Sample records for unspecified code execution

  1. T-593: Microsoft Internet Explorer unspecified code execution

    Broader source: Energy.gov [DOE]

    Unspecified vulnerability in Microsoft Internet Explorer 8 on Windows 7 allows remote attackers to bypass Protected Mode and create arbitrary files by leveraging access to a Low integrity process.

  2. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

  3. T-650: Microsoft Word Unspecified Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    SA44923 SecurityTracker Alert ID: 1025675 Bugtraq ID: 48261 TSL ID: TSL20110614-02 PRL: 2011-07 IMPACT ASSESSMENT: High Discussion: A code execution vulnerability has been...

  4. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code...

  5. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department of

  6. U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code |Department

  7. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  8. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  9. T-619: Skype for Mac Message Processing Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A remote user can send a specially crafted message to a Skype user to execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

  10. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  11. U-052: HP Protect Tools Device Access Manager Unspecified Bug...

    Broader source: Energy.gov (indexed) [DOE]

    Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

  12. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Environmental Management (EM)

    5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9,...

  13. U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...

    Broader source: Energy.gov (indexed) [DOE]

    and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-082: McAfee SaaS...

  14. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  15. U-069: Telnet code execution vulnerability: FreeBSD and Kerberos

    Broader source: Energy.gov [DOE]

    Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

  16. System for loading executable code into volatile memory in a downhole tool

    DOE Patents [OSTI]

    Hall, David R. (Provo, UT); Bartholomew, David B. (Springville, UT); Johnson, Monte L. (Orem, UT)

    2007-09-25T23:59:59.000Z

    A system for loading an executable code into volatile memory in a downhole tool string component comprises a surface control unit comprising executable code. An integrated downhole network comprises data transmission elements in communication with the surface control unit and the volatile memory. The executable code, stored in the surface control unit, is not permanently stored in the downhole tool string component. In a preferred embodiment of the present invention, the downhole tool string component comprises boot memory. In another embodiment, the executable code is an operating system executable code. Preferably, the volatile memory comprises random access memory (RAM). A method for loading executable code to volatile memory in a downhole tool string component comprises sending the code from the surface control unit to a processor in the downhole tool string component over the network. A central processing unit writes the executable code in the volatile memory.

  17. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  18. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  19. MSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real

    E-Print Network [OSTI]

    Turletti, Thierry

    : information-centric networking over mobile ad hoc network using the PARC CCNx code, and a seamless handoffMSWiM Demo Abstract: Direct Code Execution: Increase Simulation Realism using Unmodified Real of Tokyo, Japan INRIA, France Abstract We propose to demonstrate Direct Code Execution (DCE)1 , a ns-3

  20. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  1. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid...

  2. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  3. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  4. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  5. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  6. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  7. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  8. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

  9. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Broader source: Energy.gov (indexed) [DOE]

    Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were...

  10. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

  11. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  12. U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system.

  13. U-007: IBM Rational AppScan Import/Load Function Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in IBM Rational AppScan. A remote user can cause arbitrary code to be executed on the target user's system.

  14. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  15. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  16. Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory

    E-Print Network [OSTI]

    Aickelin, Uwe

    Malicious Code Execution Detection and Response Immune System inpired by the Danger Theory Jungwon an artificial immune system. A recently developed hypothesis in immunology, the Danger The- ory, states that our invaders, plus signals generated by the host indic- ating danger and damage. We propose the incorporation

  17. SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification

    E-Print Network [OSTI]

    Simha, Rahul

    SPEE: A Secure Program Execution Environment Tool Using Static and Dynamic Code Verification Olga those using the Internet and exploiting the vul- nerabilities in the software and applications, software ­ for software integrity protection and authentication and presents performance results. Our system architecture

  18. T-529: Apple Mac OS PackageKit Distribution Script Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    A format string issue exists in PackageKit's handling of distribution scripts. A man-in-the-middle attacker may be able to cause an unexpected application termination or arbitrary code execution when Software Update checks for new updates. This issue is addressed through improved validation of distribution scripts. This issue does not affect systems prior to Mac OS X v10.6.

  19. T-609: Adobe Acrobat/Reader Memory Corruption Error in CoolType Library Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted PDF file that, when loaded by the target user, will trigger a memory corruption error in the CoolType library and execute arbitrary code on the target system. The code will run with the privileges of the target user.

  20. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  1. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    No solution was available at the time of this entry. Addthis Related Articles T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-047: Siemens...

  2. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  3. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideoStrategic|IndustrialCenterMarch 4; RSVP97Cross-SiteVulnerability |Execute

  4. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  5. LADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

    E-Print Network [OSTI]

    Ling, Shiqing

    and Van Dijk (1996) studied several stock market indexes by AR(1)-GJR(1, 1) models, Zhu and Ling (2011) fitted a MA(3)-GARCH(1, 1) model to the world oil prices, see also Tsay (2005) for more empiricalLADE-based Inference for ARMA Models with Unspecified and Heavy-tailed Heteroscedastic Noises

  6. U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpactEnergy

  7. U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora PhaseArbitrary Code | Department

  8. Shipment of Small Quantities of Unspecified Radioactive Material in Chalfant Packagings

    SciTech Connect (OSTI)

    Smith, Allen; Abramczyk, Glenn; Nathan, Steven; Bellamy, Steve

    2009-06-12T23:59:59.000Z

    In the post 6M era, radioactive materials package users are faced with the disciplined operations associated with use of Certified Type B packagings. Many DOE, commercial and academic programs have a requirement to ship and/or store small masses of poorly characterized or unspecified radioactive material. For quantities which are small enough to be fissile exempt and have low radiation levels, the materials could be transported in a package which provides the required containment level. Because their Chalfant type containment vessels meet the highest standard of containment (helium leak-tight), the 9975, 9977, and 9978 are capable of transporting any of these contents. The issues associated with certification of a high-integrity, general purpose package for shipping small quantities of unspecified radioactive material are discussed and certification of the packages for this mission is recommended.

  9. U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

  10. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  11. V-043: Perl Locale::Maketext Module '_compile()' Multiple Code...

    Broader source: Energy.gov (indexed) [DOE]

    Let Remote Authenticated Users Execute Arbitrary Code and View Arbitrary Files V-002: EMC NetWorker Module for Microsoft Applications Lets Remote Users Execute Arbitrary Code...

  12. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code October 9, 2012 - 6:00am Addthis...

  13. A loop is the only control-flow construct that lets you go back to an earlier point in the code. Loops are designed to allow us to iterate--to execute the same piece of code over and over again.

    E-Print Network [OSTI]

    Peters, Dennis

    A loop is the only control-flow construct that lets you go back to an earlier point in the code. After the body is executed, we go back and test the loop continuation condition again As soon. Note that the first example (temperature conversion) is basically a variation on this theme. Event

  14. Self-assembled software and method of overriding software execution

    DOE Patents [OSTI]

    Bouchard, Ann M.; Osbourn, Gordon C.

    2013-01-08T23:59:59.000Z

    A computer-implemented software self-assembled system and method for providing an external override and monitoring capability to dynamically self-assembling software containing machines that self-assemble execution sequences and data structures. The method provides an external override machine that can be introduced into a system of self-assembling machines while the machines are executing such that the functionality of the executing software can be changed or paused without stopping the code execution and modifying the existing code. Additionally, a monitoring machine can be introduced without stopping code execution that can monitor specified code execution functions by designated machines and communicate the status to an output device.

  15. U-106: Citrix XenServer Multiple Flaws in Web Self Service Have Unspecified

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary CodeImpact |

  16. 8 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    8 Executive Summary Executive Summary 1. World Robotics 2012 Industrial Robots 2. World Robotics 2012 Service Robots 1. World Robotics 2012 Industrial Robots 2011: The most successful year for industrial robots since 1961 In 2011, robot sales again increased by 38% to 166,028 units, by far the highest

  17. Executive Summary 11 Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    Executive Summary 11 Executive Summary 1. World Robotics 2014 Industrial Robots 2. World Robotics 2014 Service Robots 1. World Robotics 2014 Industrial Robots 2013: The highest number of industrial recorded for one year. Sales of industrial robots to the automotive, the chemical, and the rubber

  18. 10 Executive Summary Executive Summary

    E-Print Network [OSTI]

    De Luca, Alessandro

    10 Executive Summary Executive Summary 1. World Robotics 2013 Industrial Robots 2. World Robotics 2013 Service Robots 1. World Robotics 2013 Industrial Robots 2012: Second highest number of robots sold for the slight sales reduction. Sales of industrial robots to the automotive industry continued to increase

  19. Executive Officer

    Broader source: Energy.gov [DOE]

    THIS VACANCY ANNOUNCEMENT HAS BEEN MODIFIED TO EXTEND THE CLOSING DATE. A successful candidate in this position will serve as the Executive Officer to the Administrator of the Bonneville Power...

  20. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code May 16, 2012 - 7:00am...

  1. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  2. T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    99: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code August 23, 2011 - 3:35pm...

  3. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 6, 7, 8, 9 ABSTRACT: A vulnerability was reported in Microsoft Internet...

  4. act executive orders: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Information Sciences Websites Summary: Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code) An administrative officer or supervisor of...

  5. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    Eirinaki, Magdalini

    Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal Code, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  6. Executive MBA* Executive MBA at a Glance

    E-Print Network [OSTI]

    Manufacturing Natural Resources Not-for-Profit Public Service Real Estate Development Technology Transportation, strategic analysis, and change management * Additional Options The Americas MBA for Executives Executive MBA

  7. FEI Program Session: Date: CHRIS Code: Session Number:

    Broader source: Energy.gov (indexed) [DOE]

    OPM Federal Executive Institute - DOE CHRIS Codes: (Program Tuition Cost - 19,875.00) *Program Calendar for Fiscal Year 2015 FEI Program Session: Date: CHRIS Code: Session Number:...

  8. Virtual Private Environments for Multiphysics Code Validation on Computing Grids

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

  9. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Energy Savers [EERE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  10. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code...

  11. Executive Director

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive Director

  12. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  13. Visualization of Program-Execution Data for Deployed

    E-Print Network [OSTI]

    Orso, Alessandro "Alex"

    · Color used to represent characteristics of code and its executions · Mapping of data to color dependent Collection Daemon Database Customer 1 Customer 2 Customer N program instrumented program execution data data · Maps field data to program representations using color · Provides multiple levels of abstraction

  14. Chip Laingen Executive Director

    E-Print Network [OSTI]

    Levinson, David M.

    Link 3) MilTech · Defense Alliance / APC Staff 1) Executive Director 2) Business / Finance Director

  15. Tabled Execution in Scheme

    SciTech Connect (OSTI)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19T23:59:59.000Z

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  16. Experience with Remote Job Execution

    SciTech Connect (OSTI)

    Lynch, Vickie E [ORNL; Cobb, John W [ORNL; Green, Mark L [ORNL; Kohl, James Arthur [ORNL; Miller, Stephen D [ORNL; Ren, Shelly [ORNL; Smith, Bradford C [ORNL; Vazhkudai, Sudharshan S [ORNL

    2008-01-01T23:59:59.000Z

    The Neutron Science Portal at Oak Ridge National Laboratory submits jobs to the TeraGrid for remote job execution. The TeraGrid is a network of high performance computers supported by the US National Science Foundation. There are eleven partner facilities with over a petaflop of peak computing performance and sixty petabytes of long-term storage. Globus is installed on a local machine and used for job submission. The graphical user interface is produced by java coding that reads an XML file. After submission, the status of the job is displayed in a Job Information Service window which queries globus for the status. The output folder produced in the scratch directory of the TeraGrid machine is returned to the portal with globus-url-copy command that uses the gridftp servers on the TeraGrid machines. This folder is copied from the stage-in directory of the community account to the user's results directory where the output can be plotted using the portal's visualization services. The primary problem with remote job execution is diagnosing execution problems. We have daily tests of submitting multiple remote jobs from the portal. When these jobs fail on a computer, it is difficult to diagnose the problem from the globus output. Successes and problems will be presented.

  17. Unspecified technologies | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri Global Energy LLCEnergy) Redirect page JumpCorpUniversity

  18. ISO 14001: An Executive Report

    E-Print Network [OSTI]

    Simon, Richard

    1998-01-01T23:59:59.000Z

    Review: ISO 14001: An Executive Report By Gordon A. West andA. and Manta, Joseph G. ISO 14001: An Executive Report.management standards, ISO 14001: An Executive Report stands

  19. Shared prefetching to reduce execution skew in multi-threaded systems

    DOE Patents [OSTI]

    Eichenberger, Alexandre E; Gunnels, John A

    2013-07-16T23:59:59.000Z

    Mechanisms are provided for optimizing code to perform prefetching of data into a shared memory of a computing device that is shared by a plurality of threads that execute on the computing device. A memory stream of a portion of code that is shared by the plurality of threads is identified. A set of prefetch instructions is distributed across the plurality of threads. Prefetch instructions are inserted into the instruction sequences of the plurality of threads such that each instruction sequence has a separate sub-portion of the set of prefetch instructions, thereby generating optimized code. Executable code is generated based on the optimized code and stored in a storage device. The executable code, when executed, performs the prefetches associated with the distributed set of prefetch instructions in a shared manner across the plurality of threads.

  20. Executive Secretariat | Department of Energy

    Energy Savers [EERE]

    Executive Secretariat The Office of the Executive Secretariat manages the Department's top-level written communications, such as letters, information, action, and decision memos,...

  1. Data processing with microcode designed with source coding

    DOE Patents [OSTI]

    McCoy, James A; Morrison, Steven E

    2013-05-07T23:59:59.000Z

    Programming for a data processor to execute a data processing application is provided using microcode source code. The microcode source code is assembled to produce microcode that includes digital microcode instructions with which to signal the data processor to execute the data processing application.

  2. Steering Committee Executive Sponsor,

    E-Print Network [OSTI]

    Alvarez-Cohen, Lisa

    , Academic Planning & Facilities Executive Vice Chancellor & Provost George W. Breslauer Members Hermalin, Representative, Budget and Interdepartmental Relations Chika Kondo, Undergraduate Student Implementation Project Team Functional Owner, Mara Hancock, Director, Educational Technology Services Members

  3. Carrie Takeyasu Executive Director

    E-Print Network [OSTI]

    Burg, Theresa

    Carrie Takeyasu Executive Director Daryl Schacher Manager, Materials Management Lyn Jose Besplug Materials Handling Worker Chris Charles Materials Handling Worker Gerry Ste Marie Materials Handling Worker Mark Sabo Materials Handling Worker Michele Roberts General Clerk Laurie Martin Purchasing

  4. STEP Participant Survey Executive Summary

    Broader source: Energy.gov [DOE]

    STEP Participant Survey Executive Summary, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  5. Code Description Code Description

    E-Print Network [OSTI]

    Leave* 5127 Officials 5217 Faculty Sick Leave Payment 5124 Personal Service Contracts 5211 Research Services Contracts Scholarships & Fellowships Faculty Fringe Contract Services #12;Banner Account Code

  6. Detection of malicious computer executables

    DOE Patents [OSTI]

    Cai, Dongming M. (Los Alamos, NM); Gokhale, Maya (Los Alamos, NM)

    2009-04-14T23:59:59.000Z

    A method of detecting malicious binary executable files is accomplished by inputting a binary executable file; converting the binary executable file to byte hexadecimal text strings; calculating the frequency of each byte pattern in the byte hexadecimal text strings; selecting characteristic byte pattern frequencies as discriminating features; classifying the discriminating features as malicious or benign; labeling the binary executable file as malicious or benign; and outputting the labeled malicious or benign binary executable file.

  7. V-164: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Apple QuickTime prior to 7.7.4. ABSTRACT: Apple QuickTime Multiple Vulnerabilities REFERENCE LINKS:...

  8. Executive report Building knowledge

    E-Print Network [OSTI]

    Geffner, Hector

    Executive report Building knowledge To build citizens To build cities UPF CAMPUS ICRIA INTERNATIONAL PROJECT 2010 International Campus of Excellence Programme #12;2 UPF CAMPUS ICRIA INTERNATIONAL this presentation from the one submitted in the CEI 2009 programme where UPF was classified as a `promising

  9. Execution Version POWER PURCHASE AGREEMENT

    E-Print Network [OSTI]

    Firestone, Jeremy

    ") and BLUEWATER WIND DELAWARE LLC ("Seller") June 23, 2008 #12;Execution Version POWER PURCHASE AGREEMENT TableExecution Version POWER PURCHASE AGREEMENT between DELMARVA POWER & LIGHT COMPANY ("Buyer 3.5 Energy Forecasts, Scheduling and Balancing.......................................... 40 3

  10. Executive Committee | Department of Energy

    Office of Environmental Management (EM)

    Executive Committee Executive Committee May 27, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  11. Business Model Guide Executive Summary

    Broader source: Energy.gov [DOE]

    The Business Model Guide Executive Summary by the U.S. Department of Energy's Better Buildings Neighborhood Program.

  12. National Ignition Facility project execution plan

    SciTech Connect (OSTI)

    Paisner, J., LLNL

    1997-08-01T23:59:59.000Z

    This project execution plan covers: Justification of Mission Need; Project Description; Management Roles and Responsibilities; Project Execution; Method of Accomplishment.

  13. Spinal codes

    E-Print Network [OSTI]

    Perry, Jonathan, S.M. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Spinal codes are a new class of rateless codes that enable wireless networks to cope with time-varying channel conditions in a natural way, without requiring any explicit bit rate selection. The key idea in the code is the ...

  14. Foundational Certified Code in a Metalogical KARL CRARY and SUSMIT SARKAR

    E-Print Network [OSTI]

    Goldstein, Seth Copen

    Foundational Certified Code in a Metalogical Framework KARL CRARY and SUSMIT SARKAR Carnegie Mellon not reflect the views of this agency. #12;2 · K. Crary and S. Sarkar the executable code is accompanied

  15. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser ServicesUsers' Executive

  16. JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP

    E-Print Network [OSTI]

    Peak, Derek

    JOHNSON-SHOYAMA GRADUATE SCHOOLOFPUBLICPOLICY EXECUTIVE INTERNSHIP MENTOR HANDBOOK September2014................................................................................................................................................... 3 C. Benefits of JSGS Internships .................................................................................................................................... 4 Both partner organizations and interns benefit from JSGS Executive Internships

  17. SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP...

    Office of Environmental Management (EM)

    SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal Training SENIOR EXECUTIVE SERVICE CANDIDATE DEVELOPMENT PROGRAM (SESCDP) Evaluation of Formal...

  18. Executive Order 13423: Strengthening Federal Environmental, Energy...

    Broader source: Energy.gov (indexed) [DOE]

    text of Executive Order 13423: Strengthening Federal Environmental, Energy, and Transportation Management. eo13423.pdf More Documents & Publications Executive Order 13423-...

  19. Code constructions and code families for nonbinary quantum stabilizer code

    E-Print Network [OSTI]

    Ketkar, Avanti Ulhas

    2005-11-01T23:59:59.000Z

    Stabilizer codes form a special class of quantum error correcting codes. Nonbinary quantum stabilizer codes are studied in this thesis. A lot of work on binary quantum stabilizer codes has been done. Nonbinary stabilizer codes have received much...

  20. U-122 Google Chrome Two Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Two vulnerabilities have been reported in Google Chrome, which can be exploited by malicious people to compromise a user's system.

  1. A PVM Executive Program for Use with RELAP5-3D

    SciTech Connect (OSTI)

    Weaver, Walter Leslie; Tomlinson, E. T.; Aumiller, D. L.

    2002-04-01T23:59:59.000Z

    A PVM executive program has been developed for use with the RELAP5-3D computer program. The PVM executive allows RELAP5-3D to be coupled with any number of other computer programs to perform integrated analyses of nuclear power reactor systems and related experimental facilities. The executive program manages all phases of a coupled computation. It starts up and configures a virtual machine, spawns all of the coupled processes, coordinates the time step size between the coupled codes, manages the production of printed and plotable output, and shuts the virtual machine down at the end of the computation. The executive program also monitors that status of the coupled computation, repeating time steps as needed and terminating a coupled computation gracefully if one of the coupled processes is terminated by the computational node on which it is executing.

  2. Holographic codes

    E-Print Network [OSTI]

    Latorre, Jose I

    2015-01-01T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  3. Holographic codes

    E-Print Network [OSTI]

    Jose I. Latorre; German Sierra

    2015-02-23T23:59:59.000Z

    There exists a remarkable four-qutrit state that carries absolute maximal entanglement in all its partitions. Employing this state, we construct a tensor network that delivers a holographic many body state, the H-code, where the physical properties of the boundary determine those of the bulk. This H-code is made of an even superposition of states whose relative Hamming distances are exponentially large with the size of the boundary. This property makes H-codes natural states for a quantum memory. H-codes exist on tori of definite sizes and get classified in three different sectors characterized by the sum of their qutrits on cycles wrapped through the boundaries of the system. We construct a parent Hamiltonian for the H-code which is highly non local and finally we compute the topological entanglement entropy of the H-code.

  4. Extension Program Council's Executive Board.

    E-Print Network [OSTI]

    Marshall, Mary G.; Richardson, Burl B.

    1986-01-01T23:59:59.000Z

    ~IB-134'-! II"I~ I~? Extension Program Council's Executive Board Mary G. Marshall and Burl B. Richardson Extension Program Development Specialists The Extension Program Council works with Extension agents to plan, implement, evaluate...

  5. Regulatory constraints on executive compensation

    E-Print Network [OSTI]

    Joskow, Paul L.

    1993-01-01T23:59:59.000Z

    This paper explores the influence of economic regulation on the level and structure of executive compensation. We find substantial and persistent differences in CEO compensation between firms subject to economic regulation ...

  6. Presidential Orders Executive Order 31

    E-Print Network [OSTI]

    Yetisgen-Yildiz, Meliha

    1 Presidential Orders Executive Order 31 Non-discrimination and Affirmative Action 1. Non. As permitted by applicable law, the University will take affirmative action to ensure equality of opportunity

  7. Parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.S.

    1987-01-01T23:59:59.000Z

    One candidate language for parallel symbolic computing is Prolog. Numerous ways for executing Prolog in parallel have been proposed, but current efforts suffer from several deficiencies. Many cannot support fundamental types of concurrency in Prolog. Other models are of purely theoretical interest, ignoring implementation costs. Detailed simulation studies of execution models are scare; at present little is known about the costs and benefits of executing Prolog in parallel. In this thesis, a new parallel execution model for Prolog is presented: the PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR-parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented, and compilation to the PPP abstract instruction set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  8. High Performance Reach Codes

    E-Print Network [OSTI]

    Edelson, J.

    2011-01-01T23:59:59.000Z

    Jim Edelson New Buildings Institute A Growing Role for Codes and Stretch Codes in Utility Programs Clean Air Through Energy Efficiency November 9, 2011 ESL-KT-11-11-39 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 New Buildings Institute ESL..., Nov. 7 ? 9, 2011 ?31? Flavors of Codes ? Building Codes Construction Codes Energy Codes Stretch or Reach Energy Codes Above-code programs Green or Sustainability Codes Model Codes ?Existing Building? Codes Outcome-Based Codes ESL-KT-11...

  9. CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 Hunter College of the City Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR DEGREE AUDIT UNIT Student Specialization Section #12;CURRICULUM CODE: 611 & 613 MINOR CODE 061 DEGREE CODE: 31 DAAF 12/09 *****A SEPARATE

  10. CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1/24/2006 Hunter College of the City-mail address Department Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR, DEGREE Section Only For January 2010 Graduate #12;CURRICULUM CODE_611 & 613 MINOR CODE 062 DEGREE CODE _31_ 1

  11. Business Development Executive (BDE) Program

    SciTech Connect (OSTI)

    Rice, E.J. "Woody"; Frederick, W. James

    2005-12-05T23:59:59.000Z

    The IPST BDE (Institute of Paper Science and Technology Business Development Executive) program was initiated in 1997 to make the paper industry better aware of the new manufacturing technologies being developed at IPST for the U.S. pulp and paper industry's use. In April 2000, the BDE program management and the 20 BDEs, all retired senior level industry manufacturing and research executives, were asked by Ms. Denise Swink of OIT at DOE to take the added responsibility of bringing DOE developed energy conservation technology to the paper industry. This project was funded by a DOE grant of $950,000.

  12. Executive Summit on Wind Research and Development | Department...

    Office of Environmental Management (EM)

    Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Executive Summit on Wind Research and Development Each year, DOE EERE invests...

  13. NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY

    E-Print Network [OSTI]

    vi NARSTO OZONE ASSESSMENT EXECUTIVE SUMMARY Prepared as a NARSTO initiative, this tropospheric O3 in the accompanying Textbox, the NARSTO Ozone Assessment contains two product components. The first of these is a set aspects of tropospheric ozone pollution. The second component, the NARSTO Ozone Assessment Document

  14. Faculty of Engineering Executive Committee

    E-Print Network [OSTI]

    Petriu, Emil M.

    is in progress. #12;2 The Dean met with the ESS executive and informed then that the Faculty is open to a shared or broader use of CBY A04. Once the ESS has revised their preliminary proposal, the Faculty will undertake to be submitted this week. The Dean discussed our pilot evaluation of TAs at the academic planning committee. TA

  15. Executive Order 1083 Attachment C

    E-Print Network [OSTI]

    de Lijser, Peter

    Rev 2/2013 Executive Order 1083 Attachment C California Child Abuse and Neglect Reporting Act Penal, an administrator, or an employee of a licensed community care or child day care facility. (11) A Head Start program in Section 11165.11. (13) A public assistance worker. (14) An employee of a child care institution, including

  16. Speech coding

    SciTech Connect (OSTI)

    Ravishankar, C., Hughes Network Systems, Germantown, MD

    1998-05-08T23:59:59.000Z

    Speech is the predominant means of communication between human beings and since the invention of the telephone by Alexander Graham Bell in 1876, speech services have remained to be the core service in almost all telecommunication systems. Original analog methods of telephony had the disadvantage of speech signal getting corrupted by noise, cross-talk and distortion Long haul transmissions which use repeaters to compensate for the loss in signal strength on transmission links also increase the associated noise and distortion. On the other hand digital transmission is relatively immune to noise, cross-talk and distortion primarily because of the capability to faithfully regenerate digital signal at each repeater purely based on a binary decision. Hence end-to-end performance of the digital link essentially becomes independent of the length and operating frequency bands of the link Hence from a transmission point of view digital transmission has been the preferred approach due to its higher immunity to noise. The need to carry digital speech became extremely important from a service provision point of view as well. Modem requirements have introduced the need for robust, flexible and secure services that can carry a multitude of signal types (such as voice, data and video) without a fundamental change in infrastructure. Such a requirement could not have been easily met without the advent of digital transmission systems, thereby requiring speech to be coded digitally. The term Speech Coding is often referred to techniques that represent or code speech signals either directly as a waveform or as a set of parameters by analyzing the speech signal. In either case, the codes are transmitted to the distant end where speech is reconstructed or synthesized using the received set of codes. A more generic term that is applicable to these techniques that is often interchangeably used with speech coding is the term voice coding. This term is more generic in the sense that the coding techniques are equally applicable to any voice signal whether or not it carries any intelligible information, as the term speech implies. Other terms that are commonly used are speech compression and voice compression since the fundamental idea behind speech coding is to reduce (compress) the transmission rate (or equivalently the bandwidth) And/or reduce storage requirements In this document the terms speech and voice shall be used interchangeably.

  17. UCSF Sustainability Action Plan: Executive Summary

    E-Print Network [OSTI]

    Yamamoto, Keith

    UCSF Sustainability Action Plan: Executive Summary Issue Date: April 21, 2011 #12;UCSF Sustainability Action Plan Executive Summary April 21, 2011 Page 1 Table of Contents An Introduction to the Sustainability Action Plan

  18. Northwest Energy Efficiency Taskforce Executive Committee

    E-Print Network [OSTI]

    #12;Northwest Energy Efficiency Taskforce Executive Committee Chairs Tom Karier, Washington Member, Northwest Energy Efficiency Alliance Bill Gaines, Director/Chief Executive Officer, Tacoma Public Utilities, Cowlitz County Public Utility District Cal Shirley, Vice President for Energy Efficiency Service, Puget

  19. Executive Order 13423- Strengthening Federal Environmental, Energy...

    Energy Savers [EERE]

    423- Strengthening Federal Environmental, Energy, and Transportation Management Executive Order 13423- Strengthening Federal Environmental, Energy, and Transportation Management It...

  20. Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of

    E-Print Network [OSTI]

    Binder, Walter

    Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications Walter Binder and Balazs Lichtl CoCo Software Engineering GmbH Margaretenstr. 22 applications. Mobile code is used for application upload, as well as for remote configuration and maintenance

  1. ByteCode 2011 LCT: An Open Source Concolic Testing Tool

    E-Print Network [OSTI]

    Heljanko, Keijo

    recently received interest is concolic testing which combines concrete and symbolic execution. Based Concolic testing [5,11,2] is a method where a given program is executed both concretely and symbolicallyByteCode 2011 LCT: An Open Source Concolic Testing Tool for Java Programs1 Kari K¨ahk¨onen, Tuomas

  2. Executive Director Carleton Sustainable Energy Research Centre

    E-Print Network [OSTI]

    Dawson, Jeff W.

    Executive Director Carleton Sustainable Energy Research Centre Carleton University is seeking to appoint an Executive Director to its Sustainable Energy Research Centre. This Centre is one of a series of recent Carleton initiatives in the area of sustainable energy. The Executive Director

  3. December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs

    E-Print Network [OSTI]

    Almgren, Robert F.

    December 17, 2008 Robert Almgren / Encyclopedia of Quantitative Finance Execution Costs 1 Execution Costs Execution costs are the difference in value between an ideal trade and what was actually done. The execution cost of a single completed trade is typically the difference between the final average trade price

  4. Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA

    E-Print Network [OSTI]

    Pasareanu, Corina

    Combining Unit-level Symbolic Execution and System-level Concrete Execution for Testing NASA-level concrete execution for generating test cases that satisfy user-specified testing criteria. We have to testing complex safety critical software that combines unit-level symbolic execution and system

  5. Performing aggressive code optimization with an ability to rollback changes made by the aggressive optimizations

    DOE Patents [OSTI]

    Gschwind, Michael K

    2013-07-23T23:59:59.000Z

    Mechanisms for aggressively optimizing computer code are provided. With these mechanisms, a compiler determines an optimization to apply to a portion of source code and determines if the optimization as applied to the portion of source code will result in unsafe optimized code that introduces a new source of exceptions being generated by the optimized code. In response to a determination that the optimization is an unsafe optimization, the compiler generates an aggressively compiled code version, in which the unsafe optimization is applied, and a conservatively compiled code version in which the unsafe optimization is not applied. The compiler stores both versions and provides them for execution. Mechanisms are provided for switching between these versions during execution in the event of a failure of the aggressively compiled code version. Moreover, predictive mechanisms are provided for predicting whether such a failure is likely.

  6. Automatic generation of executable communication specifications from parallel applications

    SciTech Connect (OSTI)

    Pakin, Scott [Los Alamos National Laboratory; Wu, Xing [NCSU; Mueller, Frank [NCSU

    2011-01-19T23:59:59.000Z

    Portable parallel benchmarks are widely used and highly effective for (a) the evaluation, analysis and procurement of high-performance computing (HPC) systems and (b) quantifying the potential benefits of porting applications for new hardware platforms. Yet, past techniques to synthetically parameterized hand-coded HPC benchmarks prove insufficient for today's rapidly-evolving scientific codes particularly when subject to multi-scale science modeling or when utilizing domain-specific libraries. To address these problems, this work contributes novel methods to automatically generate highly portable and customizable communication benchmarks from HPC applications. We utilize ScalaTrace, a lossless, yet scalable, parallel application tracing framework to collect selected aspects of the run-time behavior of HPC applications, including communication operations and execution time, while abstracting away the details of the computation proper. We subsequently generate benchmarks with identical run-time behavior from the collected traces. A unique feature of our approach is that we generate benchmarks in CONCEPTUAL, a domain-specific language that enables the expression of sophisticated communication patterns using a rich and easily understandable grammar yet compiles to ordinary C + MPI. Experimental results demonstrate that the generated benchmarks are able to preserve the run-time behavior - including both the communication pattern and the execution time - of the original applications. Such automated benchmark generation is particularly valuable for proprietary, export-controlled, or classified application codes: when supplied to a third party. Our auto-generated benchmarks ensure performance fidelity but without the risks associated with releasing the original code. This ability to automatically generate performance-accurate benchmarks from parallel applications is novel and without any precedence, to our knowledge.

  7. Building Energy Code

    Broader source: Energy.gov [DOE]

    The Bureau of Construction Codes is responsible for the administration of the State Construction Code Act (1972 PA 230), also known as the Uniform Construction Code.

  8. NREL: Energy Executive Leadership Academy - Executive Energy Leadership

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive Energy

  9. Executive Resources | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian NuclearandJunetrackEllen|July 14,Department ofExecutive Resources

  10. STEP Participant Survey Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOrigin ofEnergy atLLC - FE DKT. 10-160-LNG - ORDERSTATE ENERGY PROGRAMJulyExecutive S ummary

  11. Office of the Executive Secretariat

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreaking ofOilNEWResponse toOctober 2014 National,2008aims to increaseExecutive

  12. FY2003 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive

  13. FY2005 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive5

  14. FY2006 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive56

  15. FY2007 SSRLUO Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederalFY 2008 FOIA -MetricsBudgetFY163 Executive567

  16. An Extended Network Coding Opportunity Discovery Scheme in Wireless Networks

    E-Print Network [OSTI]

    Zhao, Yunlong; Iwai, Masayuki; Sezaki, Kaoru; Tobe, Yoshito; 10.5121/ijcnc.2012.4106

    2012-01-01T23:59:59.000Z

    Network coding is known as a promising approach to improve wireless network performance. How to discover the coding opportunity in relay nodes is really important for it. There are more coding chances, there are more times it can improve network throughput by network coding operation. In this paper, an extended network coding opportunity discovery scheme (ExCODE) is proposed, which is realized by appending the current node ID and all its 1-hop neighbors' IDs to the packet. ExCODE enables the next hop relay node to know which nodes else have already overheard the packet, so it can discover the potential coding opportunities as much as possible. ExCODE expands the region of discovering coding chance to n-hops, and have more opportunities to execute network coding operation in each relay node. At last, we implement ExCODE over the AODV protocol, and efficiency of the proposed mechanism is demonstrated with NS2 simulations, compared to the existing coding opportunity discovery scheme.

  17. Generalized concatenated quantum codes

    E-Print Network [OSTI]

    Grassl, Markus

    We discuss the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using ...

  18. Budget Execution Funds Distribution and Control

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09T23:59:59.000Z

    The Order describes Department of Energy systems, requirements, and assignment of responsibilities for control of the Department budget execution process. Cancels DOE O 135.1.

  19. 2009 Wind Technologies Market Report: Executive Summary

    SciTech Connect (OSTI)

    Wiser, R.; Bolinger, M.

    2010-08-01T23:59:59.000Z

    This is the Executive Summary of the full report entitled 2009 Wind Technologies Market Report (DOE/GO-102010-3107).

  20. Concatenated Conjugate Codes

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-31T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes either of which contains the dual of the other. A conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is known that conjugate code pairs are applicable to (quantum) cryptography. We give a construction method for efficiently decodable conjugate code pairs.

  1. CURRICULUM CODE 308 DEGREE CODE _40

    E-Print Network [OSTI]

    Qiu, Weigang

    CURRICULUM CODE 308 DEGREE CODE _40 Hunter College of the City University of New York - Office Print) E-mail address OES Stamp THIS AUDIT IS NOT OFFICIAL UNTIL APPROVED BY THE OFFICE OF THE REGISTRAR Specialization Section #12;CURRICULUM CODE_308_ DEGREE CODE _40__ Course Prefix & Number Course Title Credits

  2. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors UPC Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya #12;Dept. d'Arquitectura de Computadors Execution Environments

  3. Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for

    E-Print Network [OSTI]

    Corbalan, Julita

    Execution Environments for Parallel ApplicationsDept. d'Arquitectura de Computadors Execution Environments for Parallel Applications Master CANS 2007/2008 Departament d'Arquitectura de Computadors Universitat Politècnica de Catalunya Dept. d'Arquitectura de Computadors Execution Environments for Parallel

  4. Modeling Correlation Noise Statistics at Decoder for Pixel Based Wyner-Ziv Video Coding *

    E-Print Network [OSTI]

    Pereira, Fernando

    , and is responsible to achieve the best rate-distortion (RD) performance, while the decoder remains a pure executer in Wyner-Ziv (WZ) video coding, a particular case of DVC. In the literature, many practical WZ coding once and decoded many times, i.e. one-to-many topologies, such as broadcasting or video-on-demand

  5. IBM Global Business Services Executive Report

    E-Print Network [OSTI]

    -based strategic insights for senior executives around critical public and private sector issues. This executive perspectives Creating new business models for a changing world of energy Energy and Utilities #12;IBM Institute to facilitate not only traditional energy generation and delivery, but also emerging products and services

  6. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2011-09-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the 'Grand Challenge' for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  7. Advanced Fuels Campaign Execution Plan

    SciTech Connect (OSTI)

    Kemal Pasamehmetoglu

    2010-10-01T23:59:59.000Z

    The purpose of the Advanced Fuels Campaign (AFC) Execution Plan is to communicate the structure and management of research, development, and demonstration (RD&D) activities within the Fuel Cycle Research and Development (FCRD) program. Included in this document is an overview of the FCRD program, a description of the difference between revolutionary and evolutionary approaches to nuclear fuel development, the meaning of science-based development of nuclear fuels, and the Grand Challenge for the AFC that would, if achieved, provide a transformational technology to the nuclear industry in the form of a high performance, high reliability nuclear fuel system. The activities that will be conducted by the AFC to achieve success towards this grand challenge are described and the goals and milestones over the next 20 to 40 year period of research and development are established.

  8. Homological stabilizer codes

    SciTech Connect (OSTI)

    Anderson, Jonas T., E-mail: jonastyleranderson@gmail.com

    2013-03-15T23:59:59.000Z

    In this paper we define homological stabilizer codes on qubits which encompass codes such as Kitaev's toric code and the topological color codes. These codes are defined solely by the graphs they reside on. This feature allows us to use properties of topological graph theory to determine the graphs which are suitable as homological stabilizer codes. We then show that all toric codes are equivalent to homological stabilizer codes on 4-valent graphs. We show that the topological color codes and toric codes correspond to two distinct classes of graphs. We define the notion of label set equivalencies and show that under a small set of constraints the only homological stabilizer codes without local logical operators are equivalent to Kitaev's toric code or to the topological color codes. - Highlights: Black-Right-Pointing-Pointer We show that Kitaev's toric codes are equivalent to homological stabilizer codes on 4-valent graphs. Black-Right-Pointing-Pointer We show that toric codes and color codes correspond to homological stabilizer codes on distinct graphs. Black-Right-Pointing-Pointer We find and classify all 2D homological stabilizer codes. Black-Right-Pointing-Pointer We find optimal codes among the homological stabilizer codes.

  9. The Minimum Assumed Incentive Effect of Executive Share Options

    E-Print Network [OSTI]

    Main, Brian G M; Skovoroda, Rodion; Buck, Trevor; Bruce, Alistair

    2003-01-01T23:59:59.000Z

    In granting executive share options (ESOs), companies hand over financial assets to the executive at an opportunity cost that generally outweighs the value placed on those assets by the executive on the receiving end. This ...

  10. Insertion of operation-and-indicate instructions for optimized SIMD code

    DOE Patents [OSTI]

    Eichenberger, Alexander E; Gara, Alan; Gschwind, Michael K

    2013-06-04T23:59:59.000Z

    Mechanisms are provided for inserting indicated instructions for tracking and indicating exceptions in the execution of vectorized code. A portion of first code is received for compilation. The portion of first code is analyzed to identify non-speculative instructions performing designated non-speculative operations in the first code that are candidates for replacement by replacement operation-and-indicate instructions that perform the designated non-speculative operations and further perform an indication operation for indicating any exception conditions corresponding to special exception values present in vector register inputs to the replacement operation-and-indicate instructions. The replacement is performed and second code is generated based on the replacement of the at least one non-speculative instruction. The data processing system executing the compiled code is configured to store special exception values in vector output registers, in response to a speculative instruction generating an exception condition, without initiating exception handling.

  11. Half-Product Codes

    E-Print Network [OSTI]

    Emmadi, Santosh Kumar

    2014-12-11T23:59:59.000Z

    A class of codes, half-product codes, derived from product codes, is characterized. These codes have the implementation advantages of product codes and possess a special structural property which leads them to have larger (at least 3/2 times more...

  12. Executive Order 12088: Federal Compliance with Pollution Control...

    Energy Savers [EERE]

    088: Federal Compliance with Pollution Control Standards Executive Order 12088: Federal Compliance with Pollution Control Standards The head of each Executive agency is responsible...

  13. Eastern Wind Integration and Transmission Study: Executive Summary...

    Energy Savers [EERE]

    Study: Executive Summary and Project Overview Eastern Wind Integration and Transmission Study: Executive Summary and Project Overview This study evaluates the future operational...

  14. FY 2006 Executive Order 13101 Report: Department of Energy Affirmative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2006 Executive Order 13101 Report: Department of Energy Affirmative Procurement and Recycling Fiscal Year 2006 Report, 31207 FY 2006 Executive Order 13101 Report: Department of...

  15. American Indian Policy and Relevant DOE and Executive Orders...

    Energy Savers [EERE]

    Services Communication & Engagement Tribal Programs American Indian Policy and Relevant DOE and Executive Orders American Indian Policy and Relevant DOE and Executive...

  16. Renewable Energy Requirement Guidance for EPAct 2005 and Executive...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Requirement Guidance for EPAct 2005 and Executive Order 13423 Renewable Energy Requirement Guidance for EPAct 2005 and Executive Order 13423 Guidance specifies conditions for...

  17. New Executive Order Establishes a Federal Flood Risk Management...

    Energy Savers [EERE]

    New Executive Order Establishes a Federal Flood Risk Management Standard New Executive Order Establishes a Federal Flood Risk Management Standard February 5, 2015 - 10:55am Addthis...

  18. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  19. Richard Lazarus Named as Executive Director of National Commission...

    Office of Environmental Management (EM)

    Lazarus Named as Executive Director of National Commission on the BP Deepwater Horizon Oil Spill and Offshore Drilling Richard Lazarus Named as Executive Director of National...

  20. White House Announces New Executive Order To Reduce Greenhouse...

    Energy Savers [EERE]

    White House Announces New Executive Order To Reduce Greenhouse Gas Emissions in the Federal Government White House Announces New Executive Order To Reduce Greenhouse Gas Emissions...

  1. President Issues Executive Order Aimed at Preparing for the Impacts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Issues Executive Order Aimed at Preparing for the Impacts of Climate Change; Tribal Leaders to Serve on Task Force President Issues Executive Order Aimed at Preparing for the...

  2. List of codes Language abbreviation codes

    E-Print Network [OSTI]

    Portugal MT Malta GR Greece SE Sweden TR Turkey Country codes for the ERASMUS Institutional Identification codes A Austria IR L Ireland BG Bulgaria LV Latvia B Belgium IS Iceland CY Cyprus MT Malta D Germany L

  3. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Grassl, Markus

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are ...

  4. Quantum convolutional stabilizer codes

    E-Print Network [OSTI]

    Chinthamani, Neelima

    2004-09-30T23:59:59.000Z

    Quantum error correction codes were introduced as a means to protect quantum information from decoherance and operational errors. Based on their approach to error control, error correcting codes can be divided into two different classes: block codes...

  5. Guam- Building Energy Code

    Broader source: Energy.gov [DOE]

    NOTE: In September 2012, The Guam Building Code Council adopted the draft [http://www.guamenergy.com/outreach-education/guam-tropical-energy-code/ Guam Tropical Energy Code]. It must be adopted by...

  6. Building Energy Code

    Broader source: Energy.gov [DOE]

    In 2009S.B. 1182created theOklahoma Uniform Building Code Commission. The 11-member Commission was given the power to conduct rulemaking processes to adopt new building codes. The codes adopted...

  7. Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Andrew Cross; Graeme Smith; John A. Smolin; Bei Zeng

    2007-09-27T23:59:59.000Z

    We present a unifying approach to quantum error correcting code design that encompasses additive (stabilizer) codes, as well as all known examples of nonadditive codes with good parameters. We use this framework to generate new codes with superior parameters to any previously known. In particular, we find ((10,18,3)) and ((10,20,3)) codes. We also show how to construct encoding circuits for all codes within our framework.

  8. Generalized Concatenated Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter Shor; Graeme Smith; John Smolin; Bei Zeng

    2009-01-09T23:59:59.000Z

    We introduce the concept of generalized concatenated quantum codes. This generalized concatenation method provides a systematical way for constructing good quantum codes, both stabilizer codes and nonadditive codes. Using this method, we construct families of new single-error-correcting nonadditive quantum codes, in both binary and nonbinary cases, which not only outperform any stabilizer codes for finite block length, but also asymptotically achieve the quantum Hamming bound for large block length.

  9. Encoding Subsystem Codes

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli; Andreas Klappenecker

    2008-06-30T23:59:59.000Z

    In this paper we investigate the encoding of operator quantum error correcting codes i.e. subsystem codes. We show that encoding of subsystem codes can be reduced to encoding of a related stabilizer code making it possible to use all the known results on encoding of stabilizer codes. Along the way we also show how Clifford codes can be encoded. We also show that gauge qubits can be exploited to reduce the encoding complexity.

  10. Project Execution Plan, Rev. 3

    SciTech Connect (OSTI)

    IT Corporation, Las Vegas

    2002-08-01T23:59:59.000Z

    This plan addresses project activities encompassed by the U.S. Department of Energy's (DOE's), National Nuclear Security Administration Nevada Operations Office, Environmental Restoration Division and conforms to the requirements contained in the Life-Cycle Asset Management, DOE Order 430.1A; The Joint Program Office Policy on Project Management in Support of DOE Order 430.1; Program and Project Management for the Acquisition of Capital Assets, DOE Order 413.3; the Project Execution and Engineering Management Planning Guide, GPG-FM-010; and other applicable Good Practice Guides; and the FY 2001 Integrated Planning, Accountability, and Budgeting System Policy Guidance. The plan also reflects the milestone philosophies of the Federal Facility Agreement and Consent Order, as agreed to by the State of Nevada, the DOE, and the U.S. Department of Defense; and traditional project management philosophies such as the development of life-cycle costs, schedules, and work scope; identification o f roles and responsibilities; and baseline management and controls.

  11. On optimal constacyclic codes

    E-Print Network [OSTI]

    Giuliano G. La Guardia

    2013-11-11T23:59:59.000Z

    In this paper we investigate the class of constacyclic codes, which is a natural generalization of the class of cyclic and negacyclic codes. This class of codes is interesting in the sense that it contains codes with good or even optimal parameters. In this light, we propose constructions of families of classical block and convolutional maximum-distance-separable (MDS) constacyclic codes, as well as families of asymmetric quantum MDS codes derived from (classical-block) constacyclic codes. These results are mainly derived from the investigation of suitable properties on cyclotomic cosets of these corresponding codes.

  12. Building Energy Code

    Broader source: Energy.gov [DOE]

    The West Virginia State Fire Commission is responsible for adopting and promulgating statewide construction codes. These codes may be voluntarily adopted at the local level. Local jurisdictions...

  13. Account Executive Account Manager of Sales

    E-Print Network [OSTI]

    Engineer Naval Surface Ship Warfare Officer Network Administrator Networking/Engineering Level II NetworkAccount Executive Account Manager of Sales Administrative Assistant Advanced Systems Engineer Engineer Assistant Administrator Assistant Analyst Assistant Development Engineer Assistant Director

  14. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    meeting Executive Committee meeting June 24, 2015 6:00PM to 7:00PM EDT The meeting is open to the public. Location: DOE Information Center 1 Science.Gov Way Oak Ridge, TN 37830...

  15. v 2002 SITE ENVIRONMENTAL REPORT Executive Summary

    E-Print Network [OSTI]

    Homes, Christopher C.

    Department of Environmental Conservation (NYSDEC) granted BNLs request to modify its State Pollutantv 2002 SITE ENVIRONMENTAL REPORT Executive Summary The 2002 Site Environmental Report (SER the status of Brookhaven National Laboratorys (BNL) environmental pro- grams and performance and restoration

  16. Executive Summary Mitigation of Climate Change through

    E-Print Network [OSTI]

    Brown, Sally

    Executive Summary Mitigation of Climate Change through Land Reclamation with Biosolids: Carbon storage in reclaimed mine soils, life cycle analysis of biosolids reclamation, and ecosystem services; Pacala and Socolow, 2004). Land reclamation with municipal wastewater solids (biosolids) can play

  17. Stateless and stateful implementations of faithful execution

    DOE Patents [OSTI]

    Pierson, Lyndon G; Witzke, Edward L; Tarman, Thomas D; Robertson, Perry J; Eldridge, John M; Campbell, Philip L

    2014-12-16T23:59:59.000Z

    A faithful execution system includes system memory, a target processor, and protection engine. The system memory stores a ciphertext including value fields and integrity fields. The value fields each include an encrypted executable instruction and the integrity fields each include an encrypted integrity value for determining whether a corresponding one of the value fields has been modified. The target processor executes plaintext instructions decoded from the ciphertext while the protection engine is coupled between the system memory and the target processor. The protection engine includes logic to retrieve the ciphertext from the system memory, decrypt the value fields into the plaintext instructions, perform an integrity check based on the integrity fields to determine whether any of the corresponding value fields have been modified, and provide the plaintext instructions to the target processor for execution.

  18. Chief executive officers: their mentoring relationships

    E-Print Network [OSTI]

    Rosser, Manda Hays

    2005-02-17T23:59:59.000Z

    CHIEF EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... EXECUTIVE OFFICERS: THEIR MENTORING RELATIONSHIPS A Dissertation by MANDA HAYS ROSSER Submitted to Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved as to style and content by...

  19. TECATE - a code for anisotropic thermoelasticity in high-average-power laser technology. Phase 1 final report

    SciTech Connect (OSTI)

    Gelinas, R.J.; Doss, S.K.; Carlson, N.N.

    1985-01-01T23:59:59.000Z

    This report describes a totally Eulerian code for anisotropic thermoelasticity (code name TECATE) which may be used in evaluations of prospective crystal media for high-average-power lasers. The present TECATE code version computes steady-state distributions of material temperatures, stresses, strains, and displacement fields in 2-D slab geometry. Numerous heat source and coolant boundary condition options are available in the TECATE code for laser design considerations. Anisotropic analogues of plane stress and plane strain evaluations can be executed for any and all crystal symmetry classes. As with all new and/or large physics codes, it is likely that some code imperfections will emerge at some point in time.

  20. Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre-emptive scheduling

    E-Print Network [OSTI]

    Bril, Reinder J.

    Execution timesand execution jitter analysis of real-time tasks under fixed-priority pre In this paper, we present worst-case and best-case execution times and (absolute) execution jitter analysis fixed-priority pre-emptive scheduling (FPPS), arbitrary phasing, (absolute) activation jitter

  1. Generalized Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Markus Grassl; Peter W. Shor; Bei Zeng

    2009-05-04T23:59:59.000Z

    We show how good quantum error-correcting codes can be constructed using generalized concatenation. The inner codes are quantum codes, the outer codes can be linear or nonlinear classical codes. Many new good codes are found, including both stabilizer codes as well as so-called nonadditive codes.

  2. Graph concatenation for quantum codes

    E-Print Network [OSTI]

    Beigi, Salman

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code and every codeword stabilized code can be described by a graph and a classical code. For the ...

  3. CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    CONCATENATED CODES BASED ON MULTIDIMENSIONAL PARITY-CHECK CODES AND TURBO CODES John M. Shea, Florida Abstract--Turbo-codes provide communications near capac- ity when very large interleavers (and parity-check code can be used as an outer code with a turbo code as an inner code in a serial

  4. The Application of the PEBBED Code Suite to the PBMR-400 Coupled Code Benchmark - FY 2006 Annual Report

    SciTech Connect (OSTI)

    Not Available

    2006-09-01T23:59:59.000Z

    This document describes the recent developments of the PEBBED code suite and its application to the PBMR-400 Coupled Code Benchmark. This report addresses an FY2006 Level 2 milestone under the NGNP Design and Evaluation Methods Work Package. The milestone states "Complete a report describing the results of the application of the integrated PEBBED code package to the PBMR-400 coupled code benchmark". The report describes the current state of the PEBBED code suite, provides an overview of the Benchmark problems to which it was applied, discusses the code developments achieved in the past year, and states some of the results attained. Results of the steady state problems generated by the PEBBED fuel management code compare favorably to the preliminary results generated by codes from other participating institutions and to similar non-Benchmark analyses. Partial transient analysis capability has been achieved through the acquisition of the NEM-THERMIX code from Penn State University. Phase I of the task has been achieved through the development of a self-consistent set of tools for generating cross sections for design and transient analysis and in the successful execution of the steady state benchmark exercises.

  5. Joint Source-Channel Coding via Turbo Codes

    E-Print Network [OSTI]

    Alajaji, Fady

    Joint Source-Channel Coding via Turbo Codes by Guang-Chong Zhu A dissertation submitted coding. One of the most exciting break- throughs in channel coding is the invention of Turbo codes, whose- tigate three joint source-channel coding issues in the context of Turbo codes. In the #12;rst part

  6. Unfolding the color code

    E-Print Network [OSTI]

    Aleksander Kubica; Beni Yoshida; Fernando Pastawski

    2015-03-06T23:59:59.000Z

    The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. Here we show that the color code on a $d$-dimensional closed manifold is equivalent to multiple decoupled copies of the $d$-dimensional toric code up to local unitary transformations and adding or removing ancilla qubits. Our result not only generalizes the proven equivalence for $d=2$, but also provides an explicit recipe of how to decouple independent components of the color code, highlighting the importance of colorability in the construction of the code. Moreover, for the $d$-dimensional color code with $d+1$ boundaries of $d+1$ distinct colors, we find that the code is equivalent to multiple copies of the $d$-dimensional toric code which are attached along a $(d-1)$-dimensional boundary. In particular, for $d=2$, we show that the (triangular) color code with boundaries is equivalent to the (folded) toric code with boundaries. We also find that the $d$-dimensional toric code admits logical non-Pauli gates from the $d$-th level of the Clifford hierarchy, and thus saturates the bound by Bravyi and K\\"{o}nig. In particular, we show that the $d$-qubit control-$Z$ logical gate can be fault-tolerantly implemented on the stack of $d$ copies of the toric code by a local unitary transformation.

  7. List decoding of subspace codes and rank-metric codes

    E-Print Network [OSTI]

    Mahdavifar, Hessam

    2012-01-01T23:59:59.000Z

    2.2.2 Koetter-Kschischang Codes . . . . . . . . . . . .of Subspace Codes . . . . . . . . . . . . . . 2.3.1 OverviewList-decodable Codes of Arbitrary Dimension . . . . . . .

  8. A parallel execution model for Prolog

    SciTech Connect (OSTI)

    Fagin, B.

    1987-01-01T23:59:59.000Z

    In this thesis a new parallel execution model for Prolog is presented: The PPP model or Parallel Prolog Processor. The PPP supports AND-parallelism, OR- parallelism, and intelligent backtracking. An implementation of the PPP is described, through the extension of an existing Prolog abstract machine architecture. Several examples of PPP execution are presented and compilation to the PPP abstract instructions set is discussed. The performance effects of this model are reported, based on a simulation of a large benchmark set. The implications of these results for parallel Prolog systems are discussed, and directions for future work are indicated.

  9. Dependence driven execution for multiprogrammed multiprocessor

    SciTech Connect (OSTI)

    Vajracharya, S. [Los Alamos National Lab., NM (United States); Grunwald, D. [Univ. of Colorado, Boulder, CO (United States). Dept. of Computer Science

    1998-12-31T23:59:59.000Z

    Barrier synchronizations can be very expensive on multiprogramming environment because no process can go past a barrier until all the processes have arrived. If a process participating at a barrier is swapped out by the operating system, the rest of participating processes end up waiting for the swapped-out process. This paper presents a compile-time/run-time system that uses a dependence-driven execution to overlap the execution of computations separated by barriers so that the processes do not spend most of the time idling at the synchronization point.

  10. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  11. Model Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  12. Compiling Codes on Euclid

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Compiling Codes Compiling Codes Overview Open Mpi is the the only MPI library available on Euclid. This implementation of MPI-2 is described at Open MPI: Open Source High...

  13. Coding AuthentiCity

    E-Print Network [OSTI]

    Mercier, Rachel Havens

    2008-01-01T23:59:59.000Z

    This thesis analyzes the impact of form-based codes, focusing on two research questions: (1) What is the underlying motivation for adopting a form-based code? (2) What motivations have the most significant impact on ...

  14. Introduction to Algebraic Codes

    E-Print Network [OSTI]

    for health care. These self-correcting codes that occur in nature might be better than all of. our coding theory based on algebra or algebraic geometry. It is a myth

  15. Building Energy Code

    Broader source: Energy.gov [DOE]

    Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  16. Building Energy Code

    Broader source: Energy.gov [DOE]

    ''Note: Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For...

  17. Cellulases and coding sequences

    DOE Patents [OSTI]

    Li, Xin-Liang (Athens, GA); Ljungdahl, Lars G. (Athens, GA); Chen, Huizhong (Lawrenceville, GA)

    2001-02-20T23:59:59.000Z

    The present invention provides three fungal cellulases, their coding sequences, recombinant DNA molecules comprising the cellulase coding sequences, recombinant host cells and methods for producing same. The present cellulases are from Orpinomyces PC-2.

  18. Building Energy Code

    Broader source: Energy.gov [DOE]

    The New Jersey Uniform Construction Code Act provides that model codes and standards publications shall not be adopted more frequently than once every three years. However, a revision or amendment...

  19. Building Energy Code

    Broader source: Energy.gov [DOE]

    All residential and commercial structures are required to comply with the states energy code. The 2009 New Mexico Energy Conservation Code (NMECC), effective June 2013, is based on 2009...

  20. Building Energy Code

    Broader source: Energy.gov [DOE]

    Prior to 1997, South Carolina's local governments adopted and enforced the building codes. In 1997, the law required statewide use of the most up-to-date building codes, which then required the...

  1. Coding for Cooperative Communications

    E-Print Network [OSTI]

    Uppal, Momin Ayub

    2011-10-21T23:59:59.000Z

    of SWCNSQ based CF relaying as a performance benchmark, we will present a practical code design using low-density parity-check (LDPC) codes for error protection at the source, and nested scalar quantization plus irregular repeat-accumulate (IRA) codes... develop and design practical coding strategies which perform very close to the infor- mation theoretic limits. The cooperative communication channels we consider are: (a) The Gaussian re- lay channel, (b) the quasi-static fading relay channel, (c...

  2. Homological Product Codes

    E-Print Network [OSTI]

    Sergey Bravyi; Matthew B. Hastings

    2013-11-04T23:59:59.000Z

    Quantum codes with low-weight stabilizers known as LDPC codes have been actively studied recently due to their simple syndrome readout circuits and potential applications in fault-tolerant quantum computing. However, all families of quantum LDPC codes known to this date suffer from a poor distance scaling limited by the square-root of the code length. This is in a sharp contrast with the classical case where good families of LDPC codes are known that combine constant encoding rate and linear distance. Here we propose the first family of good quantum codes with low-weight stabilizers. The new codes have a constant encoding rate, linear distance, and stabilizers acting on at most $\\sqrt{n}$ qubits, where $n$ is the code length. For comparison, all previously known families of good quantum codes have stabilizers of linear weight. Our proof combines two techniques: randomized constructions of good quantum codes and the homological product operation from algebraic topology. We conjecture that similar methods can produce good stabilizer codes with stabilizer weight $n^a$ for any $a>0$. Finally, we apply the homological product to construct new small codes with low-weight stabilizers.

  3. Understanding Perception Through Neural 'Codes'

    E-Print Network [OSTI]

    Freeman, Walter J III

    2011-01-01T23:59:59.000Z

    Perception Through Neural Codes. In: Special Issue on Perception Through Neural Codes. In: Special Issue on Perception Through Neural Codes. In: Special Issue on

  4. Baldrige Executive Fellows Program -Prospectus Program Purpose

    E-Print Network [OSTI]

    Virtual meetings and calls throughout the year to translate learnings into actions for your company with other executives that will benefit you now and into the future Knowledge of the Baldrige framework planning; sustainability; core competencies; customer engagement; employee engagement; integration

  5. Curtin University Organisational Chart * Executive Managers

    E-Print Network [OSTI]

    Curtin University Organisational Chart * Executive Managers ** Seconded to CEC (Singapore Campus Mr Wing Chung Director Internal Audit * Professor David Wood Acting Deputy Vice-Chancellor Academic Sustainable Development Inst Mr TimothyWalton Director Energy Research Initiatives Mr Paul Nicholls Director

  6. Executive Vice President La-Verna Fountain

    E-Print Network [OSTI]

    Kim, Philip

    construction contracts went to MWL firms. During the past three fiscal years (2006-2008), Columbia contractedJoe Ienuso Executive Vice President La-Verna Fountain Associate Vice President Construction insurance and retirement benefits. Construction Jobs Referral Process As a service to those interested

  7. Academic Integrity Task Force Report Executive Summary

    E-Print Network [OSTI]

    Roy, Subrata

    . For a more comprehensive report of the findings as well as faculty suggestions for maintaining integrity1 Academic Integrity Task Force Report Executive Summary 11/22/11 INTRODUCTION CHARGE: To determine whether there is an issue with academic integrity at UF and, if so, to determine how widespread

  8. Scott Shreeve, MD Chief Executive Officer

    E-Print Network [OSTI]

    Rose, Michael R.

    is currently serving as chief executive office of Crossover Health, a next generation health care delivery, state wide health systems, and networks of primary care clinics. Dr. Shreeve is also founding member of the Health 2.0 technology and reform movement, serving as an advisor to the conference and spokesperson

  9. Executive Education Program Freight Transportation and

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    Executive Education Program Freight Transportation and Logistics: Delivering Results in a Volatile Environment September 9 ­11, 2013 Northwestern University Transportation Center NonprofitOrganization U.S.Postage PAID NorthwesternUniversity TransportationCenter RobertR.McCormickSchool of

  10. February 1, 2006 Emmett Brown, Executive Director

    E-Print Network [OSTI]

    Arnold, Douglas N.

    February 1, 2006 Emmett Brown, Executive Director National Fresh Water Fishing Hall of Fame P deduce the length of the fish by assuming a height of the angler of 72" and using direct scaling. Even between the distance of the camera to the angler and to the fish. Discounting that distance leads

  11. WORLD ROBOTICS 2009 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2009 IX EXECUTIVE SUMMARY of 1. World Robotics 2009 Industrial Robots 2. World Robotics 2009 Service Robots 1. World Robotics 2009 Industrial Robots 2008 World Robot Market Already affected by the economical downturn In 2008, the worldwide sales of industrial robots stagnated at about

  12. WORLD ROBOTICS 2010 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2010 VII EXECUTIVE SUMMARY of 1. World Robotics 2010 Industrial Robots 2. World Robotics 2010 Service Robots 1. World Robotics 2010 Industrial Robots Sales slump in 2009 In 2009, the worldwide economic and financial crisis caused a significant slump in the sales of industrial robots

  13. WORLD ROBOTICS 2011 EXECUTIVE SUMMARY of

    E-Print Network [OSTI]

    De Luca, Alessandro

    WORLD ROBOTICS 2011 VII EXECUTIVE SUMMARY of 1. World Robotics 2011 Industrial Robots 2. World Robotics 2011 Service Robots 1. World Robotics 2011 Industrial Robots 2010: Strong comeback of the robotics and financial crisis caused a significant slump in the sales of industrial robots. Compared to 2008, considered

  14. Optimal Execution with Nonlinear Impact Functions

    E-Print Network [OSTI]

    Almgren, Robert F.

    cost per share to be a power law function of the trading rate, with an arbitrary positive exponentOptimal Execution with Nonlinear Impact Functions and Trading-Enhanced Risk Robert F. Almgren October 2001 Abstract We determine optimal trading strategies for liquidation of a large single

  15. Carbon Management Plan 1. Executive summary 5

    E-Print Network [OSTI]

    Haase, Markus

    Carbon Management Plan June 2011 #12;2 #12;3 CONTENTS 1. Executive summary 5 2. Introduction 15 3. Background and context 16 4. Carbon management strategy 18 5. Carbon emissions baseline and projections 22 6. Past actions and achievements 30 7. Carbon Management Plan implementation 33 8. Carbon Management Plan

  16. Oracle SQL Exercise 1. Executing SQL Commands

    E-Print Network [OSTI]

    Lakshmanan, Laks V.S.

    . The command may extend over several lines and can be broken anywhere there is a space. SQL commands must end*Plus command. List n - displays the nth line of the command SQL> List 2 #12;Run - lists and executes the last in the buffer can be edited using the following commands. Only the current line is affected. c(hange) /oldstring

  17. UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee

    E-Print Network [OSTI]

    UNIVERSITY OF CALIFORNIA HAITI INITIATIVE Executive Committee Housed at the UCLA Program in Global'Etat d'Haiti Main Campus Planning and Reform Duration 3-4 weeks in Haiti, continual basis Funding While in Haiti: Cost of living, international transportation Background The UC Haiti Initiative (UCHI

  18. Middleware Based Executive for Embedded Reconfigurable Platforms

    E-Print Network [OSTI]

    Paris-Sud XI, Universit de

    Middleware Based Executive for Embedded Reconfigurable Platforms A. Khiar and N.Knecht and L embedded Multiprocessor Systems-on-Chip (MPSoC) platform containing reconfigurable hardware computing units of the french ANR FOSFOR (Flexible Operating System FOr Reconfigurable platforms) [1] project, the objective

  19. Hawaii energy strategy: Executive summary, October 1995

    SciTech Connect (OSTI)

    NONE

    1995-10-01T23:59:59.000Z

    This is an executive summary to a report on the Hawaii Energy Strategy Program. The topics of the report include the a description of the program including an overview, objectives, policy statement and purpose and objectives; energy strategy policy development; energy strategy projects; current energy situation; modeling Hawaii`s energy future; energy forecasts; reducing energy demand; scenario assessment, and recommendations.

  20. Understanding Multi-Transputer Execution Susan Stepney

    E-Print Network [OSTI]

    Stepney, Susan

    of the execution of occam (2) programs. But even the static structure of an occam program is considerably more of the communication. Folds are used to control the amount of information being displayed. Once the static structure and understanding of occam programs. PAR router(...) mixer(...) worker(...) Susan Stepney. "Understanding Multi

  1. Executive Summaries for the Hydrogen Storage Materials Center...

    Energy Savers [EERE]

    Executive Summaries for the Hydrogen Storage Materials Center of Excellence - Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Executive Summaries for...

  2. Executive Function and Pediatric Overweight: A Problem-Solving Framework

    E-Print Network [OSTI]

    Johnson, Audrea

    2012-10-19T23:59:59.000Z

    . The present study examines potential relations between aspects of executive function and pediatric weight status as well as obesity-prone eating behaviors. Executive function is operationally defined as a problem-solving construct with four steps that work...

  3. Extractive Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM

    E-Print Network [OSTI]

    Industries and Sustainable Development EXECUTIVE TRAINING PROGRAM Vale Columbia Center UNIVERSITY Center on Globalization and Sustainable Development EARTH INSTITUTE | COLUMBIA UNIVERSITY #12; Extractive Industries and Sustainable Development Executive Training

  4. Symbolic Execution for (Almost) Free: Hijacking an Existing Implementation to Perform Symbolic Execution

    E-Print Network [OSTI]

    Near, Joseph P.

    2014-04-22T23:59:59.000Z

    Symbolic execution of a language is traditionally achieved by replacing the language s interpreter with an entirely new interpreter. This may be an unnecessary burden, and it is tempting instead to try to use as much of ...

  5. Shortened Turbo Codes

    E-Print Network [OSTI]

    David J.C. MacKay

    Simple arguments suggest that shortened codes must have distance properties equal to or better than those of their parent codes, and that they should be equally practical to decode. This relationship holds true in the case of low density generator codes and low density parity check codes. We investigate the properties of shortened turbo codes. I. Motivation for Shortening In our previous work on codes based on very sparse matrices we have observed that while codes with a low density generator matrix [1] are asymptotically bad, codes with a low density parity check matrix [2] are asymptotically good [3, 4, 5]. One way of viewing the relationship between low density generator matrix codes and low density parity check matrix codes is that one obtains a low density parity check matrix by taking the M \\Theta N parity check matrix [P IM ] of a (N; K) low density generator matrix code and chopping off its right-most M columns (where M = N \\Gamma K), to yield an M \\Theta K matrix [P], which...

  6. EXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS

    E-Print Network [OSTI]

    Li, Yuying

    strategies to execute a trade. For a given price-impact function, the execution cost problem dealsEXECUTION COSTS IN FINANCIAL MARKETS WITH SEVERAL INSTITUTIONAL INVESTORS Somayeh Moazeni, Yuying trade large volumes face a price impact that depends on their trading volumes simul- taneously

  7. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|Code |

  8. A Global View Programming Abstraction for Transitioning MPI Codes to PGAS Languages

    SciTech Connect (OSTI)

    Mintz, Tiffany M [ORNL] [ORNL; Hernandez, Oscar R [ORNL] [ORNL; Bernholdt, David E [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The multicore generation of scientific high performance computing has provided a platform for the realization of Exascale computing, and has also underscored the need for new paradigms in coding parallel applications. The current standard for writing parallel applications requires programmers to use languages designed for sequential execution. These languages have abstractions that only allow programmers to operate on the process centric local view of data. To provide suitable languages for parallel execution, many research efforts have designed languages based on the Partitioned Global Address Space (PGAS) programming model. Chapel is one of the more recent languages to be developed using this model. Chapel supports multithreaded execution with high-level abstractions for parallelism. With Chapel in mind, we have developed a set of directives that serve as intermediate expressions for transitioning scientific applications from languages designed for sequential execution to PGAS languages like Chapel that are being developed with parallelism in mind.

  9. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    SciTech Connect (OSTI)

    kelkar, sharad

    2013-04-30T23:59:59.000Z

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  10. Stimulation at Desert Peak -modeling with the coupled THM code FEHM

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    kelkar, sharad

    Numerical modeling of the 2011 shear stimulation at the Desert Peak well 27-15. This submission contains the FEHM executable code for a 64-bit PC Windows-7 machine, and the input and output files for the results presented in the included paper from ARMA-213 meeting.

  11. Mechanical code comparator

    DOE Patents [OSTI]

    Peter, Frank J. (Albuquerque, NM); Dalton, Larry J. (Bernalillo, NM); Plummer, David W. (Albuquerque, NM)

    2002-01-01T23:59:59.000Z

    A new class of mechanical code comparators is described which have broad potential for application in safety, surety, and security applications. These devices can be implemented as micro-scale electromechanical systems that isolate a secure or otherwise controlled device until an access code is entered. This access code is converted into a series of mechanical inputs to the mechanical code comparator, which compares the access code to a pre-input combination, entered previously into the mechanical code comparator by an operator at the system security control point. These devices provide extremely high levels of robust security. Being totally mechanical in operation, an access control system properly based on such devices cannot be circumvented by software attack alone.

  12. Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner

    E-Print Network [OSTI]

    Banner Index Codes The Index code is a data-entry shortcut for the Fund code, Org code, and Program code in Banner Finance (FO-P's). Implementation of the Index has greatly decreased data entry coding ­ Account (object) - Program (FOAP) code numbers on any of your accounting forms (Contracts, Purchase Orders

  13. TESLA Technical Design Report Executive Summary

    E-Print Network [OSTI]

    TESLA Technical Design Report PART I Executive Summary March 2001 Editors: F.Richard, J.R.Schneider, D.Trines, A.Wagner #12;#12;Dedicated to the memory of Bjørn H. Wiik (1937-1999) #12;#12;TESLA ­ A Summary This report describes the scientific aims and potential as well as the technical de- sign of TESLA

  14. Sandia National Laboratories: Codes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Codes Solar Thermochemical Hydrogen Production On June 13, 2014, in SNL maintains the equipment, experts, and partnerships required to develop technology for solar thermochemical...

  15. Tokamak Systems Code

    SciTech Connect (OSTI)

    Reid, R.L.; Barrett, R.J.; Brown, T.G.; Gorker, G.E.; Hooper, R.J.; Kalsi, S.S.; Metzler, D.H.; Peng, Y.K.M.; Roth, K.E.; Spampinato, P.T.

    1985-03-01T23:59:59.000Z

    The FEDC Tokamak Systems Code calculates tokamak performance, cost, and configuration as a function of plasma engineering parameters. This version of the code models experimental tokamaks. It does not currently consider tokamak configurations that generate electrical power or incorporate breeding blankets. The code has a modular (or subroutine) structure to allow independent modeling for each major tokamak component or system. A primary benefit of modularization is that a component module may be updated without disturbing the remainder of the systems code as long as the imput to or output from the module remains unchanged.

  16. Graph Concatenation for Quantum Codes

    E-Print Network [OSTI]

    Salman Beigi; Isaac Chuang; Markus Grassl; Peter Shor; Bei Zeng

    2010-02-03T23:59:59.000Z

    Graphs are closely related to quantum error-correcting codes: every stabilizer code is locally equivalent to a graph code, and every codeword stabilized code can be described by a graph and a classical code. For the construction of good quantum codes of relatively large block length, concatenated quantum codes and their generalizations play an important role. We develop a systematic method for constructing concatenated quantum codes based on "graph concatenation", where graphs representing the inner and outer codes are concatenated via a simple graph operation called "generalized local complementation." Our method applies to both binary and non-binary concatenated quantum codes as well as their generalizations.

  17. T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...

    Broader source: Energy.gov (indexed) [DOE]

    has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

  18. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  19. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    A remote user can gain unauthorized access on the target system. IMPACT: User access via network SOLUTION: The vendor has issued a fix. Addthis Related Articles U-010:HP Onboard...

  20. Reed-Muller Codes: Spherically-Punctured Codes and Decoding Algorithms

    E-Print Network [OSTI]

    Kapralova, Olga

    2013-01-01T23:59:59.000Z

    Linear codes . . . . . . . . . . . . . . . . . . . . . . .3.3 Code parameters . . . . . . . . . . . . . .of linear codes . . . . . . . . . . . . 1.5 Reed-Muller

  1. Universal space-time codes from demultiplexed trellis codes

    E-Print Network [OSTI]

    Kose, Cenk; Wesel, R D

    2006-01-01T23:59:59.000Z

    and A. R. Calderbank, Space-time codes for high data ratePerformance criteria and code construction, IEEE Trans.of spacetime trellis codes, IEEE Trans. Commun. , vol. 51,

  2. Relation Between Surface Codes and Hypermap-Homology Quantum Codes

    E-Print Network [OSTI]

    Pradeep Sarvepalli

    2014-03-14T23:59:59.000Z

    Recently, a new class of quantum codes based on hypermaps were proposed. These codes are obtained from embeddings of hypergraphs as opposed to surface codes which are obtained from the embeddings of graphs. It is natural to compare these two classes of codes and their relation to each other. In this context two related questions are addressed in this paper: Can the parameters of hypermap-homology codes be superior to those of surface codes and what is precisely the relation between these two classes of quantum codes? We show that a canonical hypermap code is identical to a surface code while a noncanonical hypermap code can be transformed to a surface code by CNOT gates alone. Our approach is constructive; we construct the related surface code and the transformation involving CNOT gates.

  3. Runtime Detection of C-Style Errors in UPC Code

    SciTech Connect (OSTI)

    Pirkelbauer, P; Liao, C; Panas, T; Quinlan, D

    2011-09-29T23:59:59.000Z

    Unified Parallel C (UPC) extends the C programming language (ISO C 99) with explicit parallel programming support for the partitioned global address space (PGAS), which provides a global memory space with localized partitions to each thread. Like its ancestor C, UPC is a low-level language that emphasizes code efficiency over safety. The absence of dynamic (and static) safety checks allows programmer oversights and software flaws that can be hard to spot. In this paper, we present an extension of a dynamic analysis tool, ROSE-Code Instrumentation and Runtime Monitor (ROSECIRM), for UPC to help programmers find C-style errors involving the global address space. Built on top of the ROSE source-to-source compiler infrastructure, the tool instruments source files with code that monitors operations and keeps track of changes to the system state. The resulting code is linked to a runtime monitor that observes the program execution and finds software defects. We describe the extensions to ROSE-CIRM that were necessary to support UPC. We discuss complications that arise from parallel code and our solutions. We test ROSE-CIRM against a runtime error detection test suite, and present performance results obtained from running error-free codes. ROSE-CIRM is released as part of the ROSE compiler under a BSD-style open source license.

  4. Report number codes

    SciTech Connect (OSTI)

    Nelson, R.N. (ed.)

    1985-05-01T23:59:59.000Z

    This publication lists all report number codes processed by the Office of Scientific and Technical Information. The report codes are substantially based on the American National Standards Institute, Standard Technical Report Number (STRN)-Format and Creation Z39.23-1983. The Standard Technical Report Number (STRN) provides one of the primary methods of identifying a specific technical report. The STRN consists of two parts: The report code and the sequential number. The report code identifies the issuing organization, a specific program, or a type of document. The sequential number, which is assigned in sequence by each report issuing entity, is not included in this publication. Part I of this compilation is alphabetized by report codes followed by issuing installations. Part II lists the issuing organization followed by the assigned report code(s). In both Parts I and II, the names of issuing organizations appear for the most part in the form used at the time the reports were issued. However, for some of the more prolific installations which have had name changes, all entries have been merged under the current name.

  5. Executive Committee meeting | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic Plan Departmentof1-SCORECARD-09-21-11AprilWednesday,TechnologyExecutive

  6. Tribal Roundable Executive Summary | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfact sheetTransferringInc. |ofofDepartmentExecutive

  7. Other Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)IntegratedSpeeding access toTest andOptimize carbon AboutOrganizing|Executive

  8. NREL: Energy Executive Leadership Academy - Leadership Institute

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Saleshttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gifNRELPowerNewsletterAcademy Alumni Executive

  9. Executive Positions | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC) Environmental Assessments (EA) /EmailMolecular Solids | MIT-HarvardExecutive

  10. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A.; Smith, Brian E.

    2013-01-29T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  11. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-25T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  12. Runtime optimization of an application executing on a parallel computer

    DOE Patents [OSTI]

    Faraj, Daniel A; Smith, Brian E

    2014-11-18T23:59:59.000Z

    Identifying a collective operation within an application executing on a parallel computer; identifying a call site of the collective operation; determining whether the collective operation is root-based; if the collective operation is not root-based: establishing a tuning session and executing the collective operation in the tuning session; if the collective operation is root-based, determining whether all compute nodes executing the application identified the collective operation at the same call site; if all compute nodes identified the collective operation at the same call site, establishing a tuning session and executing the collective operation in the tuning session; and if all compute nodes executing the application did not identify the collective operation at the same call site, executing the collective operation without establishing a tuning session.

  13. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Pradeep Kiran Sarvepalli

    2008-10-14T23:59:59.000Z

    The importance of quantum error correction in paving the way to build a practical quantum computer is no longer in doubt. This dissertation makes a threefold contribution to the mathematical theory of quantum error-correcting codes. Firstly, it extends the framework of an important class of quantum codes -- nonbinary stabilizer codes. It clarifies the connections of stabilizer codes to classical codes over quadratic extension fields, provides many new constructions of quantum codes, and develops further the theory of optimal quantum codes and punctured quantum codes. Secondly, it contributes to the theory of operator quantum error correcting codes also called as subsystem codes. These codes are expected to have efficient error recovery schemes than stabilizer codes. This dissertation develops a framework for study and analysis of subsystem codes using character theoretic methods. In particular, this work establishes a close link between subsystem codes and classical codes showing that the subsystem codes can be constructed from arbitrary classical codes. Thirdly, it seeks to exploit the knowledge of noise to design efficient quantum codes and considers more realistic channels than the commonly studied depolarizing channel. It gives systematic constructions of asymmetric quantum stabilizer codes that exploit the asymmetry of errors in certain quantum channels.

  14. The role of executive capital and the market for alternative candidates in CEO dismissal and labor market consequences for dismissed chief executives

    E-Print Network [OSTI]

    Schepker, Donald Joseph

    2012-08-31T23:59:59.000Z

    ......................................................... 41 Firm Performance and Executive Dismissal...................................................... 42 The Interaction of Performance and Executive Dismissal.......................... 42 The Interaction of Performance and the Managerial Labor...

  15. Rateless Codes for AVC Models

    E-Print Network [OSTI]

    Sarwate, A D; Gastpar, M

    2010-01-01T23:59:59.000Z

    2004. [7] M. Luby, LT codes, in Proc. 43rd Ann. IEEE Symp.8] A. Shokrollahi, Fountain codes, in Proc. 41st AllertonChannel capacities for list codes, J. Appl. Probabil. ,

  16. Unequal Error Protection Turbo Codes

    E-Print Network [OSTI]

    Henkel, Werner

    Unequal Error Protection Turbo Codes Diploma Thesis Neele von Deetzen Arbeitsbereich Nachrichtentechnik School of Engineering and Science Bremen, February 28th, 2005 #12;Unequal Error Protection Turbo Convolutional Codes / Turbo Codes 18 3.1 Structure

  17. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabil...

    Office of Environmental Management (EM)

    have been reported in Apache OFBiz, which can be exploited by malicious people to conduct cross-site scripting attacks and compromise a vulnerable system. PLATFORM:...

  18. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks. A remote user...

  19. T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

  20. U-064: Adobe Acrobat/Reader PRC Memory Corruption Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Adobe Acrobat/Reader, this vulnerability is being actively exploited against Windows-based systems.

  1. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  2. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities | Department of

  3. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of Energy Symantec

  4. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartment ofDepartment

  5. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department ofDepartmentDepartment of

  6. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks and|

  7. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code,

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities |VulnerabilityEnergy July

  8. U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment of EnergyDepartmentURL

  9. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|

  10. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  11. U-277: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5|

  12. U-149: Apache OFBiz Cross-Site Scripting and Code Execution Vulnerabilities

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe| Department

  13. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergyTransportation WorkDecemberInjury at FY6: Adobe|2:

  14. V -209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWith theirabout

  15. V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|PotomacDepartment ofConduct Cross-Site

  16. Quantum Error Correcting Subsystem Codes From Two Classical Linear Codes

    E-Print Network [OSTI]

    Dave Bacon; Andrea Casaccino

    2006-10-17T23:59:59.000Z

    The essential insight of quantum error correction was that quantum information can be protected by suitably encoding this quantum information across multiple independently erred quantum systems. Recently it was realized that, since the most general method for encoding quantum information is to encode it into a subsystem, there exists a novel form of quantum error correction beyond the traditional quantum error correcting subspace codes. These new quantum error correcting subsystem codes differ from subspace codes in that their quantum correcting routines can be considerably simpler than related subspace codes. Here we present a class of quantum error correcting subsystem codes constructed from two classical linear codes. These codes are the subsystem versions of the quantum error correcting subspace codes which are generalizations of Shor's original quantum error correcting subspace codes. For every Shor-type code, the codes we present give a considerable savings in the number of stabilizer measurements needed in their error recovery routines.

  17. Optimal Execution Under Jump Models For Uncertain Price Impact

    E-Print Network [OSTI]

    2012-08-13T23:59:59.000Z

    May 12, 2011 ... Unfortunately current quantitative analysis of the execution cost ... Thus risk assessment under this model, particularly the tail risk, is likely to be...

  18. OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental...

    Broader source: Energy.gov (indexed) [DOE]

    OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance More Documents & Publications Microsoft PowerPoint - 08 Lawrence 2010 DOE PM...

  19. Executive Order 13148-Greening the Government Through Leadership...

    Energy Savers [EERE]

    148-Greening the Government Through Leadership in Environmental Management Executive Order 13148-Greening the Government Through Leadership in Environmental Management The head of...

  20. Implementation of Executive Order 13514, Federal Leadership in...

    Broader source: Energy.gov (indexed) [DOE]

    goal.pdf More Documents & Publications OVERVIEW OF EXECUTIVE ORDER 13XXX Federal Leadership in Environmental, Energy and Economic Performance FY 2012 Highlighted Sustainable...

  1. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    SciTech Connect (OSTI)

    Haase, S.

    2009-11-01T23:59:59.000Z

    This executive summary provides an overview of an NREL assessment to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region around Greensburg, Kansas.

  2. accelerator executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  3. astronomy executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 163 Executive...

  4. abstract executive summary: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    markets, and the potential enactment of legislation related to energy and the environment. The projections in AEO2010 focus on the factors that unknown authors 165 Executive...

  5. assessment program executive: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5, 2014 12;Corporate Affiliates Chairman: Mark Ambrose San Diego Site Executive, Raytheon 12;Corporate Affiliates Program Welcome New CAP Members 12;Corporate Affiliates...

  6. Written Testimony of Wes Kelley Executive Director Columbia Power...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Testimony of Wes Kelley Executive Director Columbia Power & Water Systems Columbia, Tennessee Before the Department of Energy, Quadrennial Energy Review Public Meeting 10:...

  7. No Code: Null Programs

    E-Print Network [OSTI]

    Montfort, Nick

    2014-06-05T23:59:59.000Z

    To continue the productive discussion of uninscribed artworks in Craig Dworkins No Medium, this report discusses, in detail, those computer programs that have no code, and are thus empty or null. Several specific examples ...

  8. Climate Code Foundation

    E-Print Network [OSTI]

    Barnes, Nick; Jones, David

    2011-07-05T23:59:59.000Z

    Climate Code Foundation - who are we? A non-profit organisation founded in August 2010; our goal is to promote the public understanding of climate science, by increasing the visibility and clarity of the software used in climate science...

  9. Building Energy Code

    Broader source: Energy.gov [DOE]

    Authority for adopting the state energy codes was previously vested in the Energy Security Office of the Department of Commerce (originally the Department of Public Services). In 1999-2000, the...

  10. Quantum error control codes

    E-Print Network [OSTI]

    Abdelhamid Awad Aly Ahmed, Sala

    2008-10-10T23:59:59.000Z

    QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY May 2008 Major... Subject: Computer Science QUANTUM ERROR CONTROL CODES A Dissertation by SALAH ABDELHAMID AWAD ALY AHMED Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  11. Nested Quantum Error Correction Codes

    E-Print Network [OSTI]

    Zhuo Wang; Kai Sun; Hen Fan; Vlatko Vedral

    2009-09-28T23:59:59.000Z

    The theory of quantum error correction was established more than a decade ago as the primary tool for fighting decoherence in quantum information processing. Although great progress has already been made in this field, limited methods are available in constructing new quantum error correction codes from old codes. Here we exhibit a simple and general method to construct new quantum error correction codes by nesting certain quantum codes together. The problem of finding long quantum error correction codes is reduced to that of searching several short length quantum codes with certain properties. Our method works for all length and all distance codes, and is quite efficient to construct optimal or near optimal codes. Two main known methods in constructing new codes from old codes in quantum error-correction theory, the concatenating and pasting, can be understood in the framework of nested quantum error correction codes.

  12. Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary

    E-Print Network [OSTI]

    Sason, Igal

    Accumulate-Repeat-Accumulate Codes: Systematic Codes Achieving the Binary Erasure Channel Capacity@ee.technion.ac.il Abstract The paper introduces ensembles of accumulate-repeat-accumulate (ARA) codes which asymp- totically by the first capacity-achieving ensembles of ir- regular repeat-accumulate (IRA) codes with bounded complexity

  13. Code: A Lightweight and Flexible Mobile Code Toolkit

    E-Print Network [OSTI]

    Picco, Gian Pietro

    evaluation of mobile code technology does not exist yet, some studies already evidenced that the powerful of clientserver and mobile code in reducing the network traffic generated by management. The theoreticalCode: A Lightweight and Flexible Mobile Code Toolkit Gian Pietro Picco Dip. Automatica e

  14. A Fault-Oblivious Extreme-Scale Execution Environment (FOX)

    SciTech Connect (OSTI)

    Van Hensbergen, Eric; Speight, William; Xenidis, Jimi

    2013-03-15T23:59:59.000Z

    IBM Researchs contribution to the Fault Oblivious Extreme-scale Execution Environment (FOX) revolved around three core research deliverables: ? collaboration with Boston University around the Kittyhawk cloud infrastructure which both enabled a development and deployment platform for the project team and provided a fault-injection testbed to evaluate prototypes ? operating systems research focused on exploring role-based operating system technologies through collaboration with Sandia National Labs on the NIX research operating system and collaboration with the broader IBM Research community around a hybrid operating system model which became known as FusedOS ? IBM Research also participated in an advisory capacity with the Boston University SESA project, the core of which was derived from the K42 operating system research project funded in part by DARPAs HPCS program. Both of these contributions were built on a foundation of previous operating systems research funding by the Department of Energys FastOS Program. Through the course of the X-stack funding we were able to develop prototypes, deploy them on production clusters at scale, and make them available to other researchers. As newer hardware, in the form of BlueGene/Q, came online, we were able to port the prototypes to the new hardware and release the source code for the resulting prototypes as open source to the community. In addition to the open source coded for the Kittyhawk and NIX prototypes, we were able to bring the BlueGene/Q Linux patches up to a more recent kernel and contribute them for inclusion by the broader Linux community. The lasting impact of the IBM Research work on FOX can be seen in its effect on the shift of IBMs approach to HPC operating systems from Linux and Compute Node Kernels to role-based approaches as prototyped by the NIX and FusedOS work. This impact can be seen beyond IBM in follow-on ideas being incorporated into the proposals for the Exasacale Operating Systems/Runtime program.

  15. NARSTO Quality Planning and Data Management Handbooks Executive Summary

    E-Print Network [OSTI]

    'existingqualityassuranceprograms. The first of the three documents, the NARSTO Quality Systems Management Plan (QSMP), is the umbrella underNARSTO Quality Planning and Data Management Handbooks Executive Summary This brief Executive, and guidance documents for quality planning and data management. NARSTO is a non-binding, tri-national public

  16. SPACE UTILIZATION STUDY -EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES

    E-Print Network [OSTI]

    Delene, David J.

    SPACE UTILIZATION STUDY - EXECUTIVE SUMMARY SCHOOL OF MEDICINE & HEALTH SCIENCES UNIVERSITY School of Medicine & Health Sciences - Space Utilization Study Grand Forks, ND EXECUTIVE SUMMARY SUITAb of Medicine and Health Sciences. It currently contains nearly 380,000 GSF (Gross Square Feet) with multiple

  17. 11/24/13 Committee Reports Executive Report

    E-Print Network [OSTI]

    Royer, Dana

    Trexler `14 Executive Committee 1. General Assembly Feedback 2. PostThanksgiving Executive Committee, indeed, create that kind of statement. Presumably, WesDivest will be directing their energies towards to President Roth for residential campus innovations. Many of the proposals discussed on Thursday concerned

  18. Executability of Scenarios in Petri Nets Robert Lorenz

    E-Print Network [OSTI]

    Desel, Jörg

    Executability of Scenarios in Petri Nets Robert Lorenz Lehrstuhl f¨ur Angewandte Informatik whether a scenario is an execution of a Petri net. This holds for a wide variety of Petri net classes, ranging from elementary nets to general inhibitor nets. Scenarios are given by causal structures

  19. Executive Budget Support Team Office of the President

    E-Print Network [OSTI]

    Jacobs, Laurence J.

    Executive Budget Support Team Office of the President Provost / Executive Vice President Institute Budget Planning & Admin. Jim Kirk Asst Budget Director Vacant Sr. Budget Analyst Ebony Thompson Budget Development & Capital Budgets Director Lisa Godfrey Systems Support Engr II Vacant Sr. Budget

  20. Towards a New Execution Model for HPC Clouds Thomas Sterling

    E-Print Network [OSTI]

    Lumsdaine, Andrew

    Towards a New Execution Model for HPC Clouds Thomas Sterling Center for Research in Extreme Scale an alternative paradigm for bringing Clouds more closely aligned to Science, Technology, Engineering Execution Model for HPC Clouds Thomas Sterling 1. Introduction Even as HPC is transiting the pan

  1. Robert D. Kimble Deputy Program Executive Officer for Strike

    E-Print Network [OSTI]

    and Deputy Program Manager for Production and Quality. From January 2000 to February 2001, Mr. Kimble of Maryland. He graduated from the Defense Systems Management College and the Senior Executive ManagementRobert D. Kimble Deputy Program Executive Officer for Strike Weapons, PEO(U&W) Naval Air Systems

  2. Coccinelle 1D: A one-dimensional neutron kinetic code using time-step size control

    SciTech Connect (OSTI)

    Engrand, P.R.; Effantin, M.E.; Gherchanoc, J. [Electricite de France, Clamart (France); Larive, B. [Electricite de France, Villeurbanne (France)

    1995-12-31T23:59:59.000Z

    COCCINELLE 1D is a one-dimensional neutron kinetic code that has been adapted from Electricite de France (EDF)`s core design code : COCCINELLE. The aim of this work is to integrate a code, derived from COCCINELLE and therefore taking advantage of most of its developments, into EDF`s Pressurized Water Reactors (PWR) simulation tools. The neutronic model of COCCINELLE ID has been optimized so that the code executes as rapidly as possible. In particular, a fast and stable kinetic method has been implemented: the Generalized Runge-Kutta (GRK) method together with its associated time-step size control. Moreover, efforts have been made to structure the code such that it could be easily integrated into any PWR simulation tool. Results show that the code executes at a rate faster than real-time on several test cases, and that, once integrated in a PWR simulation tool, the system is in good agreement with an experimental transient, that is a 3-hour load follow transient.

  3. MHD Generation Code

    E-Print Network [OSTI]

    Frutos-Alfaro, Francisco

    2015-01-01T23:59:59.000Z

    A program to generate codes in Fortran and C of the full Magnetohydrodynamic equations is shown. The program used the free computer algebra system software REDUCE. This software has a package called EXCALC, which is an exterior calculus program. The advantage of this program is that it can be modified to include another complex metric or spacetime. The output of this program is modified by means of a LINUX script which creates a new REDUCE program to manipulate the MHD equations to obtain a code that can be used as a seed for a MHD code for numerical applications. As an example, we present part of output of our programs for Cartesian coordinates and how to do the discretization.

  4. Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes

    E-Print Network [OSTI]

    Park, Namkyoo

    Cyclic simplex coded OTDR SNR enhancement of coded optical time domain reflectometry using cyclic simplex codes *, , , e-mail : nkpark@plaza.snu.ac.kr Abstract: We propose and experimentally demonstrate the performance improvement of a coded optical time domain reflectometry using cyclic simplex

  5. Extended quantum color coding

    SciTech Connect (OSTI)

    Hayashi, A.; Hashimoto, T.; Horibe, M. [Department of Applied Physics, Fukui University, Fukui 910-8507 (Japan)

    2005-01-01T23:59:59.000Z

    The quantum color coding scheme proposed by Korff and Kempe [e-print quant-ph/0405086] is easily extended so that the color coding quantum system is allowed to be entangled with an extra auxiliary quantum system. It is shown that in the extended scheme we need only {approx}2{radical}(N) quantum colors to order N objects in large N limit, whereas {approx}N/e quantum colors are required in the original nonextended version. The maximum success probability has asymptotics expressed by the Tracy-Widom distribution of the largest eigenvalue of a random Gaussian unitary ensemble (GUE) matrix.

  6. CONCEPT computer code

    SciTech Connect (OSTI)

    Delene, J.

    1984-01-01T23:59:59.000Z

    CONCEPT is a computer code that will provide conceptual capital investment cost estimates for nuclear and coal-fired power plants. The code can develop an estimate for construction at any point in time. Any unit size within the range of about 400 to 1300 MW electric may be selected. Any of 23 reference site locations across the United States and Canada may be selected. PWR, BWR, and coal-fired plants burning high-sulfur and low-sulfur coal can be estimated. Multiple-unit plants can be estimated. Costs due to escalation/inflation and interest during construction are calculated.

  7. Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty

    E-Print Network [OSTI]

    McGregor, Andrew

    Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about: April 29, 2014 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory. #12;Coding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy

  8. 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview...

    Energy Savers [EERE]

    1: Executive Summary and Overview Summary Slides 20% Wind Energy by 2030 - Chapter 1: Executive Summary and Overview Summary Slides Summary and overview slides for 20% Wind Energy...

  9. Course Code: Course Title

    E-Print Network [OSTI]

    Painter, Kevin

    - Frameworks; Decision Making Development life-cycle of a software system Bi-directional influence between-Critical Systems; Technology & Society. Brave New Worlds - Co-operative Computing; eLife. Learning OutcomesCourse Code: F29PD Course Title: Professional Development Course Co-ordinator: Sandy Jean

  10. The Woodland Carbon Code

    E-Print Network [OSTI]

    The Woodland Carbon Code While society must continue to make every effort to reduce greenhouse gas a role by removing carbon dioxide from the atmosphere. The potential of woodlands to soak up carbon to help compensate for their carbon emissions. But before investing in such projects, people want to know

  11. Chaotic Turbo Codes

    E-Print Network [OSTI]

    S. Adrian Barbulescu; Andrew Guidi; Steven S. Pietrobon

    This paper describes a new class of codes, chaotic turbo codes. They were born from a symbiosis between a chaotical digital encoder and a turbo code. This paper investigates the most important properties of both chaotic digital encoders and turbo encoders in order to understand how the two complement each other. A Chaotic Turbo Encoder is then described and initial results will be presented. I. INTRODUCTION A chaotic digital encoder was defined for the first time in [1] as a non--linear digital filter with finite precision (8 bits) which behaves in a quasi--chaotic fashion, both with zero and nonzero input sequences. A simple chaotic encoder is shown in Figure 1 [1]. D Y k X k LCIRC D Figure 1: Chaotic Digital Encoder Mapper L L L L L L 1 The main features of chaotic digital encoders that are used in this paper are: # The system is digital which makes possible its integration with a turbo code. # The output of a chaotic digital encoder with arbitrary inputs has a broad...

  12. Erasure Techniques in MRD codes

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; R. Sujatha; R. S. Raja Durai

    2012-05-03T23:59:59.000Z

    This book is organized into six chapters. The first chapter introduces the basic algebraic structures essential to make this book a self contained one. Algebraic linear codes and their basic properties are discussed in chapter two. In chapter three the authors study the basic properties of erasure decoding in maximum rank distance codes. Some decoding techniques about MRD codes are described and discussed in chapter four of this book. Rank distance codes with complementary duals and MRD codes with complementary duals are introduced and their applications are discussed. Chapter five introduces the notion of integer rank distance codes. The final chapter introduces some concatenation techniques.

  13. Optimized Generation of Data-Path from C Codes for FPGAs

    E-Print Network [OSTI]

    Guo, Zhi; Najjar, Walid; Vissers, Kees

    2011-01-01T23:59:59.000Z

    FPGAs, as computing devices, offer significant speedup over microprocessors. Furthermore, their configurability offers an advantage over traditional ASICs. However, they do not yet enjoy high-level language programmability, as microprocessors do. This has become the main obstacle for their wider acceptance by application designers. ROCCC is a compiler designed to generate circuits from C source code to execute on FPGAs, more specifically on CSoCs. It generates RTL level HDLs from frequently executing kernels in an application. In this paper, we describe ROCCC's system overview and focus on its data path generation. We compare the performance of ROCCC-generated VHDL code with that of Xilinx IPs. The synthesis result shows that ROCCC-generated circuit takes around 2x ~ 3x area and runs at comparable clock rate.

  14. REDUCED-COMPLEXITY DECODING FOR CONCATENATED CODES BASED ON RECTANGULAR PARITY-CHECK CODES AND TURBO CODES

    E-Print Network [OSTI]

    Wong, Tan F.

    AND TURBO CODES John M. Shea and Tan F. Wong University of Florida Department of Electrical and Computer-check code (RPCC) with a turbo code. These concatenated codes are referred to as RPCC+turbo codes. RPCC+turbo codes have been shown to significantly outperform turbo codes in several scenarios [1],[2]. One

  15. NREL: Energy Executive Leadership Academy Home Page

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency Visit | NationalWebmaster ToStaff Webmaster

  16. John Hairston rounds out BPA's executive office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |Is Your Home as Ready for(SC) Jetting

  17. Coded modulation with Low Density Parity Check codes

    E-Print Network [OSTI]

    Narayanaswami, Ravi

    2001-01-01T23:59:59.000Z

    This thesis proposes the design of Low Density Parity Check (LDPC) codes for cases where coded modulation is used. We design these codes by extending the idea of Density Evolution (DE) that has been introduced as a powerful tool to analyze LDPC...

  18. Generating Code for High-Level Operations through Code Composition

    E-Print Network [OSTI]

    Generating Code for High-Level Operations through Code Composition James M. Stichnoth August 1997 of the authors and should not be interpreted as necessarily representing the official policies or endorsements: Compilers, code generation, parallelism, communication generation #12;Abstract A traditional compiler

  19. Multiclass learning with simplex coding

    E-Print Network [OSTI]

    Mroueh, Youssef

    In this paper we discuss a novel framework for multiclass learning, defined by a suitable coding/decoding strategy, namely the simplex coding, that allows us to generalize to multiple classes a relaxation approach commonly ...

  20. Distributed control of coded networks

    E-Print Network [OSTI]

    Zhao, Fang, Ph. D. Massachusetts Institute of Technology

    2010-01-01T23:59:59.000Z

    The introduction of network coding has the potential to revolutionize the way people operate networks. For the benefits of network coding to be realized, distributed solutions are needed for various network problems. In ...

  1. Nevada Energy Code for Buildings

    Broader source: Energy.gov [DOE]

    ''Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  2. Confocal coded aperture imaging

    DOE Patents [OSTI]

    Tobin, Jr., Kenneth William (Harriman, TN); Thomas, Jr., Clarence E. (Knoxville, TN)

    2001-01-01T23:59:59.000Z

    A method for imaging a target volume comprises the steps of: radiating a small bandwidth of energy toward the target volume; focusing the small bandwidth of energy into a beam; moving the target volume through a plurality of positions within the focused beam; collecting a beam of energy scattered from the target volume with a non-diffractive confocal coded aperture; generating a shadow image of said aperture from every point source of radiation in the target volume; and, reconstructing the shadow image into a 3-dimensional image of the every point source by mathematically correlating the shadow image with a digital or analog version of the coded aperture. The method can comprise the step of collecting the beam of energy scattered from the target volume with a Fresnel zone plate.

  3. Understanding the Team Dynamics of an Executive Virtual Team

    E-Print Network [OSTI]

    Riley, Ramona Leonard

    2011-10-21T23:59:59.000Z

    employ virtuality in their work regimen. Therefore, organizations employ virtual executives to work teams with ideal skill sets to effectively persevere and complete tasks through distance, space, and time. The purpose of this study was to identify...

  4. Assessment of Biomass Pelletization Options for Greensburg, Kansas: Executive Summary

    Office of Energy Efficiency and Renewable Energy (EERE)

    This executive summary provides an overview of a technical report on an assessment NREL conducted in Greensburg, Kansas, to identify potential opportunities to develop a biomass pelletization or briquetting plant in the region.

  5. Robust, goal-directed plan execution with bounded risk

    E-Print Network [OSTI]

    Ono, Masahiro, Ph. D. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    There is an increasing need for robust optimal plan execution for multi-agent systems in uncertain environments, while guaranteeing an acceptable probability of success. For example, a fleet of unmanned aerial vehicles ...

  6. Robust execution of bipedal walking tasks from biomechanical principles

    E-Print Network [OSTI]

    Hofmann, Andreas G. (Andreas Gunther)

    2006-01-01T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  7. Robust Execution of Bipedal Walking Tasks From Biomechanical Principles

    E-Print Network [OSTI]

    Hofmann, Andreas

    2006-04-28T23:59:59.000Z

    Effective use of robots in unstructured environments requires that they have sufficient autonomy and agility to execute task-level commands successfully. A challenging example of such a robot is a bipedal walking machine. ...

  8. Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies

    E-Print Network [OSTI]

    Cremers, Daniel

    Learning Structured Reactive Navigation Plans from Executing MDP Navigation Policies Michael Beetz, beetz,belker@cs.uni-bonn.de Abstract. Autonomous robots, such as robot office couriers, need navigation

  9. Paducah CAB Executive Board - May | Department of Energy

    Energy Savers [EERE]

    - May Paducah CAB Executive Board - May May 11, 2015 3:30PM to 5:30PM CDT Paducah CAB Office, 111 Memorial Drive, Paducah, KY 42001 Contact Buz Smith, DOE Site Office 270-441-6821...

  10. Summary of Differences in Approach to Executing the NGNP Project

    SciTech Connect (OSTI)

    P.C. Hildebrandt

    2010-08-01T23:59:59.000Z

    The following discuss the summary differences between the NGNP Industry Alliances approach to execution of the NGNP Project as described in its Project Execution Strategy, and that included in the DOEs Report to Congress on the Next Generation Nuclear Plant dated April 2010. These summary differences are not a comprehensive description of the results of a detailed gap analysis, but rather are those differences that warrant discussion in meetings between DOE executives and the private sector represented by the Alliance. In practical fact, the full range and content of the differences will not be understood until such time as detailed discussions are engaged between the DOE and the Alliance to develop a mutually agreed-to project execution plan.

  11. PROGRAM INFORMATION This executive master's program with a

    E-Print Network [OSTI]

    Suzuki, Masatsugu

    , they have helped healthcare facilities improve total-quality management, scheduling and sequencingPROGRAM INFORMATION This executive master's program with a health systems concentration: takes and construction firms Management consulting firms Health insurance companies Research and planning

  12. MELCOR computer code manuals

    SciTech Connect (OSTI)

    Summers, R.M.; Cole, R.K. Jr.; Smith, R.C.; Stuart, D.S.; Thompson, S.L. [Sandia National Labs., Albuquerque, NM (United States); Hodge, S.A.; Hyman, C.R.; Sanders, R.L. [Oak Ridge National Lab., TN (United States)

    1995-03-01T23:59:59.000Z

    MELCOR is a fully integrated, engineering-level computer code that models the progression of severe accidents in light water reactor nuclear power plants. MELCOR is being developed at Sandia National Laboratories for the U.S. Nuclear Regulatory Commission as a second-generation plant risk assessment tool and the successor to the Source Term Code Package. A broad spectrum of severe accident phenomena in both boiling and pressurized water reactors is treated in MELCOR in a unified framework. These include: thermal-hydraulic response in the reactor coolant system, reactor cavity, containment, and confinement buildings; core heatup, degradation, and relocation; core-concrete attack; hydrogen production, transport, and combustion; fission product release and transport; and the impact of engineered safety features on thermal-hydraulic and radionuclide behavior. Current uses of MELCOR include estimation of severe accident source terms and their sensitivities and uncertainties in a variety of applications. This publication of the MELCOR computer code manuals corresponds to MELCOR 1.8.3, released to users in August, 1994. Volume 1 contains a primer that describes MELCOR`s phenomenological scope, organization (by package), and documentation. The remainder of Volume 1 contains the MELCOR Users Guides, which provide the input instructions and guidelines for each package. Volume 2 contains the MELCOR Reference Manuals, which describe the phenomenological models that have been implemented in each package.

  13. Executive Summary A FAculty-Driven PlAn

    E-Print Network [OSTI]

    Watson, Craig A.

    Executive Summary A FAculty-Driven PlAn SePtember 2009 reSeArch uF/iFAS roADmAP #12;UF/IFAS ReSeARch RoAdmAp Executive Summary 2 It is easier to plan when resources are plentiful, but it is far more. With these realities in mind, we began the process of developing a Research Roadmap. It was purposely designed

  14. Travel Codes Traveler Is Employee

    E-Print Network [OSTI]

    Arnold, Jonathan

    Travel Codes Traveler Is Employee: 64100-Domestic Travel 64150-Mileage 64200-International Travel Supplies & Expense Codes 71410-Office Supplies 71430-Lab/Research Supplies (dollar value of each item less Charges Equipment Codes 84320-Equipment (non-computer & peripherals) with a cost of $5,000.00 or more per

  15. Rotationally invariant multilevel block codes

    E-Print Network [OSTI]

    Kulandaivelu, Anita

    1993-01-01T23:59:59.000Z

    The objective of this thesis is to evaluate the performance of block codes that are designed to be rotationally invariant, in a multilevel coding scheme, over a channel modelled to be white gaussian noise. Also, the use of non-binary codes...

  16. Design of proximity detecting codes

    E-Print Network [OSTI]

    Perisetty, Srinivas

    1997-01-01T23:59:59.000Z

    delay insensitive, codes like unordered codes have been proposed. Although these codes are delay insensitive, the receiver still has to wait for all the 1s in the transmitted data to be received before sending an acknowledge signal to the sender. A new...

  17. Code for Hydrogen Hydrogen Pipeline

    E-Print Network [OSTI]

    #12;2 Code for Hydrogen Pipelines Hydrogen Pipeline Working Group Workshop Augusta, Georgia August development · Charge from BPTCS to B31 Standards Committee for Hydrogen Piping/Pipeline code development · B31.12 Status & Structure · Hydrogen Pipeline issues · Research Needs · Where Do We Go From Here? #12;4 Code

  18. Energy Codes and Standards: Facilities

    SciTech Connect (OSTI)

    Bartlett, Rosemarie; Halverson, Mark A.; Shankle, Diana L.

    2007-01-01T23:59:59.000Z

    Energy codes and standards play a vital role in the marketplace by setting minimum requirements for energy-efficient design and construction. They outline uniform requirements for new buildings as well as additions and renovations. This article covers basic knowledge of codes and standards; development processes of each; adoption, implementation, and enforcement of energy codes and standards; and voluntary energy efficiency programs.

  19. PERFORMANCE EVALUATION OF TURBO CODES

    E-Print Network [OSTI]

    Alajaji, Fady

    PERFORMANCE EVALUATION OF TURBO CODES by Guangchong Zhu A project submitted to the Department named ``Turbo codes'' which claims an extraordinary performance with reasonable decoding complexity. In this project, we begin with a study on the structure and principle of Turbo codes. We then investigate

  20. Southeast Energy Efficiency Alliance's Building Energy Codes...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southeast Energy Efficiency Alliance's Building Energy Codes Project Southeast Energy Efficiency Alliance's Building Energy Codes Project Building Codes Project for the 2013...

  1. 2013 Reporting Unit Codes | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    2013 Reporting Unit Codes 2013 Reporting Unit Codes CFC Reporting Unit Codes 2013.pdf More Documents & Publications EA-0372: Final Environmental Assessment Alignment: Achieving...

  2. Error Floors of LDPC Codes and Related Topics

    E-Print Network [OSTI]

    Butler, Brian K.

    Code . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2.2 LDPC Codes . . . . . . . .2.1 Binary Linear Block Codes . . . . . . .

  3. CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment

    E-Print Network [OSTI]

    CMU-ITC-83-029 WHITE PAPER: The ICE Execution Environment Document Number 003-001/002.01 DRAFT-Mellon University Schenley Park Pittsburgh, PA 15213 #12;The ICE Execution Environment DRAFT 003- 001/002.01 U ncla ssified ( 2 The ICE Execution Environment #12;The ICE Execution Environment DRAFT 003

  4. A Study of Execution Environments for Software Kung-Kiu Lau and Vladyslav Ukis

    E-Print Network [OSTI]

    Lau, Kung-Kiu

    A Study of Execution Environments for Software Components Kung-Kiu Lau and Vladyslav Ukis School-kiu,vukis}@cs.man.ac.uk Abstract. Software components are deployed into an execution environment be- fore runtime. The execution environment influences the runtime execution of a component. Therefore, it is important to study existing

  5. Forest Research Executive Board Meeting 16 April 2008 by video conference

    E-Print Network [OSTI]

    Forest Research Executive Board Meeting ­ 16 April 2008 by video conference Present: NRS Alice Holt

  6. Statewide Electrical Energy Cost Savings and Peak Demand Reduction from the IECC Code-Compliant, Single-Family Residences in Texas (2002-2009)

    E-Print Network [OSTI]

    Kim, H; Baltazar, J.C.; Haberl, J.

    ESL-TR-11-02-01 STATEWIDE ELECTRICITY AND DEMAND CAPACITY SAVINGS FROM THE INTERNATIONAL ENERGY CONSERVATION CODE (IECC) ADOPTION FOR SINGLE-FAMILY RESIDENCES IN TEXAS (2002-2009) Hyojin Kim Juan-Carlos Baltazar...&M University EXECUTIVE SUMMARY Statewide electricity and electric demand savings achieved from the adoption of the different International Energy Conservation Code (IECC) versions for single-family residences in Texas and the corresponding construction...

  7. T ID CODE I

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved:AdministrationAnalysisDarby Dietrich5 | NUMBER 1 | MARCHT ID CODE I

  8. Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about Uncertainty

    E-Print Network [OSTI]

    McGregor, Andrew

    Coding for Transmission Coding for Compression Bonus Section CMPSCI 240: Reasoning about 1, 2013 #12;Coding for Transmission Coding for Compression Bonus Section Information Theory Encoding for Transmission Coding for Compression Bonus Section Encoding Messages with Redundancy: Error Correcting Suppose

  9. Quantum serial turbo-codes

    E-Print Network [OSTI]

    David Poulin; Jean-Pierre Tillich; Harold Ollivier

    2009-06-10T23:59:59.000Z

    We present a theory of quantum serial turbo-codes, describe their iterative decoding algorithm, and study their performances numerically on a depolarization channel. Our construction offers several advantages over quantum LDPC codes. First, the Tanner graph used for decoding is free of 4-cycles that deteriorate the performances of iterative decoding. Secondly, the iterative decoder makes explicit use of the code's degeneracy. Finally, there is complete freedom in the code design in terms of length, rate, memory size, and interleaver choice. We define a quantum analogue of a state diagram that provides an efficient way to verify the properties of a quantum convolutional code, and in particular its recursiveness and the presence of catastrophic error propagation. We prove that all recursive quantum convolutional encoder have catastrophic error propagation. In our constructions, the convolutional codes have thus been chosen to be non-catastrophic and non-recursive. While the resulting families of turbo-codes have bounded minimum distance, from a pragmatic point of view the effective minimum distances of the codes that we have simulated are large enough not to degrade the iterative decoding performance up to reasonable word error rates and block sizes. With well chosen constituent convolutional codes, we observe an important reduction of the word error rate as the code length increases.

  10. Conjugate Codes and Applications to Cryptography

    E-Print Network [OSTI]

    Mitsuru Hamada

    2006-10-23T23:59:59.000Z

    A conjugate code pair is defined as a pair of linear codes such that one contains the dual of the other. The conjugate code pair represents the essential structure of the corresponding Calderbank-Shor-Steane (CSS) quantum code. It is argued that conjugate code pairs are applicable to quantum cryptography in order to motivate studies on conjugate code pairs.

  11. Turbo and LDPC Codes: Implementation, Simulation,

    E-Print Network [OSTI]

    Valenti, Matthew C.

    1 Turbo and LDPC Codes: Implementation, Simulation, and Standardization June 7, 2006 Matthew/7/2006 Turbo and LDPC Codes 2/133 Tutorial Overview Channel capacity Convolutional codes ­ the MAP algorithm Turbo codes ­ Standard binary turbo codes: UMTS and cdma2000 ­ Duobinary CRSC turbo codes: DVB

  12. Using true concurrency to model execution of parallel programs

    SciTech Connect (OSTI)

    Ben-Asher, Y.; Farchi, E.

    1994-08-01T23:59:59.000Z

    Parallel execution of a program R (intuitively regarded as a partial order) is usually modeled by sequentially executing one of the total orders (interleavings) into which it can be embedded. Our work deviates from this serialization principle by using true concurrency to model parallel execution. True concurrency is represented via completions of R to semi total orders, called time diagrams. These orders are characterized via a set of conditions (denoted by Ct), yielding orders of time diagrams which preserve some degree of the intended parallelism in R. Another way to express semi total orders is to use re-writing or derivation rules (denoted by Cx) which for any program R generates a set of semi-total orders. This paper includes a classification of parallel execution into three classes according to three different types of Ct conditions. For each class a suitable Cx is found and a proof of equivalence between the set of all time diagrams satisfying Ct and the set of all terminal Cx derivations of R is devised. This equivalence between time diagram conditions and derivation rules is used to define a novel notion of correctness for parallel programs. This notion is demonstrated by showing that a specific asynchronous program enforces synchronous execution, which always halts, showing that true concurrency can be useful in the context of parallel program verification.

  13. EXTENSION OF THE EMPIRE CODE TO THE RESONANCE REGION.

    SciTech Connect (OSTI)

    CHO,Y.S.; HERMAN, M.; MUGHABGHAB, S.F.; OBLOZINSKY, P.; ROCHMAN, D.; LEE, Y.O.

    2007-04-22T23:59:59.000Z

    The preliminary version of a new module has been developed to be added to a nuclear reaction model code EMPIRE to allow for an evaluation of neutron cross sections in a resonance region. It automates most of the evaluation procedures and can be executed within EMPIRE or as a stand-alone program. The module includes a graphic user interface (GUI) and a number of codes and scripts that read individual, as well as average, resonance parameters from the Atlas of Neutron Resonances and other physical constants from RIPL-2, perform an analysis of the available resonances, carry out statistical distributions, and compute cross sections in resolved and unresolved resonance regions which are then compared with experimental data. The module also provides an ENDF-formatted file for a resonance region and various plots allowing for a verification of the procedure. The formatted file can be integrated later into the final ENDF-6 file as generated by the EMPIRE code. However, as a preliminary version, extensive testing and further improvements are needed before this new capability can be incorporated into the production version of EMPIRE.

  14. SHEAN (Simplified Human Error Analysis code) and automated THERP

    SciTech Connect (OSTI)

    Wilson, J.R.

    1993-06-01T23:59:59.000Z

    One of the most widely used human error analysis tools is THERP (Technique for Human Error Rate Prediction). Unfortunately, this tool has disadvantages. The Nuclear Regulatory Commission, realizing these drawbacks, commissioned Dr. Swain, the author of THERP, to create a simpler, more consistent tool for deriving human error rates. That effort produced the Accident Sequence Evaluation Program Human Reliability Analysis Procedure (ASEP), which is more conservative than THERP, but a valuable screening tool. ASEP involves answering simple questions about the scenario in question, and then looking up the appropriate human error rate in the indicated table (THERP also uses look-up tables, but four times as many). The advantages of ASEP are that human factors expertise is not required, and the training to use the method is minimal. Although not originally envisioned by Dr. Swain, the ASEP approach actually begs to be computerized. That WINCO did, calling the code SHEAN, for Simplified Human Error ANalysis. The code was done in TURBO Basic for IBM or IBM-compatible MS-DOS, for fast execution. WINCO is now in the process of comparing this code against THERP for various scenarios. This report provides a discussion of SHEAN.

  15. Recent developments in DYNSUB: New models, code optimization and parallelization

    SciTech Connect (OSTI)

    Daeubler, M.; Trost, N.; Jimenez, J.; Sanchez, V. [Karlsruhe Institute of Technology, Institute for Neutron Physics and Reactor Technology, Hermann-von-Helmholtz-Platz 1, 76344 Eggenstein-Leopoldshafen (Germany)

    2013-07-01T23:59:59.000Z

    DYNSUB is a high-fidelity coupled code system consisting of the reactor simulator DYN3D and the sub-channel code SUBCHANFLOW. It describes nuclear reactor core behavior with pin-by-pin resolution for both steady-state and transient scenarios. In the course of the coupled code system's active development, super-homogenization (SPH) and generalized equivalence theory (GET) discontinuity factors may be computed with and employed in DYNSUB to compensate pin level homogenization errors. Because of the largely increased numerical problem size for pin-by-pin simulations, DYNSUB has bene fitted from HPC techniques to improve its numerical performance. DYNSUB's coupling scheme has been structurally revised. Computational bottlenecks have been identified and parallelized for shared memory systems using OpenMP. Comparing the elapsed time for simulating a PWR core with one-eighth symmetry under hot zero power conditions applying the original and the optimized DYNSUB using 8 cores, overall speed up factors greater than 10 have been observed. The corresponding reduction in execution time enables a routine application of DYNSUB to study pin level safety parameters for engineering sized cases in a scientific environment. (authors)

  16. Clark County- Energy Conservation Code

    Broader source: Energy.gov [DOE]

    In September 2010, Clark County adopted Ordinance 3897, implementing the Southern Nevada version of the 2009 International Energy Conservation Code for both residential and commercial buildings...

  17. Nonbinary Codeword Stabilized Quantum Codes

    E-Print Network [OSTI]

    Xie Chen; Bei Zeng; Isaac L. Chuang

    2008-08-22T23:59:59.000Z

    The codeword stabilized (CWS) quantum codes formalism presents a unifying approach to both additive and nonadditive quantum error-correcting codes (arXiv:0708.1021 [quant-ph]), but only for binary states. Here we generalize the CWS framework to the nonbinary case (of both prime and nonprime dimension) and map the search for nonbinary quantum codes to a corresponding search problem for classical nonbinary codes with specific error patterns. We show that while the additivity properties of nonbinary CWS codes are similar to the binary case, the structural properties of the nonbinary codes differ substantially from the binary case, even for prime dimensions. In particular, we identify specific structure patterns of stabilizer groups, based on which efficient constructions might be possible for codes that encode more dimensions than any stabilizer codes of the same length and distance; similar methods cannot be applied in the binary case. Understanding of these structural properties can help prune the search space and facilitate the identification of good nonbinary CWS codes.

  18. Marin County- Solar Access Code

    Broader source: Energy.gov [DOE]

    Marin County's Energy Conservation Code is designed to assure new subdivisions provide for future passive or natural heating or cooling opportunities in the subdivision to the extent feasible. ...

  19. VOLTTRON: An Agent Execution Platform for the Electric Power System

    SciTech Connect (OSTI)

    Akyol, Bora A.; Haack, Jereme N.; Ciraci, Selim; Carpenter, Brandon J.; Vlachopoulou, Maria; Tews, Cody W.

    2012-06-05T23:59:59.000Z

    Volttron is an agent execution platform that is engineered for use in the electric power system. Volttron provides resource guarantees for agents and the platform including memory and processor utilization; authentication and authorization services; directory services for agent and resource location; and agent mobility. Unlike most other agent platforms, Volttron does not depend on a single agent authoring language. Instead, we chose to design and implement Volttron as a platform service and framework that is decoupled from the agent execution environment. A prototype implementation of Volttron has been written in Python (using Python v2.7.2) and we have executed agents written in Python and Java and as shell scripts. The intended use of Volttron is in the power distribution system for managing distributed generation, demand-response, and plug-in electric vehicles.

  20. Quantum Quasi-Cyclic LDPC Codes

    E-Print Network [OSTI]

    Manabu Hagiwara; Hideki Imai

    2010-08-28T23:59:59.000Z

    In this paper, a construction of a pair of "regular" quasi-cyclic LDPC codes as ingredient codes for a quantum error-correcting code is proposed. That is, we find quantum regular LDPC codes with various weight distributions. Furthermore our proposed codes have lots of variations for length, code rate. These codes are obtained by a descrete mathematical characterization for model matrices of quasi-cyclic LDPC codes. Our proposed codes achieve a bounded distance decoding (BDD) bound, or known as VG bound, and achieve a lower bound of the code length.

  1. Super Special Codes using Super Matrices

    E-Print Network [OSTI]

    W. B. Vasantha Kandasamy; Florentin Smarandache; K. Ilanthenral

    2010-06-30T23:59:59.000Z

    The new classes of super special codes are constructed in this book using the specially constructed super special vector spaces. These codes mainly use the super matrices. These codes can be realized as a special type of concatenated codes. This book has four chapters. In chapter one basic properties of codes and super matrices are given. A new type of super special vector space is constructed in chapter two of this book. Three new classes of super special codes namely, super special row code, super special column code and super special codes are introduced in chapter three. Applications of these codes are given in the final chapter.

  2. On the logical operators of quantum codes

    E-Print Network [OSTI]

    Mark M. Wilde

    2009-03-30T23:59:59.000Z

    I show how applying a symplectic Gram-Schmidt orthogonalization to the normalizer of a quantum code gives a different way of determining the code's logical operators. This approach may be more natural in the setting where we produce a quantum code from classical codes because the generator matrices of the classical codes form the normalizer of the resulting quantum code. This technique is particularly useful in determining the logical operators of an entanglement-assisted code produced from two classical binary codes or from one classical quaternary code. Finally, this approach gives additional formulas for computing the amount of entanglement that an entanglement-assisted code requires.

  3. Non-Residential Energy Code National and Regional Codes

    E-Print Network [OSTI]

    Non-Residential Energy Code Comparison National and Regional Codes David Baylon Mike Kennedy #12 2003 · ASHRAE 90.1 2001 & addenda · E-Benchmark Guidelines (NBI) #12;Approach · Comparison of the State;Approach (cont.) · Provisions compared ­ Lighting power ­ Lighting controls ­ Mechanical systems ­ Building

  4. Building and Facility Codes Code Building Location Bldg # Coordinates

    E-Print Network [OSTI]

    Russell, Lynn

    Building and Facility Codes Code Building Location Bldg # Coordinates APM Applied Physics & Mathematics Building Muir 249 F7 ASANT Asante Hall Eleanor Roosevelt 446 F5 BIO Biology Building Muir 259 F7 BIRCH Birch Aquarium SIO 2300 S-D7 BONN Bonner Hall Revelle 131 G8 BSB Biomedical Sciences Building

  5. Space time coded code division multiplexing on SC140 DSP

    E-Print Network [OSTI]

    Menon, Murali P

    2001-01-01T23:59:59.000Z

    The aim of this research is to design a high data rate wireless communication system for multi-path fading channels. Code-division multiplexing is proposed as a modulation scheme for a space-time coded multiple antenna system that would guarantee...

  6. Weight Distribution of a Class of Binary Linear Block Codes Formed from RCPC Codes

    E-Print Network [OSTI]

    Shen, Yushi Dr.; Cosman, Pamela C; Milstein, Laurence B

    2006-01-01T23:59:59.000Z

    formed from convolutional codes, IEEE Trans. Commun. , vol.terminated convolutional codes, IEEE Trans. Inform. Theory,decoding of linear block codes and related soft- decision

  7. Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space-Time Coding for Multi-Antenna

    E-Print Network [OSTI]

    Veeravalli, Venugopal

    Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary Space 2007 #12;Introduction Space Time Codes Space Time Coding with Feedback New Thoughts Summary MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures notes on Space Time Coding

  8. LFSC - Linac Feedback Simulation Code

    SciTech Connect (OSTI)

    Ivanov, Valentin; /Fermilab

    2008-05-01T23:59:59.000Z

    The computer program LFSC (Code>) is a numerical tool for simulation beam based feedback in high performance linacs. The code LFSC is based on the earlier version developed by a collective of authors at SLAC (L.Hendrickson, R. McEwen, T. Himel, H. Shoaee, S. Shah, P. Emma, P. Schultz) during 1990-2005. That code was successively used in simulation of SLC, TESLA, CLIC and NLC projects. It can simulate as pulse-to-pulse feedback on timescale corresponding to 5-100 Hz, as slower feedbacks, operating in the 0.1-1 Hz range in the Main Linac and Beam Delivery System. The code LFSC is running under Matlab for MS Windows operating system. It contains about 30,000 lines of source code in more than 260 subroutines. The code uses the LIAR ('Linear Accelerator Research code') for particle tracking under ground motion and technical noise perturbations. It uses the Guinea Pig code to simulate the luminosity performance. A set of input files includes the lattice description (XSIF format), and plane text files with numerical parameters, wake fields, ground motion data etc. The Matlab environment provides a flexible system for graphical output.

  9. Stabilizer Codes over Frobenius Rings

    E-Print Network [OSTI]

    Nadella, Sushma

    2012-07-16T23:59:59.000Z

    now, the methods for quantum error correction were mainly based on quantum codes that rely on the arithmetic in finite fields. In contrast, this thesis aims to develop a basic framework for quantum error correcting codes over a class of rings known...

  10. Entanglement boosts quantum turbo codes

    E-Print Network [OSTI]

    Wilde, Mark M

    2010-01-01T23:59:59.000Z

    One of the unexpected breakdowns in the existing theory of quantum serial turbo coding is that a quantum convolutional encoder cannot simultaneously be recursive and non-catastrophic. These properties are essential for a quantum turbo code to have an unbounded minimum distance and for its iterative decoding algorithm to converge, respectively. Here, we show that the entanglement-assisted paradigm gives a theoretical and practical "turbo boost" to these codes, in the sense that an entanglement-assisted quantum (EAQ) convolutional encoder can possess both of the aforementioned desirable properties, and simulation results indicate that entanglement-assisted turbo codes can operate reliably in a noise regime 5.5 dB beyond that of standard quantum turbo codes. Entanglement is the resource that enables a convolutional encoder to satisfy both properties because an encoder acting on only information qubits, classical bits, gauge qubits, and ancilla qubits cannot simultaneously satisfy them. We give several examples o...

  11. On Quantum and Classical BCH Codes

    E-Print Network [OSTI]

    Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

    2006-04-14T23:59:59.000Z

    Classical BCH codes that contain their (Euclidean or Hermitian) dual codes can be used to construct quantum stabilizer codes; this correspondence studies the properties of such codes. It is shown that a BCH code of length n can contain its dual code only if its designed distance d=O(sqrt(n)), and the converse is proved in the case of narrow-sense codes. Furthermore, the dimension of narrow-sense BCH codes with small design distance is completely determined, and - consequently - the bounds on their minimum distance are improved. These results make it possible to determine the parameters of quantum BCH codes in terms of their design parameters.

  12. Update: March 28, 2014 EXECUTIVE SUMMARY: PEACECARE-DOMINICAN REPUBLIC

    E-Print Network [OSTI]

    Alford, Simon

    Update: March 28, 2014 1 EXECUTIVE SUMMARY: PEACECARE-DOMINICAN REPUBLIC A partnership between Peace Corps-Dominican Republic, the community of Guaymate, the University of Illinois) and Northwestern University (NU), Peace Corps volunteers in the Dominican Republic, and the Guaymate community

  13. Oak Ridge National Laboratory Technology Logic Diagram. Executive Summary

    SciTech Connect (OSTI)

    Not Available

    1993-06-30T23:59:59.000Z

    This executive summary contains a description of the logic diagram format; some examples from the diagram (Vol. 2) and associated technology evaluation data sheets (Vol. 3); a complete (albeit condensed) listing of the RA, D&D, and WM problems at ORNL; and a complete listing of the technology rankings for all the areas covered by the diagram.

  14. iDeKalb Housing information Project executive summary

    E-Print Network [OSTI]

    Kostic, Milivoje M.

    iDeKalb Housing information Project executive summary In the spring of 2012, the City of DeKalb, launched a project to develop a comprehensive housing database and related analytical and reporting tools is a housing database with information describing the available housing stock (i.e., number, size, geographic

  15. GROUPED'ANALYSEETDETHORIECONOMIQUELYONSTTIENNE ReininginExcessiveRiskTakingbyExecutives

    E-Print Network [OSTI]

    Boyer, Edmond

    compensation; stock-options; incentives; accountability; risk taking JEL Classification: D03, G28, G32, J33, L #12;Reining in Excessive Risk Taking by Executives: Experimental Evidence Mathieu Lefebvre. The overwhelming part of such equity compensation is currently provided in the form of stock-options. Recent events

  16. Nancy Rader, Executive Director California Wind Energy Association

    E-Print Network [OSTI]

    Nancy Rader, Executive Director California Wind Energy Association Improving Methods for Estimating Fatality of Birds and Bats at Wind Energy Facilities California Wind Energy Association Public Webinar Wind Energy Development 2008 CEC Research "Roadmap" on Impact Assessment Methods 2008 CEC PIER RFP 2009

  17. LCLS Users Organization Executive Committee Meeting Minutes July 8, 2009

    E-Print Network [OSTI]

    Wechsler, Risa H.

    LCLS Users Organization Executive Committee Meeting Minutes July 8, 2009 1:00 PM Attendance: Linda, Cathy Knotts, Henia Kamil 1. The May 6, 2009 meeting minutes were approved. 2. LCLS received 62 be rolled in or out requires a major effort both from the user group and the LCLS. The LCLS Proposal Review

  18. Detailed Execution Planning for Large Oil and Gas Construction Projects

    E-Print Network [OSTI]

    Calgary, University of

    Detailed Execution Planning for Large Oil and Gas Construction Projects Presented by James Lozon, University of Calgary There is currently 55.8 billion dollars worth of large oil and gas construction projects scheduled or underway in the province of Alberta. Recently, large capital oil and gas projects

  19. Project Management and Analysis Project Conception and Execution

    E-Print Network [OSTI]

    Sohoni, Milind

    of asset value pay-as-you-earn, progressive Octroi, Sales Tax pay-as-you- consume, regressive 10-15 wards of asset value pay-as-you-earn, progressive Octroi, Sales Tax pay-as-you- consume, regressive 10-15 wardsTD 608 Project Management and Analysis Part I Project Conception and Execution Milind Sohoni

  20. Furlough or Reduction in Force in the Senior Executive Service

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-05-15T23:59:59.000Z

    To establish requirements and assign responsibilities for furlough and reduction in force (RIF) of the Senior Executive Service (SES) in the Department of Energy (DOE) and the National Nuclear Security Administration (NNSA). Cancels O DOE 3350.1 Chg 1 and DOE 3351.2 Chg 1.

  1. FWP executive summaries: Basic energy sciences materials sciences programs

    SciTech Connect (OSTI)

    Samara, G.A.

    1996-02-01T23:59:59.000Z

    This report provides an Executive Summary of the various elements of the Materials Sciences Program which is funded by the Division of Materials Sciences, Office of Basic Energy Sciences, U.S. Department of Energy at Sandia National Laboratories, New Mexico.

  2. Regulation and Execution of Meiosis in Drosophh Males

    E-Print Network [OSTI]

    9 Regulation and Execution of Meiosis in Drosophh Males lean Maines and Steven Wasserm. Identification of Male Meiotic Mutant\\ IT. Regulation of the Meiotic Cell Divisions A. Entry into Meiosis B. Regulation of the Cell Cycle Machinery C. Coordination of Meio\\i\\ with Diflerentiation D. Regulation

  3. Executive Vice Chancellor & Jeffrey A. Bluestone, PhD.

    E-Print Network [OSTI]

    Lim, Wendell

    Service Center Suzanne Murphy Dir. LARC Jame Wilkerson, DVM,JD Director CCF Linda Reilly, PhD. MultipleExecutive Vice Chancellor & Provost Jeffrey A. Bluestone, PhD. Assoc. VC Research Susanne Hildebrand- Zanki, PhD. AVC OTIIP VACANT ED-RRP (Cores) Julie Auger Dir. Admin & Fin. EVC&P Business & HR

  4. Reducing Electricity Demand Charge for Data Centers with Partial Execution

    E-Print Network [OSTI]

    Li, Baochun

    . INTRODUCTION Data centers are the powerhouse behind many Internet services today. A modern data centerReducing Electricity Demand Charge for Data Centers with Partial Execution Hong Xu Department@eecg.toronto.edu ABSTRACT Data centers consume a large amount of energy and incur substantial electricity cost

  5. Multiple ERK substrates execute single biological processes in Caenorhabditis elegans

    E-Print Network [OSTI]

    Multiple ERK substrates execute single biological processes in Caenorhabditis elegans germ, 2008) RAS-extracellular signal regulated kinase (ERK) signaling governs multiple aspects of cell fate. Understanding how perturbations to the ERK signaling pathway lead to developmental disorders and cancer hinges

  6. Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Execution Trace-Driven Automated Attack Signature Generation Susanta Nanda Symantec Research Labs In its most general form, an attack signature is a program that can correctly determine if an input network packet se- quence can successfully attack a protected network appli- cation. Filter rules used

  7. Office of Nuclear Energy, Science and Technology Executive Summary

    E-Print Network [OSTI]

    nuclear power plant in the U.S. by 2010 to support the President's goal of reducing greenhouse gasOffice of Nuclear Energy, Science and Technology Executive Summary Mission As we become more in this new century, the benefits of nuclear fission as a key energy source for both the near- and long

  8. The Specification and Execution of Heterogeneous Synchronous Reactive Systems

    E-Print Network [OSTI]

    The Specification and Execution of Heterogeneous Synchronous Reactive Systems by Stephen Anthony in Engineering---Electrical Engineering and Computer Sciences in the GRADUATE DIVISION of the UNIVERSITY of Heterogeneous Synchronous Reactive Systems Copyright ã 1997 by Stephen Anthony Edwards #12; Abstract

  9. IBM Human Ability and Accessibility Center Executive brief

    E-Print Network [OSTI]

    to making products and services accessible, to its commitment to research, IBM has been an industry leader graduated from New York's Pace University with a Master's degree in computer science. A skilled and highlyIBM Human Ability and Accessibility Center Executive brief Accessibility at IBM: An integrated

  10. EXECUTIVE SUMMARY A Review of Water Conservation Planning for the

    E-Print Network [OSTI]

    remains weak; half of the local water districts lack conservation programs all together. This revealsEXECUTIVE SUMMARY A Review of Water Conservation Planning for the Atlanta, Georgia Region (August, 2006) To better understand the Atlanta, Georgia region's potential to reduce water waste in order

  11. Speculative Execution Exception Recovery Write-back Suppression

    E-Print Network [OSTI]

    Mahlke, Scott A.

    Speculative Execution Exception Recovery using Write-back Suppression Roger A. Bringmann Scott A or extra register pressure. This paper introduces a new architecture scheme referred to as write-back that with a modest amount of hardware, write- back suppression supports accurate reporting and handling of exceptions

  12. Executive Summary 2012 -2013 Department of Housing & Residential Life

    E-Print Network [OSTI]

    Fernandez, Eduardo

    Executive Summary 2012 - 2013 Department of Housing & Residential Life The Department of Housing & Residential Life will strive to educate our students outside of the classroom to provide them & Residential Life has a capacity of 3,500 students on the Boca Raton Campus and 283 Jupiter campuses of Florida

  13. UITV 2005 Annual Report Executive Summary ITS VIDEO SERVICES

    E-Print Network [OSTI]

    UITV 2005 Annual Report Executive Summary ITS VIDEO SERVICES 1 Telecommunication and Network Services ITS Video Services 23 Lindquist Center 319-335-5898 UITV (University of Iowa Cable TelevisionBride, Video Services Program Manager INTRODUCTION 2005 could be called "The Year of the Student Producer

  14. UITV 2004 Annual Report Executive Summary ITS VIDEO SERVICES

    E-Print Network [OSTI]

    UITV 2004 Annual Report Executive Summary ITS VIDEO SERVICES 1 Telecommunication and Network Services ITS Video Services 23 Lindquist Center 319-335-5898 UITV (University of Iowa Cable TelevisionBride, Video Services Program Manager UITV, University of Iowa Cable Television, is the cable television

  15. Executive Summaries Hydrogen Storage Materials Centers of Excellence

    E-Print Network [OSTI]

    of performance metrics for onboard hydrogen storage systems based on comparison with gasoline fueled vehiclesExecutive Summaries for the Hydrogen Storage Materials Centers of Excellence Chemical Hydrogen Storage CoE, Hydrogen Sorption CoE, and Metal Hydride CoE Period of Performance: 2005

  16. EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET

    E-Print Network [OSTI]

    EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D. C . 20503.C. 20515 Dear Mr. Speaker: Enclosed please find the Office ofManagement and Budget (OMB) Report to the Congress on the sequestration for fiscal year (FY) 2013 required by section 251A of the Balanced Budget

  17. EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET

    E-Print Network [OSTI]

    Myers, Lawrence C.

    EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET WASHINGTON, D.C. 20503 March 1 Balanced Budget and Emergency Deficit Control Act of 1985, as Amended This memorandum is to inform) in accordance with section 251A of the Balanced Budget and Emergency Deficit Control Act, as amended (BBEDCA), 2

  18. San Francisco Building Code Amendments to the

    E-Print Network [OSTI]

    Green Building Standards Code 2010 California Residential Code Operative date: January 1, 2011 #12;2 #121 2010 San Francisco Building Code Amendments to the 2010 California Building Code 2010 California;3 CHAPTER 1 SCOPE AND ADMINISTRATION DIVISION I CALIFORNIA ADMINISTRATION No San Francisco Building Code

  19. NHA HYDROGEN SAFETY CODES AND STANDARDS ACTIVITIES

    E-Print Network [OSTI]

    laboratories, code officials and model building code organizations to bring experts together in a focused and other information needed by the Code Officials to complete the development of these new codes needs to be disseminated to building code officials such as National Fire Protection Association (NFPA

  20. Remarkable Degenerate Quantum Stabilizer Codes Derived from Duadic Codes

    E-Print Network [OSTI]

    Salah A. Aly; Andreas Klappenecker; Pradeep Kiran Sarvepalli

    2006-01-18T23:59:59.000Z

    Good quantum codes, such as quantum MDS codes, are typically nondegenerate, meaning that errors of small weight require active error-correction, which is--paradoxically--itself prone to errors. Decoherence free subspaces, on the other hand, do not require active error correction, but perform poorly in terms of minimum distance. In this paper, examples of degenerate quantum codes are constructed that have better minimum distance than decoherence free subspaces and allow some errors of small weight that do not require active error correction. In particular, two new families of [[n,1,>= sqrt(n)

  1. A Framework to Model Branch Prediction for Worst Case Execution Time Analysis

    E-Print Network [OSTI]

    Roychoudhury, Abhik

    execution history. This allows the program execution to proceed by speculating the control flow. Branch with an external environment in a timely fashion. Many embedded systems are safety critical, e.g., automobiles

  2. Emotion regulation, executive functioning and quality of life following stroke : a research portfolio

    E-Print Network [OSTI]

    Yule, Mhairi

    2013-07-02T23:59:59.000Z

    Systematic review Executive dysfunction is commonly reported following stroke with most research in this area focused on frontal lobe lesions. A systematic review was carried out to evaluate the evidence of executive ...

  3. Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

  4. On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and

    E-Print Network [OSTI]

    Yang, Junfeng

    On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons by the Computer Emergency Response Team (CERT), and which surveyed 523 security executives and law enforcement

  5. HANK CARDELLO Hank Cardello is a former food industry executive turned author,

    E-Print Network [OSTI]

    Janssen, Michel

    executive with The Coca-Cola Company, Canada Dry, Anheuser-Busch and General Mills. His perspectives have

  6. Grid porting of Bhabha scattering code through a master-worker scheme

    E-Print Network [OSTI]

    Alejandro Lorca; Jose Luis Vazquez-Poletti; Eduardo Huedo; Ignacio M. Llorente

    2009-04-01T23:59:59.000Z

    A program calculating Bhabha scattering at high energy colliders is considered for porting to the EGEE Grid infrastructure. The program code, which is a result of the aITALC project, is ported by using a master-worker operating scheme. The job submission, execution and monitoring are implemented using the GridWay metascheduler. The unattended execution of jobs turned out to be complete and rather efficient, even when pre-knowledge of the grid is absent. While the batch of jobs remains organized at the user's side, the actual computation was carried out within the phenogrid virtual organization. The scientific results support the use of the small angle Bhabha scattering for the luminosity measurements of the International Linear Collider project.

  7. Surface code implementation of block code state distillation

    E-Print Network [OSTI]

    Austin G. Fowler; Simon J. Devitt; Cody Jones

    2013-01-29T23:59:59.000Z

    State distillation is the process of taking a number of imperfect copies of a particular quantum state and producing fewer better copies. Until recently, the lowest overhead method of distilling states |A>=(|0>+e^{i\\pi/4}|1>)/\\sqrt{2} produced a single improved |A> state given 15 input copies. New block code state distillation methods can produce k improved |A> states given 3k+8 input copies, potentially significantly reducing the overhead associated with state distillation. We construct an explicit surface code implementation of block code state distillation and quantitatively compare the overhead of this approach to the old. We find that, using the best available techniques, for parameters of practical interest, block code state distillation does not always lead to lower overhead, and, when it does, the overhead reduction is typically less than a factor of three.

  8. Track 4: Sustainability in National Programs I. Impact of Executive Orders on Federal Agencies

    E-Print Network [OSTI]

    executive orders have expanded federal agencies' responsibility for energy efficiency, renewable energy. Energy Conservation in Infrastructure 1. Impact of Executive Orders on Federal Agencies: Two presidential1 Track 4: Sustainability in National Programs I. Impact of Executive Orders on Federal Agencies II

  9. Integrating Multiple Forms of Multithreaded Execution on multi-SMT Systems: A Study with Scientific Applications

    E-Print Network [OSTI]

    Nikolopoulos, Dimitris

    Integrating Multiple Forms of Multithreaded Execution on multi-SMT Systems: A Study with Scientific execution appears to be a natural choice for executing these applications on systems composed of SMT of multithreading on current SMT processors, thus leading to marginal utilization of mul- tiple hardware threads

  10. Entanglement-assisted codeword stabilized quantum codes

    SciTech Connect (OSTI)

    Shin, Jeonghwan; Heo, Jun; Brun, Todd A. [School of Electrical Engineering, Korea University, Seoul (Korea, Republic of); Communication Sciences Institute, University of Southern California, Los Angeles, California 90089 (United States)

    2011-12-15T23:59:59.000Z

    Entangled qubits can increase the capacity of quantum error-correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and nonadditive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common stabilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only on the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors in the codeword stabilized quantum code framework give rise to effective Z errors on Bob's side. We use this scheme to construct entanglement-assisted nonadditive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

  11. Entanglement-assisted codeword stabilized quantum codes

    E-Print Network [OSTI]

    Jeonghwan Shin; Jun Heo; Todd A. Brun

    2011-09-15T23:59:59.000Z

    Entangled qubit can increase the capacity of quantum error correcting codes based on stabilizer codes. In addition, by using entanglement quantum stabilizer codes can be construct from classical linear codes that do not satisfy the dual-containing constraint. We show that it is possible to construct both additive and non-additive quantum codes using the codeword stabilized quantum code framework. Nonadditive codes may offer improved performance over the more common sta- bilizer codes. Like other entanglement-assisted codes, the encoding procedure acts only the qubits on Alice's side, and only these qubits are assumed to pass through the channel. However, errors the codeword stabilized quantum code framework gives rise to effective Z errors on Bob side. We use this scheme to construct new entanglement-assisted non-additive quantum codes, in particular, ((5,16,2;1)) and ((7,4,5;4)) codes.

  12. STDS91.COD: Grief and Mourning Codes

    E-Print Network [OSTI]

    Rosenblatt, Paul C.; Walsh, R. Patricia; Jackson, Douglas A.

    2011-01-01T23:59:59.000Z

    conflict 2000 Age of Marriage, Females (code book variable87) N Code NA Meaning Missing data Scores range from 8.2 toGRIEF AND MOURNING CODES Paul C. Rosenblatt Department of

  13. LDPC codes : structural analysis and decoding techniques

    E-Print Network [OSTI]

    Zhang, Xiaojie

    2012-01-01T23:59:59.000Z

    to Low-Density Parity-Check Codes 2.1 Representation of LDPC4.2 Error Floors of LDPC Codes . . . . . . . . . . . . . . .LP Decoding of LDPC Codes with Alternating Direction Method

  14. Codes for the fast SSS QR eigens

    E-Print Network [OSTI]

    Fortran 90 codes (zip file); Matlab codes (zip file). Please email. A fast O(n^2) time QR eigensolver for companion matrices/polynomials. Fortran 90 codes (zip...

  15. DEPARTMENT CODE Department of Computer Science

    E-Print Network [OSTI]

    DEPARTMENT CODE Department of Computer Science College of Natural Sciences Colorado State and Amendment of this Code 19 #12;1 MISSION AND OBJECTIVES 3 Preamble This Code of the Department of Computer

  16. Example of Environmental Restoration Code of Accounts

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-28T23:59:59.000Z

    This chapter describes the fundamental structure of an example remediation cost code system, lists and describes the Level 1 cost codes, and lists the Level 2 and Level 3 cost codes.

  17. Arkansas Underground Injection Control Code (Arkansas)

    Broader source: Energy.gov [DOE]

    The Arkansas Underground Injection Control Code (UIC code) is adopted pursuant to the provisions of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-5-11). It is the...

  18. Codeword Stabilized Quantum Codes and Their Error Correction

    E-Print Network [OSTI]

    Li, Yunfan

    2010-01-01T23:59:59.000Z

    5.1.4 Generic CWS codes . . . . . . . . . . .USt codes . . . . . . . . . . . . . . . . . . . . . .Quantum Codes 2.1 Notations . . . . . . . . . . . . . . 2.2

  19. Algebraic list-decoding of error-correcting codes

    E-Print Network [OSTI]

    Parvaresh, Farzad

    2007-01-01T23:59:59.000Z

    Solomon codes . . . . . . . . . . . . . . . 1.2.2 Guruswami-Simple trivariate codes and theirdecoding . . . . . . . . . . . . . 3.3.1 Code parameters and

  20. Streamlining of the RELAP5-3D Code

    SciTech Connect (OSTI)

    Mesina, George L; Hykes, Joshua; Guillen, Donna Post

    2007-11-01T23:59:59.000Z

    RELAP5-3D is widely used by the nuclear community to simulate general thermal hydraulic systems and has proven to be so versatile that the spectrum of transient two-phase problems that can be analyzed has increased substantially over time. To accommodate the many new types of problems that are analyzed by RELAP5-3D, both the physics and numerical methods of the code have been continuously improved. In the area of computational methods and mathematical techniques, many upgrades and improvements have been made decrease code run time and increase solution accuracy. These include vectorization, parallelization, use of improved equation solvers for thermal hydraulics and neutron kinetics, and incorporation of improved library utilities. In the area of applied nuclear engineering, expanded capabilities include boron and level tracking models, radiation/conduction enclosure model, feedwater heater and compressor components, fluids and corresponding correlations for modeling Generation IV reactor designs, and coupling to computational fluid dynamics solvers. Ongoing and proposed future developments include improvements to the two-phase pump model, conversion to FORTRAN 90, and coupling to more computer programs. This paper summarizes the general improvements made to RELAP5-3D, with an emphasis on streamlining the code infrastructure for improved maintenance and development. With all these past, present and planned developments, it is necessary to modify the code infrastructure to incorporate modifications in a consistent and maintainable manner. Modifying a complex code such as RELAP5-3D to incorporate new models, upgrade numerics, and optimize existing code becomes more difficult as the code grows larger. The difficulty of this as well as the chance of introducing errors is significantly reduced when the code is structured. To streamline the code into a structured program, a commercial restructuring tool, FOR_STRUCT, was applied to the RELAP5-3D source files. The methodology employed follows Dijkstra's structured programming paradigm, which is based on splitting programs into sub-sections, each with single points of entry and exit and in which control is passed downward through the structure with no unconditional branches to higher levels. GO TO commands are typically avoided, since they alter the flow and control of a programs execution by allowing a jump from one place in the routine to another. The restructuring of RELAP5-3D subroutines is complicated by several issues. The first is use of code other than standard FORTRAN77. The second is restructuring limitations of FOR_STRUCT. The third is existence of pre-compiler directives and the complication of nested directives. Techniques were developed to overcome all these difficulties and more and these are reported. By implementing these developments, all subroutines of RELAP were restructured. Measures of code improvement relative to maintenance and development are presented.

  1. Budget/Object Codes -REVENUE Budget/Object Codes -REVENUE BUDGET/OBJECT BUDGET/OBJECT

    E-Print Network [OSTI]

    Selmic, Sandra

    Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET CODE DESCRIPTION BUDGET CODE DESCRIPTION 01 30 0101 On-Campus-Full Time 3001 Federal Program 0102 On APPROPRIATIONS #12;Budget/Object Codes -REVENUE Budget/Object Codes - REVENUE BUDGET/OBJECT BUDGET/OBJECT BUDGET

  2. Nuclear Energy Advanced Modeling and Simulation (NEAMS) waste Integrated Performance and Safety Codes (IPSC) : gap analysis for high fidelity and performance assessment code development.

    SciTech Connect (OSTI)

    Lee, Joon H.; Siegel, Malcolm Dean; Arguello, Jose Guadalupe, Jr.; Webb, Stephen Walter; Dewers, Thomas A.; Mariner, Paul E.; Edwards, Harold Carter; Fuller, Timothy J.; Freeze, Geoffrey A.; Jove-Colon, Carlos F.; Wang, Yifeng

    2011-03-01T23:59:59.000Z

    This report describes a gap analysis performed in the process of developing the Waste Integrated Performance and Safety Codes (IPSC) in support of the U.S. Department of Energy (DOE) Office of Nuclear Energy Advanced Modeling and Simulation (NEAMS) Campaign. The goal of the Waste IPSC is to develop an integrated suite of computational modeling and simulation capabilities to quantitatively assess the long-term performance of waste forms in the engineered and geologic environments of a radioactive waste storage or disposal system. The Waste IPSC will provide this simulation capability (1) for a range of disposal concepts, waste form types, engineered repository designs, and geologic settings, (2) for a range of time scales and distances, (3) with appropriate consideration of the inherent uncertainties, and (4) in accordance with rigorous verification, validation, and software quality requirements. The gap analyses documented in this report were are performed during an initial gap analysis to identify candidate codes and tools to support the development and integration of the Waste IPSC, and during follow-on activities that delved into more detailed assessments of the various codes that were acquired, studied, and tested. The current Waste IPSC strategy is to acquire and integrate the necessary Waste IPSC capabilities wherever feasible, and develop only those capabilities that cannot be acquired or suitably integrated, verified, or validated. The gap analysis indicates that significant capabilities may already exist in the existing THC codes although there is no single code able to fully account for all physical and chemical processes involved in a waste disposal system. Large gaps exist in modeling chemical processes and their couplings with other processes. The coupling of chemical processes with flow transport and mechanical deformation remains challenging. The data for extreme environments (e.g., for elevated temperature and high ionic strength media) that are needed for repository modeling are severely lacking. In addition, most of existing reactive transport codes were developed for non-radioactive contaminants, and they need to be adapted to account for radionuclide decay and in-growth. The accessibility to the source codes is generally limited. Because the problems of interest for the Waste IPSC are likely to result in relatively large computational models, a compact memory-usage footprint and a fast/robust solution procedure will be needed. A robust massively parallel processing (MPP) capability will also be required to provide reasonable turnaround times on the analyses that will be performed with the code. A performance assessment (PA) calculation for a waste disposal system generally requires a large number (hundreds to thousands) of model simulations to quantify the effect of model parameter uncertainties on the predicted repository performance. A set of codes for a PA calculation must be sufficiently robust and fast in terms of code execution. A PA system as a whole must be able to provide multiple alternative models for a specific set of physical/chemical processes, so that the users can choose various levels of modeling complexity based on their modeling needs. This requires PA codes, preferably, to be highly modularized. Most of the existing codes have difficulties meeting these requirements. Based on the gap analysis results, we have made the following recommendations for the code selection and code development for the NEAMS waste IPSC: (1) build fully coupled high-fidelity THCMBR codes using the existing SIERRA codes (e.g., ARIA and ADAGIO) and platform, (2) use DAKOTA to build an enhanced performance assessment system (EPAS), and build a modular code architecture and key code modules for performance assessments. The key chemical calculation modules will be built by expanding the existing CANTERA capabilities as well as by extracting useful components from other existing codes.

  3. The Cost of Enforcing Building Energy Codes: Phase 1

    E-Print Network [OSTI]

    Williams, Alison

    2013-01-01T23:59:59.000Z

    practices among code officials. Stakeholders recommendboth applicants and code officials and help to inform thecomply with the code and code officials to enforce the new

  4. Gas Code of Conduct (Connecticut)

    Broader source: Energy.gov [DOE]

    The Gas Code of Conduct sets forth the standard of conduct for transactions, direct or indirect, between gas companies and their affiliates. The purpose of these regulations is to promote...

  5. Commercial Building Codes and Standards

    Broader source: Energy.gov [DOE]

    Once an energy-efficient technology or practice is widely available in the market, it can become the baseline of performance through building energy codes and equipment standards. The Building...

  6. Montana Coal Mining Code (Montana)

    Broader source: Energy.gov [DOE]

    The Department of Labor and Industry is authorized to adopt rules pertaining to safety standards for all coal mines in the state. The Code requires coal mine operators to make an accurate map or...

  7. Fuel cycle code, "FUELMOVE III"

    E-Print Network [OSTI]

    Sovka, Jerry Alois

    1963-01-01T23:59:59.000Z

    Further modifications to the fuel cycle code FUELMOVE are described which were made in an attempt to obtain results for reflected reactors operated under batch, outin, and bidirectional fueling schemes. Numerical methods ...

  8. LATTICE: AN INTERACTIVE LATTICE COMPUTER CODE

    E-Print Network [OSTI]

    Staples, John

    2010-01-01T23:59:59.000Z

    4500-R65 I LATTICE AN INTERACTIVE LATTICE COMPUTER CODE Johnr LBL-4843 LATTICE An interactive lattice computer code Johncode which enables an interactive user to calculate the

  9. Building Energy Codes Collaborative Technical Assistance for...

    Energy Savers [EERE]

    State Energy Officials - 2014 BTO Peer Review Southeast Energy Efficiency Alliance's Building Energy Codes Project Reducing Energy Demand in Buildings Through State Energy Codes...

  10. Program School/ Career: Descripton ISIS Program Codes

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School;Program School/ Career: Descripton ISIS Program Codes Program Career: Descripton College School/ College 1

  11. Building Energy Code | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Building Codes Assistance Project (BCAP). For more detailed information about building energy codes, visit the http:www.energycodes.govstates DOE and http:...

  12. Quantum stabilizer codes and beyond

    E-Print Network [OSTI]

    Sarvepalli, Pradeep Kiran

    2008-10-10T23:59:59.000Z

    QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY August 2008 Major... Subject: Computer Science QUANTUM STABILIZER CODES AND BEYOND A Dissertation by PRADEEP KIRAN SARVEPALLI Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY...

  13. Edge equilibrium code for tokamaks

    SciTech Connect (OSTI)

    Li, Xujing [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China)] [Institute of Computational Mathematics and Scientific/Engineering Computing, Academy of Mathematics and Systems Science, Chinese Academy of Sciences, P.O. Box 2719, Beijing 100190 (China); Zakharov, Leonid E. [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States)] [Princeton Plasma Physics Laboratory Princeton, MS-27 P.O. Box 451, New Jersey (United States); Drozdov, Vladimir V. [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)] [Euratom/CCFE Fusion Association, Culham Science Centre, Abingdon OX14 3DB (United Kingdom)

    2014-01-15T23:59:59.000Z

    The edge equilibrium code (EEC) described in this paper is developed for simulations of the near edge plasma using the finite element method. It solves the Grad-Shafranov equation in toroidal coordinate and uses adaptive grids aligned with magnetic field lines. Hermite finite elements are chosen for the numerical scheme. A fast Newton scheme which is the same as implemented in the equilibrium and stability code (ESC) is applied here to adjust the grids.

  14. Scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the nodes during execution

    DOE Patents [OSTI]

    Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

    2012-10-16T23:59:59.000Z

    Methods, apparatus, and products are disclosed for scheduling applications for execution on a plurality of compute nodes of a parallel computer to manage temperature of the plurality of compute nodes during execution that include: identifying one or more applications for execution on the plurality of compute nodes; creating a plurality of physically discontiguous node partitions in dependence upon temperature characteristics for the compute nodes and a physical topology for the compute nodes, each discontiguous node partition specifying a collection of physically adjacent compute nodes; and assigning, for each application, that application to one or more of the discontiguous node partitions for execution on the compute nodes specified by the assigned discontiguous node partitions.

  15. Budget-based power consumption for application execution on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J; Inglett, Todd A

    2012-10-23T23:59:59.000Z

    Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

  16. Budget-based power consumption for application execution on a plurality of compute nodes

    SciTech Connect (OSTI)

    Archer, Charles J; Blocksome, Michael A; Peters, Amanda E; Ratterman, Joseph D; Smith, Brian E

    2013-02-05T23:59:59.000Z

    Methods, apparatus, and products are disclosed for budget-based power consumption for application execution on a plurality of compute nodes that include: assigning an execution priority to each of one or more applications; executing, on the plurality of compute nodes, the applications according to the execution priorities assigned to the applications at an initial power level provided to the compute nodes until a predetermined power consumption threshold is reached; and applying, upon reaching the predetermined power consumption threshold, one or more power conservation actions to reduce power consumption of the plurality of compute nodes during execution of the applications.

  17. Graphical Quantum Error-Correcting Codes

    E-Print Network [OSTI]

    Sixia Yu; Qing Chen; C. H. Oh

    2007-09-12T23:59:59.000Z

    We introduce a purely graph-theoretical object, namely the coding clique, to construct quantum errorcorrecting codes. Almost all quantum codes constructed so far are stabilizer (additive) codes and the construction of nonadditive codes, which are potentially more efficient, is not as well understood as that of stabilizer codes. Our graphical approach provides a unified and classical way to construct both stabilizer and nonadditive codes. In particular we have explicitly constructed the optimal ((10,24,3)) code and a family of 1-error detecting nonadditive codes with the highest encoding rate so far. In the case of stabilizer codes a thorough search becomes tangible and we have classified all the extremal stabilizer codes up to 8 qubits.

  18. Codeword stabilized quantum codes on subsystems

    E-Print Network [OSTI]

    Jeonghwan Shin; Jun Heo; Todd A. Brun

    2012-08-29T23:59:59.000Z

    Codeword stabilized quantum codes provide a unified approach to constructing quantum error-correcting codes, including both additive and non-additive quantum codes. Standard codeword stabilized quantum codes encode quantum information into subspaces. The more general notion of encoding quantum information into a subsystem is known as an operator (or subsystem) quantum error correcting code. Most operator codes studied to date are based in the usual stabilizer formalism. We introduce operator quantum codes based on the codeword stabilized quantum code framework. Based on the necessary and sufficient conditions for operator quantum error correction, we derive a error correction condition for operator codeword stabilized quantum codes. Based on this condition, the word operators of a operator codeword stabilized quantum code are constructed from a set of classical binary errors induced by generators of the gauge group. We use this scheme to construct examples of both additive and non-additive codes that encode quantum information into a subsystem.

  19. Architecture-Dependent Execution Time of Shor's Algorithm

    E-Print Network [OSTI]

    Rodney Van Meter; Kohei M. Itoh; Thaddeus D. Ladd

    2006-05-25T23:59:59.000Z

    We show how the execution time of algorithms on quantum computers depends on the architecture of the quantum computer, the choice of algorithms (including subroutines such as arithmetic), and the ``clock speed'' of the quantum computer. The primary architectural features of interest are the ability to execute multiple gates concurrently, the number of application-level qubits available, and the interconnection network of qubits. We analyze Shor's algorithm for factoring large numbers in this context. Our results show that, if arbitrary interconnection of qubits is possible, a machine with an application-level clock speed of as low as one-third of a (possibly encoded) gate per second could factor a 576-bit number in under one month, potentially outperforming a large network of classical computers. For nearest-neighbor-only architectures, a clock speed of around twenty-seven gates per second is required.

  20. Resilient Control System Execution Agent (ReCoSEA)

    SciTech Connect (OSTI)

    Craig G. Rieger; Kris Villez

    2012-08-01T23:59:59.000Z

    In an increasingly networked world, critical infrastructure systems suffer from two types of vulnerability. The first is the traditionally recognized problem of monitoring the systems for faults and failures, recognizing and analyzing data, and responding with real understanding to the problems of the system. Increasingly complex systems create the opportunity for single points of failure to cascade when inaccurate assessment of system health increases response time or leads to faulty analysis of the problems involved. A second problem involves vulnerability to cyber intrusion, in which bad actors can mask system deterioration or present false data about system status. A resilient system will protect stability, efficiency, and security. To ensure these three states, the system must react to changing conditions within the system with coordination: no one component of the system can be allowed to react to problems without real consideration of the effects of that action on other components within the system. Systems with multi-agent design typically have three layers of action, a management layer, a coordination layer, and an execution layer. A resilient multi-agent system will emphasize functions of the execution layer, which has the responsibility of initiating actions, monitoring, analyzing, and controlling its own processes, while feeding information back to the higher levels of management and coordination. The design concept of a resilient control system execution agent (ReCoSEA) grows out of these underpinnings, and through the use of computational intelligence techniques, this paper suggests an associated design methodology.

  1. Presented by Campus Services Object Code Classifications

    E-Print Network [OSTI]

    Stephens, Graeme L.

    ) Decrease expense from the wrong object code (From) Example: Expensed a service contract that covered 12

  2. Michigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045 Section Code(s): 4000 4200

    E-Print Network [OSTI]

    Section Code(s): 4000 4200 PPO - HuskyCare HDHP Benefits-at-a-Glance Michigan Technological University In% after deductible Maternity Services Provided by a Physician Prenatal and Postnatal Care Visits CoveredMichigan Technological University_010114 R 10/25/13 Group Number: 71571 Package Code(s): 040 045

  3. The environment and ASME performance test codes

    SciTech Connect (OSTI)

    Bannister, R.L. [Westinghouse Electric Corp., Orlando, FL (United States); Macak, J.J. III [Mostardi-Platt Associates, Inc., Elmhurst, IL (United States); Newby, R.A. [Westinghouse Science and Technology Center, Pittsburgh, PA (United States)

    1995-12-31T23:59:59.000Z

    Today, federal, state and local governmental agencies have enacted comprehensive legislation on power generation emission limits which affects all aspects of the energy sector. This paper reviews the indirect impact of Performance Test Codes on environmental testing, reviewing past, current, and future practices. Existing codes and three new codes currently under development will be cited along with possible future code development.

  4. SECTION GS1020 CONSTRUCTION CODE REQUIREMENTS

    E-Print Network [OSTI]

    Zhang, Yuanlin

    101, Life Safety Code; 5. National Fire Protection Association Codes and Standards; 6. ANSI/ASME A17SECTION GS1020 ­ CONSTRUCTION CODE REQUIREMENTS PART 1 - GENERAL 1.1 RELATED DOCUMENTS A. Drawings includes the following: 1. Construction code requirements for all construction at Texas Tech University. 1

  5. T-615: IBM Rational System Architect ActiveBar ActiveX Control Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    There is a high risk security vulnerability with the ActiveBar ActiveX controls used by IBM Rational System Architect.

  6. A simple family of nonadditive quantum codes

    E-Print Network [OSTI]

    John A. Smolin; Graeme Smith; Stephanie Wehner

    2007-03-20T23:59:59.000Z

    Most known quantum codes are additive, meaning the codespace can be described as the simultaneous eigenspace of an abelian subgroup of the Pauli group. While in some scenarios such codes are strictly suboptimal, very little is understood about how to construct nonadditive codes with good performance. Here we present a family of nonadditive quantum codes for all odd blocklengths, n, that has a particularly simple form. Our codes correct single qubit erasures while encoding a higher dimensional space than is possible with an additive code or, for n of 11 or greater, any previous codes.

  7. A monadic interpretation of execution levels and exceptions for AOP

    E-Print Network [OSTI]

    -scale applications. Originating at Xerox PARC, this observation has sparked the development of a new style piece of code can have a very rich interaction with the rest of the pro- gram, whose effect can come up

  8. What Just Happened? Explaining the Past in Planning and Execution

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    , Code 5514; Washington DC; USA 1 matthew.molineaux@knexusresearch.com 2 ukuter@sift.net 3 Matthew.Klenk@parc, Institute for Advanced Computer Studies, College Park, MD 20742; USA. Now at Palo Alto Research Center (PARC

  9. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2011-09-01T23:59:59.000Z

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  10. Parallization of Stellar Atmosphere Codes

    E-Print Network [OSTI]

    P. Hoeflich

    2002-09-19T23:59:59.000Z

    Parallel computing has turned out to be the enabling technology to solve complex physical systems. However, the transition from shared memory, vector computers to massively parallel, distributed memory systems and, recently, to hybrid systems poses new challenges to the scientist. We want to present a cook-book (with a very strong, personal bias) based on our experience with parallization of our existing codes. Some of the general tools and communication libraries are discussed. Our approach includes a mixture of algorithm, domain and physical module based parallization. The advantages, scalability and limitations of each are discussed at some examples. We want show that it becomes easier to write parallel code with increasing complexity of the physical problem making stellar atmosphere codes beyond the classical assumptions very suitable.

  11. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2010-09-01T23:59:59.000Z

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  12. ASME Code Efforts Supporting HTGRs

    SciTech Connect (OSTI)

    D.K. Morton

    2012-09-01T23:59:59.000Z

    In 1999, an international collaborative initiative for the development of advanced (Generation IV) reactors was started. The idea behind this effort was to bring nuclear energy closer to the needs of sustainability, to increase proliferation resistance, and to support concepts able to produce energy (both electricity and process heat) at competitive costs. The U.S. Department of Energy has supported this effort by pursuing the development of the Next Generation Nuclear Plant, a high temperature gas-cooled reactor. This support has included research and development of pertinent data, initial regulatory discussions, and engineering support of various codes and standards development. This report discusses the various applicable American Society of Mechanical Engineers (ASME) codes and standards that are being developed to support these high temperature gascooled reactors during construction and operation. ASME is aggressively pursuing these codes and standards to support an international effort to build the next generation of advanced reactors so that all can benefit.

  13. Light-water reactor safety analysis codes

    SciTech Connect (OSTI)

    Jackson, J.F.; Ransom, V.H.; Ybarrondo, L.J.; Liles, D.R.

    1980-01-01T23:59:59.000Z

    A brief review of the evolution of light-water reactor safety analysis codes is presented. Included is a summary comparison of the technical capabilities of major system codes. Three recent codes are described in more detail to serve as examples of currently used techniques. Example comparisons between calculated results using these codes and experimental data are given. Finally, a brief evaluation of current code capability and future development trends is presented.

  14. Energy Codes and the Landlord-Tenant Problem

    E-Print Network [OSTI]

    Papineau, Maya

    2013-01-01T23:59:59.000Z

    of the International Energy Conservation Code 2000 edition (in The International Energy Conservation Code (IECC) is

  15. Turbo Codes are Low Density Parity Check Codes David J. C. MacKay

    E-Print Network [OSTI]

    MacKay, David J.C.

    Turbo Codes are Low Density Parity Check Codes David J. C. MacKay July 8, 1998--- Draft 0.2, not for distribution! (First draft written July 5, 1998) Abstract Turbo codes and Gallager codes (also known as low note that the parity check matrix of a Turbo code can be written as low density parity check matrix

  16. IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    IEEE VEHICULAR TECHNOLOGY CONFERENCE SPRING, 2003 1 Space-Time Block Coding applied to Turbo Coded and a Turbo Code (TC) as channel code. MC-CDMA is likely to be one of the most promising access technique. Then, since Turbo Coded MC-CDMA was demonstrated to be very efficient for a Single Input Single Output

  17. Validation issues for SSI codes

    SciTech Connect (OSTI)

    Philippacopoulos, A.J.

    1995-02-01T23:59:59.000Z

    The paper describes the results of a recent work which was performed to verify computer code predictions in the SSI area. The first part of the paper is concerned with analytic solutions of the system response. The mathematical derivations are reasonably reduced by the use of relatively simple models which capture fundamental ingredients of the physics of the system motion while allowing for the response to be obtained analytically. Having established explicit forms of the system response, numerical solutions from three computer codes are presented in comparative format.

  18. Texas Energy Code Compliance Collaborative

    E-Print Network [OSTI]

    Herbert, C.

    2013-01-01T23:59:59.000Z

    document these practices? What is the role of alternative code compliance programs like EnergyStar? What is the role of third party inspectors? 15 ESL-KT-13-12-29 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec... Conference, San Antonio, Texas Dec. 16-18 7 Source: ACEEE Building Energy Codes Program 2010 ESL-KT-13-12-29 CATEE 2013: Clean Air Through Energy Efficiency Conference, San Antonio, Texas Dec. 16-18 Residential (Single Family Residences And Duplexes...

  19. Principles of Faithful Execution in the implementation of trusted objects.

    SciTech Connect (OSTI)

    Tarman, Thomas David; Campbell, Philip LaRoche; Pierson, Lyndon George

    2003-09-01T23:59:59.000Z

    We begin with the following definitions: Definition: A trusted volume is the computing machinery (including communication lines) within which data is assumed to be physically protected from an adversary. A trusted volume provides both integrity and privacy. Definition: Program integrity consists of the protection necessary to enable the detection of changes in the bits comprising a program as specified by the developer, for the entire time that the program is outside a trusted volume. For ease of discussion we consider program integrity to be the aggregation of two elements: instruction integrity (detection of changes in the bits within an instruction or block of instructions), and sequence integrity (detection of changes in the locations of instructions within a program). Definition: Faithful Execution (FE) is a type of software protection that begins when the software leaves the control of the developer and ends within the trusted volume of a target processor. That is, FE provides program integrity, even while the program is in execution. (As we will show below, FE schemes are a function of trusted volume size.) FE is a necessary quality for computing. Without it we cannot trust computations. In the early days of computing FE came for free since the software never left a trusted volume. At that time the execution environment was the same as the development environment. In some circles that environment was referred to as a ''closed shop:'' all of the software that was used there was developed there. When an organization bought a large computer from a vendor the organization would run its own operating system on that computer, use only its own editors, only its own compilers, only its own debuggers, and so on. However, with the continuing maturity of computing technology, FE becomes increasingly difficult to achieve

  20. Degenerate Quantum Codes for Pauli Channels

    E-Print Network [OSTI]

    Graeme Smith; John A. Smolin

    2006-12-23T23:59:59.000Z

    A striking feature of quantum error correcting codes is that they can sometimes be used to correct more errors than they can uniquely identify. Such degenerate codes have long been known, but have remained poorly understood. We provide a heuristic for designing degenerate quantum codes for high noise rates, which is applied to generate codes that can be used to communicate over almost any Pauli channel at rates that are impossible for a nondegenerate code. The gap between nondegenerate and degenerate code performance is quite large, in contrast to the tiny magnitude of the only previous demonstration of this effect. We also identify a channel for which none of our codes outperform the best nondegenerate code and show that it is nevertheless quite unlike any channel for which nondegenerate codes are known to be optimal.

  1. Ptolemy Coding Style Christopher Brooks

    E-Print Network [OSTI]

    Ptolemy Coding Style Christopher Brooks Edward A. Lee Electrical Engineering and Computer Sciences was supported in part by the iCyPhy Research Center (Industrial Cyber-Physical Systems, supported by IBM (Industrial Cyber-Physical Systems, supported by IBM and United Technologies), and the Center for Hybrid

  2. Free Energy Code Online Discussion

    E-Print Network [OSTI]

    Free Energy Code Online Discussion for Building Department Personnel Join us for this FREE 90 Bruce Cheney from Anchors Aweigh Energy, LLC want to hear from YOU on residential HVAC changeout issues of the California Energy Commission. Date: 3 dates currently offered, choose the one that works for you

  3. WESTERN MICHIGAN UNIVERSITY STUDENT CODE

    E-Print Network [OSTI]

    de Doncker, Elise

    WESTERN MICHIGAN UNIVERSITY STUDENT CODE Approved by The Western Michigan University Board Michigan University Kalamazoo, MI 49008 Effective August 2008 #12;A UNIVERSITY COMMUNITY IS... ...a for the Advancement of Teaching; Ernest L. Boyer (frwd.); Princeton, New Jersey; 1990 #12;WESTERN MICHIGAN UNIVERSITY

  4. Department of Energy Budget Execution Funds Distribution and Control Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2006-01-09T23:59:59.000Z

    As a service to all Department of Energy (DOE) elements, including the National Nuclear Security Administration (NNSA), this Manual provides the user with a single source for references, definitions, and procedural requirements for distributing and controlling Department of Energy (DOE) funds. Accordingly, the Manual provides detailed requirements to supplement DOE O 135.1A, Budget ExecutionFunds Distribution and Control, dated 1-9-06. Paragraph 5, of DOE O 135.1A defines organizational responsibilities pertinent to this Manual. Cancels DOE M 135.1-1.

  5. Executive Summary High-Yield Scenario Workshop Series Report

    SciTech Connect (OSTI)

    Leslie Park Ovard; Thomas H. Ulrich; David J. Muth Jr.; J. Richard Hess; Steven Thomas; Bryce Stokes

    2009-12-01T23:59:59.000Z

    To get a collective sense of the impact of research and development (R&D) on biomass resource availability, and to determine the feasibility that yields higher than baseline assumptions used for past assessments could be achieved to support U.S. energy independence, an alternate High-Yield Scenario (HYS) concept was presented to industry experts at a series of workshops held in December 2009. The workshops explored future production of corn/agricultural crop residues, herbaceous energy crops (HECs), and woody energy crops (WECs). This executive summary reports the findings of that workshop.

  6. Multiprocessor system with multiple concurrent modes of execution

    DOE Patents [OSTI]

    Ahn, Daniel; Ceze, Luis H; Chen, Dong; Gara, Alan; Heidelberger, Philip; Ohmacht, Martin

    2013-12-31T23:59:59.000Z

    A multiprocessor system supports multiple concurrent modes of speculative execution. Speculation identification numbers (IDs) are allocated to speculative threads from a pool of available numbers. The pool is divided into domains, with each domain being assigned to a mode of speculation. Modes of speculation include TM, TLS, and rollback. Allocation of the IDs is carried out with respect to a central state table and using hardware pointers. The IDs are used for writing different versions of speculative results in different ways of a set in a cache memory.

  7. ILC Reference Design Report Volume 1 - Executive Summary

    E-Print Network [OSTI]

    Brau, James; Walker, Nicholas

    2007-01-01T23:59:59.000Z

    The International Linear Collider (ILC) is a 200-500 GeV center-of-mass high-luminosity linear electron-positron collider, based on 1.3 GHz superconducting radio-frequency (SCRF) accelerating cavities. The ILC has a total footprint of about 31 km and is designed for a peak luminosity of 2x10^34 cm^-2s^-1. This report is the Executive Summary (Volume I) of the four volume Reference Design Report. It gives an overview of the physics at the ILC, the accelerator design and value estimate, the detector concepts, and the next steps towards project realization.

  8. ILC Reference Design Report Volume 1 - Executive Summary

    E-Print Network [OSTI]

    James Brau; Yasuhiro Okada; Nicholas Walker

    2007-12-12T23:59:59.000Z

    The International Linear Collider (ILC) is a 200-500 GeV center-of-mass high-luminosity linear electron-positron collider, based on 1.3 GHz superconducting radio-frequency (SCRF) accelerating cavities. The ILC has a total footprint of about 31 km and is designed for a peak luminosity of 2x10^34 cm^-2s^-1. This report is the Executive Summary (Volume I) of the four volume Reference Design Report. It gives an overview of the physics at the ILC, the accelerator design and value estimate, the detector concepts, and the next steps towards project realization.

  9. Other utilities, not IPPs key concern for electric executives

    SciTech Connect (OSTI)

    O'Driscoll, M.

    1994-01-12T23:59:59.000Z

    The evolving competitive electric utility world is making executives more cautious and focused on their core businesses at the expense of high-profile issues like international investment, global warming, demand side management and electric and magnetic fields, a new survey shows. The 1994 Electric Utility Outlook, conducted by the Washington International Energy Group, also shows growing concern about utility-on-utility competition and a decline of the independent power producer threat, a growing but grudging acknowledgement of retail wheeling and increasing discomfort with nuclear power.

  10. Executive Order 11988: Floodplain Management | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic Plan Departmentof1-SCORECARD-09-21-11AprilWednesday,TechnologyExecutiveChange

  11. Sandia Energy - Energy Council Executive Committee Visits Sandia

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand RequirementsCoatingsUltra-High-Voltage SiliconEnergy Council Executive Committee Visits

  12. 2014 NCAI Executive Council Winter Session | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny: The Future of BadTHEEnergy VehicleSessionOffice4 NCAI Executive Council Winter

  13. Executive Order 13583, Establishing a Coordinated Government-Wide

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy Chinaof EnergyImpactOn Chapter 42.15 - AttachmentExecutive Order 13212:Department

  14. National Electric Transmission Congestion Study 2006 Executive Summary

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked QuestionsDepartment of Energyof Energy U.S.August 2014 |EXECUTIVE SUMMARY

  15. Two-Layer Error Control Codes Combining Rectangular and Hamming Product Codes for Cache Error

    E-Print Network [OSTI]

    Zhang, Meilin

    We propose a novel two-layer error control code, combining error detection capability of rectangular codes and error correction capability of Hamming product codes in an efficient way, in order to increase cache error ...

  16. Code Booster Award-winning research on code optimization explores multicore computing

    E-Print Network [OSTI]

    Knowles, David William

    May 2008 Code Booster Award-winning research on code optimization explores multicore computing paper exploring ways to make a popular scientific analysis code run smoothly on different types of multicore computers. SamuelWilliams,aresearcherfromBerkeleyLab'sComputational

  17. SEE ADDENDUM IS CHECKED CODE 18a. PAYMENT WILL BE MADE BY CODE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SEE ADDENDUM IS CHECKED CODE 18a. PAYMENT WILL BE MADE BY CODE FACILITY CODE 17b. CHECK IF REMITTANCE IS DIFFERENT AND PUT SUCH ADDRESS IN OFFER OFFEROR 00146 Casper WY 82601 Shale...

  18. Bounds on Effective Hamiltonians for Stabilizer Codes

    E-Print Network [OSTI]

    Stephen S. Bullock; Dianne P. O'Leary

    2008-02-05T23:59:59.000Z

    This manuscript introduces various notions of k-locality of stabilizer codes inherited from the associated stabilizer groups. A choice of generators for the group leads to a Hamiltonian with the code in its groundspace, while a Hamiltonian holding the code in its groundspace might be called effective if its locality is less than that of a natural choice of generators (or any choice). This paper establishes some conditions under which effective Hamiltonians for stabilizer codes do not exist. Our results simplify in the cases of Calderbank-Shor-Steane stabilizer codes and topologically-ordered stabilizer codes arising from surface cellulations.

  19. Quantum Stabilizer Codes Embedding Qubits Into Qudits

    E-Print Network [OSTI]

    Carlo Cafaro; Federico Maiolini; Stefano Mancini

    2012-07-30T23:59:59.000Z

    We study, by means of the stabilizer formalism, a quantum error correcting code which is alternative to the standard block codes since it embeds a qubit into a qudit. The code exploits the non-commutative geometry of discrete phase space to protect the qubit against both amplitude and phase errors. The performance of such code is evaluated on Weyl channels by means of the entanglement fidelity as function of the error probability. A comparison with standard block codes, like five and seven qubit stabilizer codes, shows its superiority.

  20. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Environmental Management (EM)

    of the DCERPC Inspection Buffer Overflow Vulnerability may cause a stack overflow and permit the execution of arbitrary commands. Solution: The vendor has issued a fix. Addthis...

  1. Reducing power consumption during execution of an application on a plurality of compute nodes

    DOE Patents [OSTI]

    Archer, Charles J. (Rochester, MN); Blocksome, Michael A. (Rochester, MN); Peters, Amanda E. (Rochester, MN); Ratterman, Joseph D. (Rochester, MN); Smith, Brian E. (Rochester, MN)

    2012-06-05T23:59:59.000Z

    Methods, apparatus, and products are disclosed for reducing power consumption during execution of an application on a plurality of compute nodes that include: executing, by each compute node, an application, the application including power consumption directives corresponding to one or more portions of the application; identifying, by each compute node, the power consumption directives included within the application during execution of the portions of the application corresponding to those identified power consumption directives; and reducing power, by each compute node, to one or more components of that compute node according to the identified power consumption directives during execution of the portions of the application corresponding to those identified power consumption directives.

  2. Executive Order 13514 Section 9 Recommendations: Federal Greenhouse Gas Accounting and Reporting

    Broader source: Energy.gov [DOE]

    Presentation covers the Executive Order 13514 Section 9 Recommentdations, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

  3. Trellis coded vector quantization for the intraframe coding of images

    E-Print Network [OSTI]

    Chauvin, Todd Henry

    1989-01-01T23:59:59.000Z

    quantization in both conligurations. The design algo- rithm is also developed for the case of a, constrainl, on the entropy of the channel indices. Performance is evaluated by computer simulation for a variety of encoding rates, number of trellis states.... Rate Expansion . 2. Set Partitioning 3. Viterbi Encoding . C. Codebook Design 15 15 17 17 23 28 29 IV PREDICTIVE TRELLIS CODED VECTOR QUANTIZATION. . . 30 A. Implementation Structure . B. Design of Predictive TCVQ Coders 1. Vector...

  4. An implicit Smooth Particle Hydrodynamic code

    SciTech Connect (OSTI)

    Charles E. Knapp

    2000-04-01T23:59:59.000Z

    An implicit version of the Smooth Particle Hydrodynamic (SPH) code SPHINX has been written and is working. In conjunction with the SPHINX code the new implicit code models fluids and solids under a wide range of conditions. SPH codes are Lagrangian, meshless and use particles to model the fluids and solids. The implicit code makes use of the Krylov iterative techniques for solving large linear-systems and a Newton-Raphson method for non-linear corrections. It uses numerical derivatives to construct the Jacobian matrix. It uses sparse techniques to save on memory storage and to reduce the amount of computation. It is believed that this is the first implicit SPH code to use Newton-Krylov techniques, and is also the first implicit SPH code to model solids. A description of SPH and the techniques used in the implicit code are presented. Then, the results of a number of tests cases are discussed, which include a shock tube problem, a Rayleigh-Taylor problem, a breaking dam problem, and a single jet of gas problem. The results are shown to be in very good agreement with analytic solutions, experimental results, and the explicit SPHINX code. In the case of the single jet of gas case it has been demonstrated that the implicit code can do a problem in much shorter time than the explicit code. The problem was, however, very unphysical, but it does demonstrate the potential of the implicit code. It is a first step toward a useful implicit SPH code.

  5. Quantifying the Performance of Quantum Codes

    E-Print Network [OSTI]

    C. Cafaro; S. L'Innocente; C. Lupo; S. Mancini

    2011-01-12T23:59:59.000Z

    We study the properties of error correcting codes for noise models in the presence of asymmetries and/or correlations by means of the entanglement fidelity and the code entropy. First, we consider a dephasing Markovian memory channel and characterize the performance of both a repetition code and an error avoiding code in terms of the entanglement fidelity. We also consider the concatenation of such codes and show that it is especially advantageous in the regime of partial correlations. Finally, we characterize the effectiveness of the codes and their concatenation by means of the code entropy and find, in particular, that the effort required for recovering such codes decreases when the error probability decreases and the memory parameter increases. Second, we consider both symmetric and asymmetric depolarizing noisy quantum memory channels and perform quantum error correction via the five qubit stabilizer code. We characterize this code by means of the entanglement fidelity and the code entropy as function of the asymmetric error probabilities and the degree of memory. Specifically, we uncover that while the asymmetry in the depolarizing errors does not affect the entanglement fidelity of the five qubit code, it becomes a relevant feature when the code entropy is used as a performance quantifier.

  6. User's manual for SMACS: a family of codes for probabilistic structural analysis

    SciTech Connect (OSTI)

    Bumpus, S; Shukla, S N; O'Connell, W J; Gerhard, M A

    1982-03-01T23:59:59.000Z

    SMACS is a code which links the seismic input, soil-structure interaction and structural response calculations to obtain response vectors, which in turn are used as input for risk analysis. Inherently, there are uncertainties involved in various links of the seismic methodology chain. SMACS incorporates the uncertainty in the seismic input by using a suite of possible earthquakes. Uncertainties in the soil-structure interaction (SSI) are incorporated by using a range of values of soil shear modulus and soil material damping at a given site. Similarly a range of probable values of modal frequency and damping of the structure are used to account for uncertainties in structural modelling. The following pre-processor codes are available, as a package, to create necessary input files for the SMACS program: SIMQ (for generating seimic input); GLAY and CLAF (for soil-structure interaction analysis); and SAP4 (for modal analysis of the structures). The post-processor codes available are: PRESTO (to plot probability distributions for the response vectors or basic events); and CHANGO (to plot comparisons of basic events from different analyses). The code, SMACS, and the nature of the problem it solves are discussed. The way that SMACS is executed is explained. Manuals are provided that explain how to create the necessary input files for different subprograms of the SMACS family. An example problem illustrating an SSI analysis for a containment structure is presented.

  7. Design of additive quantum codes via the code-word-stabilized framework

    SciTech Connect (OSTI)

    Kovalev, Alexey A.; Pryadko, Leonid P. [Department of Physics and Astronomy, University of California, Riverside, California 92521 (United States); Dumer, Ilya [Department of Electrical Engineering, University of California, Riverside, California 92521 (United States)

    2011-12-15T23:59:59.000Z

    We consider design of the quantum stabilizer codes via a two-step, low-complexity approach based on the framework of codeword-stabilized (CWS) codes. In this framework, each quantum CWS code can be specified by a graph and a binary code. For codes that can be obtained from a given graph, we give several upper bounds on the distance of a generic (additive or nonadditive) CWS code, and the lower Gilbert-Varshamov bound for the existence of additive CWS codes. We also consider additive cyclic CWS codes and show that these codes correspond to a previously unexplored class of single-generator cyclic stabilizer codes. We present several families of simple stabilizer codes with relatively good parameters.

  8. Arkansas Air Pollution Control Code (Arkansas)

    Broader source: Energy.gov [DOE]

    The Arkansas Air Pollution Control code is adopted pursuant to Subchapter 2 of the Arkansas Water and Air Pollution Control Act (Arkansas Code Annotated 8-4-101). ) By authority of the same State...

  9. Quantum error-correcting codes and devices

    DOE Patents [OSTI]

    Gottesman, Daniel (Los Alamos, NM)

    2000-10-03T23:59:59.000Z

    A method of forming quantum error-correcting codes by first forming a stabilizer for a Hilbert space. A quantum information processing device can be formed to implement such quantum codes.

  10. The College Station Residential Energy Compliance Code

    E-Print Network [OSTI]

    Claridge, D. E.; Schrock, D.

    1988-01-01T23:59:59.000Z

    The City of College Station, Texas adopted a new residential Energy Compliance Code in January, 1988. The code, which strengthens compliance requirements in several areas, has received broadly based support and acceptance from all major constituent...

  11. Transforms for prediction residuals in video coding

    E-Print Network [OSTI]

    Kam??l?, Fatih

    2010-01-01T23:59:59.000Z

    Typically the same transform, the 2-D Discrete Cosine Transform (DCT), is used to compress both image intensities in image coding and prediction residuals in video coding. Major prediction residuals include the motion ...

  12. Microsoft Word - Foreign Obligation Codes.docx

    National Nuclear Security Administration (NNSA)

    March 2014 Transaction Code Material Balance Code Obligation 1 31 85 Australia 32 86 Canada 33 87 EURATOM 34 88 Japan 35 89 Peoples' Republic of China 36 C1 Russia 37 A8...

  13. Evolutionary approaches toward practical network coding

    E-Print Network [OSTI]

    Kim, Minkyu, 1976-

    2008-01-01T23:59:59.000Z

    There have been numerous studies showing various benefits of network coding. However, in order to have network coding widely deployed in real networks, it is also important to show that the amount of overhead incurred by ...

  14. N. Mariana Islands- Building Energy Code

    Broader source: Energy.gov [DOE]

    Much of the information presented in this summary is drawn from the U.S. Department of Energys (DOE) Building Energy Codes Program and the Building Codes Assistance Project (BCAP). For more...

  15. A Better Handoff for Code Officials

    SciTech Connect (OSTI)

    Conover, David R.; Yerkes, Sara

    2010-09-24T23:59:59.000Z

    The U.S. Department of Energy's Building Energy Codes Program has partnered with ICC to release the new Building Energy Codes Resource Guide: Code Officials Edition. We created this binder of practical materials for a simple reason: code officials are busy learning and enforcing several codes at once for the diverse buildings across their jurisdictions. This doesnt leave much time to search www.energycodes.gov, www.iccsafe.org, or the range of other helpful web-based resources for the latest energy codes tools, support, and information. So, we decided to bring the most relevant materials to code officials in a way that works best with their daily routine, and point to where they can find even more. Like a coachs game plan, the Resource Guide is an "energy playbook" for code officials.

  16. Green Codes and Programs | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Green Codes and Programs Green Codes and Programs Blue version of the EERE PowerPoint template, for use with PowerPoint 2007. Transcript Presentation More Documents & Publications...

  17. The EGS5 Code System

    SciTech Connect (OSTI)

    Hirayama, Hideo; Namito, Yoshihito; /KEK, Tsukuba; Bielajew, Alex F.; Wilderman, Scott J.; U., Michigan; Nelson, Walter R.; /SLAC

    2005-12-20T23:59:59.000Z

    In the nineteen years since EGS4 was released, it has been used in a wide variety of applications, particularly in medical physics, radiation measurement studies, and industrial development. Every new user and every new application bring new challenges for Monte Carlo code designers, and code refinements and bug fixes eventually result in a code that becomes difficult to maintain. Several of the code modifications represented significant advances in electron and photon transport physics, and required a more substantial invocation than code patching. Moreover, the arcane MORTRAN3[48] computer language of EGS4, was highest on the complaint list of the users of EGS4. The size of the EGS4 user base is difficult to measure, as there never existed a formal user registration process. However, some idea of the numbers may be gleaned from the number of EGS4 manuals that were produced and distributed at SLAC: almost three thousand. Consequently, the EGS5 project was undertaken. It was decided to employ the FORTRAN 77 compiler, yet include as much as possible, the structural beauty and power of MORTRAN3. This report consists of four chapters and several appendices. Chapter 1 is an introduction to EGS5 and to this report in general. We suggest that you read it. Chapter 2 is a major update of similar chapters in the old EGS4 report[126] (SLAC-265) and the old EGS3 report[61] (SLAC-210), in which all the details of the old physics (i.e., models which were carried over from EGS4) and the new physics are gathered together. The descriptions of the new physics are extensive, and not for the faint of heart. Detailed knowledge of the contents of Chapter 2 is not essential in order to use EGS, but sophisticated users should be aware of its contents. In particular, details of the restrictions on the range of applicability of EGS are dispersed throughout the chapter. First-time users of EGS should skip Chapter 2 and come back to it later if necessary. With the release of the EGS4 version, a deliberate attempt was made to present example problems in order to help the user ''get started'', and we follow that spirit in this report. A series of elementary tutorial user codes are presented in Chapter 3, with more sophisticated sample user codes described in Chapter 4. Novice EGS users will find it helpful to read through the initial sections of the EGS5 User Manual (provided in Appendix B of this report), proceeding then to work through the tutorials in Chapter 3. The User Manuals and other materials found in the appendices contain detailed flow charts, variable lists, and subprogram descriptions of EGS5 and PEGS. Included are step-by-step instructions for developing basic EGS5 user codes and for accessing all of the physics options available in EGS5 and PEGS. Once acquainted with the basic structure of EGS5, users should find the appendices the most frequently consulted sections of this report.

  18. CBP PHASE I CODE INTEGRATION

    SciTech Connect (OSTI)

    Smith, F.; Brown, K.; Flach, G.; Sarkar, S.

    2011-09-30T23:59:59.000Z

    The goal of the Cementitious Barriers Partnership (CBP) is to develop a reasonable and credible set of software tools to predict the structural, hydraulic, and chemical performance of cement barriers used in nuclear applications over extended time frames (greater than 100 years for operating facilities and greater than 1000 years for waste management). The simulation tools will be used to evaluate and predict the behavior of cementitious barriers used in near surface engineered waste disposal systems including waste forms, containment structures, entombments, and environmental remediation. These cementitious materials are exposed to dynamic environmental conditions that cause changes in material properties via (i) aging, (ii) chloride attack, (iii) sulfate attack, (iv) carbonation, (v) oxidation, and (vi) primary constituent leaching. A set of state-of-the-art software tools has been selected as a starting point to capture these important aging and degradation phenomena. Integration of existing software developed by the CBP partner organizations was determined to be the quickest method of meeting the CBP goal of providing a computational tool that improves the prediction of the long-term behavior of cementitious materials. These partner codes were selected based on their maturity and ability to address the problems outlined above. The GoldSim Monte Carlo simulation program (GTG 2010a, GTG 2010b) was chosen as the code integration platform (Brown & Flach 2009b). GoldSim (current Version 10.5) is a Windows based graphical object-oriented computer program that provides a flexible environment for model development (Brown & Flach 2009b). The linking of GoldSim to external codes has previously been successfully demonstrated (Eary 2007, Mattie et al. 2007). GoldSim is capable of performing deterministic and probabilistic simulations and of modeling radioactive decay and constituent transport. As part of the CBP project, a general Dynamic Link Library (DLL) interface was developed to link GoldSim with external codes (Smith III et al. 2010). The DLL uses a list of code inputs provided by GoldSim to create an input file for the external application, runs the external code, and returns a list of outputs (read from files created by the external application) back to GoldSim. In this way GoldSim provides: (1) a unified user interface to the applications, (2) the capability of coupling selected codes in a synergistic manner, and (3) the capability of performing probabilistic uncertainty analysis with the codes. GoldSim is made available by the GoldSim Technology Group as a free 'Player' version that allows running but not editing GoldSim models. The player version makes the software readily available to a wider community of users that would wish to use the CBP application but do not have a license for GoldSim.

  19. What's coming in 2012 codes

    E-Print Network [OSTI]

    Lacey, E

    2011-01-01T23:59:59.000Z

    ? High performance HVAC ? On-site renewables 2012 IECC Energy Savings and Environmental Impact ?[The 2012 IECC] represents the largest, one-step efficiency increase in the history of the national model energy code.? ? U.S. Department.... Environmental Impact ? Alliance to Save Energy: ?If all states adopted the 2012 IECC in 2012 and achieved full compliance by 2013 ?? ? 3.5 quadrillion Btu annual energy savings by 2030. ? $40 billion annual energy cost savings by 2030. ? 200 million...

  20. Homological Error Correction: Classical and Quantum Codes

    E-Print Network [OSTI]

    H. Bombin; M. A. Martin-Delgado

    2006-05-10T23:59:59.000Z

    We prove several theorems characterizing the existence of homological error correction codes both classically and quantumly. Not every classical code is homological, but we find a family of classical homological codes saturating the Hamming bound. In the quantum case, we show that for non-orientable surfaces it is impossible to construct homological codes based on qudits of dimension $D>2$, while for orientable surfaces with boundaries it is possible to construct them for arbitrary dimension $D$. We give a method to obtain planar homological codes based on the construction of quantum codes on compact surfaces without boundaries. We show how the original Shor's 9-qubit code can be visualized as a homological quantum code. We study the problem of constructing quantum codes with optimal encoding rate. In the particular case of toric codes we construct an optimal family and give an explicit proof of its optimality. For homological quantum codes on surfaces of arbitrary genus we also construct a family of codes asymptotically attaining the maximum possible encoding rate. We provide the tools of homology group theory for graphs embedded on surfaces in a self-contained manner.