models and Computer Codes  

E-Print Network [OSTI]

CARD No. 23 Models and Computer Codes 23.A BACKGROUND Section 194.23 addresses the compliance criteria requirements for conceptual models and computer codes. Conceptual models capture a general (PA). The design of computer codes begins with the development of conceptual models. Conceptual models

491

STUDENT CONDUCT CODE REVIEW/DISCUSSION  

E-Print Network [OSTI]

STUDENT CONDUCT CODE REVISION REVIEW/DISCUSSION Student Conduct Code Revision Workgroup #12;Agenda Introductions/Purpose History of the Student Conduct Code Revision Workgroup Highlights of the Draft Revision Introduction: Principles Promoting Student Responsibility Jurisdiction Conduct in Violation of Community

Fainman, Yeshaiahu

492

Using closures for code generation Marc Feeley  

E-Print Network [OSTI]

which offers the advantages of an interpreter with the speed of compiled code. Code generation relies - environment (i.e. the set of current variable bindings). This operation is called closure. We speakUsing closures for code generation Marc Feeley Guy Lapalme D´epartement d'informatique et de

Feeley, Marc

493

A Turbo Code Tutorial William E. Ryan  

E-Print Network [OSTI]

A Turbo Code Tutorial William E. Ryan New Mexico State University Box 30001 Dept. 3-O, Las Cruces, NM 88003 wryan@nmsu.edu Abstract| We give a tutorial exposition of turbo codes and the associated algorithms. Included are a simple derivation for the performance of turbo codes, and a straightforward

Shea, John M.

494

Homological Error Correction: Classical and Quantum Codes  

E-Print Network [OSTI]

We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.

H. Bombin; M. A. Martin-Delgado

2006-05-10T23:59:59.000Z

495

Cost Codes and the Work Breakdown Structure  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The chapter discusses the purpose of the work breakdown structure (WBS) and code of account (COA) cost code system, shows the purpose and fundamental structure of both the WBS and the cost code system, and explains the interface between the two systems.

1997-03-28T23:59:59.000Z

496

Hydrogen Pipeline Working Group Workshop: Code for Hydrogen Pipelines...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Working Group Workshop: Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop: Code for Hydrogen Pipelines Code for Hydrogen Piping and Pipelines. B31 Hydrogen...

497

State and Local Code Implementation: Northeast Region - 2014...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Local Code Implementation: South-central Region - 2014 BTO Peer Review Building Energy Codes Program - 2014 BTO Peer Review State and Local Code Implementation: State Energy...

498

Technical Assistance: Increasing Code Compliance - 2014 BTO Peer...  

Energy Savers [EERE]

Code Compliance - 2014 BTO Peer Review More Documents & Publications Building Energy Codes Program - 2014 BTO Peer Review Building Energy Codes Program Overview - 2014 BTO Peer...

499

Energy Codes and the Landlord-Tenant Problem  

E-Print Network [OSTI]

a Commercial Building Energy Code in Michigan, Report PNNL-Grant Summaries, 1999. Office of Codes and Standards. , 2004, , Building Energy Codes: An Introduction, 2010.

Papineau, Maya

2013-01-01T23:59:59.000Z

500

The Cost of Enforcing Building Energy Codes: Phase 1  

E-Print Network [OSTI]

B. (2005). Residential Energy Code Evaluatinons: Review andProvidence, RI: Building Codes Assistance Project. ZING2007 Commercial Energy Code Compliance Study. Calgary, AB:

Williams, Alison

2013-01-01T23:59:59.000Z