Powered by Deep Web Technologies
Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements March 4, 2013 - 12:27am Addthis PROBLEM: RSA Authentication Agent Lets Remote Users Bypass...

2

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication  

Broader source: Energy.gov [DOE]

A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

3

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...  

Broader source: Energy.gov (indexed) [DOE]

7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

4

U-188: MySQL User Login Security Bypass and Unspecified Vulnerability  

Broader source: Energy.gov [DOE]

An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

5

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Broader source: Energy.gov (indexed) [DOE]

Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

6

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...  

Broader source: Energy.gov (indexed) [DOE]

8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

7

V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind &Apple iOSEnergyRequirements |

8

T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data  

Broader source: Energy.gov [DOE]

Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

9

T-709:Mac OS X Keychain Certificate Settings Can Be Bypassed...  

Broader source: Energy.gov (indexed) [DOE]

available at the time of this entry. Addthis Related Articles U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-130: JBoss Operations...

10

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

11

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

Sheldon, Nathan D.

12

SSL/TLS Session-Aware User Authentication Rolf Oppliger1  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

Basin, David

13

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

Basin, David

14

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

15

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories  

Broader source: Energy.gov [DOE]

A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

16

Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for  

E-Print Network [OSTI]

University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

17

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)  

E-Print Network [OSTI]

A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

Basin, David

18

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart  

E-Print Network [OSTI]

SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

Basin, David

19

SECURING UNFAMILAR SYSTEM ENTRY POINTS AGAINST FAULTY USER AUTHENTICATION VIA  

E-Print Network [OSTI]

of electromagnetic interference produced by these circuits. Furthermore, this paper outlines a novel approach to user the electromagnetic interference produced by the keyboard device, making it considerably harder to isolate

Thornton, Mitchell

20

A Primary User Authentication System for Mobile Cognitive Radio Networks  

E-Print Network [OSTI]

portion of the licensed spectrum to establish network commu- nications. Essential to the co Cognitive radio technology is expected to increase the spectrum utilization by allowing opportunistic use of the idle portion of the licensed spectrum by Secondary (unlincensed) Users (SUs) [1], [9], [15], [17

Lazos, Loukas

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

22

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

23

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsA

24

U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|Conduct Cross-Site

25

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication or Obtain

26

Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures  

E-Print Network [OSTI]

any harmful interference to the primary user [17]. For example, in IEEE 802.22 WRANs, TV transmission towers are primary users, and radio devices that use TV channels for communication are secondary users should not use those channels to avoid interfering with the transmission of the primary user. Existing m

Ning, Peng

27

T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multipleAuthentication

28

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

29

V-231: Cisco Identity Services Engine Discloses Authentication...  

Energy Savers [EERE]

231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users...

30

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational services such as user authentication and access, central file  

E-Print Network [OSTI]

CAH and Shared Services Transition Plan CAH will move seven servers that provide daily operational the university's NET domain. Domains provide user authentication, access, and management to resources divide the transition plan, and each phase has goals and a deadline. The overall goal is to continue

Wu, Shin-Tson

31

Multi-factor authentication  

DOE Patents [OSTI]

Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

Hamlet, Jason R; Pierson, Lyndon G

2014-10-21T23:59:59.000Z

32

ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing  

E-Print Network [OSTI]

such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

33

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...  

Broader source: Energy.gov (indexed) [DOE]

and Change User Passwords U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-173: Symantec Web Gateway Multiple Vulnerabilities...

34

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

35

Ch.3 User Authentication Textbook?  

E-Print Network [OSTI]

· account lockout mechanisms · policies against using common passwords but rather hard to guess passwords

Dong, Yingfei

36

T-703: Cisco Unified Communications Manager Open Query Interface...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

37

Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services PrintUser'sUSERS

38

U-084: Cisco Digital Media Manager Lets Remote Authenticated...  

Broader source: Energy.gov (indexed) [DOE]

authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

39

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Broader source: Energy.gov (indexed) [DOE]

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

40

U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote...  

Broader source: Energy.gov (indexed) [DOE]

1: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass...

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

42

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

keeps track of UDP packets within memory. November 9, 2011 U-031: Microsoft Active Directory CRL Validation Flaw Lets Remote Users Bypass Authentication A remote user can bypass...

43

Authentication of byte sequences  

SciTech Connect (OSTI)

Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

Stearns, S.D.

1991-06-01T23:59:59.000Z

44

Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy  

DOE Patents [OSTI]

A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

2000-01-01T23:59:59.000Z

45

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

46

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full  

E-Print Network [OSTI]

Authentication ofAuthentication ofAuthentication ofAuthentication of Degree Certificates Application Form Name in Full Name in Full as Registered at King's Date of Birth Student ID number (IE degree certificate copies for authentication to: PLEASE REMEMBER TO INCLUDE COPIES OF YOUR CERTIFICATE(S

Applebaum, David

47

T-646: Debian fex authentication bypass | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO46: Debian fex

48

T-606: Sun Java System Access Manager Lets Remote Users Partially...  

Broader source: Energy.gov (indexed) [DOE]

6: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data T-606: Sun Java System Access Manager Lets Remote...

49

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

50

Public workstations: Authentication  

E-Print Network [OSTI]

identification. 3. Personal data With registration, library clients and guests accept that their personal dataPublic workstations: Authentication The public workstations require a personal login. This flyer will provide you with information on the procedure for receiving personal login details (authentication

Gilli, Adrian

51

Bypass Flow Study  

SciTech Connect (OSTI)

The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments use Particle Image Velocimetry (PIV) to measure the velocity fields that will populate the bypass flow study database.

Richard Schultz

2011-09-01T23:59:59.000Z

52

User Authentication Policy | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates by DianeDemographics UsageUsage Policies

53

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks  

Broader source: Energy.gov [DOE]

Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

54

PAKE-based mutual HTTP authentication for preventing phishing attacks  

E-Print Network [OSTI]

This paper describes a new password-based mutual authentication protocol for Web systems which prevents various kinds of phishing attacks. This protocol provides a protection of user's passwords against any phishers even if dictionary attack is employed, and prevents phishers from imitating a false sense of successful authentication to users. The protocol is designed considering interoperability with many recent Web applications which requires many features which current HTTP authentication does not provide. The protocol is proposed as an Internet Draft submitted to IETF, and implemented in both server side (as an Apache extension) and client side (as a Mozilla-based browser and an IE-based one). The paper also proposes a new user-interface for this protocol which is always distinguishable from fake dialogs provided by phishers.

Oiwa, Yutaka; Takagi, Hiromitsu

2009-01-01T23:59:59.000Z

55

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags sensitive information. For example, without pri- vacy protection, any reader can identify a consumer's ID

Liu, Yunhao

56

Dynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems , Jinsong Han2  

E-Print Network [OSTI]

- sitive information. For example, without privacy pro- tection, any reader can identify a consumer's IDDynamic Key-Updating: Privacy-Preserving Authentication for RFID Systems Li Lu1 , Jinsong Han2 an emerging requirement ­ protecting user privacy [13] in RFID authentications. In most RFID systems, tags

Liu, Yunhao

57

Formal Analysis and Systematic Construction of Two-factor Authentication Scheme  

E-Print Network [OSTI]

, Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

58

QKD Quantum Channel Authentication  

E-Print Network [OSTI]

Several simple yet secure protocols to authenticate the quantum channel of various QKD schemes, by coupling the photon sender's knowledge of a shared secret and the QBER Bob observes, are presented. It is shown that Alice can encrypt certain portions of the information needed for the QKD protocols, using a sequence whose security is based on computational-complexity, without compromising all of the sequence's entropy. It is then shown that after a Man-in-the-Middle attack on the quantum and classical channels, there is still enough entropy left in the sequence for Bob to detect the presence of Eve by monitoring the QBER. Finally, it is shown that the principles presented can be implemented to authenticate the quantum channel associated with any type of QKD scheme, and they can also be used for Alice to authenticate Bob.

J. T. Kosloski

2006-04-02T23:59:59.000Z

59

Key recycling in authentication  

E-Print Network [OSTI]

In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

Christopher Portmann

2014-09-29T23:59:59.000Z

60

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...  

Office of Environmental Management (EM)

Controller Software for Integrated Services Module 300 and Cisco Services-Ready Engine 700, 710, 900, and 910 ABSTRACT: A remote authenticated user can execute arbitrary...

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Broader source: Energy.gov (indexed) [DOE]

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

62

Interventions in Infrainguinal Bypass Grafts  

SciTech Connect (OSTI)

The interventional radiologist plays an important role in the detection and prevention of infrainguinal bypass failure. Early detection and evaluation of flow-limiting lesions effectively preserve graft (venous bypass and polyester or expanded polytetrafluoroethylene bypass) patency by identifying stenoses before occlusion occurs. Delay in treatment of the at-risk graft may result in graft failure and a reduced chance of successful revascularization. For this reason, surveillance protocols form an important part of follow-up after infrainguinal bypass surgery. As well as having an understanding of the application of imaging techniques including ultrasound, MR angiography, CT angiography and digital subtraction angiography, the interventional radiologist should have detailed knowledge of the minimally invasive therapeutic options. Percutaneous transluminal angioplasty (PTA), or alternatively cutting balloon angioplasty, is the interventional treatment of choice in prevention of graft failure and occlusion. Further alternatives include metallic stent placement, fibrinolysis, and mechanical thrombectomy. Primary assisted patency rates following PTA can be up to 65% at 5 years. When the endovascular approach is unsuccessful, these therapeutic options are complemented by surgical procedures including vein patch revision, jump grafting, or placement of a new graft.

Mueller-Huelsbeck, S., E-mail: muehue@rad.uni-kiel.de; Order, B.-M.; Jahnke, T. [University Hospital Schleswig-Holstein - Campus Kiel, Department of Radiology (Germany)

2006-02-15T23:59:59.000Z

63

Provably Secure Password-based Authentication in TLS  

SciTech Connect (OSTI)

In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

2005-12-20T23:59:59.000Z

64

T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw  

Broader source: Energy.gov [DOE]

An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

65

Secure Anonymous RFID Authentication Protocols Christy Chatmon  

E-Print Network [OSTI]

and scalable. Keywords: RFID, Authentication, Anonymity, Privacy, Availability, Scalability. 1 Introduction technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags doSecure Anonymous RFID Authentication Protocols Christy Chatmon Computer & Information Sciences

Burmester, Mike

66

IT Licentiate theses Query Authentication and  

E-Print Network [OSTI]

IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

Flener, Pierre

67

TwoKind Authentication: Usable Authenticators for Untrustworthy Environments  

E-Print Network [OSTI]

damage if the session or their password is compromised. 1. INTRODUCTION In today's Internet. Current authentication mechanisms such as one-time passwords [4] (such as RSA SecurID [3]) and privileged-time passwords limit the damage caused by stolen passwords, but allow full-scale damage in a hijacked session

Smith, Sean W.

68

V-216: Drupal Monster Menus Module Security Bypass and Script...  

Office of Environmental Management (EM)

Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities...

69

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

70

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

71

Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and...

72

Thermal Bypass Air Barriers in the 2009 International Energy...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code - Building America Top Innovation Thermal Bypass Air Barriers in the 2009 International Energy...

73

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway....

74

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks Several vulnerabilities were reported in McAfee Email Gateway....

75

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

76

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

77

JC3 Bulletin Archive | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

78

JC3 | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

79

Obfuscated authentication systems, devices, and methods  

DOE Patents [OSTI]

Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

Armstrong, Robert C; Hutchinson, Robert L

2013-10-22T23:59:59.000Z

80

How to Balance Privacy and Key Management in User Authentication  

E-Print Network [OSTI]

without electronic data? Privacy vs. Accountability #12;· CURRENTLY: The worst of both worlds: ­ Personal ­ Personal data cannot be located when you need it ­ (Or cannot be released due to a poorly designed ­ Personal data is only disclosed under well- defined conditions, to which the person agrees Privacy vs

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Implicit User Re-authentication for Mobile Sausan Yazji1  

E-Print Network [OSTI]

dramatically. Features of the Lamp: · Battery, Mechanically, or Electrically powered · All lighting Firelight would be Non-Governmental Organizations (NGOs) · Doctors Without Borders · World Bank · World to the lamp and used to power the light. · Battery Powered: The light can be powered by a car battery

Dick, Robert

82

Bypass diode for a solar cell  

DOE Patents [OSTI]

Bypass diodes for solar cells are described. In one embodiment, a bypass diode for a solar cell includes a substrate of the solar cell. A first conductive region is disposed above the substrate, the first conductive region of a first conductivity type. A second conductive region is disposed on the first conductive region, the second conductive region of a second conductivity type opposite the first conductivity type.

Rim, Seung Bum (Palo Alto, CA); Kim, Taeseok (San Jose, CA); Smith, David D. (Campbell, CA); Cousins, Peter J. (Menlo Park, CA)

2012-03-13T23:59:59.000Z

83

V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field EmissionFunctionalPortalV > 111 \il3:

84

V-236: MediaWiki CentralAuth Extension Authentication Bypass...  

Energy Savers [EERE]

Web: http:energy.govcioservicesincident-management E-mail: circ@jc3.doe.gov JC3 services are available to JC3-Joint Cybersecurity Coordination Center, and JC3 Contractors....

85

Occurrence of Pesticides in Water, Sediment, and Soil from the Yolo Bypass, California  

E-Print Network [OSTI]

water and sediment from Yolo Bypass, California, 2004-2005.L. 2002. California’s Yolo Bypass: Evidence that floodfish. KEYWORDS pesticides, Yolo Bypass, fish, surface water,

Smalling, Kelly L.; Orlando, James L.; Kuivila, Kathryn M.

2007-01-01T23:59:59.000Z

86

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct...  

Broader source: Energy.gov (indexed) [DOE]

can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID:...

87

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

88

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING  

E-Print Network [OSTI]

DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

Cortesi, Tino

89

Verifying authentication protocols with CSP Steve Schneider  

E-Print Network [OSTI]

Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

Doran, Simon J.

90

Final report for the network authentication investigation and pilot.  

SciTech Connect (OSTI)

New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

2006-11-01T23:59:59.000Z

91

AUTHENTICATED  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudget AdvancedASSESSINGEnergy

92

AVTA: Oil Bypass Filter Specifications and Test Procedures  

Broader source: Energy.gov [DOE]

PuraDYN Oil Bypass Filtration System Evaluation Test Plan methodology is used in the testing of all oil bypass filters on the buses at the Idaho National Laboratory.

93

LANSCE | Users | User Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016LANSCE User Program

94

Bypass apparatus and method for series connected energy storage devices  

DOE Patents [OSTI]

A bypass apparatus and method for series connected energy storage devices. Each of the energy storage devices coupled to a common series connection has an associated bypass unit connected thereto in parallel. A current bypass unit includes a sensor which is coupled in parallel with an associated energy storage device or cell and senses an energy parameter indicative of an energy state of the cell, such as cell voltage. A bypass switch is coupled in parallel with the energy storage cell and operable between a non-activated state and an activated state. The bypass switch, when in the non-activated state, is substantially non-conductive with respect to current passing through the energy storage cell and, when in the activated state, provides a bypass current path for passing current to the series connection so as to bypass the associated cell. A controller controls activation of the bypass switch in response to the voltage of the cell deviating from a pre-established voltage setpoint. The controller may be included within the bypass unit or be disposed on a control platform external to the bypass unit. The bypass switch may, when activated, establish a permanent or a temporary bypass current path.

Rouillard, Jean (Saint-Luc, CA); Comte, Christophe (Montreal, CA); Daigle, Dominik (St-Hyacinthe, CA)

2000-01-01T23:59:59.000Z

95

Final report and recommendations of the ESnet Authentication Pilot Project  

SciTech Connect (OSTI)

To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

1995-01-01T23:59:59.000Z

96

Hardware device binding and mutual authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

Hamlet, Jason R; Pierson, Lyndon G

2014-03-04T23:59:59.000Z

97

Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes  

DOE Patents [OSTI]

Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

Kent, Alexander Dale (Los Alamos, NM)

2008-09-02T23:59:59.000Z

98

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

THESIS A Service-oriented Architecture for AuthenticationSAN DIEGO A Service-oriented Architecture for Authentication2.0, which is a service-oriented architecture that addresses

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

99

V-174: RSA Authentication Manager Writes Operating System, SNMP...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

100

PAP: A Privacy and Authentication Protocol for Passive RFID Tags  

E-Print Network [OSTI]

PAP: A Privacy and Authentication Protocol for Passive RFID Tags Alex X. Liu LeRoy A. Bailey for RFID tags is necessary to ensure the privacy and authentication between each tag and their reader. In order to accomplish this, we propose PAP, a privacy and authentication protocol for passive RFID tags

Liu, Alex X.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL  

E-Print Network [OSTI]

REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

102

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE  

E-Print Network [OSTI]

FORENSIC CONNOISSEURSHIP, JACKSON POLLOCK, AND THE AUTHENTIC EYE by Francis V. O'Connor, Ph shall proceed to some general #12;Forensic Connoisseurship, Pollock, & The Authentic Eye - F. V. O, the training of authentic eyes and forensic connoisseurs -- concluding with a final thought on the historicity

Taylor, Richard

103

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

104

V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerabil...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory SA53495...

105

V-036: EMC Smarts Network Configuration Manager Database Authenticatio...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

106

Spatial Data Authentication Using Mathematical Visualization  

E-Print Network [OSTI]

Spatial Data Authentication Using Mathematical Visualization Vert, G., Harris, F., Nasser, S. Dept has become an increasingly compromised method to transmit any type of data including spatial data. Due to the criticality of spatial data in decision making processes that range from military targeting to urban planning

Harris Jr., Frederick C.

107

A SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE  

E-Print Network [OSTI]

. In this paper, we propose to secure an infrastructure providing telecommunication services on the Internet- bile Internet Telecommunication services (MobInTel). We present this infrastructure in detailsA SECURE AUTHENTICATION INFRASTRUCTURE FOR MOBILE COMMUNICATION SERVICES OVER THE INTERNET Ir

von Bochmann, Gregor

108

Bypass diode for a solar cell  

DOE Patents [OSTI]

Methods of fabricating bypass diodes for solar cells are described. In once embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed on the first conductive region. In another embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed within, and surrounded by, an uppermost portion of the first conductive region but is not formed in a lowermost portion of the first conductive region.

Rim, Seung Bum; Kim, Taeseok; Smith, David D; Cousins, Peter J

2013-11-12T23:59:59.000Z

109

Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations 2005 Diesel Engine Emissions Reduction (DEER)...

110

V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...  

Broader source: Energy.gov (indexed) [DOE]

2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 -...

111

E-Print Network 3.0 - aortocoronary bypass surgery Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and MRI measurement of flow in an aorto-coronary bypass graft with various inlet flow conditions... . Introduction Bypass graft surgery is a widely applied procedure to relieve...

112

User Agreements | Partnerships | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

user facilities to the User Office of the specific facility. Users must include an acknowledgement on all publications that include work performed at ORNL. Users should refer to...

113

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services Print The User Services

114

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services Print The User

115

User's Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services PrintUser's Manual for

116

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.Home Contact User

117

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.Home Contact UserAuthor

118

Verifiable process monitoring through enhanced data authentication.  

SciTech Connect (OSTI)

To ensure the peaceful intent for production and processing of nuclear fuel, verifiable process monitoring of the fuel production cycle is required. As part of a U.S. Department of Energy (DOE)-EURATOM collaboration in the field of international nuclear safeguards, the DOE Sandia National Laboratories (SNL), the European Commission Joint Research Centre (JRC) and Directorate General-Energy (DG-ENER) developed and demonstrated a new concept in process monitoring, enabling the use of operator process information by branching a second, authenticated data stream to the Safeguards inspectorate. This information would be complementary to independent safeguards data, improving the understanding of the plant's operation. The concept is called the Enhanced Data Authentication System (EDAS). EDAS transparently captures, authenticates, and encrypts communication data that is transmitted between operator control computers and connected analytical equipment utilized in nuclear processes controls. The intent is to capture information as close to the sensor point as possible to assure the highest possible confidence in the branched data. Data must be collected transparently by the EDAS: Operator processes should not be altered or disrupted by the insertion of the EDAS as a monitoring system for safeguards. EDAS employs public key authentication providing 'jointly verifiable' data and private key encryption for confidentiality. Timestamps and data source are also added to the collected data for analysis. The core of the system hardware is in a security enclosure with both active and passive tamper indication. Further, the system has the ability to monitor seals or other security devices in close proximity. This paper will discuss the EDAS concept, recent technical developments, intended application philosophy and the planned future progression of this system.

Goncalves, Joao G. M. (European Commission Joint Research Centre, Italy); Schwalbach, Peter (European Commission Directorate General%3CU%2B2014%3EEnergy, Luxemburg); Schoeneman, Barry Dale; Ross, Troy D.; Baldwin, George Thomas

2010-09-01T23:59:59.000Z

119

CFD Analysis of Core Bypass Phenomena  

SciTech Connect (OSTI)

The U.S. Department of Energy is exploring the potential for the VHTR which will be either of a prismatic or a pebble-bed type. One important design consideration for the reactor core of a prismatic VHTR is coolant bypass flow which occurs in the interstitial regions between fuel blocks. Such gaps are an inherent presence in the reactor core because of tolerances in manufacturing the blocks and the inexact nature of their installation. Furthermore, the geometry of the graphite blocks changes over the lifetime of the reactor because of thermal expansion and irradiation damage. The existence of the gaps induces a flow bias in the fuel blocks and results in unexpected increase of maximum fuel temperature. Traditionally, simplified methods such as flow network calculations employing experimental correlations are used to estimate flow and temperature distributions in the core design. However, the distribution of temperature in the fuel pins and graphite blocks as well as coolant outlet temperatures are strongly coupled with the local heat generation rate within fuel blocks which is not uniformly distributed in the core. Hence, it is crucial to establish mechanistic based methods which can be applied to the reactor core thermal hydraulic design and safety analysis. Computational Fluid Dynamics (CFD) codes, which have a capability of local physics based simulation, are widely used in various industrial fields. This study investigates core bypass flow phenomena with the assistance of commercial CFD codes and establishes a baseline for evaluation methods. A one-twelfth sector of the hexagonal block surface is modeled and extruded down to whole core length of 10.704m. The computational domain is divided vertically with an upper reflector, a fuel section and a lower reflector. Each side of the sector grid can be set as a symmetry boundary

Richard W. Johnson; Hiroyuki Sato; Richard R. Schultz

2010-03-01T23:59:59.000Z

120

CFD Analysis of Core Bypass Phenomena  

SciTech Connect (OSTI)

The U.S. Department of Energy is exploring the potential for the VHTR which will be either of a prismatic or a pebble-bed type. One important design consideration for the reactor core of a prismatic VHTR is coolant bypass flow which occurs in the interstitial regions between fuel blocks. Such gaps are an inherent presence in the reactor core because of tolerances in manufacturing the blocks and the inexact nature of their installation. Furthermore, the geometry of the graphite blocks changes over the lifetime of the reactor because of thermal expansion and irradiation damage. The existence of the gaps induces a flow bias in the fuel blocks and results in unexpected increase of maximum fuel temperature. Traditionally, simplified methods such as flow network calculations employing experimental correlations are used to estimate flow and temperature distributions in the core design. However, the distribution of temperature in the fuel pins and graphite blocks as well as coolant outlet temperatures are strongly coupled with the local heat generation rate within fuel blocks which is not uniformly distributed in the core. Hence, it is crucial to establish mechanistic based methods which can be applied to the reactor core thermal hydraulic design and safety analysis. Computational Fluid Dynamics (CFD) codes, which have a capability of local physics based simulation, are widely used in various industrial fields. This study investigates core bypass flow phenomena with the assistance of commercial CFD codes and establishes a baseline for evaluation methods. A one-twelfth sector of the hexagonal block surface is modeled and extruded down to whole core length of 10.704m. The computational domain is divided vertically with an upper reflector, a fuel section and a lower reflector. Each side of the one-twelfth grid can be set as a symmetry boundary

Richard W. Johnson; Hiroyuki Sato; Richard R. Schultz

2009-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Formal analysis of device authentication applications in ubiquitous computing.  

SciTech Connect (OSTI)

Authentication between mobile devices in ad-hoc computing environments is a challenging problem. Without pre-shared knowledge, existing applications rely on additional communication methods, such as out-of-band or location-limited channels for device authentication. However, no formal analysis has been conducted to determine whether out-of-band channels are actually necessary. We answer this question through formal analysis, and use BAN logic to show that device authentication using a single channel is not possible.

Shin, Dongwan (New Mexico Tech, Socorro, NM); Claycomb, William R.

2010-11-01T23:59:59.000Z

122

Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival  

E-Print Network [OSTI]

the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

Kim, Hyounggon

2005-02-17T23:59:59.000Z

123

A Flexible Approach to Embedded Network Multicast Authentication  

E-Print Network [OSTI]

A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

Koopman, Philip

124

Shouhuai Xu 2000 1 Password-based Authentication and  

E-Print Network [OSTI]

&AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

Sandhu, Ravi

125

Oil Bypass Filter Technology Performance Evaluation - First Quarterly Report  

SciTech Connect (OSTI)

This report details the initial activities to evaluate the performance of the oil bypass filter technology being tested by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass systems from the puraDYN Corporation. Each bus averages about 60,000 miles a year. The evaluation includes an oil analysis regime to monitor the presence of necessary additives in the oil and to detect undesirable contaminants. Very preliminary economic analysis suggests that the oil bypass system can reduce life-cycle costs. As the evaluation continues and oil avoidance costs are quantified, it is estimated that the bypass system economics may prove increasingly favorable, given the anticipated savings in operational costs and in reduced use of oil and waste oil avoidance.

Zirker, L.R.; Francfort, J.E.

2003-01-31T23:59:59.000Z

126

Oil Bypass Filter Technology Performance Evaluation - January 2003 Quarterly Report  

SciTech Connect (OSTI)

This report details the initial activities to evaluate the performance of the oil bypass filter technology being tested by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass systems from the puraDYN Corporation. Each bus averages about 60,000 miles a year. The evaluation includes an oil analysis regime to monitor the presence of necessary additives in the oil and to detect undesirable contaminants. Very preliminary economic analysis suggests that the oil bypass system can reduce life-cycle costs. As the evaluation continues and oil avoidance costs are quantified, it is estimated that the bypass system economics may prove increasingly favorable, given the anticipated savings in operational costs and in reduced use of oil and waste oil avoidance.

Laurence R. Zirker; James E. Francfort

2003-01-01T23:59:59.000Z

127

Development of By-Pass Blending Station System  

E-Print Network [OSTI]

A new building blending station system named by-pass blending station (BBS) has been developed to reduce building pump energy consumption in both district heating and cooling systems. Theoretical investigation demonstrated that the BBS can...

Liu, M.; Barnes, D.; Bunz, K.; Rosenberry, N.

2003-01-01T23:59:59.000Z

128

EA-1262: McKay Bypass Canal Extension, Golden, Colorado  

Broader source: Energy.gov [DOE]

This EA evaluates the environmental impacts for the proposal to extend the McKay Bypass Canal in order to route water from the existing Canal north of the Walnut Creek drainage on the east side of...

129

Extreme Users WHY engage with extreme users  

E-Print Network [OSTI]

Extreme Users METHOD WHY engage with extreme users HOW to engage extreme users Designers engage inspiration from their work-arounds and frameworks. When you speak with and observe extreme users, their needs extreme users are often also needs of a wider population. Determine who's extreme Determining who

Prinz, Friedrich B.

130

Bypass flow computations on the LOFA transient in a VHTR  

SciTech Connect (OSTI)

Bypass flow in the prismatic gas-cooled very high temperature reactor (VHTR) is not intentionally designed to occur, but is present in the gaps between graphite blocks. Previous studies of the bypass flow in the core indicated that the cooling provided by flow in the bypass gaps had a significant effect on temperature and flow distributions for normal operating conditions. However, the flow and heat transports in the core are changed significantly after a Loss of Flow Accident (LOFA). This study aims to study the effect and role of the bypass flow after a LOFA in terms of the temperature and flow distributions and for the heat transport out of the core by natural convection of the coolant for a 1/12 symmetric section of the active core which is composed of images and mirror images of two sub-region models. The two sub-region models, 9 x 1/12 and 15 x 1/12 symmetric sectors of the active core, are employed as the CFD flow models using computational grid systems of 70.2 million and 117 million nodes, respectively. It is concluded that the effect of bypass flow is significant for the initial conditions and the beginning of LOFA, but the bypass flow has little effect after a long period of time in the transient computation of natural circulation.

Yu-Hsin Tung [National Tsing Hua Univ., Hsinchu (Taiwan). Inst. of Nuclear Engineering and Science; Richard W. Johnson [Idaho National Laboratory (INL), Idaho Falls, ID (United States); Yuh-Ming Ferng [National Tsing Hua Univ., Hsinchu (Taiwan). Inst. of Nuclear Engineering and Science; Ching-Chang Chieng [City Univ. of Hong Kong, Kowloon (Hong Kong). Dept. of Mechanical and Biomedical Engineering

2014-01-01T23:59:59.000Z

131

Enhancing CardSpace Authentication Using a Mobile Device  

E-Print Network [OSTI]

, authentication. 1 Introduction In line with the continuing increase in the number of on-line services requir- ing design goals of CardSpace is to reduce reliance on password authentication. We address this limitation, since the additional overhead is handled by the client. The remainder of the paper is

Sheldon, Nathan D.

132

Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks  

E-Print Network [OSTI]

Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

Ning, Peng

133

On the construction of digest functions for manual authentication protocols  

E-Print Network [OSTI]

On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

Jeavons, Peter

134

Hardware authentication using transmission spectra modified optical fiber.  

SciTech Connect (OSTI)

The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

Grubbs, Robert K.; Romero, Juan A.

2010-09-01T23:59:59.000Z

135

User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed Fuel DispositionUser Accounts

136

User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed Fuel DispositionUser

137

User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 Business MeetingUser

138

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 BusinessUserPolicy

139

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07:CCSM4large.jpgServicesUser

140

User Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosion Monitoring:Home|Physics ResearchLCLS Sign Register todayUser

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Prospective Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNews &UserPrivacyGasProgramsSynchrotronHome

142

User Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register with the ALS

143

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register with the

144

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register with

145

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register withPolicy

146

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.

147

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.Home Contact

148

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.Home ContactServices

149

User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.Home

150

LANSCE | Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisit Rosen

151

User Information  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearch UpperFacilities atGuideUser

152

User Policy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearch UpperFacilitiesPolicy User

153

User Program | Prospective Users US  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register

154

V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Gateway Lets Remote Users Bypass Authentication and Conduct Cross-Site Scripting and Directory Traversal Attacks T-688: McAfee Security Bulletin - McAfee SaaS Endpoint Protection...

155

HYDROLOGY AND CHEMISTRY OF FLOODWATERS IN THE YOLO BYPASS, SACRAMENTO RIVER SYSTEM, CALIFORNIA, DURING 2000.  

E-Print Network [OSTI]

HYDROLOGY AND CHEMISTRY OF FLOODWATERS IN THE YOLO BYPASS, SACRAMENTO RIVER SYSTEM, CALIFORNIA..................................................1 Introduction..............................................2 Hydrology of the Yolo Bypass....................7 Dissolved Metals....................................10 Samples collected by boat in the Yolo

156

Profitability of CCS with flue gas bypass and solvent storage Supplementary Information  

E-Print Network [OSTI]

1 Profitability of CCS with flue gas bypass and solvent storage #12; 2 Perfect information model formulation Sets t T Time, in hours, from K Capital cost to oversize turbine if solvent storage or bypass are used

Jaramillo, Paulina

157

Authenticity and Physiological Changes during Defensive Verbal Response  

E-Print Network [OSTI]

who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

Yen, Yana

2013-08-31T23:59:59.000Z

158

authenticated key agreement: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

159

Understanding 'It': Affective Authenticity, Space, and the Phish Scene  

E-Print Network [OSTI]

"Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

Yeager, Elizabeth Anne

2011-04-26T23:59:59.000Z

160

Floodwater Chemistry in the Yolo Bypass during Winter and Spring 1998  

E-Print Network [OSTI]

Floodwater Chemistry in the Yolo Bypass during Winter and Spring 1998 Open-File Report 2007­1025 U.S. Department of the Interior U.S. Geological Survey #12;Floodwater Chemistry in the Yolo Bypass during Winter-USGS Suggested citation: Schemel, L.E., Cox, M.H., 2007, Floodwater Chemistry in the Yolo Bypass during Winter

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints...  

Broader source: Energy.gov (indexed) [DOE]

ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT...

162

V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale Wind & Solar PowerDepartment of

163

T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from the GridwiseSiteDepartmentChallengeCompliance7/109 TORNADO * FLASH FLOOD

164

U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6ScriptingURL Address|Conduct

165

Cycling firing method for bypass operation of bridge converters  

SciTech Connect (OSTI)

The bridge converter comprises a number of switching elements and an electronic logic system which regulated the electric power levels by controlling the firing, i.e., the initiation of the conduction period of the switching elements. Cyclic firing of said elements allows the direct current to bypass the alternating current system with high power factor and negligible losses.

Zabar, Zivan (99-72 66th Rd., Apt. 9N, Forest Hills, NY 11375)

1982-01-01T23:59:59.000Z

166

Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules (Poster)  

SciTech Connect (OSTI)

This paper presents the result of high-temperature durability and thermal cycling testing and analysis for the selected diodes to study the detail of the thermal design and relative long-term reliability of the bypass diodes used to limit the detrimental effects of module hot-spot susceptibility.

Zhang, Z.; Wohlgemuth, J.; Kurtz, S.

2013-05-01T23:59:59.000Z

167

The USER cloning standard  

E-Print Network [OSTI]

This BioBricks Foundation Request for Comments (BBF RFC) provides information about the design of uracil-containing primers used for USER cloning and USER fusion.

Kaas, Christian Schrřder

2009-11-01T23:59:59.000Z

168

Manual authentication for wireless devices Christian Gehrmann  

E-Print Network [OSTI]

is to examine how these services might best be achieved for personal wireless-enabled devices. Using the terminology of Stajano [12], the problem is that of securely `imprinting' a personal device. That is, suppose a user has two wireless-enabled devices, e.g. a mobile phone and a Personal Digital Assistant (PDA

Mitchell, Chris

169

Fraction Collector User Manual  

E-Print Network [OSTI]

Fraction Collector Frac-950 18-1139-56 User Manual #12;#12;Important user information All users Territories Hong Kong © Copyright Amersham Biosciences AB 2002 - All rights reserved Fraction Collector Frac Fraction Collector Frac-950 User Manual 18-1139-56 Edition AE v Contents 1 Introduction 1.1 General

Pawlowski, Wojtek

170

Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis  

E-Print Network [OSTI]

Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

Li, Depeng

171

Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)  

E-Print Network [OSTI]

1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

Doran, Simon J.

172

Authentic, Dialogic Writing: Th e Case of a Letter to the Editor  

E-Print Network [OSTI]

A teacher educator reflects on the educational value of an authentic writing assignment inspired by real-world local events.

Hallman, Heidi L.

2009-01-01T23:59:59.000Z

173

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris Škori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

174

Authentication in the Clouds: A Framework and its Application to Mobile Users  

E-Print Network [OSTI]

.00. With bank accounts, health records, corporate intellectual property and politically sensitive information. For instance, it is often not practical to require security-related computation that notably limits battery

175

Implicit User Re-Authentication for Mobile Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheuermann  

E-Print Network [OSTI]

of servers and battery-powered portable devices. The proposed system is able to distinguish between normal% of a typical laptop battery in 24 hours. 1 Introduction Portable computing devices such as personal digital- formation, e.g., bank account, commercial transaction, and private emails. How- ever, they are frequently

Bustamante, Fabián E.

176

V-195: RSA Authentication Manager Lets Local Users View the Administra...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks...

177

T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges  

Broader source: Energy.gov [DOE]

A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

178

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...  

Energy Savers [EERE]

5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

179

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment of EnergyProgram2-26TheUtility-Scale WindDepartment of Energy

180

T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy StrainClient update resolve multiple

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGain

182

V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartment ofEnergy,PotomacGeneratorsAUsersExecuteGainLet

183

V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting Attacks | Department of

184

V-195: RSA Authentication Manager Lets Local Users View the Administrative  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScripting AttacksThere

185

V-223: RSA Authentication Agent for PAM Allows Remote Users to Make  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discoveredSUSE

186

U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code | Department

187

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of EnergyTheTwo New Energy Storage6 (07/03)Arbitrary Code|Privileges,

188

The order of encryption and authentication for protecting communications (Or: how secure is SSL?)  

E-Print Network [OSTI]

The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

189

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

, or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

190

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

Tygar, Doug

191

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

192

E-Print Network 3.0 - aortocoronary bypass graft Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Materials Summary: . Holmes, Jr., and H. V. Schaff. Aortocoronary bypass grafting with expanded polytetrafluoroethylene: 12... , synthetic polymers currently used as artificial...

193

E-Print Network 3.0 - above-knee femoropopliteal bypass Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Source: Kozak, Victor R. - Budker Institute of Nuclear Physics Collection: Fission and Nuclear Technologies ; Physics 19 2009 ASHRAE 199 The issue of filter bypass has long been...

194

E-Print Network 3.0 - artery bypass operations Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

by intravenous delivery of salt and water. This route of delivery bypasses ... Source: Brand, Paul H. - Department of Physiology and Pharmacology, University of Toledo...

195

Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols  

E-Print Network [OSTI]

to privacy of consumers. In recent years, the cryptographic community have made an extensive effort Zahra Ahmadian, Mahmoud Salmasizadeh, and Mohammad Reza Aref Abstract--Privacy is faced to serious years have focused on design and analysis of privacy friendly ultralightweight authentication protocols

196

ELmE : A Misuse Resistant Parallel Authenticated Encryption  

E-Print Network [OSTI]

-Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

197

Final report for the mobile node authentication LDRD project.  

SciTech Connect (OSTI)

In hostile ad hoc wireless communication environments, such as battlefield networks, end-node authentication is critical. In a wired infrastructure, this authentication service is typically facilitated by a centrally-located ''authentication certificate generator'' such as a Certificate Authority (CA) server. This centralized approach is ill-suited to meet the needs of mobile ad hoc networks, such as those required by military systems, because of the unpredictable connectivity and dynamic routing. There is a need for a secure and robust approach to mobile node authentication. Current mechanisms either assign a pre-shared key (shared by all participating parties) or require that each node retain a collection of individual keys that are used to communicate with other individual nodes. Both of these approaches have scalability issues and allow a single compromised node to jeopardize the entire mobile node community. In this report, we propose replacing the centralized CA with a distributed CA whose responsibilities are shared between a set of select network nodes. To that end, we develop a protocol that relies on threshold cryptography to perform the fundamental CA duties in a distributed fashion. The protocol is meticulously defined and is implemented it in a series of detailed models. Using these models, mobile wireless scenarios were created on a communication simulator to test the protocol in an operational environment and to gather statistics on its scalability and performance.

Michalski, John T.; Lanzone, Andrew J.

2005-09-01T23:59:59.000Z

198

Forging Attacks on two Authenticated Encryptions COBRA and POET  

E-Print Network [OSTI]

Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

199

Authenticated Streamwise On-line Encryption Patrick P. Tsang  

E-Print Network [OSTI]

and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

200

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees  

E-Print Network [OSTI]

SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

Gummadi, Ramakrishna

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Cryptanalysis of a recent two factor authentication scheme  

E-Print Network [OSTI]

Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

202

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Dutertre, Bruno

203

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

Doran, Simon J.

204

Using a PVS Embedding of CSP to Verify Authentication Protocols  

E-Print Network [OSTI]

Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

Dutertre, Bruno

205

Authenticity Issue in Performing Arts using Live Electronics  

E-Print Network [OSTI]

by the production process key elements for future assessment of authenticity. We will present some "case studies we intend to study the production process, and extract from the elements and traces left, the electronic processes are evaluated towards their robustness against changes of instrumentist, changes

Kouroupetroglou, Georgios

206

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio  

E-Print Network [OSTI]

Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil frequency spectrum was inefficiently utilized. To fully use these spectrums, cognitive radio networks have of cognitive radio is to enable the current fixed spectrum channels assigned by Federal Communica- tions

Du, Wenliang "Kevin"

207

TRL Computer System User’s Guide  

SciTech Connect (OSTI)

We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

Engel, David W.; Dalton, Angela C.

2014-01-31T23:59:59.000Z

208

A service-oriented architecture for authentication and authorization  

E-Print Network [OSTI]

distribution: system entities such as users, resources, and sites are inher- ently distributed. • Reliability:

Hamedtoolloei, Hamidreza

2009-01-01T23:59:59.000Z

209

Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers  

E-Print Network [OSTI]

protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user

Van Oorschot, Paul

210

Dead Block Replacement and Bypass with a Sampling Predictor Daniel A. Jimenez  

E-Print Network [OSTI]

Dead Block Replacement and Bypass with a Sampling Predictor Daniel A. Jim´enez Department of Computer Science The University of Texas at San Antonio Abstract We present a cache replacement and bypass policy driven by dead block prediction. A block is considered dead is it will be replaced before

Paris-Sud XI, Université de

211

Rankine cycle condenser pressure control using an energy conversion device bypass valve  

DOE Patents [OSTI]

The disclosure provides a waste heat recovery system and method in which pressure in a Rankine cycle (RC) system of the WHR system is regulated by diverting working fluid from entering an inlet of an energy conversion device of the RC system. In the system, an inlet of a controllable bypass valve is fluidly coupled to a working fluid path upstream of an energy conversion device of the RC system, and an outlet of the bypass valve is fluidly coupled to the working fluid path upstream of the condenser of the RC system such that working fluid passing through the bypass valve bypasses the energy conversion device and increases the pressure in a condenser. A controller determines the temperature and pressure of the working fluid and controls the bypass valve to regulate pressure in the condenser.

Ernst, Timothy C; Nelson, Christopher R; Zigan, James A

2014-04-01T23:59:59.000Z

212

Hardware device to physical structure binding and authentication  

DOE Patents [OSTI]

Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

2013-08-20T23:59:59.000Z

213

User Facilities - Learn More  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

a user Trip Planning Search by discipline Biological Science Chemical Science Computer Science Energy Science Engineering Material Sciences Neutron Science Physics Search by...

214

STANDARD USER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

addressed in Article IX. USER may be permitted by the Contractor to furnish equipment, tooling, test apparatus, or materials necessary to assist in the performance of its...

215

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearchStatistics UserUserUserUsers

216

New foundations for efficient authentication, commutative cryptography, and private disjointness testing  

E-Print Network [OSTI]

This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

Weis, Stephen August, 1978-

2006-01-01T23:59:59.000Z

217

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2001-01-01T23:59:59.000Z

218

Counterfeit-resistant materials and a method and apparatus for authenticating materials  

DOE Patents [OSTI]

Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

2000-01-01T23:59:59.000Z

219

E-Print Network 3.0 - authentications algorithms based Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

soft- ware can certify particular outputs. Software Source: Schneier, Bruce - BT Group plc Collection: Computer Technologies and Information Sciences 9 A Local Authentication...

220

Nanotechnology User Facility for  

E-Print Network [OSTI]

A National Nanotechnology User Facility for Industry Academia Government #12;The National Institute of Commerce's nanotechnology user facility. The CNST enables innovation by providing rapid access to the tools new measurement and fabrication methods in response to national nanotechnology needs. www

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Pre-test CFD Calculations for a Bypass Flow Standard Problem  

SciTech Connect (OSTI)

The bypass flow in a prismatic high temperature gas-cooled reactor (HTGR) is the flow that occurs between adjacent graphite blocks. Gaps exist between blocks due to variances in their manufacture and installation and because of the expansion and shrinkage of the blocks from heating and irradiation. Although the temperature of fuel compacts and graphite is sensitive to the presence of bypass flow, there is great uncertainty in the level and effects of the bypass flow. The Next Generation Nuclear Plant (NGNP) program at the Idaho National Laboratory has undertaken to produce experimental data of isothermal bypass flow between three adjacent graphite blocks. These data are intended to provide validation for computational fluid dynamic (CFD) analyses of the bypass flow. Such validation data sets are called Standard Problems in the nuclear safety analysis field. Details of the experimental apparatus as well as several pre-test calculations of the bypass flow are provided. Pre-test calculations are useful in examining the nature of the flow and to see if there are any problems associated with the flow and its measurement. The apparatus is designed to be able to provide three different gap widths in the vertical direction (the direction of the normal coolant flow) and two gap widths in the horizontal direction. It is expected that the vertical bypass flow will range from laminar to transitional to turbulent flow for the different gap widths that will be available.

Rich Johnson

2011-11-01T23:59:59.000Z

222

ARM User Survey Report  

SciTech Connect (OSTI)

The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

Roeder, LR

2010-06-22T23:59:59.000Z

223

User`s guide to MIDAS  

SciTech Connect (OSTI)

Welcome to the MIDAS User`s Guide. This document describes the goals of the Munitions Items Disposition Action System (MIDAS) program and documents the MIDAS software. The main text first describes the equipment and software you need to run MIDAS and tells how to install and start it. It lists the contents of the database and explains how it is organized. Finally, it tells how to perform various functions, such as locating, entering, viewing, deleting, changing, transferring, and printing both textual and graphical data. Images of the actual computer screens accompany these explanations and guidelines. Appendix A contains a glossary of names for the various abbreviations, codes, and chemicals; Appendix B is a list of modem names; Appendix C provides a database dictionary and rules for entering data; and Appendix D describes procedures for troubleshooting problems associated with connecting to the MIDAS server and using MIDAS.

Tisue, S.A.; Williams, N.B.; Huber, C.C. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.] [Argonne National Lab., IL (United States). Decision and Information Sciences Div.; Chun, K.C. [Argonne National Lab., IL (United States). Environmental Assessment Div.] [Argonne National Lab., IL (United States). Environmental Assessment Div.

1995-12-01T23:59:59.000Z

224

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser ServicesUsers June 22,Users'

225

EMSL User Agreements | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:DirectivesSAND2015-21271 7AnUser Agreements EMSL User

226

International aeronautical user charges  

E-Print Network [OSTI]

Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

Odoni, Amedeo R.

1985-01-01T23:59:59.000Z

227

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

in place 2.5 s Amplifier Preamplifier Oscilloscope traces of 40.8 MHz pulse train envelope measured by photodiode ATF Program Advisory & Users Meeting, April 2-3,2009...

228

Bevalac user's handbook  

SciTech Connect (OSTI)

This report is a users manual on the Bevalac accelerator facility. This paper discuses: general information; the Bevalac and its operation; major facilities and experimental areas; and experimental equipment.

Not Available

1990-04-01T23:59:59.000Z

229

Initial Hydrologic Feasibility Analysis of the Proposed Ship Channel Bypass (lower Sacramento River, California  

E-Print Network [OSTI]

Project Modifications Works, Yolo County, CA. USACE (U.S.2006. Office Report: Yolo Bypass 2-D Hydraulic ModelPlan. Prepared by CDFG, Yolo Basin Foundation and EDAW.

Church, Tami C.

2012-01-01T23:59:59.000Z

230

V-036: EMC Smarts Network Configuration Manager Database Authentication  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: Debian SecurityBypass

231

VOLTTRON: User Guide  

SciTech Connect (OSTI)

This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

2014-04-24T23:59:59.000Z

232

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks  

E-Print Network [OSTI]

A Trustful Authentication and Key Exchange Scheme (TAKES) for Ad Hoc Networks Tony Cheneau National public key distribution scheme adapted to ad hoc networks called TAKES for Trustful Authentication, or even implementing a light naming system can be enabled on top of ad hoc networks. TAKES is formally

Paris-Sud XI, Université de

233

Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang  

E-Print Network [OSTI]

Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

234

Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication  

E-Print Network [OSTI]

(International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

Basin, David

235

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach  

E-Print Network [OSTI]

Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

236

eSeal -A System for Enhanced Electronic Assertion of Authenticity and Integrity  

E-Print Network [OSTI]

in the network and a communication protocol. The system is able to control various kinds of integrity settings to claim and assert the authenticity and integrity of goods, documents or other valued objects in storageeSeal - A System for Enhanced Electronic Assertion of Authenticity and Integrity Christian Decker1

Beigl, Michael

237

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

Xu, Wenyuan

238

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song  

E-Print Network [OSTI]

The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

Perrig, Adrian

239

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME  

E-Print Network [OSTI]

Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

240

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider  

E-Print Network [OSTI]

CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

Doran, Simon J.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems  

E-Print Network [OSTI]

Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

Wang, Yongge

242

Experimental and Analytic Study on the Core Bypass Flow in a Very High Temperature Reactor  

SciTech Connect (OSTI)

Core bypass flow has been one of key issues in the very high temperature reactor (VHTR) design for securing core thermal margins and achieving target temperatures at the core exit. The bypass flow in a prismatic VHTR core occurs through the control element holes and the radial and axial gaps between the graphite blocks for manufacturing and refueling tolerances. These gaps vary with the core life cycles because of the irradiation swelling/shrinkage characteristic of the graphite blocks such as fuel and reflector blocks, which are main components of a core's structure. Thus, the core bypass flow occurs in a complicated multidimensional way. The accurate prediction of this bypass flow and counter-measures to minimize it are thus of major importance in assuring core thermal margins and securing higher core efficiency. Even with this importance, there has not been much effort in quantifying and accurately modeling the effect of the core bypass flow. The main objectives of this project were to generate experimental data for validating the software to be used to calculate the bypass flow in a prismatic VHTR core, validate thermofluid analysis tools and their model improvements, and identify and assess measures for reducing the bypass flow. To achieve these objectives, tasks were defined to (1) design and construct experiments to generate validation data for software analysis tools, (2) determine the experimental conditions and define the measurement requirements and techniques, (3) generate and analyze the experimental data, (4) validate and improve the thermofluid analysis tools, and (5) identify measures to control the bypass flow and assess its performance in the experiment.

Richard Schultz

2012-04-01T23:59:59.000Z

243

User Program | Prospective Users Non-US  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. Register withPolicyNon

244

LANSCE | User Resources | User Satisfaction Survey  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:User

245

MD user's manual  

SciTech Connect (OSTI)

MD is the S-1 Mark IIA machine debugger. It is the hardware equivalent of a software symbolic debugger. It consists of a user-level program which executes on a VAX computer running Berkeley UNIX and a device driver which resides within the UNIX kernel. It communicates with the S-1 Mark IIA through a front-end interface attached to the UNIBUS of the VAX. The first section of this report describes MD's user interface and command set. The second section describes the virtual machine interface through which MD and the UNIX device driver communicate.

Correll, S.

1988-04-01T23:59:59.000Z

246

User Agreements | Partnerships | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed Fuel DispositionUserAgreementsUser

247

Users | Jefferson Lab  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser ServicesUsers June 22, 2011 Each

248

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser ServicesUsers June 22, 2011

249

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser ServicesUsers June 22,

250

User Science Images  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1. RegisterResearchUser

251

Users from Industry  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.HomeShipmentsUsers from

252

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.HomeShipmentsUsers

253

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive Committee

254

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide PrintUsers' Executive

255

User Survey Results | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearchStatistics UserUser Survey

256

ALS Users' Association Charter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07)Operations DuringALSSpectrum Print BegunUserUsers'

257

1st EGEE User Forum  

E-Print Network [OSTI]

The EGEE project, organized a User Forum during March 1-3, 2006 at CERN, Geneva. This was an event focusing explicitly on the growing user community, and it provided an opportunity for in depth dialogue on the services provided to users, and on the experiences and planning of user communities drawn from a wide range of disciplines. The present document is the "Book of Abstracts" documenting the event and providing the activities of the EGEE user communities.

Lamanna, Massimo; Loomis, Carl; Enabling Grids for E-sciencE

2006-01-01T23:59:59.000Z

258

Oil Bypass Filter Technology Evaluation Tenth Quarterly Report January–March 2005  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation quarterly report (January– March 2005) details the ongoing fleet evaluation of oil bypass filter technologies being conducted by the Idaho National Laboratory (INL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eleven INL fourcycle diesel-engine buses and six INL Chevrolet Tahoes with gasoline engines are equipped with oil bypass filter systems. Eight of the buses and the six Tahoes are equipped with oil bypass filters from the puraDYN Corporation; the remaining three buses are equipped with oil bypass filters from Refined Global Solutions. Both the puraDYN and Refined Global Solutions bypass filters have a heating chamber to remove liquid contaminates from the oil. During the January to March 2005 reporting quarter, the eleven diesel engine buses traveled 97,943 miles. As of March 31, 2005, the buses had accumulated 744,059 total test miles. During this quarter, four regularly scheduled 12,000-mile bus servicings were performed. The full-flow and bypass oil filters were changed and oil analysis samples were taken for the four buses. Bus 73446 had its oil changed due to a low total base number value. Bus 73450 had a major engine failure at the beginning of the quarter when one of its pushrods and valves were damaged. Buses 73432 and 73433 were removed from the bypass filter evaluation project and placed into the INL Diesel Engine Idling Wear-Rate Evaluation Test. While a total of nine oil changes on the INL buses occurred during the past 29 months, 53 oil changes have been avoided by using the oil bypass filters. The 53 avoided oil changes equates to 1,855 quarts (464 gallons) of new oil not consumed and 1,855 quarts of waste oil not generated. Therefore, over 85% of the oil normally required for oil-changes was not used, and, consequently, the evaluation achieved a greater than 85% reduction in the amount of waste oil normally generated by the buses. The six Tahoe test vehicles traveled 40,700 miles, and as of March 31, 2005, the Tahoes had accumulated 231,428 total test miles.

Larry Ziker; James Francfort

2005-06-01T23:59:59.000Z

259

Investigation on the Core Bypass Flow in a Very High Temperature Reactor  

SciTech Connect (OSTI)

Uncertainties associated with the core bypass flow are some of the key issues that directly influence the coolant mass flow distribution and magnitude, and thus the operational core temperature profiles, in the very high-temperature reactor (VHTR). Designers will attempt to configure the core geometry so the core cooling flow rate magnitude and distribution conform to the design values. The objective of this project is to study the bypass flow both experimentally and computationally. Researchers will develop experimental data using state-of-the-art particle image velocimetry in a small test facility. The team will attempt to obtain full field temperature distribution using racks of thermocouples. The experimental data are intended to benchmark computational fluid dynamics (CFD) codes by providing detailed information. These experimental data are urgently needed for validation of the CFD codes. The following are the project tasks: • Construct a small-scale bench-top experiment to resemble the bypass flow between the graphite blocks, varying parameters to address their impact on bypass flow. Wall roughness of the graphite block walls, spacing between the blocks, and temperature of the blocks are some of the parameters to be tested. • Perform CFD to evaluate pre- and post-test calculations and turbulence models, including sensitivity studies to achieve high accuracy. • Develop the state-of-the art large eddy simulation (LES) using appropriate subgrid modeling. • Develop models to be used in systems thermal hydraulics codes to account and estimate the bypass flows. These computer programs include, among others, RELAP3D, MELCOR, GAMMA, and GAS-NET. Actual core bypass flow rate may vary considerably from the design value. Although the uncertainty of the bypass flow rate is not known, some sources have stated that the bypass flow rates in the Fort St. Vrain reactor were between 8 and 25 percent of the total reactor mass flow rate. If bypass flow rates are on the high side, the quantity of cooling flow through the core may be considerably less than the nominal design value, causing some regions of the core to operate at temperatures in excess of the design values. These effects are postulated to lead to localized hot regions in the core that must be considered when evaluating the VHTR operational and accident scenarios.

Hassan, Yassin

2013-10-22T23:59:59.000Z

260

Oil Bypass Filter Technology Evaluation, Fourth Quarterly Report, July--September 2003  

SciTech Connect (OSTI)

This fourth Oil Bypass Filter Technology Evaluation report details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. To date, the eight buses have accumulated 259,398 test miles. This represents an avoidance of 21 oil changes, which equates to 740 quarts (185 gallons) of oil not used or disposed of. To validate the extended oil-drain intervals, an oil-analysis regime evaluates the fitness of the oil for continued service by monitoring the presence of necessary additives, undesirable contaminants, and engine-wear metals. For bus 73450, higher values of iron have been reported, but the wear rate ratio (parts per million of iron per thousand miles driven) has remained consistent. In anticipation of also evaluating oil bypass systems on six Chevrolet Tahoe sport utility vehicles, the oil is being sampled on each of the Tahoes to develop a characterization history or baseline for each engine.

James E. Francfort; Larry Zirker

2003-11-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Computations of high-pressure steam flow in the turbine bypass valve  

SciTech Connect (OSTI)

The objective of the present study is to investigate the steam flow behavior through the high-pressure turbine bypass valve. Efforts have mainly been directed at investigating the process of steam flow and property variations aforementioned bypass valve as well as to obtain correlations between the flow rate and the valve opening ratio. Modeling of the high-pressure turbulent steam flow was performed on a three-dimensional non-staggered grid system by employing the finite volume method and by solving the three-dimensional, turbulent, compressible Navier-Stokes, and energy equations. Through this research, numerous data have been acquired and analyzed. These efforts enable one to obtain a correlation data set for the valve opening versus flow rate coefficient of the valve. One of the significant accomplishments is to use the model presented here to further improve a design of a turbine bypass flow valve.

Amano, R.S.; Draxler, G.R.

1999-07-01T23:59:59.000Z

262

Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time  

E-Print Network [OSTI]

, it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

Liwinski, Thomas

2011-10-21T23:59:59.000Z

263

A Reduction for Automated Veri cation of Authentication Scott D. Stoller  

E-Print Network [OSTI]

A Reduction for Automated Veri cation of Authentication Protocols Scott D. Stoller Computer Science of those case studies were not rigorously justi ed. Reduction theorems are needed, which show

Stoller, Scott

264

The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity  

E-Print Network [OSTI]

Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

Otey, Penny Addison

2011-10-21T23:59:59.000Z

265

Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity  

E-Print Network [OSTI]

This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

Hahl, Oliver (Oliver Douglas)

2013-01-01T23:59:59.000Z

266

Users' Executive Committee  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print

267

Anonymous, authentic, and accountable resource management based on the E-cash paradigm  

E-Print Network [OSTI]

AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

Lam, Tak Cheung

2009-05-15T23:59:59.000Z

268

Multi-Objective Analysis for Ecosystem Reconciliation on an Engineered Floodplain: The Yolo Bypass in California's Central Valley  

E-Print Network [OSTI]

i Multi-Objective Analysis for Ecosystem Reconciliation on an Engineered Floodplain: The Yolo on an Engineered Floodplain: the Yolo Bypass in California's Central Valley Abstract Floodplains in California. Results suggest several land use changes and inundation management strategies on the Yolo Bypass that can

Pasternack, Gregory B.

269

Biomass Feedstock National User Facility  

Broader source: Energy.gov [DOE]

Breakout Session 1B—Integration of Supply Chains I: Breaking Down Barriers Biomass Feedstock National User Facility Kevin L. Kenney, Director, Biomass Feedstock National User Facility, Idaho National Laboratory

270

EFFECTS OF GRAPHITE SURFACE ROUGHNESS ON BYPASS FLOW COMPUTATIONS FOR AN HTGR  

SciTech Connect (OSTI)

Bypass flow in a prismatic high temperature gas reactor (HTGR) occurs between graphite blocks as they sit side by side in the core. Bypass flow is not intentionally designed to occur in the reactor, but is present because of tolerances in manufacture, imperfect installation and expansion and shrinkage of the blocks from heating and irradiation. It is desired to increase the knowledge of the effects of such flow, which has been estimated to be as much as 20% of the total helium coolant flow. Computational fluid dynamic (CFD) simulations can provide estimates of the scale and impacts of bypass flow. Previous CFD calculations have examined the effects of bypass gap width, level and distribution of heat generation and effects of shrinkage. The present contribution examines the effects of graphite surface roughness on the bypass flow for different relative roughness factors on three gap widths. Such calculations should be validated using specific bypass flow measurements. While such experiments are currently underway for the specific reference prismatic HTGR design for the next generation nuclear plant (NGNP) program of the U. S. Dept. of Energy, the data are not yet available. To enhance confidence in the present calculations, wall shear stress and heat transfer results for several turbulence models and their associated wall treatments are first compared for flow in a single tube that is representative of a coolant channel in the prismatic HTGR core. The results are compared to published correlations for wall shear stress and Nusselt number in turbulent pipe flow. Turbulence models that perform well are then used to make bypass flow calculations in a symmetric onetwelfth sector of a prismatic block that includes bypass flow. The comparison of shear stress and Nusselt number results with published correlations constitutes a partial validation of the CFD model. Calculations are also compared to ones made previously using a different CFD code. Results indicate that increasing surface roughness increases the maximum fuel and helium temperatures as do increases in gap width. However, maximum coolant temperature variation due to increased gap width is not changed by surface roughness.

Rich Johnson; Yu-Hsin Tung; Hiroyuki Sato

2011-07-01T23:59:59.000Z

271

Oil Bypass Filter Technology Evaluation Ninth Quarterly Report October–December 2004  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation quarterly report (October–December 2004) details the ongoing fleet evaluation of oil bypass filter technologies being conducted by the Idaho National Laboratory (INL; formerly Idaho National Engineering and Environmental Laboratory) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight INL four-cycle diesel-engine buses used to transport INL employees on various routes and six INL Chevrolet Tahoes with gasoline engines are equipped with oil bypass filter systems from the puraDYN Corporation. This quarter, three additional buses were equipped with bypass filters from Refined Global Solutions. Oil bypass filters are reported to have an engine oil filtering capability of less than 1 micron. Both the puraDYN and Refined Global Solutions bypass filters have a heating chamber to remove liquid contaminate from the oil. During the quarter, the eleven diesel engine buses traveled 62,188 miles, and as of January 3, 2005 the buses had accumulated 643,036 total test miles. Two buses had their engine oil changed this quarter. In one bus, the oil was changed due to its degraded quality as determined by a low total base number (<3.0 mg KOH/g). The other bus had high oxidation and nitration numbers (>30.0 Abs/cm). Although a total of six buses have had their oil changed during the last 26 months, by using the oil bypass filters the buses in the evaluation avoided 48 oil changes, which equates to 1,680 quarts (420 gallons) of new oil not consumed and 1,680 quarts of waste oil not generated. Therefore, over 80% of the oil normally required for oil-changes was not used, and, consequently, the evaluation achieved over 80% reduction in the amount of waste oil normally generated. The six Tahoe test vehicles traveled 39,514 miles, and as of January 3, 2005 the Tahoes had accumulated 189,970 total test miles. The Tahoe filter test is in transition. To increase the rate of bypass filter oil flow on the Tahoes, puraDYN provided a larger orifice assembly, and these are being changed out as the Tahoes come in for regular service.

Larry Zirker; James Francfort; Jordan Fielding

2005-02-01T23:59:59.000Z

272

Endovascular Treatment of a Coronary Artery Bypass Graft to Pulmonary Artery Fistula with Coil Embolization  

SciTech Connect (OSTI)

Fistula formation between a coronary artery bypass graft (CABG)and the pulmonary arterial circulation represents a rare cause of recurrent angina in patients following bypass grafting. Therapy has traditionally involved surgical ligation by open thoracotomy. We describe a case of left internal mammary artery-left upper lobe pulmonary artery fistula presenting as early recurrent angina following CABG. The fistula was embolized using platinum coils, resulting in symptomatic relief and improvement in myocardial perfusion on cardiac perfusion scintigraphy. Coil embolization should be considered a therapeutic option in patients with coronary-pulmonary steal syndrome.

Nielson, Jeffery L., E-mail: nielson@uhrad.com; Kang, Preet S. [University Hospitals of Cleveland and Veterans Administration Medical Center-Cleveland, Case Western Reserve University, Departments of Radiology (United States)

2006-04-15T23:59:59.000Z

273

AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES  

SciTech Connect (OSTI)

This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

Poland, R.; Drayer, R.; Wilson, J.

2013-08-12T23:59:59.000Z

274

User Accounts and Emails  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed Fuel DispositionUser Accounts and

275

User Liaison Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 Business MeetingUser

276

User Liaison Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 Business MeetingUser

277

User Liaison Office  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 Business MeetingUser

278

User Meeting Awards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 BusinessUser Meeting

279

User Meeting Awards  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10 BusinessUser

280

User Requirements Gathered for  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsed FuelM07: The10Source UserSource

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

User' Software Manual  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services Print

282

ALS User Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformation InExplosion Monitoring:Home|PhysicsGasandArgonne LeadershipBeamlinesUser

283

About the User Program  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation InInformationCenterResearch Highlights MediaFuel Production ASUEMSLAbout theUser

284

STANDARD USER AGREEMENT  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE AwardsNA-00197-1USERS'Minutes |Shell STREV

285

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for Users Print

286

2012 User Meeting Agenda  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-onASTROPHYSICS H. I. Park, L.2State of Matter20122 User

287

Safety for Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas ConchasPassive Solar HomePromisingStoriesSANDIA1 0-SA-02 SeptemberMaterialsSafety for Users

288

Weekly User Schedule  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption byAbout PrintableBlender Net ProductionNet ProductionWeekly User

289

2011 User Meeting Workshops  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-on halloweenReliable7O(α,5March0JuneLab1201112011 User2011

290

ALS Users' Association Charter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07)Operations DuringALSSpectrum PrintUsers' Association

291

ALS Users' Association Charter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07)Operations DuringALSSpectrum PrintUsers'

292

General User Proposals (GUPs)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky Learning Fun withGenepoolCrystals. | EMSL SchemaGeneral User

293

ALS Users' Association Charter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies |November 2011Astudies smartHistory: The FirstUsers' Executive

294

LANSCE | Users | LUG  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisit

295

LANSCE | Users | Rosen Prize  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisitMedia

296

LANSCE | Users | Rosen Scholar  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisitMedia

297

CNMS User Newsletter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, andAnalysis15 CNMS User Newsletter

298

CNMS User Newsletter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone6Energy, science, andAnalysis15 CNMS User Newsletter2013 CNMS

299

NERSC User Group Meeting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Opticalhttp://www.fnal.gov/directorate/nalcal/nalcal02_07_05_files/nalcal.gif Directorate -News,AdvancedSeeksDayNERSC User

300

User Executive Committee | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearch Upper GreatArgonneAboutUser

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

User Facilities | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearch UpperFacilities at aUSER

302

JLab Users Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfrared LandResponsesIon/SurfacePump-TestingJEDI:User/Researcher Information

303

Joint Facilities User Forum  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFunInfraredJefferson LabJeffersonStandardsWelcomeJohn ForOctober 22, User

304

ALS User Meeting Archives  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience4AJ01) (See95TI07)Operations DuringALSSpectrum Print BegunUser Meeting

305

Photovoltaics information user study  

SciTech Connect (OSTI)

The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.

Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.

1980-10-01T23:59:59.000Z

306

THE CRESCENT BYPASS: A RIPARIAN RESTORATION PROJECT ON THE KINGS RIVER (FRESNO COUNTY)1  

E-Print Network [OSTI]

THE CRESCENT BYPASS: A RIPARIAN RESTORATION PROJECT ON THE KINGS RIVER (FRESNO COUNTY)1 Jonathan A-24, 1988; Davis, California. 2 Staff Biologist and Environmental Division Chief, respectively, Kings River Conservation District, Fresno, Calif. Abstract: The Kings River Conservation District planted over 1200 plants

Standiford, Richard B.

307

Customer Data Entry User's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Customer Data Entry User's Guide, Version 2 Updated: September 18, 2014 The Customer Data Entry (CDE) Application provides BPA transmission customers with capability to view and...

308

Library Terms That Users Understand  

E-Print Network [OSTI]

University of Newfoundland Libraries Test methods: user taskUsability of the Academic Library Web Site: ImplicationsDesign," College & Research Libraries (July Library Website

Kupersmith, John

2012-01-01T23:59:59.000Z

309

PAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey  

E-Print Network [OSTI]

people about consumer privacy protection and other security loopholes that make RFID tags an easy targetPAP: A privacy and authentication protocol for passive RFID tags Alex X. Liu *, LeRoy A. Bailey 2009 Accepted 20 March 2009 Available online 31 March 2009 Keywords: RFID Privacy Authentication

Liu, Alex X.

310

A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia  

E-Print Network [OSTI]

A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

Zhu, Sencun

311

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and  

E-Print Network [OSTI]

Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

Baras, John S.

312

T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500  

Broader source: Energy.gov [DOE]

The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

313

Numerical control user experience  

SciTech Connect (OSTI)

AUTOCON is an acronym for Automatic Contouring, a program which generates a contour toolpath for the external profile of printed writing boards (PWB) using ICEM DDN. AUTOCON originates from the Computer Aided Process Planning (CAPP) Procedure developed by Electrical Manufacturing at Allied Bendix. The CAPP program uses electronically transmitted graphics files received from a design agency to generate automatic panel layouts and travellers for Process Engineers. The objective of AUTOCON is to utilize the information from the CAPP program to generate Numerical Control tapes. If the CAPP program can be utilized to its full potential, it is estimated that a good portion of the 60 to 90 PWB tapes shipped each month from our Numerical Control Department could be eliminated from conventional N/C Programming. The purpose of AUTOCON is to automatically generate a toolpath around the external profile of a PWB with no user intervention. The Process Engineer can generate a profile contour N/C tape after he has completed the panel layout and traveller through CAPPS for a part. After the layout and traveller illustrations have been completed, the same geometry can then be utilized again for the N/C tape. An N/C Analysist then reviews the listing for a final checkout of the job. 13 figs.

Butler, J.

1985-10-01T23:59:59.000Z

314

User experience with memory management  

SciTech Connect (OSTI)

Effects on computer users of the introduction of CMM at NOS1.3(485) at Sandia National Laboratories, Albuquerque are reported. Background information on the configuration, operating environment, users, and kinds of applications run on the different machines is given. Then some of the problems associated with CMM are described. Although they were overcome, they were more numerous than anticipated. (RWR)

Lane, G.L.

1980-01-01T23:59:59.000Z

315

Project-Role Pair user_tokens  

E-Print Network [OSTI]

OSAC Users (U) Domains (D) Roles (R) User Assignment (UA) Permission Assignment (PA) Project Ownership (PO) Project-Role Pair (PRP) Projects (P) Tokens (T) User Ownership (UO) Services (S) user_tokens token_project Groups (G) Group Ownership (GO) User Group (UG) Group Assignment (GA) token_roles PERMS

Sandhu, Ravi

316

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research PetroleumDepartment of Energy Kaveh Ghaemmaghami has discovered aUsers

317

User interfaces to expert systems  

SciTech Connect (OSTI)

Expert Systems are becoming increasingly popular in environments where the user is not well versed in computers or the subject domain. They offer expert advice and can also explain their lines of reasoning. As these systems are applied to highly technical areas, they become complex and large. Therefore, User Systems Interfaces (USIs) become critical. This paper discusses recent technologies that can be applied to improved user communication. In particular, bar menus/graphics, mouse interfaces, touch screens, and voice links will be highlighted. Their applications in the context of SOFTMAN (The Software Manager Apprentice) a knowledge-based system are discussed. 18 refs., 2 figs.

Agarwal, A.; Emrich, M.L.

1988-10-01T23:59:59.000Z

318

User_agenda_09_B  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services PrintUser'sUSERS

319

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices  

E-Print Network [OSTI]

Heart-to-Heart (H2H): Authentication for Implanted Medical Devices Masoud Rostami Rice University Rice University Houston, TX farinaz@rice.edu ABSTRACT We present Heart-to-Heart (H2H), a system patients to over-the-air attack and physical harm. H2H makes use of ECG (heartbeat data

320

A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots  

E-Print Network [OSTI]

of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

Reliable and Semi-reliable Communication with Authentication in Mobile Ad Hoc Networks Falko of wireless ad hoc sensor networks is the error-proneness and, therefore, the unreliability of communication describe a new approach and an according protocol for usage in ad hoc networks that provides reliable

Breu, Ruth

322

Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems  

E-Print Network [OSTI]

based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

Brylow, Dennis

323

Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and  

E-Print Network [OSTI]

Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

324

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication  

E-Print Network [OSTI]

All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

Yang, Junfeng

325

Simplified authenticated key exchange based on the q(th) root problem  

SciTech Connect (OSTI)

Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

JOHNSTON,ANNA M.; GEMMELL,PETER S.

2000-02-29T23:59:59.000Z

326

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards  

E-Print Network [OSTI]

An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

Paris-Sud XI, Université de

327

Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for  

E-Print Network [OSTI]

to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

Hazas, Mike

328

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu  

E-Print Network [OSTI]

ECG-Based Authentication Fahim Sufi, Ibrahim Khalil, and Jiankun Hu 17 Contents 17.1 Background of ECG . . . . . . . . . . . . . . . . . . . . . . 310 17.1.1 Physiology of ECG . . . . . . . . . . . . . . . . . . 310 17.1.2 Rhythm Analysis . . . . . . . . . . . . . . . . . . . . 312 17.2 What Can ECG Based

Hu, Jiankun

329

T-721:Mac OS X Directory Services Lets Local Users View User...  

Broader source: Energy.gov (indexed) [DOE]

1:Mac OS X Directory Services Lets Local Users View User Password Hashes T-721:Mac OS X Directory Services Lets Local Users View User Password Hashes September 20, 2011 - 8:45am...

330

Soybean (2010 JGI User Meeting)  

ScienceCinema (OSTI)

Gary Stacey, associate director of the National Center for Soybean Biotechnology at the University of Missouri, gives a talk simply titled "Soybean" on March 24, 2010 at the 5th Annual DOE JGI User Meeting

Stacey, Gary

2011-04-26T23:59:59.000Z

331

CCD Astronomy Software User's Guide  

E-Print Network [OSTI]

CCDSoft CCD Astronomy Software User's Guide Version 5 Revision 1.11 Copyright © 1992­2006 SantaSky Astronomy Software, and AutomaDome are trademarks of Software Bisque. WindowsTM is a trademark of Microsoft

332

Midwest Hydro Users Group Meeting  

Broader source: Energy.gov [DOE]

The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin.  An Owners-only meeting on the afternoon of the 12th followed by a full...

333

User cost in oil production  

E-Print Network [OSTI]

The assumption of an initial fixed mineral stock is superfluous and wrong. User cost (resource rent) in mineral production is the present value of expected increases in development cost. It can be measured as the difference ...

Adelman, Morris Albert

1990-01-01T23:59:59.000Z

334

User’s Guide for Getter Rate Test System  

SciTech Connect (OSTI)

This User’s Guide describes the operation and maintenance of the Getter Rate Test System, including the mechanical equipment, instrumentation, and datalogger/computer components. The Getter Rate Test System includes equipment and instrumentation to conduct two getter rate tests simultaneously. The mechanical equipment comprises roughing and high-vacuum pumps, heated test chambers, standard hydrogen leaks, and associated piping and valves. Instrumentation includes thermocouples, pressure (vacuum) transducers, panel displays, analog-to-digital signal converter, and associated wiring. The datalogger/computer is a stand-alone computer with installed software to allow the user to record data input from the pressure transducers to data files and to calculate the getter rate from the data in an Excel® spreadsheet.

Elmore, Monte R.

2007-06-27T23:59:59.000Z

335

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Broader source: Energy.gov (indexed) [DOE]

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

336

PIA - Advanced Test Reactor National Scientific User Facility...  

Broader source: Energy.gov (indexed) [DOE]

Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor...

337

User Statistics Collection Practices Archives | U.S. DOE Office...  

Office of Science (SC) Website

a Glance User Resources User Statistics Policies and Processes Definition Designation Process User Statistics Collection Practices User Statistics Collection Practices Archives...

338

Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer  

E-Print Network [OSTI]

. Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized

Van Oorschot, Paul

339

HTGR Cost Model Users' Manual  

SciTech Connect (OSTI)

The High Temperature Gas-Cooler Reactor (HTGR) Cost Model was developed at the Idaho National Laboratory for the Next Generation Nuclear Plant Project. The HTGR Cost Model calculates an estimate of the capital costs, annual operating and maintenance costs, and decommissioning costs for a high-temperature gas-cooled reactor. The user can generate these costs for multiple reactor outlet temperatures; with and without power cycles, including either a Brayton or Rankine cycle; for the demonstration plant, first of a kind, or nth of a kind project phases; for a single or four-pack configuration; and for a reactor size of 350 or 600 MWt. This users manual contains the mathematical models and operating instructions for the HTGR Cost Model. Instructions, screenshots, and examples are provided to guide the user through the HTGR Cost Model. This model was design for users who are familiar with the HTGR design and Excel. Modification of the HTGR Cost Model should only be performed by users familiar with Excel and Visual Basic.

A.M. Gandrik

2012-01-01T23:59:59.000Z

340

GADRAS-DRF user's manual.  

SciTech Connect (OSTI)

The Gamma Detector Response and Analysis Software-Detector Response Function (GADRAS-DRF) application computes the response of gamma-ray detectors to incoming radiation. This manual provides step-by-step procedures to acquaint new users with the use of the application. The capabilities include characterization of detector response parameters, plotting and viewing measured and computed spectra, and analyzing spectra to identify isotopes or to estimate flux profiles. GADRAS-DRF can compute and provide detector responses quickly and accurately, giving researchers and other users the ability to obtain usable results in a timely manner (a matter of seconds or minutes).

Theisen, Lisa Anne; Mitchell, Dean James; Thoreson, Gregory G.; Harding, Lee T.; Horne, Steve; Bradley, Jon David; Eldridge, Bryce Duncan; Amai, Wendy A.

2013-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

User Verification for 2014 Projects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services Print TheUser

342

User account | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.HomeShipments User

343

WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)  

SciTech Connect (OSTI)

The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

2000-01-27T23:59:59.000Z

344

Integrating end-to-end encryption and authentication technology into broadband networks  

SciTech Connect (OSTI)

BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

Pierson, L.G.

1995-11-01T23:59:59.000Z

345

Electrical and thermal finite element modeling of arc faults in photovoltaic bypass diodes.  

SciTech Connect (OSTI)

Arc faults in photovoltaic (PV) modules have caused multiple rooftop fires. The arc generates a high-temperature plasma that ignites surrounding materials and subsequently spreads the fire to the building structure. While there are many possible locations in PV systems and PV modules where arcs could initiate, bypass diodes have been suspected of triggering arc faults in some modules. In order to understand the electrical and thermal phenomena associated with these events, a finite element model of a busbar and diode was created. Thermoelectrical simulations found Joule and internal diode heating from normal operation would not normally cause bypass diode or solder failures. However, if corrosion increased the contact resistance in the solder connection between the busbar and the diode leads, enough voltage potentially would be established to arc across micron-scale electrode gaps. Lastly, an analytical arc radiation model based on observed data was employed to predicted polymer ignition times. The model predicted polymer materials in the adjacent area of the diode and junction box ignite in less than 0.1 seconds.

Bower, Ward Isaac; Quintana, Michael A.; Johnson, Jay

2012-01-01T23:59:59.000Z

346

Open cycle ocean thermal energy conversion steam control and bypass system  

DOE Patents [OSTI]

Two sets of hinged control doors for regulating motive steam flow from an evaporator to a condenser alternatively through a set of turbine blades in a steam bypass around the turbine blades. The evaporator has a toroidal shaped casing situated about the turbine's vertical axis of rotation and an outlet opening therein for discharging motive steam into an annular steam flow path defined between the turbine's radially inner and outer casing structures. The turbine blades extend across the steam flow path intermediate the evaporator and condenser. The first set of control doors is arranged to prevent steam access to the upstream side of the turbine blades and the second set of control doors acts as a bypass around the blades so as to maintain equilibrium between the evaporator and condenser during non-rotation of the turbine. The first set of control doors preferably extend, when closed, between the evaporator casing and the turbine's outer casing and, when open, extend away from the axis of rotation. The second set of control doors preferably constitute a portion of the turbine's outer casing downstream from the blades when closed and extend, when open, toward the axis of rotation. The first and second sets of control doors are normally held in the open and closed positions respectively by locking pins which may be retracted upon detecting an abnormal operating condition respectively to permit their closing and opening and provide steam flow from the evaporator to the condenser.

Wittig, J. Michael (West Goshen, PA); Jennings, Stephen J. (Radnor Township, Delaware County, PA)

1980-01-01T23:59:59.000Z

347

LOCUS User's Guide Steve Scott  

E-Print Network [OSTI]

LOCUS User's Guide Steve Scott March, 2005 Last updated November 22, 2005 LOCUS is a database of the listed options, e.g. `Y' to define the variable to be plotted on the y-axis or `PL' to plot the data of items, e.g. a list of constraints, entering a semi-colon (";") terminates the list. For example, SET? X

Princeton Plasma Physics Laboratory

348

User's Guide Model RPM10  

E-Print Network [OSTI]

, will provide years of safe reliable service. Meter Description 1. Photo Tachometer sensor, IR ThermometerUser's Guide Model RPM10 Laser Photo / Contact Tachometer with IR Thermometer Patented #12;RPM10 V1.4 8/072 1 2 3 4 5 6 7 Introduction Congratulations on your purchase of Extech's Laser Photo

Haller, Gary L.

349

Efficient Applications in User Transparent  

E-Print Network [OSTI]

Chapter 7 Efficient Applications in User Transparent Parallel Image Processing "Thy will by my parallel image processing. First, in Chapter 2 we have discussed the need for the availability is a sustainable software library consisting of an extensive set of operations commonly applied in state

Seinstra, Frank J.

350

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution Losses Module 1 June 29, 2010 Steam EndUser Training Steam Distribution System Losses Module Slide 1 pressure. #12;DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution

Oak Ridge National Laboratory

351

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Welcome Module - 1 8/27/2010 Steam End User Training Welcome Module Slide 1 ­ Steam End User Training Welcome to the Department of Energy's Industrial Technologies Program BestPractices Steam End-User Training. The Department of Energy

Oak Ridge National Laboratory

352

CFD Analysis of Core Bypass Flow and Crossflow in the Prismatic Very High Temperature Gas-cooled Nuclear Reactor  

E-Print Network [OSTI]

if the large portion of the coolant flows into bypass gaps instead of coolant channels in which the cooling efficiency is much higher. A preliminary three dimensional steady-state CFD analysis was performed with commercial code STARCCM+ 6.04 to investigate...

Wang, Huhu 1985-

2012-12-13T23:59:59.000Z

353

SOWFA + Super Controller User's Manual  

SciTech Connect (OSTI)

SOWFA + Super Controller is a modification of the NREL's SOWFA tool which allows for a user to apply multiturbine or centralized wind plant control algorithms within the high-fidelity SOWFA simulation environment. The tool is currently a branch of the main SOWFA program, but will one day will be merged into a single version. This manual introduces the tool and provides examples such that a user can implement their own super controller and set up and run simulations. The manual only discusses enough about SOWFA itself to allow for the customization of controllers and running of simulations, and details of SOWFA itself are reported elsewhere Churchfield and Lee (2013); Churchfield et al. (2012). SOWFA + Super Controller, and this manual, are in alpha mode.

Fleming, P.; Gebraad, P.; Churchfield, M.; Lee, S.; Johnson, K.; Michalakes, J.; van Wingerden, J. W.; Moriarty, P.

2013-08-01T23:59:59.000Z

354

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects of GlobalASCR User

355

A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange  

SciTech Connect (OSTI)

The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

2005-10-01T23:59:59.000Z

356

Evaluating User Privacy in Bitcoin  

E-Print Network [OSTI]

Abstract. Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, we investigate the privacy guarantees of Bitcoin in the setting where Bitcoin is used as a primary currency for the daily transactions of individuals. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the operation of Bitcoin in the context where Bitcoin is used for all transactions within a university. In this setting, our results show that the profiles of almost 40 % of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin. As a by-product, we have designed and implemented the first simulator of Bitcoin; our simulator can be used to model the interaction between Bitcoin users in generic settings. 1

Elli Androulaki; Ghassan O. Karame; Marc Roeschlin; Tobias Scherer

357

MEASURING USER MOUNIA LALMAS, YAHOO! LABS  

E-Print Network [OSTI]

-of-brand-engagement-on-pinterest-come-from-users/ 51032/ http://iactionable.com/user-engagement/ http://www.cio.com.au/article/459294/ heart_foundation_uses_gamification

Lalmas, Mounia

358

NERSC Releases Mobile Apps to Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Releases Mobile Apps to Users NERSC Releases Mobile Apps to Users Job Status, MOTD and Pilot of VASP Submission Available with More to Come April 23, 2012 In an effort to make...

359

EURECOM VPN SSL for students User's guide  

E-Print Network [OSTI]

EURECOM VPN SSL for students User's guide Table of Contents Introduction...................................................................................................................................9 SSL VPN usage.........................................................................................................................................20 EURECOM VPN SSL students user's guide Page 1 #12;Introduction Eurecom offers a solution for staff

Gesbert, David

360

Water Rights Analysis Package (WRAP) Users Manual  

E-Print Network [OSTI]

The Water Rights Analysis Package (WRAP) is documented by a Reference Manual and this Users Manual. The Reference Manual explains WRAP capabilities and methodologies. This Users Manual provides the operational logistics for applying the model...

Wurbs, Ralph A.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Superior Cardiac Function Via Anaplerotic Pyruvate in the Immature Swine Heart After Cardiopulmonary Bypass and Reperfusion  

SciTech Connect (OSTI)

Pyruvate produces inotropic responses in the adult reperfused heart. Pyruvate oxidation and anaplerotic entry into the citric acid cycle (CAC) via carboxylation are linked to stimulation of contractile function. The goals of this study were to determine if these metabolic pathways operate and are maintained in the developing myocardium after reperfusion. Immature male swine (age 10-18 days) were subjected to cardiopulmonary bypass (CPB). Intracoronary infusion of [2]-13C-pyruvate (to achieve a final concentration of 8 mM) was given for 35 minutes starting either during weaning (Group I), after discontinuation (Group II) or without (Control) CPB. Hemodynamic data was collected. 13C NMR spectroscopy was used to determine the fraction of pyruvate entering the CAC via pyruvate carboxylation (PC) to total CAC entry (PC plus decarboxlyation via pyruvate dehydrogenase). Liquid chromatography-mass spectrometry was used to determine total glutamate enrichment.

Olson, Aaron; Hyyti, Outi M.; Cohen, Gordon A.; Ning, Xue-Han; Sadilek, Martin; Isern, Nancy G.; Portman, Michael A.

2008-12-01T23:59:59.000Z

362

Particle Image Velocimetry Measurements and Analysis of Bypass Data for a Scaled 6mm Gap  

SciTech Connect (OSTI)

The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments will use optical techniques, primarily particle image velocimetry (PIV) in the INL Matched Index of Refraction (MIR) flow system.

J.R. Wolf; T.E. Conder; R.R. Schultz

2012-09-01T23:59:59.000Z

363

David Turner! NERSC User Services Group! NUG New User Training!  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1 EIA BestDavidNERSC File SystemsNUG New User

364

Syllabus Information Depiction System (SIDS) user's guide  

SciTech Connect (OSTI)

The Syllabus Information Depiction System (SIDS) is an automated tool designed to track the aircrew training syllabi of the Marine Corps. This report is the User's Manual for this data base system, providing users with instructions to help them use the system more efficiently. This document contains printed screen layouts that will guide the user step-by-step through the written instructions.

Waterman, D.K.; Skinner, N.L.

1987-10-01T23:59:59.000Z

365

Home Inventory User Manual About Home Inventory  

E-Print Network [OSTI]

Home Inventory User Manual About Home Inventory The HomeInventory Project consists of a customized. With two types of roles, Users and Administrators, clients logged into the HomeInventory have access to a variety of commands. HomeInventory stores each user's items safely and privately, without worry

Wolfgang, Paul

366

Manufactured Home Energy Audit user`s manual  

SciTech Connect (OSTI)

The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

NONE

1997-09-01T23:59:59.000Z

367

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Navigational Tutorial - 1 8/27/2010 Steam End User Training Navigational Tutorial Module Slide 1 ­ Introduction Hello, and welcome to the Steam End User Training. I would like to take a few minutes to show you how to navigate through

Oak Ridge National Laboratory

368

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Introduction Module - 1 8/27/2010 Steam End User Training Introduction Module Slide 1 - Introduction Title Page Hello, and welcome to the Steam System End User training. In this training, we will investigate how to assess, evaluate

Oak Ridge National Laboratory

369

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Steam Generation Efficiency Module Shell Losses - 1 8/27/2010 Steam End-User Training Steam Generation Efficiency Module Shell Losses-Section: Shell Losses] Banner: DOE's BestPractices Steam End User Training Steam Generation Efficiency Efficiency

Oak Ridge National Laboratory

370

MRDAP User/Developer Documentation  

SciTech Connect (OSTI)

The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

Joshua Cogliati; Michael Milvich

2009-09-01T23:59:59.000Z

371

Cray XC30 User Documentation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User GroupInformationE-GovNatural GasCourseCraig SzymanskiLibSciTPSL »

372

Users Meetings | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services

373

ATF Program Advisory & Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects of GlobalASCR User FacilitiesBaslerfluxPlasmaApril

374

ATF Program Committee/Users  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc Documentation RUCProductstwrmrAre the Effects of GlobalASCR UserProgram Advisory and ATF

375

David Turner! User Services Group  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed Newcatalyst phasesData Files Data Files 1 EIA BestDavidNERSC FileUser Services Group

376

FNAL Users Meeting Morgan Wascko  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing ZirconiaPolicy andExsolutionFES Committees of9, 2011COMMERCIALBulletinFNAL Users

377

User Facility | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates by DianeDemographicsFacility AccessUser

378

User account | The Ames Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption by sectorlongUpdates byUser Guide Print 1.HomeShipments

379

2011 User Meeting Award Recipients  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered‰PNGExperience hands-on halloweenReliable7O(α,5March0JuneLab1201112011 User

380

Early Edison Users Deliver Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series toESnet4: Networking for the Future of DOE ScienceEarly Edison Users

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

LANSCE | News | User Program Headlines  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement Titan TargetInJupiterUserbackgroundUser

382

LANSCE | User Resources | Visitor Registration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisit

383

LANSCE | Users | LUG | LUG EC  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region serviceMission Statement TitanProposals | FY2016 pRad:UserVisitMedia

384

New Users - 88-Inch Cyclotron  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell Batteries &NSTCurrentTransportation We'reNew Users

385

Notice to Users - Pantex Plant  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Regionat Cornell BatteriesArchives Events/NewsYou are hereNotice to Users

386

Michael Stewart! NERSC User Services  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces andMapping theEnergyInnovationMichael M. May, 1970 TheStewart! NERSC User

387

CAMD User Meeting 2009 Abstracts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New Substation Sites Proposed Route Segments (notCAMD Cleanroom 2009 CAMD User

388

CAMD User Meeting 2009 Photos  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New Substation Sites Proposed Route Segments (notCAMD Cleanroom 2009 CAMD UserPhoto

389

CAMD User Meeting 2010 Abstracts  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New Substation Sites Proposed Route Segments (notCAMD Cleanroom 2009 CAMD UserPhoto

390

2000 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies | BlandinePrincetonOPT OpticsFrequently6|Quarter6,August0 User

391

2001 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert SouthwestTechnologies | BlandinePrincetonOPTFebruary 2001 Fri, 02/09/2001 -August1 User

392

April 2013 CNMS User Newsletter  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to someone by E-mailRadioimmunotherapy EA15PC3041-3-0 Mar.3 CNMS User

393

FLOWTRAN-TF user guide  

SciTech Connect (OSTI)

This document is a set of detailed instructions and guidelines to aid users in constructing and interpreting FLOWTRAN-TF input and output files for version 1.2 of the source code. The document assumes the user is familiar with the FLOWTRAN-TF Software Design report, SRS fuel assembly hardware, and two-phase flow. General code capabilities and input options are summarized. Then, detailed instructions for creating and interpreting code input files are given next. A sample input deck and corresponding output files are listed for reference and illustration. FLOWTRAN-TF is a two-phase thermal-hydraulics code of similar technology to existing commercial reactor codes such as RELAP and TRAC but customized for Savannah River Site applications. The code may be used to simulate solid components, fluid coolant flow and solid-fluid heat transfer, or fluid flow only (adiabatic flow channels). Pure component water or two-component air-water flows may be modeled. A variety of materials may be chosen for the solid tubes separating flow channels. FLOWTRAN-TF is fundamentally a transient analysis tool.

Flach, G.P.; Lee, S.Y.; Aleman, S.E.

1993-02-01T23:59:59.000Z

394

ITOUGH2 user`s guide version 2.2  

SciTech Connect (OSTI)

ITOUGH2 is a program to estimate hydrogeologic model parameters for the numerical simulator TOUGH2. TOUGH2 was developed by Karsten Pruess at Lawrence Berkeley Laboratory for simulating non-isothermal flows of multicomponent, multiphase fluids in porous and fractured media. ITOUGH2 solves the inverse problem by automatic model calibration based on an indirect approach, in which some function of the difference between observed and model-predicted system response and appropriately weighted prior information about the parameters is minimized using standard optimization techniques. ITOUGH2 also provides a detailed error analysis of the estimated parameter set, and employs some procedures to study error propagation for prediction runs. This report includes a review of the inverse modeling theory, and a detailed description of the program architecture, input language, and the various user features provided by ITOUGH2. A sample problem is given to illustrate code application.

Finsterle, S.

1993-08-01T23:59:59.000Z

395

Trajectory analysis and optimization system (TAOS) user`s manual  

SciTech Connect (OSTI)

The Trajectory Analysis and Optimization System (TAOS) is software that simulates point--mass trajectories for multiple vehicles. It expands upon the capabilities of the Trajectory Simulation and Analysis program (TAP) developed previously at Sandia National Laboratories. TAOS is designed to be a comprehensive analysis tool capable of analyzing nearly any type of three degree-of-freedom, point-mass trajectory. Trajectories are broken into segments, and within each segment, guidance rules provided by the user control how the trajectory is computed. Parametric optimization provides a powerful method for satisfying mission-planning constraints. Althrough TAOS is not interactive, its input and output files have been designed for ease of use. When compared to TAP, the capability to analyze trajectories for more than one vehicle is the primary enhancement, although numerous other small improvements have been made. This report documents the methods used in TAOS as well as the input and output file formats.

Salguero, D.E.

1995-12-01T23:59:59.000Z

396

Workforce Transition Modeling Environment user`s guide  

SciTech Connect (OSTI)

The Pacific Northwest Laboratory (PNL) was tasked by the US Department of Energy Albuquerque Field Office (DOE-AL) to develop a workforce assessment and transition planning tool to support integrated decision making at a single DOE installation. The planning tool permits coordinated, integrated workforce planning to manage growth, decline, or transition within a DOE installation. The tool enhances the links and provides commonality between strategic, programmatic, and operations planners and human resources. Successful development and subsequent complex-wide implementation of the model also will facilitate planning at the national level by enforcing a consistent format on data that are now collected by installations in corporate-specific formats that are not amenable to national-level analyses. The workforce assessment and transition planning tool, the Workforce Transition Modeling Environment (WFTME), consists of two components: the Workforce Transition Model and the Workforce Budget Constraint Model. The Workforce Transition Model, the preponderant of the two, assists decision makers identify and evaluate alternatives for transitioning the current workforce to meet the skills required to support projected workforce requirements. The Workforce Budget Constraint Model helps estimate the number of personnel that will be affected by a given workforce budget increase or decrease and assists in identifying how the corresponding hirings or layoffs should be distributed across the Common Occupation Classification System (COCS) occupations. This user`s guide describes the use and operation of the WFTME. This includes the functions of modifying data and running models, interpreting output reports, and an approach for using the WFTME to evaluate various workforce transition scenarios.

Stahlman, E.J.; Oens, M.A.; Lewis, R.E.

1993-10-01T23:59:59.000Z

397

A goal-oriented user interface for personalized semantic search  

E-Print Network [OSTI]

Users have high-level goals when they browse the Web or perform searches. However, the two primary user interfaces positioned between users and the Web, Web browsers and search engines, have very little interest in users' ...

Faaborg, Alexander James

2006-01-01T23:59:59.000Z

398

Hybrid user interfaces : design guidelines and implementation examples  

E-Print Network [OSTI]

A hybrid user interface is a new type of computer user interface that achieves high usability by combining features of graphical user interfaces and command line interfaces. The main goal of a hybrid user interface is to ...

Ahn, Sehyun

2006-01-01T23:59:59.000Z

399

Method of treating emissions of a hybrid vehicle with a hydrocarbon absorber and a catalyst bypass system  

DOE Patents [OSTI]

A method of treating emissions from an internal combustion engine of a hybrid vehicle includes directing a flow of air created by the internal combustion engine when the internal combustion engine is spinning but not being fueled through a hydrocarbon absorber to collect hydrocarbons within the flow of air. When the hydrocarbon absorber is full and unable to collect additional hydrocarbons, the flow of air is directed through an electrically heated catalyst to treat the flow of air and remove the hydrocarbons. When the hydrocarbon absorber is not full and able to collect additional hydrocarbons, the flow of air is directed through a bypass path that bypasses the electrically heated catalyst to conserve the thermal energy stored within the electrically heated catalyst.

Roos, Bryan Nathaniel; Gonze, Eugene V; Santoso, Halim G; Spohn, Brian L

2014-01-14T23:59:59.000Z

400

Elemental ABAREX -- a user's manual.  

SciTech Connect (OSTI)

ELEMENTAL ABAREX is an extended version of the spherical optical-statistical model code ABAREX, designed for the interpretation of neutron interactions with elemental targets consisting of up to ten isotopes. The contributions from each of the isotopes of the element are explicitly dealt with, and combined for comparison with the elemental observables. Calculations and statistical fitting of experimental data are considered. The code is written in FORTRAN-77 and arranged for use on the IBM-compatible personal computer (PC), but it should operate effectively on a number of other systems, particularly VAX/VMS and IBM work stations. Effort is taken to make the code user friendly. With this document a reasonably skilled individual should become fluent with the use of the code in a brief period of time.

Smith, A.B.

1999-05-26T23:59:59.000Z

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Implications for Damage Recognition during Dpo4-Mediated Mutagenic Bypass of m1G and m3C Lesions  

SciTech Connect (OSTI)

DNA is susceptible to alkylation damage by a number of environmental agents that modify the Watson-Crick edge of the bases. Such lesions, if not repaired, may be bypassed by Y-family DNA polymerases. The bypass polymerase Dpo4 is strongly inhibited by 1-methylguanine (m1G) and 3-methylcytosine (m3C), with nucleotide incorporation opposite these lesions being predominantly mutagenic. Further, extension after insertion of both correct and incorrect bases, introduces additional base substitution and deletion errors. Crystal structures of the Dpo4 ternary extension complexes with correct and mismatched 3'-terminal primer bases opposite the lesions reveal that both m1G and m3C remain positioned within the DNA template/primer helix. However, both correct and incorrect pairing partners exhibit pronounced primer terminal nucleotide distortion, being primarily evicted from the DNA helix when opposite m1G or misaligned when pairing with m3C. Our studies provide insights into mechanisms related to hindered and mutagenic bypass of methylated lesions and models associated with damage recognition by repair demethylases.

Rechkoblit, Olga; Delaney, James C.; Essigmann, John M.; Patel, Dinshaw J. (MIT); (MSKCC)

2012-05-08T23:59:59.000Z

402

U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Final Report  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation final report documents the feasibility of using oil bypass filters on 17 vehicles in the Idaho National Laboratory (INL) fleet during a 3-year test period. Almost 1.3 million test miles were accumulated, with eleven 4-cycle diesel engine buses accumulating 982,548 test miles and six gasoline-engine Chevrolet Tahoes accumulating 303,172 test miles. Two hundred and forty oil samples, taken at each 12,000-mile bus servicing event and at 3,000 miles for the Tahoes, documented the condition of the engine oils for continued service. Twenty-eight variables were normally tested, including the presence of desired additives and undesired wear metals such as iron and chrome, as well as soot, water, glycol, and fuel. Depending on the assumptions employed, the INL found that oil bypass filter systems for diesel engine buses have a positive payback between 72,000 and 144,000 miles. For the Tahoes, the positive payback was between 66,000 and 69,000 miles.

L. R. Zirker; J. E. Francfort; J. J. Fielding

2006-03-01T23:59:59.000Z

403

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for  

E-Print Network [OSTI]

IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

Shen, Xuemin "Sherman"

404

Addressing the needs of mobile users  

E-Print Network [OSTI]

Based Localization Technology for Mobile Users . . . . . 3.1for designing future mobile technology. Methods There arefor ways future mobile technology might better address

Sohn, Timothy Youngjin

2008-01-01T23:59:59.000Z

405

Ocean Viral Metagenomics (2010 JGI User Meeting)  

ScienceCinema (OSTI)

Forest Rohwer from San Diego State University talks about "Ocean Viral Metagenomics" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

Rohwer, Forest

2011-04-26T23:59:59.000Z

406

Non-Proprietary Master User Agreement  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

or substantive changes to the non *** provisons will require approval by the DOE Contracting Officer, WHICH WILL LIKELY DELAY YOUR ACCESS TO THE USER FACILITY. In instances...

407

OCEAN SCIENCES CENTRE USER FEE DOCUMENT  

E-Print Network [OSTI]

............................................................................................................ 4 2.2 Storage Fees.6 Cold Rooms support research programs of our Government and Industrial Partners The following user fee schedules

Oyet, Alwell

408

SLAC Linac Coherent Light Source User Site  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

| Agreements | Check-In | Computing | Safety | Shipping | Supplies & Gases | User Feedback | Publications Proposal Submission and Scheduling Step-By-Step Instructions to...

409

PIA - Environmental Molecular Sciences Laboratory (EMSL) User...  

Office of Environmental Management (EM)

Sciences Laboratory (EMSL) User System (ESU) More Documents & Publications PIA - WEB iPASS System DOE PIA Integrated Safety Management Workshop Registration, PIA, Idaho...

410

Shifting Innovation to Users Via Toolkits  

E-Print Network [OSTI]

In the traditional new product development process, manufacturers first explore user needs and then develop responsive products. Developing an accurate understanding of ...

Katz, Ralph

2002-06-07T23:59:59.000Z

411

Diatom Genomics (2009 JGI User Meeting)  

ScienceCinema (OSTI)

Ginger Armbrust from the University of Washington spoke about diatom genomics on March 26, 2009 at the DOE JGI User Meeting

Ambrust, Ginger

2011-04-25T23:59:59.000Z

412

Required Training for Users | Advanced Photon Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

ESH100U: Argonne National Laboratory User Facility Orientation (2 years) ESH223U: Cybersecurity Annual Education and Awareness (1 year) ESH738, GERT: General Employee Radiation...

413

2007/2008 NERSC User Survey Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

stability, IO performance and the user environment. In July 2008 NERSC and Cray began upgrading Franklin's compute nodes from dual core to quad core, doubling both the number...

414

CHEETAH 1.0 user`s manual  

SciTech Connect (OSTI)

CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0, and a host of others will be implemented in the future. In CHEETAH 1.0 I have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. I find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. I hope that CHEETAH makes the use of thermochemical codes more attractive to practical explosive formulators. In the future I plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. CHEETAH is currently a numerical implementation of C-J theory. It will,become an implementation of ZND theory. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

Fried, L.E.

1994-06-24T23:59:59.000Z

415

STOMP Subsurface Transport Over Multiple Phases: User`s guide  

SciTech Connect (OSTI)

The U.S. Department of Energy, through the Office of Technology Development, has requested the demonstration of remediation technologies for the cleanup of volatile organic compounds and associated radionuclides within the soil and groundwater at arid sites. This demonstration program, called the VOC-Arid Soils Integrated Demonstration Program (Arid-ID), has been initially directed at a volume of unsaturated and saturated soil contaminated with carbon tetrachloride, on the Hanford Site near Richland, Washington. A principal subtask of the Arid-ID program involves the development of an integrated engineering simulator for evaluating the effectiveness and efficiency of various remediation technologies. The engineering simulator`s intended users include scientists and engineers who are investigating soil physics phenomena associated with remediation technologies. Principal design goals for the engineer simulator include broad applicability, verified algorithms, quality assurance controls, and validated simulations against laboratory and field-scale experiments. An important goal for the simulator development subtask involves the ability to scale laboratory and field-scale experiments to full-scale remediation technologies, and to transfer acquired technology to other arid sites. The STOMP (Subsurface Transport Over Multiple Phases) simulator has been developed by the Pacific Northwest National Laboratory for modeling remediation technologies. Information on the use, application, and theoretical basis of the STOMP simulator theory and discussions on the governing equations, constitutive relations, and numerical solution algorithms for the STOMP simulator.

White, M.D.; Oostrom, M.

1997-10-01T23:59:59.000Z

416

Weakness of two ID-based remote mutual authentication with key agreement protocols for mobile devices  

E-Print Network [OSTI]

to achieve explicit key confirmation. We also point out Wu's scheme decreases efficiency by using the double by the traditional public-key cryptography (Rivest et al., 1978; ElGama, l985). The computation ability and battery the number of users is increased, KAC needs a large storage space to store users' public keys

417

Heating 7.2 user`s manual  

SciTech Connect (OSTI)

HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

Childs, K.W.

1993-02-01T23:59:59.000Z

418

Vegetation Change Analysis User's Manual  

SciTech Connect (OSTI)

Approximately 70 percent of all U.S. military training lands are located in arid and semi-arid areas. Training activities in such areas frequently adversely affect vegetation, damaging plants and reducing the resilience of vegetation to recover once disturbed. Fugitive dust resulting from a loss of vegetation creates additional problems for human health, increasing accidents due to decreased visibility, and increasing maintenance costs for roads, vehicles, and equipment. Diagnostic techniques are needed to identify thresholds of sustainable military use. A cooperative effort among U.S. Department of Energy, U.S. Department of Defense, and selected university scientists was undertaken to focus on developing new techniques for monitoring and mitigating military impacts in arid lands. This manual focuses on the development of new monitoring techniques that have been implemented at Fort Irwin, California. New mitigation techniques are described in a separate companion manual. This User's Manual is designed to address diagnostic capabilities needed to distinguish between various degrees of sustainable and nonsustainable impacts due to military training and testing and habitat-disturbing activities in desert ecosystems. Techniques described here focus on the use of high-resolution imagery and the application of image-processing techniques developed primarily for medical research. A discussion is provided about the measurement of plant biomass and shrub canopy cover in arid. lands using conventional methods. Both semiquantitative methods and quantitative methods are discussed and reference to current literature is provided. A background about the use of digital imagery to measure vegetation is presented.

D. J. Hansen; W. K. Ostler

2002-10-01T23:59:59.000Z

419

USER'S MANUAL Revision 1.0c  

E-Print Network [OSTI]

to correct the interference at your own expense. California Best Management Practices RegulationsH8QM3-2 H8QMi-2 USER'S MANUAL Revision 1.0c SUPER ® #12;Manual Revision 1.0c Release Date: November in the United States of America The information in this User's Manual has been carefully reviewed

van Hemmen, J. Leo

420

USER'S MANUAL Revision 1.1b  

E-Print Network [OSTI]

Best Management Practices Regulations for Perchlorate Materials: This Perchlorate warning applies onlySUPER ® X7DB3 USER'S MANUAL Revision 1.1b #12;Unless you request and receive written permission in this User's Manual has been carefully reviewed and is believed to be accurate. The vendor assumes

Maccabe, Barney

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

DAKOTA JAGUAR 2.1 user's Manual.  

SciTech Connect (OSTI)

JAGUAR (JAva GUi for Applied Research) is a Java software tool providing an advanced text editor and graphical user interface (GUI) to manipulate DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) input specifications. This document focuses on the features necessary for a user to use JAGUAR.

Adams, Brian M.; Lefantzi, Sophia; Chan, Ethan; Ruthruff, Joseph R.

2011-06-01T23:59:59.000Z

422

User Manual Milli-Q Reference System  

E-Print Network [OSTI]

is intended for use with a Milli-Q® Reference Water Purification System. This User Manual is a guide for use before attempting installation, normal operation or maintenance of the Water Purification System. If this User Manual is not the correct one for your Water Purification System, then please contact Millipore

Woodall, Jerry M.

423

2006 XSD Scientific Software User Survey.  

SciTech Connect (OSTI)

In preparation for the 2006 XSD Scientific Software workshop, our committee sent a survey on June 16 to 100 users in the APS user community. This report contains the survey and the responses we received. The responses are presented in the order received.

Jemian, P. R.

2007-01-22T23:59:59.000Z

424

User Guide for San José Finance Tool  

Broader source: Energy.gov [DOE]

This user guide is intended primarily for the finance tool itself rather than an introduction to photovoltaics (PV) and PV finance. Users who do not have a basic understanding of PV systems, terminology, and financing structures are encouraged to review the documents referenced at the end of the guide...

425

Navigating the Aural Web: Augmenting User Experience for Visually Impaired and Mobile Users  

E-Print Network [OSTI]

Navigating the Aural Web: Augmenting User Experience for Visually Impaired and Mobile Users Davide and Experience Research (USER) Lab 535 W. Michigan Street Indianapolis, IN 46202 USA Abstract The current web information architectures typical of the web. A pervasive problem in designing for web accessibility

Zhou, Yaoqi

426

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Conclusion Module 1 June 28, 2010 Steam EndUser Training Conclusion Module Slide 1 Conclusions Let's briefly examine the major items we have covered in this training. [Slide Visual ­ Contents of Module Sections

Oak Ridge National Laboratory

427

DOE's BestPractices Steam End User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam End User Training Steam Generation Efficiency Module Efficiency Definition - 1 8/30/2010 Steam End-User Training Steam Generation Efficiency Module Efficiency Definition Section Slide 1 - Steam Generation Efficiency Module This module will discuss steam

Oak Ridge National Laboratory

428

DOE's BestPractices Steam End-User Training Steam End User Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End-User Training Steam End User Training Steam Generation Module Stack Losses 1 June 28, 2010 Steam EndUser Training Steam Generation Efficiency Module Stack Losses loss is almost always the largest boiler loss. [Slide Visual ­ Stack Loss Title Page] Steam

Oak Ridge National Laboratory

429

HEATING 7. 1 user's manual  

SciTech Connect (OSTI)

HEATING is a FORTRAN program designed to solve steady-state and/or transient heat conduction problems in one-, two-, or three- dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heating generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-boundary or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General graybody radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING is variably dimensioned and utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution (for one-dimensional or two-dimensional problems), and conjugate gradient. Transient problems may be solved using one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method (which for some circumstances allows a time step greater than the CEP stability criterion). The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

Childs, K.W.

1991-07-01T23:59:59.000Z

430

Heating 7. 2 user's manual  

SciTech Connect (OSTI)

HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

Childs, K.W.

1993-02-01T23:59:59.000Z

431

T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...  

Broader source: Energy.gov (indexed) [DOE]

Articles U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-174: RSA Authentication Manager Writes Operating System, SNMP,...

432

EMSL User and Active Project Statistics | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct:DirectivesSAND2015-21271 7AnUser Agreements EMSL UserEMSL

433

Demonstration and Validation Assets: User Manual Development  

SciTech Connect (OSTI)

This report documents the development of a database-supported user manual for DEMVAL assets in the NSTI area of operations and focuses on providing comprehensive user information on DEMVAL assets serving businesses with national security technology applications in southern New Mexico. The DEMVAL asset program is being developed as part of the NSPP, funded by both Department of Energy (DOE) and NNSA. This report describes the development of a comprehensive user manual system for delivering indexed DEMVAL asset information to be used in marketing and visibility materials and to NSTI clients, prospective clients, stakeholders, and any person or organization seeking it. The data about area DEMVAL asset providers are organized in an SQL database with updateable application structure that optimizes ease of access and customizes search ability for the user.

None

2008-06-30T23:59:59.000Z

434

Paper Airplane user's manual : version four  

E-Print Network [OSTI]

Preface: This document provides the user with a step-by-step guide to using Paper Airplane, Version IV. Although this program can be used to design any system (once given the proper set of design equations), this manual ...

Lajoie, Ronnie M.

435

Fighting phishing at the user interface  

E-Print Network [OSTI]

The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to look as if they come from a known and legitimate organization, in order to deceive users into ...

Wu, Min, 1976-

2006-01-01T23:59:59.000Z

436

MOBILE-TERMINATED DATA User's Guide  

E-Print Network [OSTI]

MOBILE-TERMINATED DATA User's Guide Iridium Satellite LLC Rev. 2; February 1, 2002 #12;MOBILE................................................................................................................................3 1.1 IRIDIUM MOBILE TERMINATED DATA CONNECTIVITY ..........................................................................................................................7 4 Mobile Terminated Call Scenarios

Ashley, Michael C. B.

437

User interface handles for web objects  

E-Print Network [OSTI]

On the desktop, users are accustomed to having visible handles to objects that they can organize, share, and manipulate. Web applications today feature many loosely defined classes of such objects, like flight itineraries, ...

Pham, Hubert

2013-01-01T23:59:59.000Z

438

User experience design of complex systems  

E-Print Network [OSTI]

Over recent years, the global marketplace and its consumers have developed a mutual recognition for the rising prominence of design that delivers high quality user experience. For the provider of products and services, ...

Reily, Todd R. (Todd Richard)

2012-01-01T23:59:59.000Z

439

User's guide to the Venezuelan macrofinancial model  

E-Print Network [OSTI]

This paper presents a user's guide and documentation for a macrofinancial model of Venezuela. This model was developed under a DOE International Affairs Division grant (contract no. EX-76-A-01-2295) for the project, "A ...

Aliana, Simon

1981-01-01T23:59:59.000Z

440

PMI Toolbox User's Guide Photon Migration Imaging  

E-Print Network [OSTI]

PMI Toolbox User's Guide 2/25/2002 1 Photon Migration Imaging Toolbox 2001 http Temple Place - Suite 330, Boston, MA 02111-1307, USA. http://www.gnu.org/copyleft/gpl.html #12;PMI

Boas, David

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

ALS User Meeting Highlights Challenges, Accomplishments  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

advantage of those. ALS Director Roger Falcone was up next and he began with a sad acknowledgement of the passing of a veteran ALS user, Dennis Lindle. While the past year has been...

442

September 2005 ADVISING USERS ON INFORMATION TECHNOLOGY  

E-Print Network [OSTI]

September 2005 ADVISING USERS ON INFORMATION TECHNOLOGY BBuulllleettiinn BIOMETRIC TECHNOLOGIES: HELPING TO PROTECT INFORMATION AND AUTOMATED TRANSACTIONS IN INFORMATION TECHNOLOGY SYSTEMS BIOMETRIC TECHNOLOGIES: HELPING TO PROTECT INFORMATION AND AUTOMATED TRANSACTIONS IN INFORMATION TECHNOLOGY SYSTEMS

443

PARS II User Guide | Department of Energy  

Office of Environmental Management (EM)

to assist DOE end-users in performing their respective functions within the PARS II web application. The document provides a description and "How To" for the major functions...

444

Design exploration: engaging a larger user population  

E-Print Network [OSTI]

. One challenge to such an approach is how software designers make use of the potentially overwhelming combination of text, graphics, and other content. The Design Exploration process provides users and other stakeholders the Design Exploration Builder...

Moore, John Michael

2009-06-02T23:59:59.000Z

445

Models of User Engagement Janette Lehmann1  

E-Print Network [OSTI]

@acm.org 3 Yahoo! Research New York, USA eladyt@yahoo-inc.com 4 Yahoo! Labs Sunnyvale, USA gdupret@yahoo-inc measure web usage, they are commonly em- ployed as proxy for online user engagement: the higher

Lalmas, Mounia

446

Water Usage Law, Major Water Users (Missouri)  

Broader source: Energy.gov [DOE]

Any water user with the capability to withdraw or divert 100,000 gallons or more per day from any stream, river, lake, well, spring or other water source must register and file for a permit for...

447

Inky : Internet keywords with user feedback  

E-Print Network [OSTI]

The web today is accessed primarily through graphical user interfaces although some of its functionality can be more efficiently invoked through a command line interface. This thesis presents Inky, a sloppy command line ...

Chou, Victoria H. (Victoria Hsiao-tsung)

2008-01-01T23:59:59.000Z

448

Waste Management Information System (WMIS) User Guide  

SciTech Connect (OSTI)

This document provides the user of the Waste Management Information System (WMIS) instructions on how to use the WMIS software. WMIS allows users to initiate, track, and close waste packages. The modular design supports integration and utilization of data throuh the various stages of waste management. The phases of the waste management work process include generation, designation, packaging, container management, procurement, storage, treatment, transportation, and disposal.

R. E. Broz

2008-12-22T23:59:59.000Z

449

VOLTTRON 2.0: User Guide  

SciTech Connect (OSTI)

This document is a user guide for the deployment of the transactional network platform and agent/application development within VOLTTRON. The intent of this user guide is to provide a description of the functionality of the transactional network platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

Lutes, Robert G.; Haack, Jereme N.; Katipamula, Srinivas; Monson, Kyle E.; Akyol, Bora A.; Carpenter, Brandon J.; Tenney, Nathan D.

2014-11-30T23:59:59.000Z

450

ArrangePak-3D User's Manual  

E-Print Network [OSTI]

ArrangePak-3D User's Manual File Planes Options Help Quit Planes: 5 ­120.2732,+28.2707 poweredbyLEDA ArrangePak­3D #12; #12; ArrangePak-3D User's Manual Manipulating Arrangements of Planes in Three- chantability or #12;tness for a particular purpose. version 1.0x License: The ArrangePak-3D source code

Wismath, Stephen

451

Integrating Agile Development Processes and User Centred Design-  

E-Print Network [OSTI]

: Agile Software Development Processes, User Centred De- sign, Agile User Centred Design IntegrationIntegrating Agile Development Processes and User Centred Design- A Place for Usability Maturity, Usability Maturity Models, Maturity Models. 1 Introduction Agile methods are lightweight software

Cairns, Paul

452

DOE BestPractices Steam End User Training  

E-Print Network [OSTI]

DOE BestPractices Steam End User Training Guide Alternate Text Narratives and Graphic Descriptions June 29, 2010 #12;DOE BestPractices Steam End User Training Steam End User Training Table ................................................................................................................................................................................................ 8 Technical Modules Steam Generation Efficiency Efficiency Definition

Oak Ridge National Laboratory

453

T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send...  

Broader source: Energy.gov (indexed) [DOE]

Process Lets Local Users Send Spoofed Signals T-653: Linux Kernel sigqueueinfo() Process Lets Local Users Send Spoofed Signals June 23, 2011 - 4:49am Addthis PROBLEM:...

454

ASCEM Project Achieves Major Milestone with Initial User Release...  

Broader source: Energy.gov (indexed) [DOE]

NASA World Wind and LaGritGridder in its toolset user interface. The High Performance Computing environment allows the user to do Single Run, Sensitivity Analysis,...

455

U-240: Apple Remote Desktop Encryption Failure Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

0: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain Potentially Sensitive Information U-240: Apple Remote Desktop Encryption Failure Lets Remote Users Obtain...

456

U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

HP Service Manager Unspecified Flaw Lets Remote Users Gain Unauthorized Access V-120: EMC Smarts Network Configuration Manager Java RMI Access Control Flaw Lets Remote Users...

457

U-137: HP Performance Manager Unspecified Bug Lets Remote Users...  

Broader source: Energy.gov (indexed) [DOE]

7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March...

458

Bypass Flow Computations using a One-Twelfth Symmetric Sector For Normal Operation in a 350 MWth VHTR  

SciTech Connect (OSTI)

Significant uncertainty exists about the effects of bypass flow in a prismatic gas-cooled very high temperature reactor (VHTR). Bypass flow is the flow in the gaps between prismatic graphite blocks in the core. The gaps are present because of variations in their construction, imperfect installation and expansion and shrinkage from thermal heating and neutron fluence. Calculations are performed using computational fluid dynamics (CFD) for flow of the helium coolant in the gap and coolant channels along with conjugate heat generation and heat transfer in the fuel compacts and graphite. A commercial CFD code is used for all of the computations. A one-twelfth sector of a standard hexagonal block column is used for the CFD model because of its symmetry. Various scenarios are computed by varying the gap width from zero to 5 mm, varying the total heat generation rate to examine average and peak radial generation rates and variation of the graphite block geometry to account for the effects of shrinkage caused by irradiation. The calculations are for a 350 MWth prismatic reactor. It is shown that the effect of increasing gap width, while maintaining the same total mass flow rate, causes increased maximum fuel temperature while providing significant cooling to the near-gap region. The maximum outlet coolant temperature variation is increased by the presence of gap flow and also by an increase in total heat generation with a gap present. The effect of block shrinkage is actually to decrease maximum fuel temperature compared to a similar reference case.

Richard W. Johnson; Hiroyuki Sato

2010-10-01T23:59:59.000Z

459

Bypass Flow Computations using a One-Twelfth Symmetric Sector For Normal Operation in a 350 MWth VHTR  

SciTech Connect (OSTI)

Significant uncertainty exists about the effects of bypass flow in a prismatic gas-cooled very high temperature reactor (VHTR). Bypass flow is the flow in the gaps between prismatic graphite blocks in the core. The gaps are present because of variations in their construction, imperfect installation and expansion and shrinkage from thermal heating and neutron fluence. Calculations are performed using computational fluid dynamics (CFD) for flow of the helium coolant in the gap and coolant channels along with conjugate heat generation and heat transfer in the fuel compacts and graphite. A commercial CFD code is used for all of the computations. A one-twelfth sector of a standard hexagonal block column is used for the CFD model because of its symmetry. Various scenarios are computed by varying the gap width from zero to 5 mm, varying the total heat generation rate to examine average and peak radial generation rates and variation of the graphite block geometry to account for the effects of shrinkage caused by irradiation. The calculations are for a 350 MWth prismatic reactor. It is shown that the effect of increasing gap width, while maintaining the same total mass flow rate, causes increased maximum fuel temperature while providing significant cooling to the near-gap region. The maximum outlet coolant temperature variation is increased by the presence of gap flow and also by an increase in total heat generation with a gap present. The effect of block shrinkage is actually to decrease maximum fuel temperature compared to a similar reference case.

Richard W. Johnson; Hiroyuki Sato

2012-10-01T23:59:59.000Z

460

Considering Possible Outcomes and the User's Environment in Designing User Interfaces to Data Intensive Systems  

E-Print Network [OSTI]

Renaud,K.V. Cooper,R.L. User Interfaces to Data Intensive Systems. UIDIS'01. ETH, Zurich. 31 May - 1 June 2001. IEEE

Renaud, K.V.

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

161 rue Ada F -34392 Montpellier Cedex 05 Tl : 33 (0)4 67 4 85 85 Fax : 33 (0)4 67 4 85 00 www. lirmm.fr Added Redundancy Explicit Authentication at  

E-Print Network [OSTI]

hardware-based (physical) attacks and work under th Technical Report 01/07/2007 lirmm-00171028,version1-11Sep2007 #12;Added Redundancy Explicit Authentication

Boyer, Edmond

462

User Statistics Collection Practices | U.S. DOE Office of Science...  

Office of Science (SC) Website

a Glance User Resources User Statistics Policies and Processes Definition Designation Process User Statistics Collection Practices User Statistics Collection Practices Archives...

463

HTGR Application Economic Model Users' Manual  

SciTech Connect (OSTI)

The High Temperature Gas-Cooled Reactor (HTGR) Application Economic Model was developed at the Idaho National Laboratory for the Next Generation Nuclear Plant Project. The HTGR Application Economic Model calculates either the required selling price of power and/or heat for a given internal rate of return (IRR) or the IRR for power and/or heat being sold at the market price. The user can generate these economic results for a range of reactor outlet temperatures; with and without power cycles, including either a Brayton or Rankine cycle; for the demonstration plant, first of a kind, or nth of a kind project phases; for up to 16 reactor modules; and for module ratings of 200, 350, or 600 MWt. This users manual contains the mathematical models and operating instructions for the HTGR Application Economic Model. Instructions, screenshots, and examples are provided to guide the user through the HTGR Application Economic Model. This model was designed for users who are familiar with the HTGR design and Excel and engineering economics. Modification of the HTGR Application Economic Model should only be performed by users familiar with the HTGR and its applications, Excel, and Visual Basic.

A.M. Gandrik

2012-01-01T23:59:59.000Z

464

An Empirical Study on Categorizing User Input Parameters for User Inputs Reuse  

E-Print Network [OSTI]

An Empirical Study on Categorizing User Input Parameters for User Inputs Reuse Shaohua Wang1 , Ying, Kingston, Canada {ying.zou, bipin.upadhyaya, iman.keivanloo}@queensu.ca 3 CAS Research, IBM Canada Software;2 Shaohua Wang, Ying Zou, Bipin Upadhyaya, Iman Keivanloo, Joanna Ng website, and the Homes 5 , a real

Zou, Ying

465

ALLAN, VERBEEK: RANKING USER-ANNOTATED IMAGES 1 Ranking user-annotated images for multiple  

E-Print Network [OSTI]

, for example, the user enters the search terms `cat' and `dog', we can quickly find potentially-relevant images, and that performance when searching for multiple terms can be increased by learning a new combined model and taking be increased by rejecting images from `untrustwor- thy' users. We focus on search queries for multiple terms

Paris-Sud XI, Université de

466

DOE's BestPractices Steam End User Training Steam EndUser Training  

E-Print Network [OSTI]

DOE's BestPractices Steam End User Training Steam EndUser Training Resource Utilization. These include fuel selection, steam enduse or demand management, and combined heat and power activities importance of investigating steam enduse components and reducing steam consumption or improving the energy

Oak Ridge National Laboratory

467

U-203: HP Photosmart Bug Lets Remote Users Deny Service  

Broader source: Energy.gov [DOE]

A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

468

Motivating Participation in Social Computing Applications: A User Modeling Perspective  

E-Print Network [OSTI]

environments. Keywords: social computing, participation, motivation, persuasion, gamification, open user models

Vassileva, Julita

469

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service  

Broader source: Energy.gov [DOE]

Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

470

Making Linux protection mechanisms egalitarian with UserFS  

E-Print Network [OSTI]

UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user-not just the system administrator-to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted ...

Kim, Taesoo, Ph. D. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

471

Making Linux Protection Mechanisms Egalitarian with UserFS  

E-Print Network [OSTI]

UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user—not just the system administrator—to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted ...

Kim, Taesoo

472

On User Behaviour Adaptation Under Interface Change Benjamin Rosman  

E-Print Network [OSTI]

experiences in video games, etc. In typical sequential deci- sion making tasks, users execute sequences

Kohli, Pushmeet

473

Nested User Interface Components Ken Perlin, Jon Meyer  

E-Print Network [OSTI]

Nested User Interface Components Ken Perlin, Jon Meyer NYU Media Research Lab Department,meyer}@cs.nyu.edu ABSTRACT Nested User Interface Components combine the concepts of Zooming User Interfaces (ZUIs) with recursive nesting of active graphical user interface widgets. The resulting system of recursively nesting

474

Graphical User Interface Energy Characterization for Handheld Computers  

E-Print Network [OSTI]

Graphical User Interface Energy Characterization for Handheld Computers Lin Zhong and Niraj K. Jha, Low power Keywords Energy characterization, Graphical user interface, Handheld computers, Low power to its graphical user interface (GUI). Moreover, GUIs are direct users of the dis- play and also

Zhong, Lin

475

U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation - Sixth Quarterly Report, January - March 2004  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation quarterly report (January-March 2004) details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. This quarter, the heavy-duty buses traveled 88,747 miles, and as of the end of March 2004, the eight buses have accumulated 412,838 total test miles without requiring an oil change. This represents an avoidance of 34 oil changes, which equates to 1,199 quarts (300 gallons) of new oil not consumed and, furthermore, 1,199 quarts of waste oil not generated.

U.S. Department of Energy; Larry Zirker

2004-06-01T23:59:59.000Z

476

U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Fifth Quarterly Report October - December 2003  

SciTech Connect (OSTI)

This Oil Bypass Filter Technology Evaluation quarterly report (October-December 2003) details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. To date, the eight buses have accumulated 324,091 test miles. This represents an avoidance of 27 oil changes, which equate to 952 quarts (238 gallons) of new oil not conserved and therefore, 952 quarts of waste oil not generated. To validate the extended oil-drain intervals, an oil-analysis regime is used to evaluate the fitness of the oil for continued service by monitoring the presence of necessary additives, undesirable contaminants, and engine-wear metals. The test fleet has been expanded to include six Chevrolet Tahoe sport utility vehicles with gasoline engines.

Larry Zirker; James Francfort

2004-02-01T23:59:59.000Z

477

Wind energy systems information user study  

SciTech Connect (OSTI)

This report describes the results of a series of telephone interviews with potential users of information on wind energy conversion. These interviews, part of a larger study covering nine different solar technologies, attempted to identify: the type of information each distinctive group of information users needed, and the best way of getting information to that group. Groups studied include: wind energy conversion system researchers; wind energy conversion system manufacturer representatives; wind energy conversion system distributors; wind turbine engineers; utility representatives; educators; county agents and extension service agents; and wind turbine owners.

Belew, W.W.; Wood, B.L.; Marle, T.L.; Reinhardt, C.L.

1981-01-01T23:59:59.000Z

478

User Shipments | Linac Coherent Light Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services Print The UserShipments

479

User-Program_Town_Hall-11.pptx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services PrintUser's Manual

480

User_Shop_Access_List.xls  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism inS-4500II Field Emission SEMUsedUser Services PrintUser's

Note: This page contains sample records for the topic "users bypass authentication" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

User Survey | Argonne Leadership Computing Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduledProductionCCEIResearchStatistics UserUser

482

Applying Scenarios in the context of Specific User Design: Surgeon as an Expert User, and Design for Handicapped Children.  

E-Print Network [OSTI]

to guide the design team through an optimal instrument. The know-how and the knowledge of the user must, the article shows that the design process, that integrates specific user, can use the scenario based approachApplying Scenarios in the context of Specific User Design: Surgeon as an Expert User, and Design

Paris-Sud XI, Université de

483

Evaluation of a Prototype Surface Flow Bypass for Juvenile Salmon and Steelhead at the Powerhouse of Lower Granite Dam, Snake River, Washington, 1996-2000  

SciTech Connect (OSTI)

A surface flow bypass provides a route in the upper water column for naturally, surface-oriented juvenile salmonids to safely migrate through a hydroelectric dam. Surface flow bypasses were recommended in several regional salmon recovery plans as a means to increase passage survival of juvenile salmonids at Columbia and Snake River dams. A prototype surface flow bypass, called the SBC, was retrofit on Lower Granite Dam and evaluated from 1996 to 2000 using biotelemetry and hydroacoustic techniques. In terms of passage efficiency, the best SBC configurations were a surface skimmer (99 m3/s [3,500 cfs], three entrances 5 m wide, 5 m deep and one entrance 5 m wide, 15 m deep) and a single chute (99 m3/s, one entrance 5 m wide, 8.5 m deep). They each passed 62 ? 3% (95% confidence interval) of the total juvenile fish population that entered the section of the dam with the SBC entrances (Turbine Units 4-5). Smooth entrance shape and concentrated surface flow characteristics of these configurations are worth pursuing in designs for future surface flow bypasses. In addition, a guidance wall in the Lower Granite Dam forebay diverted the following percentages of juvenile salmonids away from Turbine Units 1-3 toward other passage routes, including the SBC: run-at-large 79 ? 18%; hatchery steelhead 86%; wild steelhead 65%; and yearling chinook salmon 66%. When used in combination with spill or turbine intake screens, a surface flow bypass with a guidance wall can produce a high level (> 90% of total project passage) of non-turbine passage and provide operational flexibility to fisheries managers and dam operators responsible for enhancing juvenile salmonid survival.

Johnson, Gary E.; Anglea, Steven M.; Adams, Noah S.; Wik, Timothy O.

2005-02-28T23:59:59.000Z

484

Document Engineering in User Experience Design  

E-Print Network [OSTI]

-founded another company: Document Engineering Services #12;What Is Document Engineering? A methodologyDocument Engineering in User Experience Design Doctrain Vancouver -- 8 May 2008 Bob Glushko? What is document engineering? The need to bridge the "front stage" and "back stage" Document

Glushko, Robert J.

485

User Experience in Medical Search Engines  

E-Print Network [OSTI]

User Experience in Medical Search Engines Róbert Andri Kristjánsson Kongens Lyngby 2014 IMM.imm.dtu.dk IMM-MSc-2014-???? #12;Summary (English) FindZebra.com is a specialized search engine for rare diseases that has been de- veloped to as an improvement to standard search engines. FindZebra.com has been shown

486

ISIS User Manual for Departmental, School and  

E-Print Network [OSTI]

ISIS User Manual for Departmental, School and University Administrator ISIS (pronounced -ss) is Northwestern University's Integrated Safety Information System. ISIS is the on-line web application by which PIs submit applications and registrations for review. ISIS also builds a laboratory's Safety Profile

Shull, Kenneth R.

487

User-Focused Data Management Alon Halevy  

E-Print Network [OSTI]

User-Focused Data Management Alon Halevy Google IUI 2009 Sanibel Island, Florida #12;Database on the world's water resources ­See circleofblue.org ·All the documentation about the Boeing 777 ·The Corie Curve Benefit Investment (time, cost) Dataspaces Data integration solutions ? #12;Reusing Human

Halevy, Alon

488

DAKOTA JAGUAR 3.0 user's manual.  

SciTech Connect (OSTI)

JAGUAR (JAva GUi for Applied Research) is a Java software tool providing an advanced text editor and graphical user interface (GUI) to manipulate DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) input specifications. This document focuses on the features necessary to use JAGUAR.

Adams, Brian M. [Sandia National Laboratories, Albuquerque, NM; Bauman, Lara E; Chan, Ethan; Lefantzi, Sophia; Ruthruff, Joseph R.

2013-05-01T23:59:59.000Z

489

INLAND WATERWAYS USERS BOARD ANNUAL REPORT  

E-Print Network [OSTI]

Paducah, Kentucky Mr. Daniel T. Martin Ingram Barge Company Nashville, Tennessee Mr. W. Deane Orr CONSOL Secretary of the Army (Civil Works) on the Administration's Proposed User Fee 23 #12;iv #12;1 Inland) until far into the future. The Board can think of no other sector of the private or public sectors where

US Army Corps of Engineers

490

End-user programming for the Web  

E-Print Network [OSTI]

On the desktop, an application can specify its user interface down to the last pixel, but on the World Wide Web, a content provider has little control over how the client will view the page once it has been delivered to ...

Bolin, Michael (Michael Thomas)

2005-01-01T23:59:59.000Z

491

Model BETA 52 A User Guide  

E-Print Network [OSTI]

Model BETA 52® A User Guide 27D2799 (Rev. 5) Printed in U.S.A. ©2005, Shure Incorporated SUPERCARDIOID DYNAMIC INSTRUMENT MICROPHONE GENERAL The Shure BETA 52® A is a high output dynamic microphone. The BETA 52A features a modified supercardioid pattern through- out its frequency range to insure high gain

Skorobogatiy, Maksim

492

Presto 4.18 user's guide.  

SciTech Connect (OSTI)

Presto is a Lagrangian, three-dimensional explicit, transient dynamics code that is used to analyze solids subjected to large, suddenly applied loads. The code is designed for a parallel computing environment and for problems with large deformations, nonlinear material behavior, and contact. Presto also has a versatile element library that incorporates both continuum elements and structural elements. This user's guide describes the input for Presto that gives users access to all the current functionality in the code. The environment in which Presto is built allows it to be coupled with other engineering analysis codes. Using a concept called scope, the input structure reflects the fact that Presto can be used in a coupled environment. The user's guide describes how scope is implemented from the outermost to the innermost scopes. Within a given scope, the descriptions of input commands are grouped based on functionality of the code. For example, all material input command lines are described in a chapter of the user's guide for all the material models that can be used in Presto.

Spencer, Benjamin Whiting

2010-09-01T23:59:59.000Z

493

Presto 2.9 user's guide.  

SciTech Connect (OSTI)

Presto is a Lagrangian, three-dimensional explicit, transient dynamics code that is used to analyze solids subjected to large, suddenly applied loads. The code is designed for a parallel computing environment and for problems with large deformations, nonlinear material behavior, and contact. Presto also has a versatile element library that incorporates both continuum elements and structural elements. This user's guide describes the input for Presto that gives users access to all the current functionality in the code. The environment in which Presto is built allows it to be coupled with other engineering analysis codes. Using a concept called scope, the input structure reflects the fact that Presto can be used in a coupled environment. The user's guide describes how scope is implemented from the outermost to the innermost scopes. Within a given scope, the descriptions of input commands are grouped based on functionality of the code. For example, all material input command lines are described in a chapter of the user's guide for all the material models that can be used in Presto.

Jung, Joseph

2008-05-01T23:59:59.000Z

494

Turbsim User's Guide: Version 1.50  

SciTech Connect (OSTI)

This report is a user's guide for the TurbSim code. TurbSim stochastic inflow turbulence code is a wind turbine design code that simulates a full-field flow containing coherent turbulence associated with nocturnal boundary layer flows.

Jonkman, B. J.

2009-09-01T23:59:59.000Z

495

User centered story tracking Ilija Subasic  

E-Print Network [OSTI]

and their evolu- tion and comprehending the general the story development. This situation calls for systems thatUser centered story tracking Ilija Subasi´c Katholieke Universiteit Leuven Leuven-Heverlee, Belgium is to identify and highlight these changes to better enable readers to track stories. In this work we restrict

Hammerton, James

496

Library Services for Users with Disabilities  

E-Print Network [OSTI]

Library Services for Users with Disabilities Welcome to the University of Bath Library. In support to the Library Your Subject Librarian will be happy to introduce you to the Library and to show you how to use the Library Catalogue and other subject-specific databases. You can find contact details for your librarian

Burton, Geoffrey R.

497

Facebook IPO updated valuation and user forecasting  

E-Print Network [OSTI]

Facebook IPO ­ updated valuation and user forecasting Based on: Amendment No. 6 to Form S-1 (May 9. Peter Cauwels and Didier Sornette, Quis pendit ipsa pretia: facebook valuation and diagnostic Extreme Growth JPMPaper Cauwels and Sornette 840 1110 1820 S1- filing- May 9 2012 1006 1105 1371 Facebook

498

Purchasing Card (PCard) Program and User Guide  

E-Print Network [OSTI]

Purchasing Card (PCard) Program and User Guide Updated November 25, 2013 St. Francis Xavier University Visa® Purchasing Card #12;Purchasing Card (PCard) Program Guide November 25, 2013 Page 1 of 18.................................................................................................................................................2 Financial Services ­ Business Office ­ PCard Administrators

499

Arras User's Manual John B. Smith  

E-Print Network [OSTI]

Arras User's Manual TR85-036 1985 John B. Smith The University of North Carolina at Chapel Hill'S MANUAL John B. Smith Department or Computer Science University or North Carolina Chapel Hill, North Carolina 27514 Copyright© 1984 by John B. Smith #12;Starling ARRAS Note for those not using TUCC: The ARRAS

North Carolina at Chapel Hill, University of

500

E#cient Applications in User Transparent  

E-Print Network [OSTI]

Chapter 7 E#cient Applications in User Transparent Parallel Image Processing # ''Thy will by my parallel image processing. First, in Chapter 2 we have discussed the need for the availability is a sustainable software library consisting of an extensive set of operations commonly applied in state

Seinstra, Frank J.