Sample records for virtual private network

  1. Using Multiprotocol Label Switching in Virtual Private Networks

    E-Print Network [OSTI]

    Doddapaneni, Krishnamohan

    2001-01-01T23:59:59.000Z

    This thesis presents the design of Multiprotocol Label Switching Virtual Private Networks(MPLS VPN). MPLS VPNs are true peer models, which perform traffic separation at Layer 3, through the implementation of separate IP VPN forwarding tables. MPLS...

  2. Provisioning Virtual Private Networks under Traffic Uncertainty* A ...

    E-Print Network [OSTI]

    provisioning Virtual Private Networks (VPNs): given a set of terminals that ..... de m and satis f action by i m posing a unit fl ow between each oriented pair o f ter ...

  3. GUIDELINES ON IMPLEMENTING A SECURE SOCKETS LAYER (SSL) VIRTUAL PRIVATE NETWORK (VPN)

    E-Print Network [OSTI]

    GUIDELINES ON IMPLEMENTING A SECURE SOCKETS LAYER (SSL) VIRTUAL PRIVATE NETWORK (VPN) By Sheila with the transmission of sensitive information across networks. NIST Special Publication (SP) 800-113, Guide to SSL VPNs, offers practical guidelines on implementing a Secure Sockets Layer (SSL) virtual private network (VPN

  4. Virtual Gateway Network Documentation

    E-Print Network [OSTI]

    Segall, Adrian

    Virtual Gateway Network Documentation Composed By: Stiven Andre Nikolai Gukov #12;Table of contents.3) VGNET as a network manager 2) VGNET explained 2.1) One PC with multiple Internet access points. 2 both routers. 1.3) VGNET as a network manager Let's look at figure 3 again. The perfect scenario we may

  5. Virtual Private Environments for Multiphysics Code Validation on Computing Grids

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Virtual Private Environments for Multiphysics Code Validation on Computing Grids Toan Nguyen-based computing environments and deploys, tests and analyzes multiphysics codes. A second approach executes model coupling, error correlations, alert definitions, best usage practices, code verification and code

  6. Online Games, Virtual Worlds, and Social Networks

    E-Print Network [OSTI]

    Hemmers, Oliver

    JOUR 447: Online Games, Virtual Worlds, and Social Networks Virtual Island Making #12;One element in the look and design of the virtual islands. JOUR 447: Online Games, Virtual Worlds, and Social Networks

  7. Virtual stationary timed automata for mobile networks

    E-Print Network [OSTI]

    Nolte, Tina Ann, 1979-

    2009-01-01T23:59:59.000Z

    In this thesis, we formally define a programming abstraction for mobile networks called the Virtual Stationary Automata programming layer, consisting of real mobile clients, virtual timed I/O automata called virtual ...

  8. The CloudNets Network Virtualization Architecture

    E-Print Network [OSTI]

    Schmid, Stefan

    Nets Network Virtualization Architecture Johannes Grassler jgrassler@inet.tu-berlin.de 05. Februar, 2014 Johannes Grassler jgrassler@inet.tu-berlin.de The CloudNets Network Virtualization Architecture #12;..... . .... . .... . ..... . .... . .... . .... . ..... . .... . .... . .... . ..... . .... . .... . .... . ..... . .... . ..... . .... . .... . Johannes Grassler jgrassler@inet.tu-berlin.de The CloudNets Network Virtualization Architecture #12

  9. Virtualized Network Control: Final Report

    SciTech Connect (OSTI)

    Ghani, Nasir [University of New Mexico

    2013-02-01T23:59:59.000Z

    This document is the final report for the Virtualized Network Control (VNC) project, which was funded by the United States Department of Energy (DOE) Office of Science. This project was also informally referred to as Advanced Resource Computation for Hybrid Service and TOpology NEtworks (ARCHSTONE). This report provides a summary of the project's activities, tasks, deliverable, and accomplishments. It also provides a summary of the documents, software, and presentations generated as part of this projects activities. Namely, the Appendix contains an archive of the deliverables, documents, and presentations generated a part of this project.

  10. Virtual Private Network (VPN) | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    VPN, you will always see a notice that you are accessing a federal government computer. PII Survey An annual survey is required of all employees who have VPN access to Argonne....

  11. A Virtual Infrastructure for Wireless Sensor Networks

    E-Print Network [OSTI]

    Stojmenovic, Ivan

    &CHAPTER 4 A Virtual Infrastructure for Wireless Sensor Networks STEPHAN OLARIU and QINGWEN XU Old, and wireless communications 107 Handbook of Sensor Networks: Algorithms and Architectures, Edited by I and communication infra- structures, called wireless sensor networks, will have a significant impact on a wide array

  12. An Architecture for Managing Virtual Circuit and Virtual Path Services on ATM Networks

    E-Print Network [OSTI]

    Columbia University

    1 An Architecture for Managing Virtual Circuit and Virtual Path Services on ATM Networks Abstract management architecture that provides the services and is instrumented for network management purposes service monitor- ing and control functions. The network management architecture proposes complete managed

  13. Firewalls and VPN Network Security and Virtual Private Networks

    E-Print Network [OSTI]

    Riabov, Vladimir V.

    , Profile Config, an ip32_cloud, one ppp_server, three ethernet4_slip8_gtwy routers, and two ppp_wkstn hosts objects of this type. 3. Rename the objects you added and connect them using PPP DS1 links, as shown below: 4. Save your project. The ppp_server and ppp_wkstn support one underlying SLIP (Serial Line Internet

  14. Virtual Workshops: Using Today's Networking Tools to Train Tomorrow's Experts

    E-Print Network [OSTI]

    Kane, J. F.; Bailey, W. F.

    VIRTUAL WORKSHOPS: USING TODAY'S NETWORKING TOOLS TO TRAIN TOMORROW'S EXPERTS John F. Kane, Jr., PE, CEM Senior Consulting Engineer E. 1. du Pont de Nemours and Company, Inc. Charlotte, North Carolina ABSTRACT Training and development... ing," while others call it "virtual presentations." Regardless, a virtual workshop - as we have defmed the term - is a new way to transfer rich and useful information from a subject matter expert to a very large group of people who have a genuine...

  15. Virtual MISO Triggers in Wi-Fi-like Networks

    E-Print Network [OSTI]

    Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano Edward W. Knightly 1 Thursday, April 11 difficult to achieve in mobile devices Thursday, April 11, 2013 #12;5 Virtual MISO (vMISO) TX RX vMISO, 2013 #12;1. System Model 1.1. Distributed System 1.2. Single-Antenna Nodes 6 vMISO

  16. Virtual Workshops: Using Today's Networking Tools to Train Tomorrow's Experts 

    E-Print Network [OSTI]

    Kane, J. F.; Bailey, W. F.

    2000-01-01T23:59:59.000Z

    radical new approach to deliver live, on-site training using DuPont's wide-area communications network and Microsoft's NetMeeting™ data conferencing software: "Virtual Workshops." In I999, the ETN used the virtual workshop approach to deliver timely...

  17. actively building private: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Heinz 6 The New House of the Region of Hannover - Building Energy Efficient in a Public Private Partnership Texas A&M University - TxSpace Summary: Public Private...

  18. Structure and Controls of the Global Virtual Water Trade Network

    E-Print Network [OSTI]

    Suweis, S; Dalin, C; Hanasaki, N; Rinaldo, A; Rodriguez-Iturbe, I; 10.1029/2011GL046837

    2012-01-01T23:59:59.000Z

    Recurrent or ephemeral water shortages are a crucial global challenge, in particular because of their impacts on food production. The global character of this challenge is reflected in the trade among nations of virtual water, i.e. the amount of water used to produce a given commodity. We build, analyze and model the network describing the transfer of virtual water between world nations for staple food products. We find that all the key features of the network are well described by a model that reproduces both the topological and weighted properties of the global virtual water trade network, by assuming as sole controls each country's gross domestic product and yearly rainfall on agricultural areas. We capture and quantitatively describe the high degree of globalization of water trade and show that a small group of nations play a key role in the connectivity of the network and in the global redistribution of virtual water. Finally, we illustrate examples of prediction of the structure of the network under fut...

  19. Digital control networks for virtual creatures 

    E-Print Network [OSTI]

    Bainbridge, Christopher James

    2010-01-01T23:59:59.000Z

    Robot control systems evolved with genetic algorithms traditionally take the form of floating-point neural network models. This thesis proposes that digital control systems, such as quantised neural networks and logical ...

  20. Virtual infrastructure for wireless ad hoc networks

    E-Print Network [OSTI]

    Gilbert, Seth, 1976-

    2007-01-01T23:59:59.000Z

    One of the most significant challenges introduced by ad hoc networks is coping with the unpredictable deployment, uncertain reliability, and erratic communication exhibited by emerging wireless networks and devices. The ...

  1. alternatives blending private: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Fuels? Alternative Fuels, the Smart Choice: Alternative fuels - biodiesel, electricity, ethanol (E85), natural gas 168 Low cost private education in India...

  2. A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks

    E-Print Network [OSTI]

    Krishnamurthy, Srikanth

    A Cross-Layer Framework for Exploiting Virtual MISO Links in Mobile Ad Hoc Networks Gentian requiring the deployment of physical antenna arrays. Virtual MISO entails the simultaneous transmission. We present a novel multilayer approach for exploiting virtual MISO links in ad hoc networks

  3. An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks

    E-Print Network [OSTI]

    Perkins, Dmitri

    1 An Opportunistic Virtual MISO (OVM) Protocol for Multi-hop Wireless Networks Van Nguyen-utilized and performance is not maximized. In this work, we propose the Opportunistic Virtual MISO (OVM) protocol for multi-hop wireless networks. OVM combines virtual MISO (using space- time block codes) and cooperative diversity

  4. Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

    E-Print Network [OSTI]

    Rossi, Michele

    Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks Cristiano in virtual multiple input single output (MISO) trans- missions and space-time block codes have been proposed

  5. Accurate Estimation of the Degree Distribution of Private Networks Michael Hay, Chao Li, Gerome Miklau, and David Jensen

    E-Print Network [OSTI]

    Keinan, Alon

    Accurate Estimation of the Degree Distribution of Private Networks Michael Hay, Chao Li, Gerome private estimate of the degree distribution of a network. The algorithm satisfies a rigorous property of differential privacy, and is also extremely efficient, running on networks of 100 million nodes in a few

  6. Analytical Evaluation of Virtual Infrastructures for Data Dissemination in Wireless Sensor Networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Analytical Evaluation of Virtual Infrastructures for Data Dissemination in Wireless Sensor Networks In this paper, we address the problem of data dissemination in wireless sensor networks (WSN) with mobile sink for an efficient data dissemination in wireless sensor networks. This virtual infrastructure acts as a rendez

  7. Virtual Private Milieus : sharing our digital aura through social and physical proximity

    E-Print Network [OSTI]

    Aharony, Nadav

    2008-01-01T23:59:59.000Z

    People are quite good at establishing a social style and using it in different communications contexts, but they do less well when the communication is mediated by computer networks. It is hard to control what information ...

  8. Wireless Inter-Session Network Coding - An Approach Using Virtual Multicasts

    E-Print Network [OSTI]

    Heindlmaier, Michael

    This paper addresses the problem of inter-session network coding to maximize throughput for multiple communication sessions in wireless networks. We introduce virtual multicast connections which can extract packets from ...

  9. On the Computational Practicality of Private Information Retrieval Network Security and Applied Cryptography Lab

    E-Print Network [OSTI]

    Carbunar, Bogdan

    On the Computational Practicality of Private Information Retrieval Radu Sion Network Security of single-server computational pri- vate information retrieval (PIR) for the purpose of preserv- ing client access patterns leakage. We show that deployment of non-trivial single server PIR protocols on real

  10. Title: NetVM: High Performance and Flexible Networking using Virtualization on Commodity NetVM brings virtualization to the Network, by enabling high bandwidth network functions to

    E-Print Network [OSTI]

    Title: NetVM: High Performance and Flexible Networking using Virtualization on Commodity Platforms to operate at near line speed, while taking advantage of the flexibility and customization of low cost to dynamically scale, deploy, and reprogram services. This provides far greater flexibility than existing purpose

  11. Virtual Global Accelerator Network (VGAN)(LCC-0083)

    SciTech Connect (OSTI)

    Larsen, R

    2003-10-07T23:59:59.000Z

    The concept of a Global Accelerator Network (GAN) has been proposed by key members of ICFA as a cornerstone of a future International Linear Collider (LC). GAN would provide a tool for the participants of an international collaboration to participate in the actual running of the machine from different parts of the world. Some technical experts view the concept as technologically trivial, and instead point out the significant sociological, organizational and administrative problems that must be surmounted in creating a truly workable system. This note proposes that many real issues can be explored by building a simulator (VGAN) consisting of a virtual accelerator model, a global controls model, and a functioning human organizational model, a tool that would explore and resolve many real problems of GAN and the LC enterprise during the LC preliminary design and testing phase.

  12. CTI-Private Financing Advisory Network | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass Facility Jump to:ROW FormsNetwork) Jump

  13. Virtual MISO Triggers in WiFi-like Networks Oscar Bejarano and Edward W. Knightly

    E-Print Network [OSTI]

    Knightly, Edward W.

    Virtual MISO Triggers in WiFi-like Networks Oscar Bejarano and Edward W. Knightly ECE Department, Rice University, Houston, TX 77005 Technical Report Abstract--Virtual Multiple-Input Single-Output (vMISO) sys- tems distribute multi-antenna diversity capabilities between a sending and a cooperating node. vMISO

  14. Virtual City Portal A Multi-Network Personal Information System for Automobile Users1

    E-Print Network [OSTI]

    Bruegge, Bernd

    Virtual City Portal ­ A Multi-Network Personal Information System for Automobile Users1 Richard the Virtual City Portal prototype that is developed within the SOFTNET project. The system allows automobile of information and entertainment services in an automobile environment poses certain requirements on system

  15. auditory virtual environments: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    impor- tance Liu, Ling 52 Natural Interaction in Virtual Environments Gabriel Zachmann Computer Technologies and Information Sciences Websites Summary: -environment...

  16. applied virtual reality: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of immersive applications, which provides a virtual reality system-independent operating environment. The thesis focuses on the approach taken to specify, design, and...

  17. applying virtual reality: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of immersive applications, which provides a virtual reality system-independent operating environment. The thesis focuses on the approach taken to specify, design, and...

  18. Virtual interactive simulation and inspection tool (VISIT) Modeling sensor networks in a virtual city

    SciTech Connect (OSTI)

    Moore, D. M. (David M.)

    2004-01-01T23:59:59.000Z

    The U.S. government is currently investigating the deployment of radiation sensor systems to protect cities against nuclear and radiological threats. Due to the high cost of installing such systems, there is a need to analyze the effectiveness of a variety of sensor configurations in detecting such threats before installing such systems in the field. The Virtual Interactive Simulation and Inspection Tool (VISIT) is a computer program developed for various virtual-reality applications in national security programs, and is presently being adapted to test the efficacy of a variety of sensor configurations in a virtual urban environment. The value of a particular sensor configuration will be assessed by running virtual exercises in which a threat team will choose a radiological device and route to a target and a detection team will specify the locations and types of sensors to be placed in the city to attempt detection of the threat prior to it reaching its target. This paper will discuss the VISIT package, its proposed application, and lessons learned from modeling done to date.

  19. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01T23:59:59.000Z

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, anmore »established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.« less

  20. Cyber-Physical System Security With Deceptive Virtual Hosts for Industrial Control Networks

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Vollmer, Todd; Manic, Milos

    2014-05-01T23:59:59.000Z

    A challenge facing industrial control network administrators is protecting the typically large number of connected assets for which they are responsible. These cyber devices may be tightly coupled with the physical processes they control and human induced failures risk dire real-world consequences. Dynamic virtual honeypots are effective tools for observing and attracting network intruder activity. This paper presents a design and implementation for self-configuring honeypots that passively examine control system network traffic and actively adapt to the observed environment. In contrast to prior work in the field, six tools were analyzed for suitability of network entity information gathering. Ettercap, an established network security tool not commonly used in this capacity, outperformed the other tools and was chosen for implementation. Utilizing Ettercap XML output, a novel four-step algorithm was developed for autonomous creation and update of a Honeyd configuration. This algorithm was tested on an existing small campus grid and sensor network by execution of a collaborative usage scenario. Automatically created virtual hosts were deployed in concert with an anomaly behavior (AB) system in an attack scenario. Virtual hosts were automatically configured with unique emulated network stack behaviors for 92% of the targeted devices. The AB system alerted on 100% of the monitored emulated devices.

  1. Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano and Edward W. Knightly

    E-Print Network [OSTI]

    Knightly, Edward W.

    Virtual MISO Triggers in Wi-Fi-like Networks Oscar Bejarano and Edward W. Knightly ECE Department-Input Single-Output (vMISO) sys- tems distribute multi-antenna diversity capabilities between a sending and a cooperating node. vMISO has the potential to vastly improve wireless link reliability and bit error rates

  2. Virtual MISO: Experimental Evaluation of MAC to Network-Scale Factors

    E-Print Network [OSTI]

    Virtual MISO: Experimental Evaluation of MAC to Network-Scale Factors Oscar Bejarano and Edward W-Input Single-Output (vMISO) sys- tems distribute multi-antenna diversity capabilities between a sending and a cooperating node. vMISO has been shown to vastly improve wireless link reliability and bit error rates

  3. Cognitive Mobile Virtual Network Operator: Investment and Pricing with Supply Uncertainty

    E-Print Network [OSTI]

    Huang, Jianwei

    of Management Sciences, City University of Hong Kong, China. 1There are over 400 mobile virtual network is transparent to the spectrum licensee, the main cost for the C-MVNO is the sensing time and energy. This cost of primary users' traffic. It is thus critical for a C-MVNO to find the right balance between cost

  4. Structure and controls of the global virtual water trade network S. Suweis,1,2

    E-Print Network [OSTI]

    Konar, Megan

    2011; accepted 28 February 2011; published 17 May 2011. [1] Recurrent or ephemeral water shortages al., 2008]). Due to population growth and economic development, water shortage is thus subjectStructure and controls of the global virtual water trade network S. Suweis,1,2 M. Konar,2 C. Dalin

  5. Manipulating complex network structures in virtual reality and 3D printing of the results

    E-Print Network [OSTI]

    Verschure, Paul

    Manipulating complex network structures in virtual reality and 3D printing of the results Alberto the results at any time for direct 3D printing. 1. INTRODUCTION Although its first appearance on the market can be tracked up to three decades ago, stereolithography (also known as 3D printing) has become

  6. A comparison of routing sets for robust network design

    E-Print Network [OSTI]

    2013-07-24T23:59:59.000Z

    seen as a single stage robust program where the set of routings paths together ... called a routing template, which is used by all demand vectors in the uncertainty set. ...... A flexible model for resource management in virtual private networks.

  7. Virtual active filters for HVDC networks using V2G technology F.R. Islam

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    Virtual active filters for HVDC networks using V2G technology F.R. Islam , H.R. Pota School 23 July 2013 Keywords: Power system HVDC Active filter PHEV V2G a b s t r a c t Active and passive filters are essential to maintain the power quality of a HVDC link. In this paper the Vehicle to Grid (V2G

  8. Mexico-Climate Technology Initiative Private Financing Advisory...

    Open Energy Info (EERE)

    Climate Technology Initiative Private Financing Advisory Network (CTI PFAN) Name Mexico-Climate Technology Initiative Private Financing Advisory Network (CTI PFAN) AgencyCompany...

  9. Constructing Path Efficient and Energy Aware Virtual Multicast Backbones in Static Ad Hoc Wireless Networks

    E-Print Network [OSTI]

    Acharya, Tamaghna; Roy, Rajarshi; 10.5121/ijwmn.2010.2210

    2010-01-01T23:59:59.000Z

    For stationary wireless ad hoc networks, one of the key challenging issues in routing and multicasting is to conserve as much energy as possible without compromising path efficiency measured as end-to-end delay. In this paper, we address the problem of path efficient and energy aware multicasting in static wireless ad hoc networks. We propose a novel distributed scalable algorithm for finding a virtual multicast backbone (VMB). Based on this VMB, we have further developed a multicasting scheme that jointly improves path efficiency and energy conservation. By exploiting inherent broadcast advantage of wireless communication and employing a more realistic energy consumption model for wireless communication which not only depends on radio propagation losses but also on energy losses in transceiver circuitry, our simulation results show that the proposed VMB-based multicasting scheme outperforms existing prominent tree based energy conserving, path efficient multicasting schemes.

  10. Is Private Speech Really Private

    E-Print Network [OSTI]

    Smith, Ashley

    2011-01-01T23:59:59.000Z

    This study sought to answer the question “is private speech really private?” by assessing if participants spoke more to themselves when in the company of the experimenter or when they were alone. The similarity between ...

  11. BEAULANT, Anne-Lise, PERRON, Gilles, KLEINPETER, Joseph, WEBER, Christiane, RANCHIN, Thierry, and WALD, Lucien. Adding virtual measuring stations to a network for urban air pollution

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , and WALD, Lucien. Adding virtual measuring stations to a network for urban air pollution mapping TO A NETWORK FOR URBAN AIR POLLUTION MAPPING A. L. Beaulant1* , G. Perron2 , J. Kleinpeter2 , C. Weber3 , T la Pollution atmosphérique en Alsace), 5 rue de Madrid, 67300 Schiltigheim, France 3 Laboratoire

  12. MIRAGE: A Management Tool for the Analysis and Deployment of Network Security Policies

    E-Print Network [OSTI]

    Boyer, Edmond

    , such as firewalls, intrusion detection systems, and VPN routers. We review the two main functionalities embedded technologies, such as filter- ing of traffic, use of encrypted communications, and deployment of authentication of firewalls, NIDSs (network intrusion detection systems), and VPN (Virtual Private Network) routers, is still

  13. MPEG-4 Body Animation Parameters (BAPs) are used for animation of MPEG-4 compliant virtual human-like characters. Distributed virtual reality applications and networked games on

    E-Print Network [OSTI]

    Li, Kang

    Power Aware Compression Algorithms for MPEG-4 Virtual Human Animation in Mobile Computers Siddhartha virtual human (avatar) animation is used in many applications that depict human models interacting decompression, is needed. MPEG-4 has proposed H-Anim standards to represent virtual human-like characters [7] [8

  14. Technical Documentation for System Center 2012 Virtual Machine

    E-Print Network [OSTI]

    Hunt, Galen

    #12; Technical Documentation for System Center 2012 ­ Virtual Machine Manager VMM Information Experience Team Summary: Virtual Machine Manager (VMM) is a management solution for the virtualized datacenter, enabling you to configure and manage your virtualization host, networking, and storage

  15. A verilog-hdl implementation of virtual channels in a network-on-chip router

    E-Print Network [OSTI]

    Park, Sungho

    2009-05-15T23:59:59.000Z

    regulator (ViChaR), have been proposed to use centralized buffer architecture which dynamically allocates virtual channels and buffer slots in real-time depending on traffic conditions. This ViChaR’s dynamic buffer management scheme increases buffer...

  16. Virtual Communities of Care: Online Peer Networks with Post-Organ Transplant Youth

    E-Print Network [OSTI]

    Bers, Marina Umaschi

    medical advances, and youth who benefit from medical treatment still have difficulties adjusting a peer network due to chronic illness, and as a result they are often incompliant to medical and other to develop an intervention to support peer network building and medical adherence. During an eight

  17. Virtual Exhibits

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Virtual Exhibits Inside the Museum Exhibitions Norris Bradbury Museum Lobby Defense Gallery Research Gallery History Gallery TechLab Virtual Exhibits invisible utility element...

  18. Virtual Lock: A Smartphone Application for Personal Surveillance Using Camera Sensor Networks

    E-Print Network [OSTI]

    . A major application of camera sensor networks is surveil- lance and security. Tim Ellis [9] implemented infrared (PIR) sensors to supple- ment algorithms of detecting and tracking humans which can sometimes cause false alarms. By combining PIR sensors with those algorithms, they could avoid false alarms

  19. Army Virtual Housing Experience The Army virtual housing experience provides Soldiers and Families world class

    E-Print Network [OSTI]

    US Army Corps of Engineers

    Army Virtual Housing Experience Fact Sheet OVERVIEW The Army virtual housing experience provides Soldiers and Families world class customer focused housing information which allows them to make informed housing choices regarding off-post, privatized or government housing upon receipt of orders by using

  20. Preemptive Virtual Clock: A Flexible, Efficient, and Cost-effective QOS Scheme for Networks-on-Chip

    E-Print Network [OSTI]

    Grot, Boris

    insights lead us to propose a novel QOS system called Preemptive Virtual Clock (PVC). PVC provides strong without per-flow buffering at the routers and with minimal buffering at the source nodes. PVC averts prior, PVC enables a trade-off between the strength of the guarantees and overall throughput. Finally, PVC

  1. Presence in a Distributed Virtual Environment for Cooperative Visualization

    E-Print Network [OSTI]

    Blake, Edwin

    Presence in a Distributed Virtual Environment for Cooperative Visualization Juan Casanueva of computer networks and computer graphics technology, Collabora- tive Virtual Environments are becoming-Supported Collaborative Work (CSCW). Collaborative Vir- tual Environments involve the use of a distributed architecture

  2. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Virtual Forensics: Social Network Security Solutions

    E-Print Network [OSTI]

    Tappert, Charles

    Forensics: Social Network Security Solutions Marilyn Silva, Rajeswari Ian, Anu Nagpal, Anthony Glover, Steve; Digital Dossier Aggregation Vulnerabilities; Secondary Data Collection Vulnerabilities; Face Recognition

  3. The privatization age? : which services are privatized and why

    E-Print Network [OSTI]

    Zehavi, Amos J., 1968-

    2005-01-01T23:59:59.000Z

    This dissertation examines the determinants of the extent of privatization of service delivery. Despite the fact that right-wing governments extolling neo-liberal policies have placed privatization at the top of the policy ...

  4. Virtual impactor

    DOE Patents [OSTI]

    Yeh, H.C.; Chen, B.T.; Cheng, Y.S.; Newton, G.J.

    1988-08-30T23:59:59.000Z

    A virtual impactor is described having improved efficiency and low wall losses in which a core of clean air is inserted into the aerosol flow while aerosol flow is maintained adjacent to the inner wall surfaces of the focusing portion of the impactor. The flow rate of the core and the length of the throat of the impactor's collection probe, as well as the dimensional relationships of other components of the impactor adjacent the separation region of the impactor, are selected to optimize separation efficiency. 4 figs.

  5. A GRASP WITH PATH-RELINKING FOR PRIVATE VIRTUAL ...

    E-Print Network [OSTI]

    2001-06-15T23:59:59.000Z

    Jun 15, 2001 ... ing problem is formulated as an integer multicommodity flow problem with ..... v is given by ?e??(u,v)/2?, where ? is a parameter used to control.

  6. The expandable network disk

    E-Print Network [OSTI]

    Muthitacharoen, Athicha, 1976-

    2008-01-01T23:59:59.000Z

    This thesis presents a virtual disk cluster called END, the Expandable Network Disk. END aggregates storage on a cluster of servers into a single virtual disk. END's main goals are to offer good performance during normal ...

  7. COURSE SYLLABUS SPORT / PRIVATE PILOT

    E-Print Network [OSTI]

    COURSE SYLLABUS SPORT / PRIVATE PILOT #12;#12;Cessna eLearning Web Based Instructional Programs Cessna Sport / Private Pilot Training Course SYLLABUS King Schools, Inc. 3840 Calle Fortunada San Diego States of America. #12;Ver. 1.02 Cessna Sport / Private Pilot Syllabus Your Path to Becoming a Pilot

  8. DRAFT 1999 DRAFT AIRPORT PRIVATIZATION

    E-Print Network [OSTI]

    Entekhabi, Dara

    Professor and Chairman Technology and Policy Program Room E40-245 Massachusetts Institute of Technology PRIVATIZATION ISSUES FOR THE UNITED STATES Richard de Neufville Technology and Policy Program Massachusetts airports into wholly private businesses. Most privatization projects involve substantial regulation

  9. Virtual button interface

    DOE Patents [OSTI]

    Jones, Jake S. (Albuquerque, NM)

    1999-01-01T23:59:59.000Z

    An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch.

  10. Virtual button interface

    DOE Patents [OSTI]

    Jones, J.S.

    1999-01-12T23:59:59.000Z

    An apparatus and method of issuing commands to a computer by a user interfacing with a virtual reality environment are disclosed. To issue a command, the user directs gaze at a virtual button within the virtual reality environment, causing a perceptible change in the virtual button, which then sends a command corresponding to the virtual button to the computer, optionally after a confirming action is performed by the user, such as depressing a thumb switch. 4 figs.

  11. TWRS privatization bibliography

    SciTech Connect (OSTI)

    NONE

    1996-03-01T23:59:59.000Z

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. This bibliography is not, nor is intended to be, exhaustive or complete. It was prepared with the intent of providing a sampling of representative documents potentially helpful to Offerors. The documents referenced herein have been identified as representative of those potentially helpful to Offerors. This list of documents does not represent the full extent of available and potentially helpful information, nor should it be taken as a representation of documents determined to be of greater importance than other documents not referenced herein. There are numerous documents available to the public that are NOT cited in this bibliography; the Offeror is encouraged to perform searches for alternate sources of information.

  12. TWRS privatization bibliography

    SciTech Connect (OSTI)

    NONE

    1996-02-01T23:59:59.000Z

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. The organization of this bibliography is by subject area. Some of the documents overlap subject areas, and may be presented in more than one. Additionally, assignment of a document to one subject area does not necessarily preclude that document from containing information relevant to other subject areas not identified. The subject areas include, in order of presentation:. Waste Characterization; Pre-treatment; High-level Waste Immobilization; Low-level Waste Immobilization; Low-level Waste Melter Test Program; Performance Assessment; and General Safety.

  13. Reforming the Private Insurance Market

    E-Print Network [OSTI]

    Kammen, Daniel M.

    Reforming the Private Insurance Market: Lessons from California for National Health Reform Janet M and Community Medicine, University of California, San Francisco ADVANCING NATIONAL HEALTH REFORM POLICY BRIEF Security |Reforming the Private Insurance Market: Lessons from California ACKNOWLEDGMENTS I would like

  14. Private Inference Control David Woodruff

    E-Print Network [OSTI]

    learning what information is being retrieved. PIC is a generalization of private information retrieval (PIR using PIR (simply omit sensitive information from the database), it is nontrivial to implement inference this problem private information retrieval (PIR) schemes (see, for example, [16, 34]) have been developed

  15. Private Inference Control David Woodru# #

    E-Print Network [OSTI]

    learning what information is being retrieved. PIC is a generalization of private information retrieval (PIR using PIR (simply omit sensitive information from the database), it is nontrivial to implement inference this problem private information retrieval (PIR) schemes (see, for example, [16, 34]) have been developed

  16. IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 10, OCTOBER 2007 1867 V-BLAST-Based Virtual MIMO for Distributed Wireless Sensor Networks

    E-Print Network [OSTI]

    Jayaweera, Sudharman K.

    sensor net- works (WSNs) [1], [2]. A similar concept named virtual antenna array (VAA) has been explored Research/Creative Projects Award (URCA). The author was with the Department of Electrical and Computer Engineering, Wichita State University, Wichita, KS 67260 USA. He is now with the De- partment of Electrical

  17. VIRTUAL REALITYVIRTUAL REALITY Introduction

    E-Print Network [OSTI]

    Petriu, Emil M.

    Animation Script Sensor Data Fusion & Interpretation Avatar (of a human or of a real object) VIRTUAL SCENE;HUMAN PERCEPTION OF REALITY REAL WORLD / ENVIRONMENT HUMAN (sentient living animal able of sensible Is Virtual Reality? -A Web-Based Introduction, by Jerry Isdale #12;Virtual Environments allow humans

  18. Collaborative Virtual Environment Standards: A Performance Evaluation

    E-Print Network [OSTI]

    Ottawa, University of

    for each standard varies from graphics and rendering to simulation and network communication. Standards categories: Rendering and Graphics and Communications Middleware. 2.1 Rendering and Graphics These standards1 Collaborative Virtual Environment Standards: A Performance Evaluation Jauvane C. de Oliveira

  19. Private Activity Revenue Bonds (Maryland)

    Broader source: Energy.gov [DOE]

    Private Activity Revenue Bonds are available in the form of both taxable bonds and tax-exempt bonds. Both types of bonds provide access to long-term capital markets for fixed asset financing....

  20. Private Activity Bond Allocation (Missouri)

    Broader source: Energy.gov [DOE]

    The Private Activity Bond Allocation Program provides low-interest financing through tax-exempt bonds for certain types of projects, including electric and gas utility projects. Eligible applicants...

  1. Private development of artificial reefs

    E-Print Network [OSTI]

    Burns, Arthur Allen

    1978-01-01T23:59:59.000Z

    an artificial reef would have on the total productivity of coastal fishery resources, (2) the legal consideration associated with the private development of artificial reefs, and (3) the financial feasibility or the reef development. The geographic area... the specific concern of this thesis is the private development of artificial reefs, the conclusion is made that a market economy would be the most efficient mechanism of allocating many common property resources. DEDICATION To my Parents, whose love...

  2. Efficiency in a Repeated Prisoners' Dilemma with Imperfect Private Monitoring

    E-Print Network [OSTI]

    Fong, Kyna; Sannikov, Yuliy

    2007-01-01T23:59:59.000Z

    is a sequence of private actions and private signals, i i idepends on his action and his private signal. equilibriumciently private, i.e. private actions are more infor- mative

  3. active power filters: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Varying Network Frequency Ramon Costa Hammerton, James 31 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  4. active power filtering: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Varying Network Frequency Ramon Costa Hammerton, James 31 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  5. active power filter: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Varying Network Frequency Ramon Costa Hammerton, James 31 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  6. TWRS privatization process technical baseline

    SciTech Connect (OSTI)

    Orme, R.M.

    1996-09-13T23:59:59.000Z

    The U.S. Department of Energy (DOE) is planning a two-phased program for the remediation of Hanford tank waste. Phase 1 is a pilot program to demonstrate the procurement of treatment services. The volume of waste treated during the Phase 1 is a small percentage of the tank waste. During Phase 2, DOE intends to procure treatment services for the balance of the waste. The TWRS Privatization Process Technical Baseline (PPTB) provides a summary level flowsheet/mass balance of tank waste treatment operations which is consistent with the tank inventory information, waste feed staging studies, and privatization guidelines currently available. The PPTB will be revised periodically as privatized processing concepts are crystallized.

  7. Interactive Virtual Environments Introduction

    E-Print Network [OSTI]

    Petriu, Emil M.

    sensor data or by animation scripts. Human users can interact and directly manipulate objects within Reality Interactive Virtual Reality Virtualized Reality Augmented Reality #12;HUMAN PERCEPTION OF REALITY REAL WORLD / ENVIRONMENT HUMAN (sentient living animal able of sensible reasoning) #12;Real

  8. Connecting to the Internet Securely; Protecting Home Networks CIAC-2324

    SciTech Connect (OSTI)

    Orvis, W J; Krystosek, P; Smith, J

    2002-11-27T23:59:59.000Z

    With more and more people working at home and connecting to company networks via the Internet, the risk to company networks to intrusion and theft of sensitive information is growing. Working from home has many positive advantages for both the home worker and the company they work for. However, as companies encourage people to work from home, they need to start considering the interaction of the employee's home network and the company network he connects to. This paper discusses problems and solutions related to protection of home computers from attacks on those computers via the network connection. It does not consider protection of those systems from people who have physical access to the computers nor does it consider company laptops taken on-the-road. Home networks are often targeted by intruders because they are plentiful and they are usually not well secured. While companies have departments of professionals to maintain and secure their networks, home networks are maintained by the employee who may be less knowledgeable about network security matters. The biggest problems with home networks are that: Home networks are not designed to be secure and may use technologies (wireless) that are not secure; The operating systems are not secured when they are installed; The operating systems and applications are not maintained (for security considerations) after they are installed; and The networks are often used for other activities that put them at risk for being compromised. Home networks that are going to be connected to company networks need to be cooperatively secured by the employee and the company so they do not open up the company network to intruders. Securing home networks involves many of the same operations as securing a company network: Patch and maintain systems; Securely configure systems; Eliminate unneeded services; Protect remote logins; Use good passwords; Use current antivirus software; and Moderate your Internet usage habits. Most of these items do not take a lot of work, but require an awareness of the risks involved in not doing them or doing them incorrectly. The security of home networks and communications with company networks can be significantly improved by adding an appropriate software or hardware firewall to the home network and using a protected protocol such as Secure Sockets Layer (SSL), a Virtual Private Network (VPN), or Secure Shell (SSH) for connecting to the company network.

  9. Flexible application driven network striping over Wireless Wide Area Networks

    E-Print Network [OSTI]

    Qureshi, Asfandyar

    2005-01-01T23:59:59.000Z

    Inverse multiplexing, or network striping, allows the construction of a high-bandwidth virtual channel from a collection of multiple low-bandwidth network channels. Striping systems usually employ a packet scheduling policy ...

  10. The Fantasy World of Private Finance for Transport via Public...

    Open Energy Info (EERE)

    The Fantasy World of Private Finance for Transport via Public Private Partnerships Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Fantasy World of Private Finance...

  11. Secrecy and War: The Origins of Private Information

    E-Print Network [OSTI]

    Meirowitz, Adam

    2007-01-01T23:59:59.000Z

    create private information that leads to war. Slantchev, onactions do not lead to private information? We use the termsonly what leads states to keep existing information private,

  12. Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping.

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    - of available new scientific techniques to animate Virtual Humans, in a new control scheme that better answersDesigning a Virtual Manikin Animation Framework Aimed at Virtual Prototyping. Antoine Rennuit1, 2, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks to Virtual

  13. People Power Academic + Private Collabora4on

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    People Power Academic + Private Collabora4on for Be8er Electric Motors + Private Collabora4on for Be8er Electric Motors #12; factors that has enabled success in this project has been the availability

  14. Microsoft Private Cloud Title of document

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Microsoft Private Cloud Title of document 1 1 Microsoft Private Cloud A Comparative Look at Functionality, Benefits, and Economics November2012 #12;Microsoft Private Cloud Title of document 2 2 Copyright Information © 2012 Microsoft Corporation. All rights reserved. This document is provided "as-is." Information

  15. Managing Technical Risk: Understanding Private Sector

    E-Print Network [OSTI]

    action. Our study seeks to inform the decisions of both government managers and private entrepreneursApril 2000 Managing Technical Risk: Understanding Private Sector Decision Making on Early Stage 00-787 Managing Technical Risk Understanding Private Sector Decision Making on Early Stage Technology

  16. CONSTRUCTING VIRTUAL HUMAN LIFE SIMULATIONS

    E-Print Network [OSTI]

    Kallmann, Marcelo

    , Virtual Environments, Behavioral Animation, Object Interaction, Python. 1. INTRODUCTION Virtual humanCONSTRUCTING VIRTUAL HUMAN LIFE SIMULATIONS Marcelo Kallmann, Etienne de Sevin and Daniel Thalmann human life simulations. Our main goal is to have virtual human actors living and working autonomously

  17. Managing Overloaded Hosts for Dynamic Consolidation of Virtual Machines in Cloud Data

    E-Print Network [OSTI]

    Melbourne, University of

    maintenance costs, or imple- ment a private cloud data center to improve the resource management of virtual machines (VMs) is an effective way to improve the utilization of resources and energy efficiency of dynamic VM consolidation that directly influences the resource utilization and quality of service (Qo

  18. The inline virtual impactor

    E-Print Network [OSTI]

    Seshadri, Satyanarayanan

    2009-05-15T23:59:59.000Z

    A circumferential slot In-line Virtual Impactor (IVI) has been designed using Computational Fluid Dynamics (CFD) simulation tools and experimentally characterized using monodispersed liquid aerosols to validate simulation results. The base design...

  19. Jefferson Lab Virtual Tour

    SciTech Connect (OSTI)

    None

    2013-07-13T23:59:59.000Z

    Take a virtual tour of the campus of Thomas Jefferson National Accelerator Facility. You can see inside our two accelerators, three experimental areas, accelerator component fabrication and testing areas, high-performance computing areas and laser labs.

  20. Jefferson Lab Virtual Tour

    ScienceCinema (OSTI)

    None

    2014-05-22T23:59:59.000Z

    Take a virtual tour of the campus of Thomas Jefferson National Accelerator Facility. You can see inside our two accelerators, three experimental areas, accelerator component fabrication and testing areas, high-performance computing areas and laser labs.

  1. TWRS privatization phase 1 master site plan

    SciTech Connect (OSTI)

    Parazin, R.J.

    1996-09-30T23:59:59.000Z

    The DOE-RL is pursuing a new business strategy of hiring private contractors for treatment of Hanford Site tank wastes. This strategy is called `privatization` and includes design, permitting, construction, operation and deactivation of facilities for tank waste treatment. The TWRS Privatization Infrastructure Project consists of several sub-projects which will provide key services needed to support the privatization mission. This master site plan presently describes all pertinent aspects of the site and identifies all planned provisions for site development, utilities and other site services. It is a baseline document which will be revised as privatization proceeds through design, construction and start-up.

  2. Privatization and the globalization of energy markets

    SciTech Connect (OSTI)

    NONE

    1996-10-01T23:59:59.000Z

    This report reviews recent global efforts to privatize energy resources and outlines the opportunities and challenges privatization has presented to U.S. and foreign multinational energy companies. The group of energy companies studied in this report includes the major U.S. petroleum companies and many foreign companies. The foreign companies reviewed include state-run energy enterprises, recently privatized energy enterprises, and foreign multinationals that have been privately held. The privatization of non-petroleum energy industries, such as electricity generation and transmission, natural gas transmission, and coal mining, are also discussed. Overseas investments made by electric companies, natural gas companies, and coal companies are included. The report is organized into six chapters: (1) economics of privatization; (2) petroleum privatization efforts among non-U.S. Organization for Economic Cooperation and Development nations; (3) petroleum privatization efforts in Latin America; (4) privatization in socialist and former socialist regimes; (5) privatization efforts in global electric power generation, transmission, and distribution industries; and (6) privatization and globalization of world coal.

  3. Virtual data in CMS production

    SciTech Connect (OSTI)

    Arbree, A. et al.

    2004-08-26T23:59:59.000Z

    Initial applications of the GriPhyN Chimera Virtual Data System have been performed within the context of CMS Production of Monte Carlo Simulated Data. The GriPhyN Chimera system consists of four primary components: (1) a Virtual Data Language, which is used to describe virtual data products, (2) a Virtual Data Catalog, which is used to store virtual data entries, (3) an Abstract Planner, which resolves all dependencies of a particular virtual data product and forms a location and existence independent plan, (4) a Concrete Planner, which maps an abstract, logical plan onto concrete, physical grid resources accounting for staging in/out files and publishing results to a replica location service. A CMS Workflow Planner, MCRunJob, is used to generate virtual data products using the Virtual Data Language. Subsequently, a prototype workflow manager, known as WorkRunner, is used to schedule the instantiation of virtual data products across a grid.

  4. TWRS privatization bibliography. Revision 2

    SciTech Connect (OSTI)

    NONE

    1996-04-01T23:59:59.000Z

    The purpose of this bibliography is to present a select set of documents that may be of interest to the Offeror, covering a variety of subject areas related to the TWRS Privatization Project. This bibliography is not, nor is it intended to be, exhaustive or complete. It was prepared with the intent of providing a sampling of representative documents potentially helpful to Offerors. This bibliography is organized by subject area. The subjects covered are: waste characterization; pre-treatment; high-level waste immobilization; low-level waste immobilization; low-level waste melter test program; performance assessment; general; and safety.

  5. An Analysis of Deflection-Based Wormhole Routing with Virtual Channels 1

    E-Print Network [OSTI]

    Varvarigo, Emmanouel "Manos"

    their destination, because M1 resources are occupied by worms waiting for resources to become available. Virtual messages, as opposed to buffering them un- til the resources become available. As network congestion],[KoS94]), and wormhole routing ([LBB94], [LNG96]). The wormhole deflection scheme with virtual

  6. Virtual Center for Supernetworks Isenberg School of Management July 9, 2009 Contact: Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    , electric power networks, financial networks, the Internet, and other critical networks. The book also Vulnerabilities and Synergies The Virtual Center for Supernetworks at the University of Massachusetts Isenberg Vulnerabilities and Synergies in an Uncertain World (Wiley). Authored by the center's director, John F. Smith

  7. ATLAS Virtual Visits

    E-Print Network [OSTI]

    Goldfarb, Steven; The ATLAS collaboration

    2015-01-01T23:59:59.000Z

    ATLAS Virtual Visits is a project initiated in 2011 for the Education & Outreach program of the ATLAS Experiment at CERN. Its goal is to promote public appreciation of the LHC physics program and particle physics, in general, through direct dialogue between ATLAS physicists and remote audiences. A Virtual Visit is an IP-based videoconference, coupled with a public webcast and video recording, between ATLAS physicists and remote locations around the world, that typically include high school or university classrooms, Masterclasses, science fairs, or other special events, usually hosted by collaboration members. Over the past two years, more than 10,000 people, from all of the world’s continents, have actively participated in ATLAS Virtual Visits, with many more enjoying the experience from the publicly available webcasts and recordings. We present an overview of our experience and discuss potential development for the future.

  8. High efficiency virtual impactor

    DOE Patents [OSTI]

    Loo, B.W.

    1980-03-27T23:59:59.000Z

    Environmental monitoring of atmospheric air is facilitated by a single stage virtual impactor for separating an inlet flow (Q/sub 0/) having particulate contaminants into a coarse particle flow (Q/sub 1/) and a fine particle flow (Q/sub 2/) to enable collection of such particles on different filters for separate analysis. An inlet particle acceleration nozzle and coarse particle collection probe member having a virtual impaction opening are aligned along a single axis and spaced apart to define a flow separation region at which the fine particle flow (Q/sub 2/) is drawn radially outward into a chamber while the coarse particle flow (Q/sub 1/) enters the virtual impaction opening.

  9. VirtualPower: Coordinated Power Management in Virtualized Enterprise Systems

    E-Print Network [OSTI]

    Yang, Junfeng

    VirtualPower: Coordinated Power Management in Virtualized Enterprise Systems Ripal Nathuji CERCS Institute of Technology Atlanta, GA 30032 schwan@cc.gatech.edu ABSTRACT Power management has become. This paper explores how to inte- grate power management mechanisms and policies with the virtualization

  10. Grid Computing for Virtual Organisations: An e-Social Science Case Study,

    E-Print Network [OSTI]

    Turner, K.J.; Lambert, P.; Tan, L.; Sinnott, R.O.

    Turner,K.J. Lambert,P. Tan,L. Sinnott,R.O. Bihagen,E. Gayle,V. van Leeuwen,M. Encyclopaedia for Networked and Virtual Organisations, July 2006.

  11. Private Interactive Communication Across an Adversarial Channel

    E-Print Network [OSTI]

    Private Interactive Communication Across an Adversarial Channel Ran Gelles, Amit Sahai, and Akshay Wadia Department of Computer Science, University of California, Los Angeles, CA, USA {gelles, sahai

  12. Network Embedded Systems Sensor Networks

    E-Print Network [OSTI]

    Amir, Yair

    Battery Energy Reserve Manager = Bank Each task requests an account with conditions W ­ fraction Tracking 9 #12;Virtual Battery: An Energy Reserve Abstraction for Embedded Sensor Networks Qing Cao of real battery allocated N ­ number of energy installments L ­ expected lifetime of the task C

  13. Time Domain Passivity Control of Haptic Interfaces with Virtual Environments

    E-Print Network [OSTI]

    Ryu, Jee-Hwan

    Graphics Processor 60Hz Virtual Environment or Model Haptics Processor 1000 Hz Mechanism Power Converter of conservation of energy: ­ "Energy supplied BY the network can never exceed the energy which has been fed TO it" · Mathematical definitions 0,00 0 tEdvf t N v f f v : Force : Velocity Net energy supplied Initial

  14. A Virtualized Computing Platform For Fusion Control Systems

    SciTech Connect (OSTI)

    Frazier, T; Adams, P; Fisher, J; Talbot, A

    2011-03-18T23:59:59.000Z

    The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory is a stadium-sized facility that contains a 192-beam, 1.8-Megajoule, 500-Terawatt, ultraviolet laser system together with a 10-meter diameter target chamber with room for multiple experimental diagnostics. NIF is the world's largest and most energetic laser experimental system, providing a scientific center to study inertial confinement fusion (ICF) and matter at extreme energy densities and pressures. NIF's laser beams are designed to compress fusion targets to conditions required for thermonuclear burn, liberating more energy than required to initiate the fusion reactions. 2,500 servers, 400 network devices and 700 terabytes of networked attached storage provide the foundation for NIF's Integrated Computer Control System (ICCS) and Experimental Data Archive. This talk discusses the rationale & benefits for server virtualization in the context of an operational experimental facility, the requirements discovery process used by the NIF teams to establish evaluation criteria for virtualization alternatives, the processes and procedures defined to enable virtualization of servers in a timeframe that did not delay the execution of experimental campaigns and the lessons the NIF teams learned along the way. The virtualization architecture ultimately selected for ICCS is based on the Open Source Xen computing platform and 802.1Q open networking standards. The specific server and network configurations needed to ensure performance and high availability of the control system infrastructure will be discussed.

  15. Host virtualization: a taxonomy of management challenges Vitalian A. Danciu

    E-Print Network [OSTI]

    according to established conceptual management frameworks and juxtapose the result to a survey of currentHost virtualization: a taxonomy of management challenges Vitalian A. Danciu Munich Network Management Team Ludwig­Maximilians­UniversitË? at, Munich, Germany danciu@mnm­team.org Abstract: Host

  16. Host virtualization: a taxonomy of management challenges Vitalian A. Danciu

    E-Print Network [OSTI]

    according to established conceptual management frameworks and juxtapose the result to a survey of currentHost virtualization: a taxonomy of management challenges Vitalian A. Danciu Munich Network Management Team Ludwig-Maximilians-Universit¨at, Munich, Germany danciu@mnm-team.org Abstract: Host

  17. Bounds on the sample complexity for private learning and private data release

    SciTech Connect (OSTI)

    Kasiviswanathan, Shiva [Los Alamos National Laboratory; Beime, Amos [BEN-GURION UNIV.; Nissim, Kobbi [BEN-GURION UNIV.

    2009-01-01T23:59:59.000Z

    Learning is a task that generalizes many of the analyses that are applied to collections of data, and in particular, collections of sensitive individual information. Hence, it is natural to ask what can be learned while preserving individual privacy. [Kasiviswanathan, Lee, Nissim, Raskhodnikova, and Smith; FOCS 2008] initiated such a discussion. They formalized the notion of private learning, as a combination of PAC learning and differential privacy, and investigated what concept classes can be learned privately. Somewhat surprisingly, they showed that, ignoring time complexity, every PAC learning task could be performed privately with polynomially many samples, and in many natural cases this could even be done in polynomial time. While these results seem to equate non-private and private learning, there is still a significant gap: the sample complexity of (non-private) PAC learning is crisply characterized in terms of the VC-dimension of the concept class, whereas this relationship is lost in the constructions of private learners, which exhibit, generally, a higher sample complexity. Looking into this gap, we examine several private learning tasks and give tight bounds on their sample complexity. In particular, we show strong separations between sample complexities of proper and improper private learners (such separation does not exist for non-private learners), and between sample complexities of efficient and inefficient proper private learners. Our results show that VC-dimension is not the right measure for characterizing the sample complexity of proper private learning. We also examine the task of private data release (as initiated by [Blum, Ligett, and Roth; STOC 2008]), and give new lower bounds on the sample complexity. Our results show that the logarithmic dependence on size of the instance space is essential for private data release.

  18. The Price of Private Enforcement Under the False Claims Act

    E-Print Network [OSTI]

    Kwok, David

    2011-01-01T23:59:59.000Z

    tam litigation is a form of private action in the support of82) (discussing private rights of action and initiation).might shame them into action. Private enforcement could also

  19. Aggregating QECB Allocations and Using QECBs to Support the Private...

    Office of Environmental Management (EM)

    Private Sector: A Case Study on Massachusetts Provides a overview of qualified energy conservation bond allocations and how they can be used in the private sector. Author:...

  20. Private Company Uses EERE-Supported Chemistry Model to Substantially...

    Office of Environmental Management (EM)

    Private Company Uses EERE-Supported Chemistry Model to Substantially Improve Combustion Engine Simulation Software Private Company Uses EERE-Supported Chemistry Model to...

  1. The Potential of Private Institutional Investors for the Financing...

    Open Energy Info (EERE)

    of Private Institutional Investors for the Financing of Transport Infrastructure Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Potential of Private Institutional...

  2. Strengthening Public-Private Partnerships to Accelerate Global...

    Open Energy Info (EERE)

    Public-Private Partnerships to Accelerate Global Electricity Technology Deployment Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Strengthening Public-Private...

  3. Pagosa Springs Private Wells Space Heating Low Temperature Geothermal...

    Open Energy Info (EERE)

    Private Wells Space Heating Low Temperature Geothermal Facility Jump to: navigation, search Name Pagosa Springs Private Wells Space Heating Low Temperature Geothermal Facility...

  4. Energy Department Announces New Private Sector Partnership to...

    Energy Savers [EERE]

    Energy Department Announces New Private Sector Partnership to Accelerate Renewable Energy Projects Energy Department Announces New Private Sector Partnership to Accelerate...

  5. Energy Department Launches Public-Private Initiative to Help...

    Energy Savers [EERE]

    Launches Public-Private Initiative to Help Oil and Natural Gas Industry Strengthen Its Cybersecurity Capabilities Energy Department Launches Public-Private Initiative to Help Oil...

  6. ELG 5124: Virtual Environments, (Winter 2008) ELG 5124 Virtual Environments (Winter 2008)

    E-Print Network [OSTI]

    Petriu, Emil M.

    , human body modeling and animation. #12;ELG 5124: Virtual Environments, (Winter 2008) AnimationELG 5124: Virtual Environments, (Winter 2008) ELG 5124 Virtual Environments (Winter 2008) Tuesday% _______________________________________________ Calendar description Basic concepts. Virtual worlds. Hardware and software support. World modeling

  7. active filter employing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    type). Traditional design Wilamowski, Bogdan Maciej 25 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  8. active v2 receptor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    structure without human intervention. Key Luhua, Lai 3 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  9. advanced distributed learning: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and experiences; for example, interpersonal interactions across network channels lead to the formation of virtual communities. The innovative kinds of pedagogy empowered by...

  10. Financial Networks Anna Nagurney

    E-Print Network [OSTI]

    Nagurney, Anna

    World Oil Routes Natural Gas Flows Network Systems Internet Traffic Anna Nagurney Financial Networks #12 Gothenburg University Gothenburg, Sweden and John F. Smith Memorial Professor Director ­ Virtual Center, 2012 School of Business, Economics and Law Gothenburg University, Sweden Anna Nagurney Financial

  11. Public private partnership in infrastructure financing

    E-Print Network [OSTI]

    Ahmed, Anas

    2014-01-01T23:59:59.000Z

    The global financial crisis, which was unique in its magnitude and after effects, has generated significant interest in Public Private Partnership (PPP). Lack of investments and deteriorated infrastructure challenges ...

  12. Developing a private equity business in China

    E-Print Network [OSTI]

    Gui, Zhaoyu

    2007-01-01T23:59:59.000Z

    The private equity business, a good complement to the public equity market and the debt market, has been playing an increasing role in China. However, there is no universal formula for doing this business. As an art rather ...

  13. Governmental-Owner Power Imbalance and Privatization 

    E-Print Network [OSTI]

    Xu, Kehan

    2011-10-21T23:59:59.000Z

    natural research context to examine the function of capital markets, the impact of national institutional settings, and the differences between partial privatization and initial public offerings. Very little research, however, has examined the determinants...

  14. Public Private R&D Partnerships Examples

    Broader source: Energy.gov (indexed) [DOE]

    Examples Pete Devlin DOE Hydrogen Program Workshop on Manufacturing R&D for the Hydrogen Economy July 14, 2005 Washington, DC 2 PublicPrivate R&D Partnerships * DoD...

  15. Private Sector Rates (FY 2015) Instrument Technique

    E-Print Network [OSTI]

    Bashir, Rashid

    Source Laser $150 $175 Nanophoton Raman 11 Raman Spectroscopy $150 $175 Newport Solar Simulator Solar Rates for the Material Research Laboratory Facilities Rates for Private Sector companies and researchers

  16. Real-time network simulation support for

    E-Print Network [OSTI]

    Liu, Xiaowen "Jason"

    Real-time network simulation support for scalable routing experiments Yue Li*, Jason Liu, and Raju-time network simulation with the realism of open- source routing protocol implementations. The infrastructure experiments on light-weight virtual machines. Keywords: network simulation; real-time simulation; network

  17. Virtual Science Fair | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Virtual Science Fair Virtual Science Fair The Bioenergy Technology Office (BETO) is hosting a national virtual science fair that engages 9th-12th grade students in learning about...

  18. Expressive Autonomous Cinematography for Interactive Virtual Environments

    E-Print Network [OSTI]

    Tomlinson, Bill

    Expressive Autonomous Cinematography for Interactive Virtual Environments Bill Tomlinson Synthetic an automatic cinematography system for interactive virtual environments. This system controls a virtual camera this cinematography system with an ethologically-inspired structure of sensors, emotions, motivations, and action

  19. Body Animation Parameters (BAPs) are used to animate MPEG-4 compliant virtual human-like characters. In order to stream BAPs in real time interactive environments, the BAPs are compressed for low bitrate representation using a

    E-Print Network [OSTI]

    Bhandarkar, Suchendra "Suchi" M.

    ABSTRACT Body Animation Parameters (BAPs) are used to animate MPEG-4 compliant virtual human network environment. Keywords Human Motion, Virtual Human Animation, MPEG-4 BAP compression 1. INTRODUCTION Animation of human-like virtual characters has potential applications in the design of human

  20. SQMD: Architecture for Scalable, Distributed Database System built on Virtual Private Servers

    E-Print Network [OSTI]

    is expected to continue and future datasets will only become larger. Given this deluge of data factor for scalability and performance. In today's data deluge the problems are becoming common

  1. UbiWorld: An environment integrating virtual reality, supercomputing, and design

    SciTech Connect (OSTI)

    Disz, T.; Papka, M.E.; Stevens, R. [Argonne National Lab., IL (United States). Mathematics and Computer Science Div.

    1997-07-01T23:59:59.000Z

    UbiWorld is a concept being developed by the Futures Laboratory group at Argonne National Laboratory that ties together the notion of ubiquitous computing (Ubicomp) with that of using virtual reality for rapid prototyping. The goal is to develop an environment where one can explore Ubicomp-type concepts without having to build real Ubicomp hardware. The basic notion is to extend object models in a virtual world by using distributed wide area heterogeneous computing technology to provide complex networking and processing capabilities to virtual reality objects.

  2. Designing a Virtual Manikin Animation Framework Aimed at Virtual Prototyping

    E-Print Network [OSTI]

    Rennuit, Antoine; Andriot, Claude; Guillaume, François; Chevassus, Nicolas; Chablat, Damien; Chedmail, Patrick

    2007-01-01T23:59:59.000Z

    In the industry, numerous commercial packages provide tools to introduce, and analyse human behaviour in the product's environment (for maintenance, ergonomics...), thanks to Virtual Humans. We will focus on control. Thanks to algorithms newly introduced in recent research papers, we think we can provide an implementation, which even widens, and simplifies the animation capacities of virtual manikins. In order to do so, we are going to express the industrial expectations as for Virtual Humans, without considering feasibility (not to bias the issue). The second part will show that no commercial application provides the tools that perfectly meet the needs. Thus we propose a new animation framework that better answers the problem. Our contribution is the integration - driven by need ~ of available new scientific techniques to animate Virtual Humans, in a new control scheme that better answers industrial expectations.

  3. Virtual gap dielectric wall accelerator

    DOE Patents [OSTI]

    Caporaso, George James; Chen, Yu-Jiuan; Nelson, Scott; Sullivan, Jim; Hawkins, Steven A

    2013-11-05T23:59:59.000Z

    A virtual, moving accelerating gap is formed along an insulating tube in a dielectric wall accelerator (DWA) by locally controlling the conductivity of the tube. Localized voltage concentration is thus achieved by sequential activation of a variable resistive tube or stalk down the axis of an inductive voltage adder, producing a "virtual" traveling wave along the tube. The tube conductivity can be controlled at a desired location, which can be moved at a desired rate, by light illumination, or by photoconductive switches, or by other means. As a result, an impressed voltage along the tube appears predominantly over a local region, the virtual gap. By making the length of the tube large in comparison to the virtual gap length, the effective gain of the accelerator can be made very large.

  4. Weak Deeply Virtual Compton Scattering

    E-Print Network [OSTI]

    A. Psaker; W. Melnitchouk; A. V. Radyushkin

    2006-12-21T23:59:59.000Z

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities.

  5. Weak Deeply Virtual Compton Scattering

    SciTech Connect (OSTI)

    Ales Psaker; Wolodymyr Melnitchouk; Anatoly Radyushkin

    2007-03-01T23:59:59.000Z

    We extend the analysis of the deeply virtual Compton scattering process to the weak interaction sector in the generalized Bjorken limit. The virtual Compton scattering amplitudes for the weak neutral and charged currents are calculated at the leading twist within the framework of the nonlocal light-cone expansion via coordinate space QCD string operators. Using a simple model, we estimate cross sections for neutrino scattering off the nucleon, relevant for future high intensity neutrino beam facilities.

  6. Private Information Retrieval Using Trusted Hardware

    E-Print Network [OSTI]

    Institute for Infocomm Research, Singapore baofeng@i2r.a-star.edu.sg Abstract. Many theoretical PIR (Private and computation complexity. The re- cent trend in outsourcing databases fuels the research on practical PIR schemes. In this paper, we propose a new PIR system by making use of trusted hardware. Our system

  7. Computationally Private Information Retrieval with Polylogarithmic Communication

    E-Print Network [OSTI]

    Cachin, Christian

    information retrieval. The notion of private information retrieval (PIR for short) was introduced by Chor, Goldreich, Kushilevitz and Sudan [CGKS95] and has already received a lot of attention. The study of PIR for mobile users.) Ideally, the PIR problem consists of devising a communication protocol involving just two

  8. Outsourced Private Information Retrieval Yizhou Huang

    E-Print Network [OSTI]

    Goldberg, Ian

    . Information-theoretic PIR (IT-PIR) schemes are"perfectly secure" in the same sense as above--even a server is computational PIR (CPIR), whose security relies on certain cryp a scheme for outsourcing Private Information Retrieval (PIR) to untrusted servers while protecting

  9. Private Information Retrieval Using Trusted Hardware

    E-Print Network [OSTI]

    Ding, Xuhua

    for Infocomm Research, Singapore baofeng@i2r.a-star.edu.sg Abstract. Many theoretical PIR (Private Information Retrieval) con- structions have been proposed in the past years. Though information theoretically secure complexity. The re- cent trend in outsourcing databases fuels the research on practical PIR schemes

  10. Computationally Private Information Retrieval with Polylogarithmic Communication

    E-Print Network [OSTI]

    Cachin, Christian

    . The notion of private information retrieval (PIR for short) was introduced by Chor, Goldreich, Kushilevitz and Sudan [CGKS95] and has already received a lot of attention. The study of PIR is motivated by the growing, the PIR problem consists of devising a communication protocol involving just two parties, the database

  11. Outsourcing Private RAM Computation Craig Gentry

    E-Print Network [OSTI]

    satisfy weaker security. For the basic setting without a persistent database, we can instantiate becoming the predominant mode of day-to-day computation, bringing with it new security challenges and flour of private information retrieval (PIR) [CKGS98], where a server holds a large database of size N and a client

  12. Computationally Private Information Retrieval With Polylogarithmic Communication

    E-Print Network [OSTI]

    Goldwasser, Shafi

    . The beautiful notion of private information retrieval (PIR for short) was introduced by Chor, Goldreich, Kushilevitz and Sudan [CGKS95] and has already received a lot of attention. The study of PIR is motivated.) Ideally, the PIR problem consists of devising a communication protocol involving just two parties

  13. TWRS Privatization Phase 1 Master Site Plan

    SciTech Connect (OSTI)

    PARAZIN, R.J.

    1999-08-16T23:59:59.000Z

    This document provides a reference for the development of the Tank Waste Remediation System (TWRS) Privatization Phase I site (former Grout Disposal Compound) and the upgrades and extension to the site of the 200 East Area inter- and intra-area roads and various utilities.

  14. Popular privation: Suffering in fan cultures 

    E-Print Network [OSTI]

    Pawley, Daniel W

    2007-01-01T23:59:59.000Z

    the kind of suffering that occurs in mediated culture. To narrow the mediated-culture aspect of the study, I explore the topic of fandom, which I define as “the intentional socialization of textual consumption,” and I attempt to show how privation exists...

  15. Architecture for Secure and Private Vehicular Communications

    E-Print Network [OSTI]

    Xu, Wenyuan

    Architecture for Secure and Private Vehicular Communications P. Papadimitratos EPFL Lausanne and criminal behavior could be made easier, actually jeopardizing the bene ts of the VC system deployment detection of faulty (inconsistent) data and node actions, aspects not discussed in this paper. The focus

  16. Virtual environment tactile system

    DOE Patents [OSTI]

    Renzi, Ronald (90 Arroyo Seco Way, Tracy, San Joaquin County, CA 95376)

    1996-01-01T23:59:59.000Z

    A method for providing a realistic sense of touch in virtual reality by means of programmable actuator assemblies is disclosed. Each tactile actuator assembly consists of a number of individual actuators whose movement is controlled by a computer and associated drive electronics. When an actuator is energized, the rare earth magnet and the associated contactor, incorporated within the actuator, are set in motion by the opposing electromagnetic field of a surrounding coil. The magnet pushes the contactor forward to contact the skin resulting in the sensation of touch. When the electromagnetic field is turned off, the rare earth magnet and the contactor return to their neutral positions due to the magnetic equilibrium caused by the interaction with the ferrous outer sleeve. The small size and flexible nature of the actuator assemblies permit incorporation into a glove, boot or body suit. The actuator has additional applications, such as, for example, as an accelerometer, an actuator for precisely controlled actuations or to simulate the sensation of braille letters.

  17. Virtual environment tactile system

    DOE Patents [OSTI]

    Renzi, R.

    1996-12-10T23:59:59.000Z

    A method for providing a realistic sense of touch in virtual reality by means of programmable actuator assemblies is disclosed. Each tactile actuator assembly consists of a number of individual actuators whose movement is controlled by a computer and associated drive electronics. When an actuator is energized, the rare earth magnet and the associated contactor, incorporated within the actuator, are set in motion by the opposing electromagnetic field of a surrounding coil. The magnet pushes the contactor forward to contact the skin resulting in the sensation of touch. When the electromagnetic field is turned off, the rare earth magnet and the contactor return to their neutral positions due to the magnetic equilibrium caused by the interaction with the ferrous outer sleeve. The small size and flexible nature of the actuator assemblies permit incorporation into a glove, boot or body suit. The actuator has additional applications, such as, for example, as an accelerometer, an actuator for precisely controlled actuations or to simulate the sensation of braille letters. 28 figs.

  18. Validating agent based models through virtual worlds.

    SciTech Connect (OSTI)

    Lakkaraju, Kiran; Whetzel, Jonathan H.; Lee, Jina [Sandia National Laboratories, Livermore, CA; Bier, Asmeret Brooke; Cardona-Rivera, Rogelio E. [North Carolina State University, Raleigh, NC; Bernstein, Jeremy Ray Rhythm [Gaikai, Inc., Aliso Viejo, CA

    2014-01-01T23:59:59.000Z

    As the US continues its vigilance against distributed, embedded threats, understanding the political and social structure of these groups becomes paramount for predicting and dis- rupting their attacks. Agent-based models (ABMs) serve as a powerful tool to study these groups. While the popularity of social network tools (e.g., Facebook, Twitter) has provided extensive communication data, there is a lack of ne-grained behavioral data with which to inform and validate existing ABMs. Virtual worlds, in particular massively multiplayer online games (MMOG), where large numbers of people interact within a complex environ- ment for long periods of time provide an alternative source of data. These environments provide a rich social environment where players engage in a variety of activities observed between real-world groups: collaborating and/or competing with other groups, conducting battles for scarce resources, and trading in a market economy. Strategies employed by player groups surprisingly re ect those seen in present-day con icts, where players use diplomacy or espionage as their means for accomplishing their goals. In this project, we propose to address the need for ne-grained behavioral data by acquiring and analyzing game data a commercial MMOG, referred to within this report as Game X. The goals of this research were: (1) devising toolsets for analyzing virtual world data to better inform the rules that govern a social ABM and (2) exploring how virtual worlds could serve as a source of data to validate ABMs established for analogous real-world phenomena. During this research, we studied certain patterns of group behavior to compliment social modeling e orts where a signi cant lack of detailed examples of observed phenomena exists. This report outlines our work examining group behaviors that underly what we have termed the Expression-To-Action (E2A) problem: determining the changes in social contact that lead individuals/groups to engage in a particular behavior. Results from our work indicate that virtual worlds have the potential for serving as a proxy in allocating and populating behaviors that would be used within further agent-based modeling studies.

  19. Electricity privatization : should South Korea privatize its state-owned electric utility?

    E-Print Network [OSTI]

    Lim, Sungmin

    2011-01-01T23:59:59.000Z

    The state-owned electric utility, Korea Electricity Power Cooperation (KEPCO), privatization has been a key word in South Korea since 1997, when the government received $55 billion from the International Monetary Fund in ...

  20. The Procedural Attack on Civil Rights: The Empirical Reality of Buckhannon for the Private Attorney General

    E-Print Network [OSTI]

    Albiston, Catherine R.; Nielsen, Laura Beth

    2006-01-01T23:59:59.000Z

    to take many enforcement actions, and private attorneys wererecent federalism decisions, private actions against states,several advantages. Private rights of action democratize and

  1. Public Regulation and Private Lawsuits in the American Separation of Powers System

    E-Print Network [OSTI]

    Farhang, Sean

    2007-01-01T23:59:59.000Z

    applied to de novo court actions by private plaintiffs, andslaves, created a private right of action and provided thedid create a private right of action and some economic

  2. The Private Enforcement of Government Interests Under the False Claims Act

    E-Print Network [OSTI]

    Kwok, David Y.

    2011-01-01T23:59:59.000Z

    government review of private actions in an attempt totam litigation is a form of private action in the support of82) (discussing private rights of action and initiation).

  3. The Public, the Private and the Hybrid: Mapping the Governance...

    Open Energy Info (EERE)

    The Public, the Private and the Hybrid: Mapping the Governance of Energy Finance Jump to: navigation, search Tool Summary LAUNCH TOOL Name: The Public, the Private and the Hybrid:...

  4. Low cost private education in India : challenges and way forward

    E-Print Network [OSTI]

    Garg, Nupur, M.B.A. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    The Low Cost Private School phenomenon has gained momentum and increased visibility in recent years as researchers have begun to map and record the existence of millions of private schools that cater to the education needs ...

  5. Privatization of transit in Yokohama : social and financial impacts

    E-Print Network [OSTI]

    Nakajima, Tsukihito

    2007-01-01T23:59:59.000Z

    This research examines both social and financial impacts of the privatization of municipally-owned transit systems from the perspective of a privatizing city and its citizens by studying the case of Yokohama, Japan's second ...

  6. Illinois: Ozinga Concrete Runs on Natural Gas and Opens Private...

    Energy Savers [EERE]

    Illinois: Ozinga Concrete Runs on Natural Gas and Opens Private Station Illinois: Ozinga Concrete Runs on Natural Gas and Opens Private Station November 6, 2013 - 12:00am Addthis...

  7. Virtual Oxygen Sensor for Innovative NOx and PM Emission Control...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Virtual Oxygen Sensor for Innovative NOx and PM Emission Control Technologies Virtual Oxygen Sensor for Innovative NOx and PM Emission Control Technologies A virtual O2 sensor for...

  8. Georgia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489InformationFrenchtown,JumpValley near|Information(CTI

  9. affordable private health: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    array of public-sector ... Goldstein, Ari Alowan 2007-01-01 4 Impacts of the Affordable Care Act on Health Insurance Biology and Medicine Websites Summary: Impacts of the...

  10. Brazil-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomass ConversionsSouthbyBostonBrattleboro, Vermont: Energy(CTI PFAN) | Open Energy

  11. CTI-Private Financing Advisory Network | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL Gas Recovery Biomass Facility Jump to:ROW Forms

  12. Cameroon-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:EzfeedflagBiomassSustainableCSL GasPermits Manual Jump to:(RECP) inCounty,(CTI PFAN) | Open

  13. Uganda-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri Global Energy LLC Place: Dallas,UGIURDBCOSO EGS1/12/20090 Bid5094(CTI

  14. Ukraine-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTri Global Energy LLC Place: Dallas,UGIURDBCOSO EGS1/12/20090Uganda:(CTI

  15. Zambia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind Projectsource History ViewZAP Jump to:

  16. Botswana-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia: EnergyAvignon,BelcherBlundell 1FortInformationJV JumpBoston,(CTI

  17. Jamaica-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInterias Solar EnergyEnergyKansas:SouthOhio: EnergyJallesStrategy

  18. Kazakhstan-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtelInteriasIowa: EnergyKanabec County,Kaolin ADKaw(CTI PFAN) | Open

  19. Indonesia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, search OpenEIHesperia,IDGWPIndiantown, Florida: Energy Resources

  20. Kenya-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOf Kilauea Volcano, Hawaii |Island,Kas Farmssource HistoryKenworth

  1. Honduras-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel Jump to:Pennsylvania: Energy Resources Jump to:Hon HaiMountain

  2. Panama-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer PlantMunhall,Missouri:EnergyOssian, NewPalisades Park, NewPalomar VenturesGasChinaJit(CTI

  3. India-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetecGtel JumpCounty,Jump7 Varnish cache server

  4. Rwanda-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ |Rippey Jump to:WY) JumpLand Focus Area ForestryRuthton(CTI

  5. Senegal-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f < RAPID‎ |Rippey JumpAir JumpCalifornia |Semikron JumpSenate Jump

  6. China-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovation inOpenadd:Information ChinaChina

  7. Ghana-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are8COaBulkTransmissionSitingProcess.pdfGetec AG Contracting Jump to: navigation, search Name:

  8. Nigeria-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOfRoseConcerns Jump to:Neppelsource History(CTI PFAN) | Open Energy

  9. Nepal-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLuOpen EnergyNelsoniX Ltd Jump to: navigation,

  10. Bangladesh-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia: EnergyAvignon, France: EnergyBagley PublicMaryland:Woburn,(CTI PFAN) |

  11. Tanzania-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-f <Maintained By FaultSunpodsSweetwaterTMATalbot County(CTI PFAN) | Open

  12. Mexico-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual SiteofEvaluatingGroup |JilinLu an GroupInformationMexico Central America(CTI PFAN) | Open

  13. Thailand-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty Edit with formSoutheasternInformation TengchongTex-LaInformation(CTI PFAN) |

  14. Cambodia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:Power LPInformation 8thCalwind II CEC Wind Farm JumpCam(CTI PFAN) |

  15. Chile-Climate Technology Initiative Private Financing Advisory Network (CTI

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.png El CER es unaChelmsford,VolcanicChevronJump

  16. Colombia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualProperty EditCalifornia:PowerCER.png El CERCollier Technologies Inc Jump to:

  17. Mozambique-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere I Geothermal Pwer Plant JumpMarysville,Missoula,MontereyHill,Spurr GeothermalInformation Biofuels,

  18. Vietnam-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov YouKizildere IRaghuraji Agro IndustriesTown of Ladoga,planningFlowmeter Logging Jump

  19. Ethiopia-Climate Technology Initiative Private Financing Advisory Network

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnualPropertyd8c-a9ae-f8521cbb8489 No revision|LLCInsulation IncentivesEshoneEstonia:Management

  20. TWRS privatization phase 1 electrical power system

    SciTech Connect (OSTI)

    Singh, G.

    1997-05-30T23:59:59.000Z

    This document includes Conceptual Design Report (CDR) for a new 11 km (7 miles) 230 kV transmission line and a new 40 MVA substation (A6) which will be located east of Grout Facility in 200E Area tank farm. This substation will provide electrical power up to 20 MW each for two private contractor facilities for immobilization and disposal of low activity waste (LAW).

  1. Governmental-Owner Power Imbalance and Privatization

    E-Print Network [OSTI]

    Xu, Kehan

    2011-10-21T23:59:59.000Z

    fulfillment of the requirements for the degree of DOCTOR OF PHILOSOPHY Approved by: Chair of Committee, Laszlo Tihanyi Committee Members, Michael Hitt Lorraine Eden Allan (Haipeng) Chen Head of Department, Murray Barrick August 2010... Major Subject: Management iii ABSTRACT Governmental-Owner Power Imbalance and Privatization. (August 2010) Kehan Xu, B.S., China Criminal Police College; M.B.A., University of Miami Chair of Advisory Committee: Dr. Laszlo Tihanyi...

  2. Understanding Vertical Scalability of I/O Virtualization for MapReduce Workloads

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    movements over the network as much as possible, with increasing core count per node, local storage comes and consolidation of physical resources (transforming them into pub- lic or private/hybrid clouds), the following. Two key design principles enable MapReduce to avoid data movements. First, it forces the users

  3. Developing a Conceptual Model of Virtual Organizations for Citizen Science

    E-Print Network [OSTI]

    Crowston, Kevin

    Developing a Conceptual Model of Virtual Organizations for Citizen Science Andrea Wiggins Syracuse-oriented conceptual model of scientific knowledge production through citizen science virtual organizations. Citizen: conceptual models, virtual organizations, citizen science, cyberinfrastructure, massive virtual

  4. Virtual Education in Kansas: 1998-2014

    E-Print Network [OSTI]

    Adams, Christina Marie

    2014-08-31T23:59:59.000Z

    K-12 virtual education is a growing trend in American education. Virtual education is defined as K-12 online learning experiences led by district-affiliated teachers as part of a structured public school learning program ...

  5. The DOE Virtual University (DVU) Icon

    Broader source: Energy.gov [DOE]

     The Office of Learning & Workforce Development launched a desktop icon for its virtual university.  The DOE Virtual University (DVU) icon is on most of the DOE desktops (most of HQ, except EIA...

  6. Iron Networks Microsoft Fast Track Architecture Reference Architecture Technical White Paper

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Iron Networks Microsoft Fast Track Architecture Reference Architecture Technical White Paper Iron://www.ironnetworks.com #12;Iron Networks IronPOD Fast Track Hyper-V Private Cloud - 2 Copyright©2014 Iron-V Private Cloud - 3 Contents 1 Introduction

  7. Virtual Reality to Improve Remote Control in Presence of Delays

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    or domotics. I. VIRTUAL REALITY AND REMOTE CONTROL One of the aims of virtual reality is to reproduce real

  8. Dolvara Gunatilaka,dgunatilaka@wustl.edu Download Social networking sites such as Facebook and Twitter have gained more popularity in recent years. Because

    E-Print Network [OSTI]

    Jain, Raj

    their semi-public profile [Boyd07] i.e. a profile that some information is public and some is private social network users share a large amount of their private information in their social network space accessibility, social networking websites have become new targets that attract cyber criminals. Cyber criminals

  9. I/O Performance of Virtualized Cloud Environments

    SciTech Connect (OSTI)

    Ghoshal, Devarshi; Canon, Shane; Ramakrishnan, Lavanya

    2011-11-03T23:59:59.000Z

    The scientific community is exploring the suitability of cloud infrastructure to handle High Performance Computing (HPC) applications. The goal of Magellan, a project funded through DOE ASCR, is to investigate the potential role of cloud computing to address the computing needs of the Department of Energy?s Office of Science, especially for mid-range computing and data-intensive applications which are not served through existing DOE centers today. Prior work has shown that applications with significant communication orI/O tend to perform poorly in virtualized cloud environments. However, there is a limited understanding of the I/O characteristics in virtualized cloud environments. This paper will present our results in benchmarking the I/O performance over different cloud and HPC platforms to identify the major bottlenecks in existing infrastructure. We compare the I/O performance using IOR benchmark on two cloud platforms - Amazon and Magellan. We analyze the performance of different storage options available, different instance types in multiple availability zones. Finally, we perform large-scale tests in order to analyze the variability in the I/O patterns over time and region. Our results highlight the overhead and variability in I/O performance on both public and private cloud solutions. Our results will help applications decide between the different storage options enabling applications to make effective choices.

  10. VIRTUAL TRAINING CENTRE FOR SHOE DESIGN: A SAMPLE VIRTUAL TRAINING ENVIRONMENT

    E-Print Network [OSTI]

    Aristomenis, Antoniadis

    VIRTUAL TRAINING CENTRE FOR SHOE DESIGN: A SAMPLE VIRTUAL TRAINING ENVIRONMENT Aura Mihai1 , Mehmet@tex.tuiasi.ro Abstract It is a fact that virtual training has become a key issue in training. There are numerous virtual learning and training environments and, in parallel with this, there are various approaches and tools

  11. Network Upgrade for the SLC: PEP II Network

    SciTech Connect (OSTI)

    Crane, M.; Call, M.; Clark, S.; Coffman, F.; Himel, T.; Lahey, T.; Miller, E.; Sass, R.; /SLAC

    2011-09-09T23:59:59.000Z

    The PEP-II control system required a new network to support the system functions. This network, called CTLnet, is an FDDI/Ethernet based network using only TCP/IP protocols. An upgrade of the SLC Control System micro communications to use TCP/IP and SLCNET would allow all PEP-II control system nodes to use TCP/IP. CTLnet is private and separate from the SLAC public network. Access to nodes and control system functions is provided by multi-homed application servers with connections to both the private CTLnet and the SLAC public network. Monitoring and diagnostics are provided using a dedicated system. Future plans and current status information is included.

  12. Workload Classification & Software Energy Measurement for Efficient Scheduling on Private Cloud Platforms

    E-Print Network [OSTI]

    Smith, James W

    2011-01-01T23:59:59.000Z

    At present there are a number of barriers to creating an energy efficient workload scheduler for a Private Cloud based data center. Firstly, the relationship between different workloads and power consumption must be investigated. Secondly, current hardware-based solutions to providing energy usage statistics are unsuitable in warehouse scale data centers where low cost and scalability are desirable properties. In this paper we discuss the effect of different workloads on server power consumption in a Private Cloud platform. We display a noticeable difference in energy consumption when servers are given tasks that dominate various resources (CPU, Memory, Hard Disk and Network). We then use this insight to develop CloudMonitor, a software utility that is capable of >95% accurate power predictions from monitoring resource consumption of workloads, after a "training phase" in which a dynamic power model is developed.

  13. Information in Virtual Spaces Susanne Riehemann

    E-Print Network [OSTI]

    Zalta, Edward N.

    as a result of developments in immersive interactive virtual 3D spaces, geographic information systems with these visualizations and by studying automatic verbalization of virtual events and automatic creation of virtual events that the user has control over viewpoints and can manipulate data or a

  14. A virtual substitution of Brouwer choice sequence

    E-Print Network [OSTI]

    Klaus Lange

    2009-08-24T23:59:59.000Z

    Step by step a substitution of the well known Brouwer choice sequence will be constructed. It begins with an establishing of quasi alternating prime number series followed by a construction of a virtual sequence in sense of the virtual set definition. The last step gives reasons for why this virtual sequence substitutes the choice sequence created by L. E. J. Brouwer.

  15. Virtual Control Systems Environment (VCSE)

    SciTech Connect (OSTI)

    Atkins, Will

    2012-10-08T23:59:59.000Z

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  16. Toward Virtual Actors Maciej Kalisiak

    E-Print Network [OSTI]

    Toronto, University of

    yet another set of demands. One of the key objects being animated are human or human-like characters for storytelling and drama, natural-looking human animation has been a long-sought goal. Although our present. The advent of virtual actors would make computer animation accessible to a much larger user base, bringing

  17. Virtual Control Systems Environment (VCSE)

    ScienceCinema (OSTI)

    Atkins, Will

    2014-02-26T23:59:59.000Z

    Will Atkins, a Sandia National Laboratories computer engineer discusses cybersecurity research work for process control systems. Will explains his work on the Virtual Control Systems Environment project to develop a modeling and simulation framework of the U.S. electric grid in order to study and mitigate possible cyberattacks on infrastructure.

  18. Design Alternatives for Virtual Interface Architecture (VIA) and an Implementation on IBM Net nity NT Cluster

    E-Print Network [OSTI]

    Xuan, Dong

    Network-Based Computing Laboratory z System Design & Performance Dept. of Computer and Information ScienceDesign Alternatives for Virtual Interface Architecture (VIA) and an Implementation on IBM Net#12 IBM T.J. Watson Research Center The Ohio State University P.O.Box 218 Columbus, OH 43210 Yorktown Hts

  19. Transportation planning: A virtual reality

    SciTech Connect (OSTI)

    Bradley, J. [Johnson Controls, International (United States); Hefele, J.; Dolin, R.M. [Los Alamos National Lab., NM (United States)

    1994-07-01T23:59:59.000Z

    An important factor in the development of any base technology is generating it in such a way that these technologies will continue to be useful through systems upgrades and implementation philosophy metamorphoses. Base technologies of traffic engineering including transportation modeling, traffic impact forecasting, traffic operation management, emergency situation routing and re-routing, and signal systems optimization should all be designed with the future in mind. Advanced Traffic Engineering topics, such as Intelligent Vehicle Highway Systems, are designed with advanced engineering concepts such as rules-based design and artificial intelligence. All aspects of development of base technologies must include Total Quality Engineering as the primary factor in order to succeed. This philosophy for development of base technologies for the County of Los Alamos is being developed leveraging the resources of the Center for Advanced Engineering Technology (CAET) at the Los Alamos National Laboratory. The mission of the CAET is to develop next-generation engineering technology that supports the Los Alamos National Laboratory`s mission and to transfer that technology to industry and academia. The CAET`s goal is to promote industrial, academic, and government interactions in diverse areas of engineering technology, such as, design, analysis, manufacturing, virtual enterprise, robotics, telepresence, rapid prototyping, and virtual environment technology. The Center is expanding, enhancing, and increasing core competencies at the Los Alamos National Laboratory. The CAET has three major thrust areas: development of base technologies, virtual environment technology applications, and educational outreach and training. Virtual environment technology immerses a user in a nonexistent or augmented environment for research or training purposes. Virtual environment technology illustrates the axiom, ``The best way to learn is by doing.``

  20. Khosla Vinod Private investor | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOf Kilauea Volcano, Hawaii |Island,KasVinod Private investor Jump to:

  1. Paladin Private Equity Partners | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to: navigation, searchOfRoseConcernsCompanyPCN Technology Jump to:PPLPacificPaladin Private

  2. Christian Reitberger Private Investor | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof EnergyInnovationin Urban Transport | OpenChristian Reitberger Private Investor Jump

  3. Aloe Private Equity | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat Place: Wayne, Pennsylvania Product:Almacena (SmartAloe Private

  4. The Wind Forecast Improvement Project (WFIP): A Public/Private...

    Office of Environmental Management (EM)

    The Wind Forecast Improvement Project (WFIP): A PublicPrivate Partnership for Improving Short Term Wind Energy Forecasts and Quantifying the Benefits of Utility Operations The...

  5. Service System Design in the Public and Private Sectors Jaroslav ...

    E-Print Network [OSTI]

    Lubos

    2007-10-27T23:59:59.000Z

    class is formed by so-called public systems and the second one is referred as ... On the contrary to a public systems design, a private system ..... International.

  6. Sandia National Laboratories: public-private partnership to advance...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    public-private partnership to advance hydrogen infrastructure Sandia and NREL Announce Two New H2FIRST Reports On April 21, 2015, in Capabilities, Computational Modeling &...

  7. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Broader source: Energy.gov (indexed) [DOE]

    VPN client, which provides remote users with secure IPsec (IKEv2) or SSL Virtual Private Network (VPN) connections to Cisco 5500 Series Adaptive Security Appliances (ASA) and...

  8. Chimeras in networks of planar oscillators Carlo R. Laing

    E-Print Network [OSTI]

    Laing, Carlo R.

    Chimeras in networks of planar oscillators Carlo R. Laing IIMS, Massey University, Private Bag 102-904 NSMC, Auckland, New Zealand (Dated: June 25, 2010) Chimera states occur in networks of coupled the remainder are desynchronized. Most chimera states have been observed in networks of phase oscillators

  9. VirtuCast: Multicast and Aggregation with In-Network Processing

    E-Print Network [OSTI]

    Schmid, Stefan

    by network (functions) virtualization [9] and software-defined networking, e.g., #12;(a) 5 × 5 Grid Topology (b) Steiner Arborescence (c) Virtual Arborescence Fig. 1: An aggregation example on a 5 × 5 grid and storage resources available at middleboxes in datacenters [5], in universal nodes, or in distributed

  10. Reduce truck fuel bills by $353,000+ with private fleet

    SciTech Connect (OSTI)

    Neumerski, M.J. (Rohm and Haas Co., Philadelphia, PA); Powers, T.

    1983-05-01T23:59:59.000Z

    Rohm and Haas Company accomplished well over $353,000 savings in fuel costs due to vehicle engineering and driver training in 1982. It utilized the leaser's nationwide network of company-owned fuel stops resulting in more savings. An emergency response capability has reduced the average downtime per vehicle failure. Rohm and Haas leases 61 tandem axle tractors which are used in four private carriage fleets. Also included are 90 vans and 45 haultrailers that log nearly 10 million road-miles annually.

  11. Real Oscillations of Virtual Neutrinos

    E-Print Network [OSTI]

    W. Grimus; P. Stockinger

    1996-03-28T23:59:59.000Z

    We study the conditions for neutrino oscillations in a field theoretical approach by taking into account that only the neutrino production and detection processes, which are localized in space around the coordinates $\\vec{x}_P$ and $\\vec{x}_D$, respectively, can be manipulated. In this sense the neutrinos whose oscillations are investigated appear as virtual lines connecting production with detection in the total Feynman graph and all neutrino fields or states to be found in the discussion are mass eigenfields or eigenstates. We perform a thorough examination of the integral over the spatial components of the inner neutrino momentum and show that in the asymptotic limit $L=|\\vec{x}_D - \\vec{x}_P| \\rightarrow \\infty$ the virtual neutrinos become ``real'' and under certain conditions the usual picture of neutrino oscillations emerges without ambiguities.

  12. Real oscillations of virtual neutrinos

    E-Print Network [OSTI]

    Grimus, Walter

    1996-01-01T23:59:59.000Z

    We study the conditions for neutrino oscillations in a field theoretical approach by taking into account that only the neutrino production and detection processes, which are localized in space around the coordinates \\vec{x}_P and \\vec{x}_D, respectively, can be manipulated. In this sense the neutrinos whose oscillations are investigated appear as virtual lines connecting production with detection in the total Feynman graph and all neutrino fields or states to be found in the discussion are mass eigenfields or eigenstates. We perform a thorough examination of the integral over the spatial components of the inner neutrino momentum and show that in the asymptotic limit L=|\\vec{x}_D - \\vec{x}_P| \\rightarrow \\infty the virtual neutrinos become ``real'' and under certain conditions the usual picture of neutrino oscillations emerges without ambiguities.

  13. Computer Assisted Virtual Environment - CAVE

    ScienceCinema (OSTI)

    Erickson, Phillip; Podgorney, Robert; Weingartner, Shawn; Whiting, Eric

    2014-06-09T23:59:59.000Z

    Research at the Center for Advanced Energy Studies is taking on another dimension with a 3-D device known as a Computer Assisted Virtual Environment. The CAVE uses projection to display high-end computer graphics on three walls and the floor. By wearing 3-D glasses to create depth perception and holding a wand to move and rotate images, users can delve into data.

  14. Science with Virtual Observatory Tools

    E-Print Network [OSTI]

    P. Padovani

    2004-11-12T23:59:59.000Z

    The Virtual Observatory is now mature enough to produce cutting-edge science results. The exploitation of astronomical data beyond classical identification limits with interoperable tools for statistical identification of sources has become a reality. I present the discovery of 68 optically faint, obscured (i.e., type 2) active galactic nuclei (AGN) candidates in the two GOODS fields using the Astrophysical Virtual Observatory (AVO) prototype. Thirty-one of these sources have high estimated X-ray powers (>10^44 erg/s) and therefore qualify as optically obscured quasars, the so-called QSO 2. The number of these objects in the GOODS fields is now 40, an improvement of a factor > 4 when compared to the only 9 such sources previously known. By going ~ 3 magnitudes fainter than previously known type 2 AGN in the GOODS fields the AVO is sampling a region of redshift -- power space much harder to reach with classical methods. I also discuss the AVO move to our next phase, the EURO-VO, and our short-term plans to continue doing science with the Virtual Observatory.

  15. Virtual data in CMS analysis

    SciTech Connect (OSTI)

    A. Arbree et al.

    2003-10-01T23:59:59.000Z

    The use of virtual data for enhancing the collaboration between large groups of scientists is explored in several ways: by defining ''virtual'' parameter spaces which can be searched and shared in an organized way by a collaboration of scientists in the course of their analysis; by providing a mechanism to log the provenance of results and the ability to trace them back to the various stages in the analysis of real or simulated data; by creating ''check points'' in the course of an analysis to permit collaborators to explore their own analysis branches by refining selections, improving the signal to background ratio, varying the estimation of parameters, etc.; by facilitating the audit of an analysis and the reproduction of its results by a different group, or in a peer review context. We describe a prototype for the analysis of data from the CMS experiment based on the virtual data system Chimera and the object-oriented data analysis framework ROOT. The Chimera system is used to chain together several steps in the analysis process including the Monte Carlo generation of data, the simulation of detector response, the reconstruction of physics objects and their subsequent analysis, histogramming and visualization using the ROOT framework.

  16. Harnessing the market: The opportunities and challenges of privatization

    SciTech Connect (OSTI)

    NONE

    1997-01-01T23:59:59.000Z

    The decision to privatize comes from a policy determination that the Government no longer needs particular assets or no longer needs to be in control of all the means by which products or services are obtained or delivered. Most broadly defined, privatization substitutes, in whole or in part, private market mechanisms for the traditional Government role as employer, financier, owner, operator, and/or regulator of a product or service. This definition admits a wide variety of actions, from innovative contractual arrangements to outright divestiture of activities or assets. But all of these actions share common objectives: to remove the agency from those activities that are not inherently governmental functions or core business lines; to improve the management of remaining activities; to reduce the costs of doing business; and to shift greater performance and financial risk to the private sector. This report by the Privatization Working Group provides an indepth analysis of the major issues that surround privatization within the Department of Energy (DOE). The report divides privatization initiatives at the DOE into three major types: divestiture of functions, contracting out, and asset transfers. It includes the results of a survey of the entire DOE system that identifies more than 200 potential privatization opportunities. The report also includes 13 case studies that explore actual DOE privatization efforts over the past 2 years. Additionally, it summarizes the key legal authorities that govern each of the three types of privatization opportunities in the DOE. The report makes a series of recommendations and outlines accompanying actions that will help the DOE seize the opportunities presented by privatization and confront its challenges.

  17. Virtual Crosswalk Analysis Tool (VCAT)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    synthesized from ideas in functional analysis, business process modeling, and complex network science. VCAT discovers synergies by analyzing natural language descriptions....

  18. Continuous-variable private quantum channel

    SciTech Connect (OSTI)

    Bradler, Kamil [Instituto de Fisica, UNAM, Apdo. Postal 20-364, Mexico DF 01000 (Mexico); Department of Optics, Palacky University, 17. listopadu 50, 77200 Olomouc (Czech Republic)

    2005-10-15T23:59:59.000Z

    In this paper we introduce the concept of quantum private channel within the continuous variables framework (CVPQC) and investigate its properties. In terms of CVPQC we naturally define a 'maximally' mixed state in phase space together with its explicit construction and show that for increasing number of encryption operations (which sets the length of a shared key between Alice and Bob) the encrypted state is arbitrarily close to the maximally mixed state in the sense of the Hilbert-Schmidt distance. We bring the exact solution for the distance dependence and give also a rough estimate of the necessary number of bits of the shared secret key (i.e., how much classical resources are needed for an approximate encryption of a generally unknown continuous-variable state). The definition of the CVPQC is analyzed from the Holevo bound point of view which determines an upper bound of information about an incoming state an eavesdropper is able to get from his optimal measurement.

  19. Private Information Retrieval, Optimal for Users and Secure Coprocessors

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    @dbis.informatik.hu­berlin.de Abstract. A private information retrieval (PIR) protocol allows a user to retrieve one of N records from a database while hiding the identity of the record from the database server. A PIR protocol is optimal Private Information Retrieval (PIR) protocols. Formally, a PIR protocol allows a user to retrieve one of N

  20. Generalizing PIR for Practical Private Retrieval of Public Data

    E-Print Network [OSTI]

    Boyer, Edmond

    Generalizing PIR for Practical Private Retrieval of Public Data Shiyuan Wang, Divyakant Agrawal without revealing the query to the server. Computational Private Information Retrieval (cPIR) achieves approach for the pri- vate retrieval of public data called Bounding-Box PIR (bbPIR). Using bbPIR, a client

  1. A Random Server Model for Private Information Retrieval or

    E-Print Network [OSTI]

    Goldwasser, Shafi

    model for PIR (or SPIR), which allows us to achieve significant improvements both in terms of securityA Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR, Cambridge, MA 02139, USA fshafi,talg@theory.lcs.mit.edu Abstract. Private information retrieval (PIR

  2. Utility and infrastructure needs for private tank waste processing

    SciTech Connect (OSTI)

    Reynolds, B.A.

    1996-05-01T23:59:59.000Z

    This document supports the development of the Draft TWRS Privatization RFP. The document provides summaries of a wide variety of utility infrastructure and support services that are available at the Hanford Site. The needs of the privatization contractors are estimated and compared to the existing infrastructure. Recommendations are presented on the preferred and alternate routes of supplying the identifies requirements.

  3. ANIMAL TRACING: BENEFITS IN CATTLE INDUSTRY AND PRIVATE INCENTIVES

    E-Print Network [OSTI]

    McCarl, Bruce A.

    AND PRIVATE INCENTIVES The economic implications of foreign animal diseases and their mitigation options haveANIMAL TRACING: BENEFITS IN CATTLE INDUSTRY AND PRIVATE INCENTIVES LEVAN ELBAKIDZE Assistant Research Professor Department of Agricultural Economics Texas A&M University College Station, TX, 77843

  4. Private Pesticide Applicator School & Examinations April 3, 2012

    E-Print Network [OSTI]

    Watson, Craig A.

    Tri-County Private Pesticide Applicator School & Examinations April 3, 2012 Registration Deadline Page 1 of 2 13714 TRI-COUNTY PRIVATE PESTICIDE APPLICATOR SCHOOL & EXAMINATIONS THIS PROGRAM ­ March 28, 2012 5:00 PM Baker County Extension Office 8:30 a.m. Registration ($5 per person for CEU

  5. Public-Private R&D Partnerships Pete Devlin

    E-Print Network [OSTI]

    1 Public-Private R&D Partnerships Examples Pete Devlin DOE Hydrogen Program Workshop on Manufacturing R&D for the Hydrogen Economy July 14, 2005 Washington, DC #12;2 Public/Private R&D Partnerships Partnership · Photovoltaic (PV) Manufacturing #12;3 #12;4 SECA: Making Fuels Cells a Reality 2011 - 2015

  6. RESTORING AND MAINTAINING RIPARIAN HABITAT ON PRIVATE PASTURELAND1

    E-Print Network [OSTI]

    Standiford, Richard B.

    RESTORING AND MAINTAINING RIPARIAN HABITAT ON PRIVATE PASTURELAND1 Nancy Reichard2 1 Presented Resources. Redwood Community Action Agency. Eureka, Calif. Abstract: Protecting riparian habitat from livestock grazing on private land is a complex task that requires paying attention to sociological

  7. Achievable Error Exponents for the Private Fingerprinting Game

    E-Print Network [OSTI]

    Merhav, Neri

    Achievable Error Exponents for the Private Fingerprinting Game Anelia Somekh-Baruch and Neri Merhav a forgery of the data while aiming at erasing the fingerprints in order not to be detected. Their action have presented and analyzed a game-theoretic model of private2 fingerprinting systems in the presence

  8. Virtual(ly) Queer: Anti-Genealogy and Obsessive-Compulsion in Bechdels' Fun Home

    E-Print Network [OSTI]

    Gill-Peterson, Julian

    2012-01-01T23:59:59.000Z

    will require giving up on genealogy to notice the virtuallyVirtual(ly) Queer: Anti-Genealogy and Obsessive-Compulsionlines are the form of genealogies, the tracing of lines of

  9. Numerically Estimating Internal Models of Dynamic Virtual Objects

    E-Print Network [OSTI]

    Sekuler, Robert

    human subjects to manipulate a computer-animated virtual object. This virtual object (vO) was a high, human cognition, human information processing, ideal performer, internal model, virtual object, virtual, specifically how humans acquire an internal model of a dynamic virtual object. Our methodology minimizes

  10. Active Perception in Virtual Humans Tamer F. Rabie Demetri Terzopoulos

    E-Print Network [OSTI]

    Terzopoulos, Demetri

    Active Perception in Virtual Humans Tamer F. Rabie Demetri Terzopoulos Department of Electrical prescribes artificial animals, or animats, situated in physics- based virtual worlds as autonomous virtual a pro- totype animat vision implementation within realistic virtual human soldiers situated in a virtual

  11. A virtual company concept for reservoir management

    SciTech Connect (OSTI)

    Martin, F.D. [Dave Martin and Associates, Inc. (United States); Kendall, R.P.; Whitney, E.M. [Los Alamos National Lab., NM (United States)

    1998-12-31T23:59:59.000Z

    This paper describes how reservoir management problems were pursued with a virtual company concept via the Internet and World Wide Web. The focus of the paper is on the implementation of virtual asset management teams that were assembled with small independent oil companies. The paper highlights the mechanics of how the virtual team transferred data and interpretations, evaluated geological models of complex reservoirs, and used results of simulation studies to analyze various reservoir management strategies.

  12. Virtual Hydropower Prospecting – Searching for Hydropower Gold

    SciTech Connect (OSTI)

    Douglas G. Hall

    2007-12-01T23:59:59.000Z

    The availability of geographic information system (GIS) tools and analytical modeling of natural streams has made it possible to perform virtual “river inventories” that were formerly done using topographic maps, stream flow estimates, and physical reconnaissance. The Idaho National Laboratory (INL) in collaboration with the U.S. Geological Survey (USGS) virtually assessed the gross power potential of all natural streams in the United States of America and identified feasible potential project sites and estimated their developable power potential. The results of this virtual prospecting have been incorporated into a GIS application called the Virtual Hydropower Prospector that is available for public use on the Internet.

  13. Virtual Training Centre For CNC: a Sample Virtual Training Environment Mehmet Sahin1

    E-Print Network [OSTI]

    Aristomenis, Antoniadis

    Virtual Training Centre For CNC: a Sample Virtual Training Environment Mehmet Sahin1 , Süleyman bilalis@dpem.tuc.gr Abstract It is a fact that virtual training has been a scope of interest for vocational training for a very long time. However, it needs more time to be more common in all specific

  14. Collective network routing

    DOE Patents [OSTI]

    Hoenicke, Dirk

    2014-12-02T23:59:59.000Z

    Disclosed are a unified method and apparatus to classify, route, and process injected data packets into a network so as to belong to a plurality of logical networks, each implementing a specific flow of data on top of a common physical network. The method allows to locally identify collectives of packets for local processing, such as the computation of the sum, difference, maximum, minimum, or other logical operations among the identified packet collective. Packets are injected together with a class-attribute and an opcode attribute. Network routers, employing the described method, use the packet attributes to look-up the class-specific route information from a local route table, which contains the local incoming and outgoing directions as part of the specifically implemented global data flow of the particular virtual network.

  15. active filter control: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jerome V. Moloney; Joshua E. S. Socolar 1996-12-05 63 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  16. active filter compensator: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    18 19 20 21 22 23 24 25 Next Page Last Page Topic Index 61 Virtual active filters for HVDC networks using V2G technology F.R. Islam Engineering Websites Summary: ) technology is...

  17. Reactive behaviour for autonomous virtual agents using fuzzy logic 

    E-Print Network [OSTI]

    Jaafar, Jafreezal

    2009-11-26T23:59:59.000Z

    One of the fundamental aspects of a virtual environment is the virtual agents that inhabit them. In many applications, virtual agents are required to perceive input information from their environment and make decisions ...

  18. Profiling and Modeling Resource Usage of Virtualized Applications

    E-Print Network [OSTI]

    Simunic, Tajana

    , and fully managed adaptive infrastruc- tures. Virtualization technologies promise great opportunities for reducing energy and hardware costs through server consolidation. Moreover, virtualization can optimize needs. However, to safely transition an application running natively on real hardware to a virtualized

  19. WebGL for Dynamic Virtual Globes

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    WebGL for Dynamic Virtual Globes Patrick Cozzi Analytical Graphics, Inc. pcozzi@agi.com @pjcozzi #12;No anisotropic filtering Overview Cesium A WebGL virtual globe for visualizing dynamic data-side #12;Cesium Architecture - Renderer Scene Renderer Core Renderer - a thin abstraction over Web

  20. Some Aspects of Deeply Virtual Compton Scattering

    E-Print Network [OSTI]

    Elena Kuchina

    2004-05-10T23:59:59.000Z

    We consider different aspects of the virtual Compton amplitude in QCD on two examples: small-x physics accessible in the Regge regime and twist-3 approximation in the description of DVCS through the general parton distributions. Using this model, we give an estimate for the cross section of deeply virtual Compton scattering for the kinematics of CEBAF at Jefferson Lab.

  1. A Deeply Virtual Compton Scattering Amplitude

    E-Print Network [OSTI]

    M. Capua; S. Fazio; R. Fiore; L. Jenkovszky; F. Paccanoni

    2006-07-07T23:59:59.000Z

    A factorized Regge-pole model for deeply virtual Compton scattering is suggested. The use of an effective logarithmic Regge-Pomeron trajectory provides for the description of both ``soft'' (small $|t|$) and ``hard'' (large $|t|$) dynamics. The model contains explicitly the photoproduction and the DIS limits and fits the existing HERA data on deeply virtual Compton scattering.

  2. QCD Sum Rules and Virtual Compton Scattering

    E-Print Network [OSTI]

    A. V. Radyushkin

    1996-09-19T23:59:59.000Z

    In this talk I report on recent progress in a few areas closely related to the virtual Compton scattering studies. In particular, I discuss the quark-hadron duality estimate of the $\\gamma^* p \\to \\Delta^+$ transition, QCD sum rule calculation of the $\\gamma \\gamma^* \\to \\pi^0$ form factor, and application of perturbative QCD to deeply virtual Compton scattering at small $t$.

  3. Storage Management in Virtualized Cloud Environment

    E-Print Network [OSTI]

    Liu, Ling

    the performance bottlenecks in a virtualized setup and understanding the implications of workload combinations present the measurement results of detailed experiments conducted on a virtualized setup focusing/applications enable ubiquitous access to data besides the ability to harness massive computing power even from

  4. Green Virtual Enterprises and their Breeding Environments

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Green Virtual Enterprises and their Breeding Environments David Romero, Arturo Molina Tecnológico. This paper introduces a Green Virtual Enterprise (GVE) model as an emerging sustainable manufacturing and logistics mode focused on offering, delivering and recovering green products to/from the market, under

  5. Coordination and sociability for intelligent virtual agents

    E-Print Network [OSTI]

    Grimaldo, Francisco

    produce low quality animations where characters do not act realistically. Moreover, virtual humans an elegant and formal framework to animate synthetic humans. When designing such agents, the main concern has that will be finally animated. Virtual actors normally operate in dynamic resource bounded contexts; thus, multi

  6. PREPARING THE VIRTUAL CLASSROOM FOR DISTANCE DELIVERY

    E-Print Network [OSTI]

    Dyer, Bill

    of humans and their companion domestic animals and livestock. Students learn that there are certain "at riskPREPARING THE VIRTUAL CLASSROOM FOR DISTANCE DELIVERY: MEDICAL-VETERINARY ENTOMOLOGY CLINICS laboratory," library materials, conventional lectures and the 43 virtual patients in the clinics

  7. Aggregating QECB Allocations & Using QECBs to Support the Private Sector: A Case Study on Massachusetts

    E-Print Network [OSTI]

    Zimring, Mark

    2014-01-01T23:59:59.000Z

    three privately-owned renewable energy projects—with moreof Energy Efficiency and Renewable Energy, Weatherizationover $10 million of private renewable energy projects. After

  8. Department of Energy Releases New Roadmap to Guide Public-Private...

    Energy Savers [EERE]

    New Roadmap to Guide Public-Private Cybersecurity Initiatives Department of Energy Releases New Roadmap to Guide Public-Private Cybersecurity Initiatives September 15, 2011 -...

  9. SMART Wind Consortium Composites Subgroup Virtual Meeting: Advanced...

    Energy Savers [EERE]

    SMART Wind Consortium Composites Subgroup Virtual Meeting: Advanced Manufacturing of Wind Turbine Blades SMART Wind Consortium Composites Subgroup Virtual Meeting: Advanced...

  10. Integrated Virtual Lab in Supporting Heavy Duty Engine and Vehicle...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Virtual Lab in Supporting Heavy Duty Engine and Vehicle Emission Rulemaking Integrated Virtual Lab in Supporting Heavy Duty Engine and Vehicle Emission Rulemaking Presentation...

  11. Proposed Virtual Center for Excellence for Metal Hydride Development

    Broader source: Energy.gov (indexed) [DOE]

    & Engineering Sciences Center Atoms to Continuum Proposed Virtual Center of Excellence Proposed Virtual Center of Excellence for Metal Hydride Development for Metal Hydride...

  12. Energy Department Launches Virtual Hackathon to Build the Next...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Launches Virtual Hackathon to Build the Next Big Solar Software Solutions Energy Department Launches Virtual Hackathon to Build the Next Big Solar Software Solutions February 20,...

  13. Virtual Center of Excellence for Hydrogen Storage - Chemical...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Virtual Center of Excellence for Hydrogen Storage - Chemical Hydrides Virtual Center of Excellence for Hydrogen Storage - Chemical Hydrides Presentation from the Hydrogen Storage...

  14. BioenergizeME Virtual Science Fair: The Environmental Benefit...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Environmental Benefit of Bioenergy BioenergizeME Virtual Science Fair: The Environmental Benefit of Bioenergy BioenergizeME Virtual Science Fair: The Environmental Benefit of...

  15. BioenergizeME Virtual Science Fair: Science & Technology Sustainable...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Science & Technology Sustainable Transportation Fuels BioenergizeME Virtual Science Fair: Science & Technology Sustainable Transportation Fuels BioenergizeME Virtual Science Fair:...

  16. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet...

  17. Buildings of the Future Research Project Launch and Virtual Panel...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buildings of the Future Research Project Launch and Virtual Panel Discussion on Building Technology Trends Buildings of the Future Research Project Launch and Virtual Panel...

  18. DREAM: DiffeRentially privatE smArt Metering

    E-Print Network [OSTI]

    Acs, Gergely

    2012-01-01T23:59:59.000Z

    This paper presents a new privacy-preserving smart metering system. Our scheme is private under the differential privacy model and therefore provides strong and provable guarantees. With our scheme, an (electricity) supplier can periodically collect data from smart meters and derive aggregated statistics while learning only limited information about the activities of individual households. For example, a supplier cannot tell from a user's trace when he watched TV or turned on heating. Our scheme is simple, efficient and practical. Processing cost is very limited: smart meters only have to add noise to their data and encrypt the results with an efficient stream cipher.

  19. Webinar Announcement: Accessing Private Capital for Clean Energy...

    Open Energy Info (EERE)

    2012 - 10:44 On November 19th, the Clean Energy Solutions Center will host a training webinar on Financing Clean Energy Projects with Private Capital. The webinar content...

  20. Secretary Chu Announces Nearly $1 Billion Public-Private Investment...

    Office of Environmental Management (EM)

    Announces Nearly 1 Billion Public-Private Investment in Industrial Carbon Capture and Storage June 10, 2010 - 12:00am Addthis Washington, D.C. - U.S. Energy Secretary Steven...

  1. Privatization of buildings and land : the case of El Salvador

    E-Print Network [OSTI]

    Chamberlain, Fernando Adolfo

    1992-01-01T23:59:59.000Z

    Privatization lS a concern, in the world transition to market economies and management of real property portfolios (RPP) --- t.he building and land stock of a government. For political and technical reasons the Government ...

  2. Secure quantum private information retrieval using phase-encoded queries

    E-Print Network [OSTI]

    Olejnik, L

    2011-01-01T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries {[}Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that...

  3. Private Branching Programs: On Communication-Efficient Cryptocomputing

    E-Print Network [OSTI]

    a secure function evaluation protocol for Boolean functions with similar performance, (c) a protocol for PIR-writing with low amortized complexity, (d) a selective private function evaluation (SPFE) protocol

  4. Collective private urban renewal in New Bedford's historic district

    E-Print Network [OSTI]

    Bullard, John K. (John Kilburn)

    1974-01-01T23:59:59.000Z

    This thesis examines the waterfront historic district in New Bedford, Massachusetts. It is, hopefully, the beginning of a process of collective private renewal that may lead the revival of the district as a vital element ...

  5. City of San Jose- Private Sector Green Building Policy

    Broader source: Energy.gov [DOE]

    In October 2008, the City of San Jose enacted the Private Sector Green Building Policy (Policy No. 6-32). The policy was adopted in Ordinance No. 28622 in June, 2009. All new buildings must meet...

  6. A Review of the Taxonomy of Private Data -Abhishek Gupta

    E-Print Network [OSTI]

    Wirosoetisno, Djoko

    A Review of the Taxonomy of Private Data -Abhishek Gupta "Data today is not just information taxonomy: a. Service Data : Basic Information like legal name, credit card number etc that we provide. b

  7. Challenges and opportunities in the Tunisian private equity sector

    E-Print Network [OSTI]

    Gharbi, Moez, S.M. Massachusetts Institute of Technology

    2012-01-01T23:59:59.000Z

    Most of the studies and research analyzing the private equity ("PE") sector in the Middle East North Africa ("MENA") region tend to focus more on the Middle East and less on North Africa. The case of Tunisia is probably ...

  8. Essays on Voluntary Contribution with Private Information and Threshold Uncertainty

    E-Print Network [OSTI]

    Peng, Hui-Chun

    2014-07-08T23:59:59.000Z

    This dissertation concerns individual voluntary contributions in the subscription game with three important model considerations: private information on public good valuations, threshold uncertainty and the timing of the contribution — simultaneous...

  9. Military housing privatization & the promise of design innovation

    E-Print Network [OSTI]

    Ellis, Jason (Jason Robert)

    2009-01-01T23:59:59.000Z

    The objective of this paper is to answer the question, "Has the military housing privatization process produced design innovation?" Secondary questions are, "What specific role has the Army's Residential Communities ...

  10. Coordination of supply chain inventory systems with private information 

    E-Print Network [OSTI]

    Chu, Chi-Leung

    2007-04-25T23:59:59.000Z

    This dissertation considers the problems of coordinating different supply chain inventory systems with private information under deterministic settings. These systems studied are characterized by the following properties: (a) each facility...

  11. UNDERSTANDING POSTAL PRIVATIZATION: CORPORATIONS, UNIONS AND "THE PUBLIC INTEREST"

    E-Print Network [OSTI]

    1 UNDERSTANDING POSTAL PRIVATIZATION: CORPORATIONS, UNIONS AND "THE PUBLIC INTEREST" BY SARAH F Relations Written under the direction of Professor Adrienne Eaton and approved by ___________[Jeffrey Keefe]_____________ ____________[Dorothy Sue Cobble]____________ ____________[Adrienne Eaton]_____________ New Brunswick, New Jersey

  12. Accelerating government R&D with private financing

    E-Print Network [OSTI]

    Corzine, Andy Robert, 1970-

    2009-01-01T23:59:59.000Z

    In this thesis, I argue that accelerating government research and development (R&D) with private financing could simultaneously improve the nation's war fighting readiness and economy. I submit that better utilization of ...

  13. Network Management Network Management

    E-Print Network [OSTI]

    that pertain to the operation, administration, maintenance, and provisioning of networked systems · Operation deals with keeping the network up (and the service provided by the network) · Administration involvesNetwork Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network

  14. PHEV's Park as a Virtual Active Filter for HVDC F. R. Islam, H. R. Pota and A. B. M. Nasiruzzaman

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    PHEV's Park as a Virtual Active Filter for HVDC Networks F. R. Islam, H. R. Pota and A. B. M.Nasiruzzaman@student.adfa.edu.au Abstract--The HVDC converters used for rectifying or in- verting operations absorb reactive power from produces harmonics in both sides of HVDC links. Passive and active filters are used to filter the harmonics

  15. Final report for the virtual channel encryptor laboratory directed research and development project

    SciTech Connect (OSTI)

    Gibson, D.J.; Sarfaty, R.A.

    1997-08-01T23:59:59.000Z

    A workstation with a single physical connection to a data communications network may have a requirement for simultaneous `virtual` communication channels to more than one destination. This report describes the development of techniques based on the Data Encryption Standard (DES) which encrypt these virtual channels to secure the data being transmitted against unauthorized access. A software module has been developed for the UNIX operating system using these techniques for encryption, and some development has also been done on a hardware device to be included between the workstation and network which can also provide these functions. The material presented in this report will be useful to those with a need to protect information in data communications systems from unauthorized access.

  16. Virtual Laboratory for Technology For Fusion Energy Science

    E-Print Network [OSTI]

    VLT Virtual Laboratory for Technology For Fusion Energy Science Stan Milora, ORNL Director, Virtual and ITER #12;VLT Virtual Laboratory for Technology For Fusion Energy Science The Technology Program Virtual Laboratory for Technology For Fusion Energy Science The VLT is the steward of burning plasma

  17. Interaction Techniques with Virtual Humans in Mixed Environments

    E-Print Network [OSTI]

    Kallmann, Marcelo

    animation have led to the integration of Virtual Humans [9] into interactive 3D environments. With emergeInteraction Techniques with Virtual Humans in Mixed Environments Selim Balcisoy, Marcelo Kallmann use virtual humans as mediators between the real and virtual world. Keywords: Interaction Techniques

  18. Complex quantum networks as structured environments: engineering and probing

    E-Print Network [OSTI]

    Johannes Nokkala; Fernando Galve; Roberta Zambrini; Sabrina Maniscalco; Jyrki Piilo

    2015-03-16T23:59:59.000Z

    We consider structured environments modeled by bosonic quantum networks and investigate the control and probing of their spectral density. We demonstrate how to engineer a desired spectral density by changing the network structure. We show that the spectral density can be very accurately detected via a locally immersed probe system for virtually any network configuration. We illustrate our findings presenting examples of spectral densities for networks of genuine complexity.

  19. National Energy Literacy Virtual Town Hall

    Broader source: Energy.gov [DOE]

    The webinar will be a dynamic, virtual conversation for educators about ongoing efforts from across the country in utilizing the Department of Energy's Energy Literacy Framework to address one of our nation's’ biggest national challenges, energy illiteracy.

  20. Robotics virtual rail system and method

    DOE Patents [OSTI]

    Bruemmer, David J. (Idaho Falls, ID); Few, Douglas A. (Idaho Falls, ID); Walton, Miles C. (Idaho Falls, ID)

    2011-07-05T23:59:59.000Z

    A virtual track or rail system and method is described for execution by a robot. A user, through a user interface, generates a desired path comprised of at least one segment representative of the virtual track for the robot. Start and end points are assigned to the desired path and velocities are also associated with each of the at least one segment of the desired path. A waypoint file is generated including positions along the virtual track representing the desired path with the positions beginning from the start point to the end point including the velocities of each of the at least one segment. The waypoint file is sent to the robot for traversing along the virtual track.

  1. BioenergizeME Virtual Science Fair: Bioenergy

    Broader source: Energy.gov [DOE]

    This infographic was created by students from Sun Valley High School in Aston, PA, as part of the U.S. Department of Energy-BioenergizeME Virtual Science Fair.

  2. QED radiative corrections to virtual Compton scattering

    E-Print Network [OSTI]

    M. Vanderhaeghen; J. M. Friedrich; D. Lhuillier; D. Marchand; L. Van Hoorebeke; J. Van de Wiele

    2000-01-12T23:59:59.000Z

    The QED radiative corrections to virtual Compton scattering (reaction $e p \\to e p \\gamma$) are calculated to first order in $\\alpha_{em} \\equiv e^2 / 4 \\pi$. A detailed study is presented for the one-loop virtual corrections and for the first order soft-photon emission contributions. Furthermore, a full numerical calculation is given for the radiative tail, corresponding with photon emission processes, where the photon energy is not very small compared with the lepton momenta. We compare our results with existing works on elastic electron-proton scattering, and show for the $e p \\to e p \\gamma$ reaction how the observables are modified due to these first order QED radiative corrections. We show results for both unpolarized and polarized observables of the virtual Compton scattering in the low energy region (where one is sensitive to the generalized polarizabilities of the nucleon), as well as for the deeply virtual Compton scattering.

  3. Heavy Ion Fusion Science Virtual National Laboratory

    E-Print Network [OSTI]

    progress with more modest near-term budgets. #12;Slide 5 Heavy Ion Fusion Science Virtual National requirement: modest growth of HIFS-VNL budget from present 7.7 M$/yr to ~16M$/yr, including suppo

  4. Virtual tour: INL's space battery facility

    SciTech Connect (OSTI)

    Johnson, Steve

    2011-01-01T23:59:59.000Z

    This virtual tour shows how INL fuels and tests nuclear power systems for deep space missions. To learn more about INL's contribution to the Mars Science Laboratory, visit http://www.inl.gov/marsrover.

  5. Virtual tour: INL's space battery facility

    ScienceCinema (OSTI)

    Johnson, Steve

    2013-05-28T23:59:59.000Z

    This virtual tour shows how INL fuels and tests nuclear power systems for deep space missions. To learn more about INL's contribution to the Mars Science Laboratory, visit http://www.inl.gov/marsrover.

  6. Balanced Virtual Humans Interacting with their Environment

    E-Print Network [OSTI]

    Rennuit, Antoine; Merlhiot, Xavier; Andriot, Claude; Guillaume, François; Chevassus, Nicolas; Chablat, Damien; Chedmail, Patrick

    2007-01-01T23:59:59.000Z

    The animation of human avatars seems very successful; the computer graphics industry shows outstanding results in films everyday, the game industry achieves exploits... Nevertheless, the animation and control processes of such manikins are very painful. It takes days to a specialist to build such animated sequences, and it is not adaptive to any type of modifications. Our main purpose is the virtual human for engineering, especially virtual prototyping. As for this domain of activity, such amounts of time are prohibitive.

  7. Private-Public Partnerships for U.S. Advanced Manufacturing

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Government Large Manufacturing Companies Small & Medium Enterprise (SMEs) Start-ups Industry Network of IMIs 2013 State of the Union Announcement National Network for...

  8. Quantum Private Information Retrieval has linear communication complexity

    E-Print Network [OSTI]

    Ämin Baumeler; Anne Broadbent

    2014-01-29T23:59:59.000Z

    In Private Information Retrieval (PIR), a client queries an n-bit database in order to retrieve an entry of her choice, while maintaining privacy of her query value. Chor, Goldreich, Kushilevitz, and Sudan showed that, in the information-theoretical setting, a linear amount of communication is required for classical PIR protocols (and thus that the trivial protocol is optimal). This linear lower bound was shown by Nayak to hold also in the quantum setting. Here, we extend Nayak's result by considering approximate privacy, and requiring security only against "specious" adversaries, which are, in analogy to classical honest-but-curious adversaries, the weakest reasonable quantum adversaries. We show that, even in this weakened scenario, Quantum Private Information Retrieval (QPIR) requires n qubits of communication. From this follows that Le Gall's recent QPIR protocol with sublinear communication complexity is not information-theoretically private, against the weakest reasonable cryptographic adversary.

  9. Motion Capture Based Animation for Virtual Human Demonstrators: Modeling, Parameterization and Planning

    E-Print Network [OSTI]

    Huang, Yazhou

    2012-01-01T23:59:59.000Z

    sive gaze animation for virtual humans. ” In Proceedings ofCapture Based Animation for Virtual Human Demonstrators:Capture Based Animation for Virtual Human Demonstrators:

  10. Isis essay review 1 P. N. Edwards Virtual Machines, Virtual Infrastructures

    E-Print Network [OSTI]

    Edwards, Paul N.

    Isis essay review 1 P. N. Edwards Virtual Machines, Virtual Infrastructures: The New Historiography of Information Technology Published in Isis, 1998 Review of: Campbell-Kelly, Martin; Aspray, William. Computer and the author of many books on computer history, including three #12;Isis essay review 2 P. N. Edwards

  11. July 2012July 2012 Cloud Computing and Virtualization:Cloud Computing and Virtualization

    E-Print Network [OSTI]

    Liu, Jiangchuan (JC)

    July 2012July 2012 Cloud Computing and Virtualization:Cloud Computing and Virtualization/26/2633 Recent: CloudRecent: Cloud The fast growth of cloud computing Cloud file storage/synchronization services Google entries about cloud computing: 184,000,000 #12;July 2012July 2012 44/26/2644 Our CloudOur Cloud 7

  12. Modeling and Visualization of Human Activities for Multi-Camera Networks

    E-Print Network [OSTI]

    Sankaranarayanan, Aswin C.

    of the scene. These are used to render the scene with virtual 3D human models that mimic the observed instant are then presented to a rendering engine that animates a set of virtual actors synthesizing1 Modeling and Visualization of Human Activities for Multi-Camera Networks Aswin C

  13. Global tree network for computing structures enabling global processing operations

    DOE Patents [OSTI]

    Blumrich; Matthias A. (Ridgefield, CT); Chen, Dong (Croton-On-Hudson, NY); Coteus, Paul W. (Yorktown Heights, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Hoenicke, Dirk (Ossining, NY); Steinmacher-Burow, Burkhard D. (Mount Kisco, NY); Takken, Todd E. (Mount Kisco, NY); Vranas, Pavlos M. (Bedford Hills, NY)

    2010-01-19T23:59:59.000Z

    A system and method for enabling high-speed, low-latency global tree network communications among processing nodes interconnected according to a tree network structure. The global tree network enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the tree via links to facilitate performance of low-latency global processing operations at nodes of the virtual tree and sub-tree structures. The global operations performed include one or more of: broadcast operations downstream from a root node to leaf nodes of a virtual tree, reduction operations upstream from leaf nodes to the root node in the virtual tree, and point-to-point message passing from any node to the root node. The global tree network is configurable to provide global barrier and interrupt functionality in asynchronous or synchronized manner, and, is physically and logically partitionable.

  14. AAVP: an innovative Autonomic Architecute for Virtual network Piloting

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    , Paris, France Mouna AYARI CRISTAL lab, National School of Computer Sciences, University of Manouba that exhibit autonomic characteristics [6]. In 2001, IBM proposes the "Autonomic Computing" paradigm [5 has attracted a great deal of interest from both industry and research communities as an important

  15. Virtual Networks under Attack: Disrupting Internet Coordinate Systems

    E-Print Network [OSTI]

    Turletti, Thierry

    Sophia Antipolis, FR mkaafar@sophia.inria.fr Laurent Mathy Lancaster University, UK and LAAS-CNRS, FR laurent@comp.lancs.ac.uk Thierry Turletti INRIA Sophia Antipolis, FR turletti@sophia.inria.fr Walid Dabbous INRIA Sophia Antipolis, FR dabbous@sophia.inria.fr ABSTRACT Internet coordinate-based systems

  16. Timed Virtual Stationary Automata for Mobile Networks Shlomi Dolev,

    E-Print Network [OSTI]

    Lynch, Nancy

    develops new techniques to cope with this dynamic, heterogeneous, and chaotic environment. We mask sites, or areas where fixed infrastructure does not exist or has been damaged. BMW and other car

  17. Collective network for computer structures

    DOE Patents [OSTI]

    Blumrich, Matthias A; Coteus, Paul W; Chen, Dong; Gara, Alan; Giampapa, Mark E; Heidelberger, Philip; Hoenicke, Dirk; Takken, Todd E; Steinmacher-Burow, Burkhard D; Vranas, Pavlos M

    2014-01-07T23:59:59.000Z

    A system and method for enabling high-speed, low-latency global collective communications among interconnected processing nodes. The global collective network optimally enables collective reduction operations to be performed during parallel algorithm operations executing in a computer structure having a plurality of the interconnected processing nodes. Router devices are included that interconnect the nodes of the network via links to facilitate performance of low-latency global processing operations at nodes of the virtual network. The global collective network may be configured to provide global barrier and interrupt functionality in asynchronous or synchronized manner. When implemented in a massively-parallel supercomputing structure, the global collective network is physically and logically partitionable according to the needs of a processing algorithm.

  18. www.pet.hw.ac.uk 1 Private and Confidential

    E-Print Network [OSTI]

    Painter, Kevin

    www.pet.hw.ac.uk 1 Private and Confidential Application for MSc Courses - Supplementary Information of Exam Grade Attained Subjects taken at `O' level or equivalent with grades #12;www.pet.hw.ac.uk 2 of principal & subsidiary subjects Please leave blank for Institute Use #12;www.pet.hw.ac.uk 3 Employment Dates

  19. Northrop Grumman Private/Proprietary Level 1 Undersea Warfare

    E-Print Network [OSTI]

    to frequency such that systems engineers are always searching for techniques for system performance to listen is an unnatural act for some "Destroyer Drivers" ­ Search patterns, system performance estimates is time and location variable #12;Northrop Grumman Private/Proprietary Level 1 3 Governing Environmental

  20. PIRMAP: Efficient Private Information Retrieval for MapReduce

    E-Print Network [OSTI]

    {travism,blass,ahchan}@ccs.neu.edu Abstract. Private Information Retrieval (PIR) allows a user to retrieve bits from a database while hiding the user's access pattern. However, the practicality of PIR in a real-world cloud computing setting has recently been questioned. In such a setting, PIR's enormous computation

  1. Optimally Robust Private Information Retrieval Casey Devet Ian Goldberg

    E-Print Network [OSTI]

    of the database. 1 Introduction and related work Private information retrieval (PIR) is a way for a client to look trivial download. The goal of PIR is to transmit less data while still protecting the privacy of the query. PIR is a fundamental building block for many proposed privacy-sensitive applications in the liter

  2. Improving the Robustness of Private Information Retrieval Ian Goldberg

    E-Print Network [OSTI]

    Goldberg, Ian

    @cs.uwaterloo.ca Abstract Since 1995, much work has been done creating proto- cols for private information retrieval (PIR). Many variants of the basic PIR model have been proposed, including such modifications as computational. In this paper, we improve on the robustness of PIR in a number of ways. First, we present a Byzantine-robust PIR

  3. Efficient Private File Retrieval by Combining ORAM and PIR

    E-Print Network [OSTI]

    Efficient Private File Retrieval by Combining ORAM and PIR Travis Mayberry Erik-Oliver Blass Agnes ORAMs which have worst-case communication complexity linear in their capacity and block size. PIR on the server. This paper presents Path-PIR, a hybrid ORAM construction, using techniques from PIR

  4. Secure quantum private information retrieval using phase-encoded queries

    SciTech Connect (OSTI)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15T23:59:59.000Z

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  5. Single Database Private Information Retrieval with Logarithmic Communication

    E-Print Network [OSTI]

    ]. Historically, the first 1dPIR scheme was proposed in [KO97], with its security based on the hardness database private information retrieval (1dPIR) is a cryptographic protocol between a database server, who (as otherwise the problem becomes trivial). In addition to its numerous applications [A01], 1dPIR

  6. Optimally Robust Private Information Retrieval Casey Devet Ian Goldberg

    E-Print Network [OSTI]

    Goldberg, Ian

    - sponding to the security guarantees they provide. One class is computational PIR [8], in which the database of the database. 1 Introduction and related work Private information retrieval (PIR) is a way for a client to look trivial download. The goal of PIR is to transmit less data while still protecting the privacy of the query

  7. Efficient Computationally Private Information Retrieval From Anonymity or Trapdoor Groups

    E-Print Network [OSTI]

    family of cPIR protocols with a variety of security and performance properties. Our protocols enable much. Laurel, MD 20723 Abstract A Private Information Retrieval (PIR) protocol allows a database user data was retrieved. Although substantial progress has been made in the discovery of computationally PIR

  8. Private Information Retrieval An overview and current trends

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    a server was not considered feasible until the private infor- mation retrieval (PIR) problem was stated recently. A PIR protocol allows a user to retrieve a record from a database while hiding the identity of the record from a database server. We explain a motivation for PIR by demonstrating e- commerce examples

  9. Single Database Private Information Retrieval Implies Oblivious Transfer \\Lambda

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    non­trivial PIR is complete for all two­party and multi­party secure compu­ tations. ffl There exists Crescenzo y Tal Malkin z Rafail Ostrovsky x Abstract A Single­Database Private Information Retrieval (PIR­ munication complexity. We call a PIR protocol non­trivial if its total communication is strictly less than

  10. Single Database Private Information Retrieval Implies Oblivious Transfer

    E-Print Network [OSTI]

    Ostrovsky, Rafail

    Tal Malkinz Rafail Ostrovskyx Abstract A Single-Database Private Information Retrieval PIR- munication complexity. We call a PIR protocol non-trivial if its total communication is strictly less than the size of the database. Non-trivial PIR is an important cryp- tographic primitive with many applications

  11. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval

    E-Print Network [OSTI]

    Goldberg, Ian

    architec- ture depends on the security of PIR schemes which are well understood and relatively easy security to that of the Tor net- work. Moreover, our experimental results show that the overhead of PIRPIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval Prateek Mittal1 Femi

  12. Single Database Private Information Retrieval with Logarithmic Communication

    E-Print Network [OSTI]

    ]. Historically, the first 1dPIR scheme was proposed in [KO97], with its security based on the hardness Single database private information retrieval (1dPIR) is a cryptographic protocol between a database to the user (as otherwise the problem becomes trivial). In addition to its numerous applications [A01], 1dPIR

  13. Towards Efficient Private Distributed Computation on Unbounded Input Streams

    E-Print Network [OSTI]

    /11), Cabarnit Cyber Security MAGNET Consortium, MAFAT and Deutsche Telekom Labs at BGU. #12;2 Shlomi Dolev1Towards Efficient Private Distributed Computation on Unbounded Input Streams Shlomi Dolev1 , Juan- curely and distributively perform a computation on common inputs, in such a way that even if the entire

  14. Update on Dining Public Private Partnership (P3)

    E-Print Network [OSTI]

    MacAdam, Keith

    energy audit findings 11 #12;Academic Partnership ·Flagship collaborative innovation centerUpdate on Dining Public Private Partnership (P3) June 10, 2014 Board of Trustees Meeting University received · Feb 4, 2014 ­ University announces decision to proceed with dual track discussions

  15. Separations/pretreatment considerations for Hanford privatization phase 2

    SciTech Connect (OSTI)

    Hunt, R.D.; McGinnis, C.P.; Welch, T.D.

    1998-05-01T23:59:59.000Z

    The Tank Focus Area is funded to develop, demonstrate, and deploy technologies that will assist in the treatment and closure of its nuclear waste tanks. Pretreatment technologies developed to support the privatization effort by the Department of Energy are reviewed. Advancements in evaporation, solid-liquid separation, sludge treatment, solids controls, sodium management, and radionuclide removal are considered.

  16. Overview of Public-Private Partnerships Samara Barend

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    /legislative authority, public protections, etc.) to supplement analysis · Public agency retention of asset control Companies P3 Agreement governs all Concessionaire responsibilities for the project 4 #12;Overview of Public Revenue/Demand Based ­ Private sector controls and collects project revenues which serve as the only

  17. Private Pesticide Applicator School & Examinations April 3, 2012

    E-Print Network [OSTI]

    Watson, Craig A.

    Tri-County Private Pesticide Applicator School & Examinations April 3, 2012 Registration Deadline ­ March 28, 2012 5:00 PM Baker County Extension Office 8:30 a.m. Registration ($5 per person for CEU) (Basil Bactawar, Union County Extension) Pest Control Pesticides in the Environment Pesticide Labeling

  18. Private Pesticide Applicator School & Examinations April 6, 2011

    E-Print Network [OSTI]

    Watson, Craig A.

    Tri-County Private Pesticide Applicator School & Examinations April 6, 2011 Registration Deadline ­ March 31, 2011 5:00 PM Baker County Extension Office 8:30 a.m. Registration ($5 per person for CEU) (Basil Bactawar, Union County Extension) Pest Control Pesticides in the Environment Pesticide Labeling

  19. Private Pesticide Applicator School & Examinations April 9, 2013

    E-Print Network [OSTI]

    Hill, Jeffrey E.

    Tri-County Private Pesticide Applicator School & Examinations April 9, 2013 Registration Deadline ­ April 2, 2013 5:00 PM Baker County Extension Office 8:30 a.m. Registration ($5 per person - Exam takers should contact their County Agent to purchase study materials) 8:45 a.m. CORE Principles (Applying

  20. is seeking partnerships with private and corporate donors

    E-Print Network [OSTI]

    mineral resources is the keystone to the global minerals industry. As existing mines are depleted of metallic mineral resources. Programs encouraging reduction in use, re-use and recycling are able to offset#12;is seeking partnerships with private and corporate donors to strengthen capacity in mineral

  1. COMMUNITY RESILIENCE: WORKSHOPS ON PRIVATE SECTOR AND PROPERTY OWNER

    E-Print Network [OSTI]

    STATES DEPARTMENT OF ENERGY under Contract DE-AC05-76RL01830 #12;Acknowledgments The authors would like to acknowledge and thank the businesses, building owners, service providers, and representatives who participated .....................................................................................3 4.1 Workshop with Private Sector Businesses on August 12

  2. Minimizing Private Data Disclosures in the Smart Grid Weining Yang

    E-Print Network [OSTI]

    McDaniel, Patrick Drew

    Minimizing Private Data Disclosures in the Smart Grid Weining Yang Purdue University yang469@cs@cse.psu.edu Patrick McDaniel Penn State University mcdaniel@cse.psu.edu ABSTRACT Smart electric meters pose monitors, smart meter data can reveal precise home appliance usage information. An emerging solution

  3. FISHERIES ADMINISTRATION Scope and Diversity of Privatized Services

    E-Print Network [OSTI]

    . Interjurisdictional agency partnerships form the cornerstones of basin- wide management strategies for integrated, compre- hensive management of rivers, lakes, and reservoirs throughout North America. Although fisheries administrators was that wide-scale privatization of management activities is counter to the long

  4. Weakly-Private Secret Sharing Schemes Amos Beimel1

    E-Print Network [OSTI]

    Beimel, Amos

    Weakly-Private Secret Sharing Schemes Amos Beimel1 and Matthew Franklin2 1 Department of Computer. Abstract. Secret-sharing schemes are an important tool in cryptogra- phy that is used in the construction of many secure protocols. However, the shares' size in the best known secret-sharing schemes realizing gen

  5. Authorized Private Keyword Search over Encrypted Data in Cloud Computing

    E-Print Network [OSTI]

    Hou, Y. Thomas

    Authorized Private Keyword Search over Encrypted Data in Cloud Computing Ming Li, Shucheng Yu, Ning,ncao,wjlou}@ece.wpi.edu Dept. of CS, University of Arkansas at Little Rock, email: sxyu1@ualr.edu Abstract--In cloud computing In recent years, cloud computing is gaining much mo- mentum in the IT industry. Especially, we have seen

  6. Ion mobility spectrometer with virtual aperture grid

    DOE Patents [OSTI]

    Pfeifer, Kent B. (Los Lunas, NM); Rumpf, Arthur N. (Albuquerque, NM)

    2010-11-23T23:59:59.000Z

    An ion mobility spectrometer does not require a physical aperture grid to prevent premature ion detector response. The last electrodes adjacent to the ion collector (typically the last four or five) have an electrode pitch that is less than the width of the ion swarm and each of the adjacent electrodes is connected to a source of free charge, thereby providing a virtual aperture grid at the end of the drift region that shields the ion collector from the mirror current of the approaching ion swarm. The virtual aperture grid is less complex in assembly and function and is less sensitive to vibrations than the physical aperture grid.

  7. Understanding the Team Dynamics of an Executive Virtual Team

    E-Print Network [OSTI]

    Riley, Ramona Leonard

    2011-10-21T23:59:59.000Z

    employ virtuality in their work regimen. Therefore, organizations employ virtual executives to work teams with ideal skill sets to effectively persevere and complete tasks through distance, space, and time. The purpose of this study was to identify...

  8. Virtual Mentor American Medical Association Journal of Ethics

    E-Print Network [OSTI]

    Fujimura, Joan

    Virtual Mentor American Medical Association Journal of Ethics August 2012, Volume 14, Number 8: 657, such as a particular genetic variant that might be related www.virtualmentor.org Virtual Mentor, August 2012--Vol 14

  9. Exploring Second Life as a beneficial virtual learning environment 

    E-Print Network [OSTI]

    Haisworth, Reissa

    2008-06-27T23:59:59.000Z

    With the growth of the internet comes the development of virtual worlds which create a perfect setting for meeting new people from around the world, chatting to existing friends and learning. Second Life is a virtual world ...

  10. A circumferential slot virtual impactor for bioaerosol concentration

    E-Print Network [OSTI]

    Adams, Clinton Wayne

    2009-05-15T23:59:59.000Z

    A virtual impactor aerosol concentrator with a circumferential inlet slot has been built and tested. Circumferential slot virtual impactors (CSVIs) have low pressure losses, similar to linear slot impactors, but without particle losses due to end...

  11. The Virtual (Re)Construction of History: Some Epistemological Questions

    E-Print Network [OSTI]

    El Antably, Ahmed

    2010-01-01T23:59:59.000Z

    Antably: The Virtual (Re)Construction of History 14. DoreenMay 1, 2010 THE VIRTUAL (RE)CONSTRUCTION OF HISTORY: SOMEthe use of perspectival constructions that emulate everyday

  12. Virtual control system environment: A modeling and simulation tool for process control systems

    SciTech Connect (OSTI)

    Lee, E.; Michalski, J.; Sholander, P.; Van Leeuwen, B. [Sandia National Laboratories, Albuquerque, NM 87111 (United States)

    2006-07-01T23:59:59.000Z

    The development of tools and techniques for security testing and performance testing of Process Control Systems (PCS) is needed since those systems are vulnerable to the same classes of threats as other networked computer systems. In practice, security testing is difficult to perform on operational PCS because it introduces an unacceptable risk of disruption to the critical systems (e.g., power grids) that they control. In addition, the hardware used in PCS is often expensive, making full-scale mockup systems for live experiments impractical. A more flexible approach to these problems can be provided through test beds that provide the proper mix of real, emulated, and virtual elements to model large, complex systems such as critical infrastructures. This paper describes a 'Virtual Control System Environment' that addresses these issues. (authors)

  13. Design and operation of a virtual reality operator-training system

    SciTech Connect (OSTI)

    Okapuu-von Veh, A.; Malowany, A.; Shaikh, A. [McGill Univ., Montreal, Quebec (Canada). Dept. of Electrical Engineering] [McGill Univ., Montreal, Quebec (Canada). Dept. of Electrical Engineering; Marceau, R.J.; Desbiens, P.; Daigle, A.; Rizzi, J.C. [Ecole Polytechnique, Montreal, Quebec (Canada). Dept. de Genie Electrique et Informatique] [Ecole Polytechnique, Montreal, Quebec (Canada). Dept. de Genie Electrique et Informatique; Garant, E.; Gauthier, R. [Hydro-Quebec, Montreal, Quebec (Canada)] [Hydro-Quebec, Montreal, Quebec (Canada)

    1996-08-01T23:59:59.000Z

    The risks to equipment and personnel associated with the manual operation of switching station equipment demand rigorous personnel instruction. Additionally, switching errors reduce customer service quality. With the virtual reality operator-training simulator ESOPE-VR, trainees can practice all necessary switching operations in complete safety, while maintaining a high degree of realism. A speech-recognition system allows for complete control of the training session by the operator trainee, while sound immersion adds a dimension of realism to the virtual world. An expert-system validates the trainee`s operations at all stages of the process and provides verbal context-sensitive advice whenever errors are made. A steady-state power-flow simulator recalculates network variables whenever operator actions lead to changes in topology. The automated conversion of station single-line diagrams to realistic three-dimensional models permits an operator to be trained economically for a larger number of stations.

  14. 2015 SunShot Incubator Virtual Showcase Slides

    Broader source: Energy.gov [DOE]

    Download the slides from the 2015 SunShot Initiative Incubator Virtual Showcase webinar, which occurred March 4, 2015

  15. Appalachian Colleges Community Economic Development Partnership The Small Private Colleges Economic Development Toolkit

    E-Print Network [OSTI]

    Engel, Jonathan

    Partnerships o Evaluation: Measuring Effectiveness #12;The Small Private Colleges Economic Development ToolkitAppalachian Colleges Community Economic Development Partnership The Small Private Colleges Economic and sustainable economic development outreach programs. It contains carefully selected articles and case studies

  16. Raising a renewable energy-focused private equity fund denominated in foreign currencies

    E-Print Network [OSTI]

    Miao, Quan, S.M. Massachusetts Institute of Technology

    2011-01-01T23:59:59.000Z

    China's private equity industry has seen rapid growth during the past decade. Private equity funds focused on different sectors and stages and denominated in different currencies are competing for limited investment ...

  17. Toll road public-private partnerships in Malaysia : using the CLIOS process for policy improvements

    E-Print Network [OSTI]

    Ward, John L., 1977-

    2005-01-01T23:59:59.000Z

    Malaysia has relied on private sector provision of toll roads for over twenty years using public- private partnerships (PPPs). While the program has been successful in providing close to 1,800 kilometers of highway in that ...

  18. Public-Private Leadership Forum (PPLF) (Fact Sheet), 21st Century...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Public-Private Leadership Forum (PPLF) The Public-Private Leadership Forum (PPLF) is a foundational component of the 21st Century Power Partnership. The PPLF * Serves as a platform...

  19. Potential use of electronic information for natural resource management by private landowners in Texas 

    E-Print Network [OSTI]

    Hays, Amy E

    2000-01-01T23:59:59.000Z

    A mail survey of Texas' private landowners was conducted in the fall of 1996 to assess the potential use of electronic information sources as a tool for natural resource management. Eight hundred private landowners in rural communities were asked...

  20. Technical progress report. Private sector initiatives between the United States and Japan. January 1990 - December 1990

    SciTech Connect (OSTI)

    NONE

    1993-07-01T23:59:59.000Z

    OAK A271 This annual report for calendar year 1990 describes the efforts performed under the Private Sector Initiatives contract. The report also describes those efforts that have continued with private funding after being initiated under this contract.

  1. Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology

    E-Print Network [OSTI]

    McDonnell, Kevin

    Virtual Clay: Haptics-based Deformable Solids of Arbitrary Topology Kevin T. McDonnell and Hong Qin|qin}@cs.sunysb.edu Abstract. This paper presents Virtual Clay as a novel, interactive, dy- namic, haptics-based deformable solid of arbitrary topology. Our Virtual Clay methodology is a unique, powerful visual modeling paradigm

  2. Virtual Compass: Relative Positioning To Sense Mobile Social Interactions

    E-Print Network [OSTI]

    Hunt, Galen

    Virtual Compass: Relative Positioning To Sense Mobile Social Interactions Nilanjan Banerjee in availability and ac- curacy. Virtual Compass is a peer-based relative positioning system that relies solely movement. We have im- plemented Virtual Compass on mobile phones and laptops, and we eval- uate it using

  3. Virtualizing Power Cords by Wireless Power Transmission and Energy Harvesting

    E-Print Network [OSTI]

    Tentzeris, Manos

    technology can be called the virtualization of the communication line, wireless power transmissionVirtualizing Power Cords by Wireless Power Transmission and Energy Harvesting Yoshihiro Kawahara1 for the virtualization of power cords for electrical devices. The first approach is a new concept for routing electric

  4. NIST Special Publication 1173 Virtual Cement and Concrete

    E-Print Network [OSTI]

    #12;NIST Special Publication 1173 Virtual Cement and Concrete Testing Laboratory Version 9.5 User;Virtual Cement and Concrete Testing Laboratory Version 9.5 User Guide Jeffrey W. Bullard1 Materials-8615 This document serves as the user's guide for the Virtual Cement and Con- crete Testing Laboratory (VCCTL

  5. Virtual Laboratory for Technology For Fusion Energy Science

    E-Print Network [OSTI]

    VLT Virtual Laboratory for Technology For Fusion Energy Science Stan Milora, ORNL Director, Virtual for Technology For Fusion Energy Science VLT Research MissionVLT Research Mission To contribute to the national;VLT Virtual Laboratory for Technology For Fusion Energy Science OutlineOutline · VLT contributions

  6. Coevolution Produces an Arms Race Among Virtual Plants

    E-Print Network [OSTI]

    Ebner, Marc

    Coevolution Produces an Arms Race Among Virtual Plants Marc Ebner, Adrian Grigore, Alexander He#11 create plants for a virtual environment. The plants are represented as context-free Lin- denmayer systems. OpenGL is used to visualize and evaluate the plants. Our plants have to collect virtual sunlight

  7. Web Based Simulations for Virtual Scientific Experiment: Methodology and Tools

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . These are the keywords. Web based simulation, Virtual Scientific Experiment, e-learning 1. INTRODUCTION Until now Technology for Enhanced Learning 1 #12;Web Based Simulations for Virtual Scientific Experiment: MethodologyWeb Based Simulations for Virtual Scientific Experiment: Methodology and Tools Giovannina Albano

  8. Leadership in self-managing virtual teams Kevin Crowston

    E-Print Network [OSTI]

    Crowston, Kevin

    1 Leadership in self-managing virtual teams Kevin Crowston Syracuse University, School acknowledge the contri- butions of Hala Annabi, Chengetai Masango and James Howison. #12;Leadership in self-managing virtual teams Leadership in self-managing virtual teams Abstract In this paper, we present a theory

  9. Towards a Virtual Environment for Interactive World Building

    E-Print Network [OSTI]

    Towards a Virtual Environment for Interactive World Building Dieter Schmalstieg and Michael|gervautz@cg.tuwien.ac.at http://www.cg.tuwien.ac.at/ Abstract We propose an architecture for virtual environments that is aimed and maintenance of the virtual environment. Users can be present in the environment using software clients

  10. The Virtual Stuntman: Dynamic Characters with a Repertoire of

    E-Print Network [OSTI]

    Panne, M. van de

    is applicable and expected to work properly. Key words: Artificial Life, Virtual Humans, Computer Animation considerable progress in animating virtual humans [1,5], physics-based an- imated characters with a large is the creation of virtual actors that autonomously synthesize realistic human motions and possess a broad

  11. CREATING 3D ANIMATED HUMAN BEHAVIORS FOR VIRTUAL WORLDS

    E-Print Network [OSTI]

    Plotkin, Joshua B.

    i CREATING 3D ANIMATED HUMAN BEHAVIORS FOR VIRTUAL WORLDS Jan M. Allbeck A DISSERTATION in Computer, and a scholar. #12;iv ABSTRACT CREATING 3D ANIMATED HUMAN BEHAVIORS FOR VIRTUAL WORLDS Jan M. Allbeck Norman I. Badler Creating virtual scenarios that simulate a substantial human population with typical and varied

  12. Towards an Intelligent Affective Multimodal Virtual Agent for Uncertain Environments

    E-Print Network [OSTI]

    Baldassarri, Sandra

    . It is based on the integration of Maxine, a powerful multimodal animation engine for managing virtual agents-time animation. 1. INTRODUCTION Most research on social interfaces is related to the design of virtual agents human- computer interface [1, 2]. A virtual agent must be believable: it has to move properly, paying

  13. Perception of Body and Hand Animations for Realistic Virtual Characters

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    Perception of Body and Hand Animations for Realistic Virtual Characters Sophie J¨org Dissertation human is still a big challenge. The motions of a virtual character in a movie or in a game have a large. However, despite great improvements in recent years, creating a persua- sive and highly realistic virtual

  14. Virtual Humans for Animation, Ergonomics, and Simulation Norman Badler

    E-Print Network [OSTI]

    Badler, Norman I.

    Virtual Humans for Animation, Ergonomics, and Simulation Norman Badler Center for Human Modeling speed and control methods needed to portray 3D virtual humans suitable for real interactive applications of Pennsylvania with the Jack system. Various aspects of real­time virtual humans are considered

  15. The Virtual Stuntman: Dynamic Characters with a Repertoire of

    E-Print Network [OSTI]

    Terzopoulos, Demetri

    properly. Key words: Artificial Life, Virtual Humans, Computer Animation, Character Animation, Physics An ambitious goal in the area of physics-based computer animation is the creation of virtual actors virtual humans [1,5], physics-based an- imated characters with a large repertoire of motor skills have so

  16. An Interactive Interface for Directing Virtual Gael Sannier

    E-Print Network [OSTI]

    Pratt, Vaughan

    1015 Lausanne, Switzerland Abstract. Research on Virtual Humans spans from body animation to speech important issues: - Fully integrated virtual humans with facial and body animation, and speech. - A straightforward user interface for designers and directors. VHD system provides a range of virtual human animation

  17. The Director's Lens: An Intelligent Assistant for Virtual Cinematography

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    .1 [Multimedia Information Systems]: Animations, Video General Terms Algorithms, Human Factors Keywords Virtual-generated animations, the task of crafting virtual camera work and edits for a sequence of 3D animation remains a timeThe Director's Lens: An Intelligent Assistant for Virtual Cinematography Christophe Lino IRISA

  18. Jacob -An Animated Instruction Agent in Virtual Reality

    E-Print Network [OSTI]

    Nijholt, Anton

    of a 3D virtual environment where an animated human- like agent called Jacob gives instructionJacob - An Animated Instruction Agent in Virtual Reality Marc Evers1, Anton Nijholt1 1 University of virtual reality techniques and in- volves the design and construction of an animated agent in a 3

  19. Virtualizing Operating Systems for Seamless Distributed Environments

    E-Print Network [OSTI]

    Dasgupta, Partha

    Virtualizing Operating Systems for Seamless Distributed Environments 1 Tom Boyd and Partha Dasgupta of the "Computing Communities" project, a joint effort between Arizona State University and New York University. Abstract Applications and operating systems can be augmented with extra functionality by injecting

  20. Collision Avoidance in Virtual Environments through

    E-Print Network [OSTI]

    Beckhaus, Steffi

    no counterpart in VEs. Examples are temperature difference (cold exterior walls radiating coolness we describe a new technique to make users aurally aware of walls surrounding them in a Virtual Interfaces: Auditory (non-speech) feedback. General Terms Design, Experimentation, Human Factors, Performance

  1. Colour dipoles and deeply virtual Compton scattering

    E-Print Network [OSTI]

    R. Sandapen

    2002-07-01T23:59:59.000Z

    I report on an analysis of Deeply Virtual Compton Scattering (DVCS) within the dipole model, done in collaboration with M. McDermott and G. Shaw. The two models considered here are distinct in their structure and implications. They both agree with the available cross-section data on DVCS from HERA. Predictions for various asymmetries are also given.

  2. Prudhoe Bay Oil Production Optimization: Using Virtual

    E-Print Network [OSTI]

    Mohaghegh, Shahab

    1 Prudhoe Bay Oil Production Optimization: Using Virtual Intelligence Techniques, Stage One: Neural total field oil production by optimizing the gas discharge rates and pressures at the separation handling capacity and subsequent oil production. 10 YEAR AVERAGE AMBIENT 1990-2000 & 2001, 2002 Averages

  3. DOE Sustainability Awards Best Practices Virtual Workshop

    Broader source: Energy.gov [DOE]

    The Sustainability Performance Office (SPO) will host a virtual best practices workshop on April 23, 2014 (2:00-3:30 PM EDT) to recognize the winners of the 2013 DOE Sustainability Awards. Award winners will present on their accomplishments and answer brief questions on their programs and projects. Please join us in celebrating the 2013 DOE Sustainability Awards winners.

  4. Ames Lab 101: C6: Virtual Engineering

    ScienceCinema (OSTI)

    None

    2012-08-29T23:59:59.000Z

    Ames Laboratory scientist Doug McCorkle explains the importance of virtual engineering and talks about the C6. The C6 is a three-dimensional, fully-immersive synthetic environment residing in the center atrium of Iowa State University's Howe Hall.

  5. A Reconfiguration Language for Virtualized Grid Infrastructures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ´eger, and Jean-Marc Menaud Ascola (EMN/INRIA, LINA) Ecole des Mines de Nantes 4, rue Alfred Kastler 44307 Nantes Systems (DAIS), France (2010)" #12;2 R´emy Pottier, Marc L´eger, and Jean-Marc Menaud virtual machine

  6. A Reconfiguration Language for Virtualized Grid Infrastructures

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    ´eger, and Jean-Marc Menaud Ascola (EMN/INRIA, LINA) Ecole des Mines de Nantes 4, rue Alfred Kastler 44307 Nantes : 10.1007/978-3-642-13645-0_4 #12;2 R´emy Pottier, Marc L´eger, and Jean-Marc Menaud virtual machine

  7. Debt Capacity and Optimal Capital Structure for Privately-Financed Infrastructure Projects

    E-Print Network [OSTI]

    productivity, profitability, and private sector capital formation. He estimated, for example, that a 1 effective utilization of resources, when compared with the more flexible and cost conscious private sectorDebt Capacity and Optimal Capital Structure for Privately-Financed Infrastructure Projects

  8. Competition Law Enforcement: the "Free-Riding" Plaintiff and Incentives for the Revelation of Private

    E-Print Network [OSTI]

    Feigon, Brooke

    -on.1 With a de novo case, a plaintiff initiates a private action based on an alleged breach of Private Information by Michael Harker and Morten Hviid ESRC Centre for Competition Policy and Norwich Law of firms and individuals to use private enforcement suggests that there are limited incentives for self

  9. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys Beno^it Libert1 in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re' public keys are public identifiers (e.g. email addresses) and the matching private keys are derived

  10. WORKING PAPER N 2012 07 Do We Follow Private Information when We Should? Laboratory

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    WORKING PAPER N° 2012 ­ 07 Do We Follow Private Information when We Should? Laboratory Evidence1-17Feb2012 #12;Do We Follow Private Information when We Should? Laboratory Evidence on Na Abstract We investigate whether experimental participants follow their private information and contradict

  11. Private Ordering, Collective Action, and the Self-Enforcing Range of Contracts.

    E-Print Network [OSTI]

    Boyer, Edmond

    1 Private Ordering, Collective Action, and the Self-Enforcing Range of Contracts. Armelle Mazé INRA and in Economics. Contrasting substitution and complementary perspectives with respect to the role of private versus public enforcement institutions, this article analyses how contract law can support private

  12. Using or Hiding Private Information? An Experimental Study of Zero-Sum Repeated Games with

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using or Hiding Private Information? An Experimental Study of Zero-Sum Repeated Games the value of private information in strictly competitive interactions in which there is a trade-off between, the empirical use of private information is almost complete when it should be, and decreases in longer

  13. Talk to the Virtual Hands: Self-Animated Avatars Improve Communication in Head-Mounted Display Virtual

    E-Print Network [OSTI]

    Talk to the Virtual Hands: Self-Animated Avatars Improve Communication in Head-Mounted Display Virtual Environments Trevor J. Dodds1 *, Betty J. Mohler1 , Heinrich H. Bu¨ lthoff1,2 1 Human Perception¨lthoff HH (2011) Talk to the Virtual Hands: Self-Animated Avatars Improve Communication in Head

  14. February 13, 2008 Virtualized Environments for the Harness High Performance Computing Workbench 1/17 Virtualized Environments for the Harness

    E-Print Network [OSTI]

    Engelmann, Christian

    February 13, 2008 Virtualized Environments for the Harness High Performance Computing Workbench 1/17 Virtualized Environments for the Harness High Performance Computing Workbench Björn Könning1,2, Christian Virtualized Environments for the Harness High Performance Computing Workbench 4/17 Harness HPC Workbench

  15. Network Chimera Network Chimera

    E-Print Network [OSTI]

    Network Chimera Network Chimera Objective Chimera aims to understand how the network properties enough with limited resources. The Chimera team is cross-disciplinary, and includes computer scientists Impact The original hypothesis of Chimera was that a physical network could be reduced to a graph

  16. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  17. Private Database Queries Using Quantum States with Limited Coherence Times

    E-Print Network [OSTI]

    Tad Hogg; Li Zhang

    2009-03-31T23:59:59.000Z

    We describe a method for private database queries using exchange of quantum states with bits encoded in mutually incompatible bases. For technology with limited coherence time, the database vendor can announce the encoding after a suitable delay to allow the user to privately learn one of two items in the database without the ability to also definitely infer the second item. This quantum approach also allows the user to choose to learn other functions of the items, such as the exclusive-or of their bits, but not to gain more information than equivalent to learning one item, on average. This method is especially useful for items consisting of a few bits by avoiding the substantial overhead of conventional cryptographic approaches.

  18. Private power development and environmental protection in India

    SciTech Connect (OSTI)

    Das, S.; Wilbanks, T.J.

    1997-12-01T23:59:59.000Z

    This report assesses relationships between private power development in India and environmental protection in that country. The central question is whether private firms generating and distributing electricity in developing countries will do a better or a worse job in environmental protection, as a part of their overall corporate responsibility, than public-sector institutions. After reviewing the fundamental question, why it is asked, and the context in which it operates in the nation of India, this report continues with an analysis of available information, quantitative and qualitative, that can help to resolve the issues in the particular case of India. Finally, it ends with conclusions from the analysis and recommendations for reducing remaining uncertainties in the future.

  19. A systematic look at Tank Waste Remediation System privatization

    SciTech Connect (OSTI)

    Holbrook, J.H.; Duffy, M.A.; Vieth, D.L.; Sohn, C.L.

    1996-01-01T23:59:59.000Z

    The mission of the Tank Waste Remediation System (TWRS) Program is to store, treat, immobilize, and dispose, or prepare for disposal, the Hanford radioactive tank waste in an environmentally sound, safe, and cost effective manner. Highly radioactive Hanford waste includes current and future tank waste plus the cesium and strontium capsules. In the TWRS program, as in other Department of Energy (DOE) clean-up activities, there is an increasing gap between the estimated funding required to enable DOE to meet all of its clean-up commitments and level of funding that is perceived to be available. Privatization is one contracting/management approach being explored by DOE as a means to achieve cost reductions and as a means to achieve a more outcome-oriented program. Privatization introduces the element of competition, a proven means of establishing true cost as well as achieving significant cost reduction.

  20. Agile and Pro-Active Public Administration as a Collaborative Networked Organization

    E-Print Network [OSTI]

    Cellary, Wojciech

    2011-01-01T23:59:59.000Z

    In highly competitive, globalized economies and societies of always-on-line people intensively using the Internet and mobile phones, public administrations have to adapt to new challenges. Enterprises and citizens expect public administrations to be agile and pro-active to foster development. A way to achieve agility and pro-activity is application of a model of Collaborative Network Organizations in its two forms: Virtual Organizations (VO) and Virtual Organization Breeding Environments (VOBE). In the paper, advantages are shown of public administration playing a role of a Virtual Organization customer on the one hand, and a Virtual Organization member on the other hand. It is also shown how public administration playing a role of a Virtual Organization Breeding Environment may improve its agility and promote advanced technologies and management methods among local organizations. It is argued in the paper that public administration should provide a Virtual Organization Breeding Environment as a part of publi...

  1. New Insights into the Stochastic Geometry Analysis of Dense CSMA Networks

    E-Print Network [OSTI]

    campuses) and private premises (residential homes, corporate buildings). Today, WiFi-enabled home routers of interference among APs employing the same channel. The complex behavior of dense networks of interfering APs Real Energy-efficient Network Design). analysis by exploiting the independent sets method originally

  2. Heavy quarks in deeply virtual Compton scattering

    E-Print Network [OSTI]

    Jens D. Noritzsch

    2003-12-11T23:59:59.000Z

    A detailed study of the heavy quark h=c,b,... contributions to deeply virtual Compton scattering is performed at both the amplitude and the cross section level, and their phenomenological relevance is discussed. For this purpose I calculate the lowest order off-forward photon-gluon scattering amplitude with a massive quark loop and the corresponding hard scattering coefficients. In a first numerical analysis these fixed order perturbation theory results are compared with the conventional intrinsic "massless" parton approach considering generalized parton distributions for the heavy quarks. The differences between these two prescriptions can be quite significant, especially at small skewedness where the massless approach largely overestimates the deeply virtual Compton scattering cross section.

  3. Controlled entanglement routing between two virtual pathways

    E-Print Network [OSTI]

    Qiang Zhou; Shuai Dong; Wei Zhang; Lixing You; Yuhao He; Weijun Zhang; Yidong Huang; Jiangde Peng

    2014-07-16T23:59:59.000Z

    We demonstrate controlled entanglement routing between bunching and antibunching path-entangled two-photon states in an unbalanced Mach-Zehnder interferometer (UMZI), in which the routing process is controlled by the relative phase difference in the UMZI. Regarding bunching and antibunching path-entangled two-photon states as two virtual ports, we can consider the UMZI as a controlled entanglement router, which bases on the coherent manipulation of entanglement. Half of the entanglement within the input two-photon state is coherently routed between the two virtual ports, while the other is lost due to the time distinguishability introduced by the UMZI. Pure bunching or antibunching path entangled two-photon states are obtained based on this controlled entanglement router. The results show that we can employ the UMZI as general entanglement router for practical quantum information application.

  4. 3D Spectroscopy and the Virtual Observatory

    E-Print Network [OSTI]

    Bryan W. Miller

    2007-08-15T23:59:59.000Z

    Integral field, or 3D, spectroscopy is the technique of obtaining spectral information over a two-dimensional, hopefully contiguous, field of view. While there is some form of astronomical 3D spectroscopy at all wavelengths, there has been a rapid increase in interest in optical and near-infrared 3D spectroscopy. This has resulted in the deployment of a large variety of integral-field spectrographs on most of the large optical/infrared telescopes. The amount of IFU data available in observatory archives is large and growing rapidly. The complications of treating IFU data as both imaging and spectroscopy make it a special challenge for the virtual observatory. This article describes the various techniques of optical and near-infrared spectroscopy and some of the general needs and issues related to the handling of 3D data by the virtual observatory.

  5. Spin effects in deeply virtual Compton scattering

    E-Print Network [OSTI]

    A. V. Belitsky; A. Kirchner; D. Müller

    2001-06-21T23:59:59.000Z

    We consider the azimuthal angle dependence in the cross section of the hard leptoproduction of a photon on a nucleon target. We show that this dependence allows to define observables that isolate the twist-two and twist-three sectors in the deeply virtual Compton scattering amplitude. All twist-two and twist-three Compton form factors can be extracted from measurements of the charge odd part of the polarized cross section and give access to all generalized parton distributions.

  6. Knowledge Discovery Framework for the Virtual Observatory

    E-Print Network [OSTI]

    Thomas, Brian; Huang, Zenping; Teuben, Peter

    2015-01-01T23:59:59.000Z

    We describe a framework that allows a scientist-user to easily query for information across all Virtual Observatory (VO) repositories and pull it back for analysis. This framework hides the gory details of meta-data remediation and data formatting from the user, allowing them to get on with search, retrieval and analysis of VO data as if they were drawn from a single source using a science based terminology rather than a data-centric one.

  7. Deeply virtual Compton scattering off nuclei

    SciTech Connect (OSTI)

    Voutier, Eric

    2009-01-01T23:59:59.000Z

    Deeply virtual Compton scattering (DVCS) is the golden exclusive channel for the study of the partonic structure of hadrons, within the universal framework of generalized parton distributions (GPDs). This paper presents the aim and general ideas of the DVCS experimental program off nuclei at the Jefferson Laboratory. The benefits of the study of the coherent and incoherent channels to the understanding of the EMC (European Muon Collaboration) effect are discussed, along with the case of nuclear targets to access neutron GPDs.

  8. FY12 -TOTAL AWARDS BY SPONSOR TYPE AND UNIT Unit Federal Industry International Private Foundation Local Government TotalOther Private State

    E-Print Network [OSTI]

    Arnold, Jonathan

    FY12 - TOTAL AWARDS BY SPONSOR TYPE AND UNIT Unit Federal Industry International Private Foundation Local Government TotalOther Private State This table reflects all awards made to UGA and UGARF,025,861 VP FOR STUDENT AFFAIRS UNITS $ 0 $ 0 $ 0 $ 0 $ 0 $ 159,668 $ 11,550 $ 171,218 AFFIRMATIVE ACTION $ 0

  9. Virtual and super - virtual refraction method: Application to synthetic data and 2012 of Karangsambung survey data

    SciTech Connect (OSTI)

    Nugraha, Andri Dian [Global Geophysics Research Group, Faculty of Mining and Petroleum Engineering, Institute of Technology Bandung, Bandung, 40132 (Indonesia)] [Global Geophysics Research Group, Faculty of Mining and Petroleum Engineering, Institute of Technology Bandung, Bandung, 40132 (Indonesia); Adisatrio, Philipus Ronnie [Geophysical Engineering Department, Faculty of Mining and Petroleum Engineering, Institute of Technology Bandung, Jl. Ganesha No. 10 Bandung, 40132 (Indonesia)] [Geophysical Engineering Department, Faculty of Mining and Petroleum Engineering, Institute of Technology Bandung, Jl. Ganesha No. 10 Bandung, 40132 (Indonesia)

    2013-09-09T23:59:59.000Z

    Seismic refraction survey is one of geophysical method useful for imaging earth interior, definitely for imaging near surface. One of the common problems in seismic refraction survey is weak amplitude due to attenuations at far offset. This phenomenon will make it difficult to pick first refraction arrival, hence make it challenging to produce the near surface image. Seismic interferometry is a new technique to manipulate seismic trace for obtaining Green's function from a pair of receiver. One of its uses is for improving first refraction arrival quality at far offset. This research shows that we could estimate physical properties such as seismic velocity and thickness from virtual refraction processing. Also, virtual refraction could enhance the far offset signal amplitude since there is stacking procedure involved in it. Our results show super - virtual refraction processing produces seismic image which has higher signal-to-noise ratio than its raw seismic image. In the end, the numbers of reliable first arrival picks are also increased.

  10. Kenya geothermal private power project: A prefeasibility study

    SciTech Connect (OSTI)

    Not Available

    1992-10-01T23:59:59.000Z

    Twenty-eight geothermal areas in Kenya were evaluated and prioritized for development. The prioritization was based on the potential size, resource temperature, level of exploration risk, location, and exploration/development costs for each geothermal area. Suswa, Eburru and Arus are found to offer the best short-term prospects for successful private power development. It was found that cost per kill developed are significantly lower for the larger (50MW) than for smaller-sized (10 or 20 NW) projects. In addition to plant size, the cost per kill developed is seen to be a function of resource temperature, generation mode (binary or flash cycle) and transmission distance.

  11. Specification buying as it relates to private brand merchandising 

    E-Print Network [OSTI]

    Tarver, Cleo B

    1964-01-01T23:59:59.000Z

    , as it is used to develop private brand merchandise, has become a very powerful tool in the hands of the giant re- tail chains, How potent this tool can be, and the effeot it is presently having on the retailing structure of our eoonomy is an important... couldnst the retailer absorb tbo functions presently performed by the wholesalersV Some of the larger retailers' with adequate financial power, began to go directly to the manufacturers and specify the charao- teristics they desired in their particular...

  12. Towards Real Time Virtual Human Life Simulations Etienne de Sevin, Marcelo Kallmann and Daniel Thalmann

    E-Print Network [OSTI]

    Kallmann, Marcelo

    Life, Agents, Virtual Humans, Virtual Environments, Behavioral Animation, Classifier Systems, ObjectTowards Real Time Virtual Human Life Simulations Etienne de Sevin, Marcelo Kallmann and Daniel for the development of artificial virtual human life simulations. Our main goal is to have virtual human actors living

  13. ©Wilolud Online Journals, 2008. THE NIGERIAN FUEL ENERGY SUPPLY CRISIS AND THE PROPOSED PRIVATE REFINERIES – PROSPECTS AND PROBLEMS

    E-Print Network [OSTI]

    Agwom Sani Z

    Dynamism of the world economy has compelled Nigerians to accept the liberalization of its economy to encourage private sector participation and induce managerial efficiency. This has become very imperative most especially, in the downstream sub-sector of the Nigerian oil and gas industry by the establishment and management of private refineries in view of the persistent fuel energy crisis. An attempt is made here at analyzing the prospects and problems of such refineries that are expected to end the fuel energy crisis which started in the 1970s due to increased demand for petroleum products for rehabilitation and reconstruction after the civil war but later metamorphosed into a hydraheaded monster in the 1980s to date. Efforts towards arresting this crisis by the government through the establishment of more refineries, storage depots and network of distribution pipelines etc achieved a short-term solution due to the abysmal low performance of the refineries and facilities in contrast to increasing demand for petroleum products. It is deduced that the low performance resulted from bad and corrupt management by indigenous technocrats and political leaders as well as vandalization of facilities. Prospects for such investments were identified, as well as some of the problems to content with. This is in order to understand the pros and cons of such investments in view of their capital intensiveness and the need to achieve economic goals that must incorporate environmental and social objectives.

  14. Networks in Buildings: Which Path Environmental Energy Technologies Division

    E-Print Network [OSTI]

    modest use in consumer electronics, security, and large building control systems. The next 20 years markets. Key future networks are lighting, climate control, and security/presence. This paper reviews some, product, or process disclosed, or represents that its use would not infringe privately owned rights

  15. Employing Virtualization in Library Computing: Use Cases and Lessons Learned

    E-Print Network [OSTI]

    Hutt, Arwen E.; Stuart, Michael; Suchy, Daniel; Westbrook, Bradley D.

    2009-01-01T23:59:59.000Z

    cataloging. Not only are types of library materials changingincreasing variety of library material types. Most notableLibraries. 2 Virtualization can be implemented using Type 1

  16. Deeply virtual Compton scattering and generalized parton distributions

    E-Print Network [OSTI]

    S. Fazio; R. Fiore; L. L. Jenkovszky

    2008-12-16T23:59:59.000Z

    We present a comparison of a recently proposed model, which describes the Deeply Virtual Compton Scattering amplitude, to the HERA data.

  17. The Virtual (Re)Construction of History: Some Epistemological Questions

    E-Print Network [OSTI]

    El Antably, Ahmed

    2010-01-01T23:59:59.000Z

    virtual environments as a new medium for representingvirtual environments as a new medium for representingmedium that are specific to the society in which the environment

  18. Teaching Variation Reduction Using a Virtual Manufacturing Environment

    E-Print Network [OSTI]

    Zhu, Mu

    short courses. KEY WORDS: Simulation; Six Sigma; Variation reduction; Virtual environment. 1 by adopting a systematic frame- work like DMAIC (define, measure, analyze, improve, control) in Six Sigma

  19. Proposed Virtual Center for Excellence for Metal Hydride Development...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Virtual Center for Excellence for Metal Hydride Development Presentation from the Hydrogen Storage Pre-Solicitation Meeting held June 19, 2003 in Washington, DC....

  20. Virtual Center of Excellence for Hydrogen Storage - Chemical...

    Broader source: Energy.gov (indexed) [DOE]

    funded) * Advanced carbon materials (LDRD) - (we propose a support role in the carbon materials virtual center) * Electrochemically active barrier liner for composite storage tanks...

  1. T-588: HP Virtual SAN Appliance Stack Overflow

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in HP StorageWorks P4000 Virtual SAN Appliance Software, which can be exploited by malicious people to compromise a vulnerable system.

  2. I/O Performance of Virtualized Cloud Environments

    E-Print Network [OSTI]

    Ghoshal, Devarshi

    2013-01-01T23:59:59.000Z

    Technologies in High Performance Computing. In 2nd IEEEusing virtual high-performance computing: a case study usingAnalysis of High Performance Computing Applications on the

  3. A Stochastic Reactor Based Virtual Engine Model Employing Detailed...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A Stochastic Reactor Based Virtual Engine Model Employing Detailed Chemistry for Kinetic Studies of In-Cylinder Combustion and Exhaust Aftertreatment A Stochastic Reactor Based...

  4. TinyVM: An Energy-Efficient Execution Infrastructure for Sensor Networks

    E-Print Network [OSTI]

    Burgstaller, Bernd

    TinyVM: An Energy-Efficient Execution Infrastructure for Sensor Networks Technical Report CS@cs.yonsei.ac.kr scholz@it.usyd.edu.au ABSTRACT Energy-efficient implementation techniques for virtual machines (VMs) have that bytecode interpretation is affordable for sensor networks if we synthesize VMs specifically for energy-efficiency

  5. The New House of the Region of Hannover - Building Energy Efficient in a Public Private Partnership

    E-Print Network [OSTI]

    Schubert, T.; Plesser, S.

    2008-01-01T23:59:59.000Z

    / 3 91 - 35 84 plesser@igs.bau.tu-bs.de The New House of the Region of Hannover - Building energy Efficient in a Public Private Partnership Topic: Examples of advanced/demonstration buildings Key words: Demonstration building, PPP..., public private partnership, commissioning, energy efficiency, user comfort Public Private Partnerships are an increasingly popular approach to carry out public infra-structure projects. PPPs aim at reducing costs and risk and improving service...

  6. Energy efficient mapping of virtualEnergy efficient mapping of virtual machinesmachines

    E-Print Network [OSTI]

    Lefčvre, Laurent

    for energy savings in cloud 2 Violaine Villebonnet GreenDays@Lille 28th November 2013 Problematic algorithms that best fit with reality Energy efficient mapping of virtual machines Violaine Villebonnet Green Conditioning Reduce the energy consumption of the whole datacenter Violaine Villebonnet GreenDays@Lille 28th

  7. ENDOWING CITIZENS WITH A PORTFOLIO OF STATE-SPONSORED ENTERPRISES FOR EFFICIENT AND EQUITABLE PRIVATIZATION

    E-Print Network [OSTI]

    Hartnett, William

    2003-03-28T23:59:59.000Z

    This paper discusses a portfolio endowment policy as an alternative to conventional privatization policies. The portfolio endowment policy endows each citizen with a ...

  8. DOE Seeks Public-Private Sector Expressions of Interest for Global...

    Office of Environmental Management (EM)

    and the world while greatly reducing proliferation concerns." Deputy Secretary of Energy Clay Sell said. "Seeking the best ideas from the public and private sectors on where to...

  9. Evaluation of 241-AZ tank farm supporting phase 1 privatization waste feed delivery

    SciTech Connect (OSTI)

    CARLSON, A.B.

    1998-11-19T23:59:59.000Z

    This evaluation is one in a series of evaluations determining the process needs and assessing the adequacy of existing and planned equipment in meeting those needs at various double-shell tank farms in support of Phase 1 privatization. A number of tank-to-tank transfers and waste preparation activities are needed to process and feed waste to the private contractor in support of Phase 1 privatization. The scope of this evaluation is limited to process needs associated with 241-AZ tank farm during the Phase 1 privatization.

  10. Planning Guide for Vaccinating Pediatric Patients Against H1N1 Influenza in Private Healthcare Settings

    SciTech Connect (OSTI)

    HCTT CHE

    2010-01-01T23:59:59.000Z

    The purpose of this document is to provide guidance for planning and conducting 2009 H1N1 Influenza vaccination of pediatric patients in private healthcare settings.

  11. Guide to Community Solar: Utility, Private, and Non-Profit Project Development (Fact Sheet)

    SciTech Connect (OSTI)

    Ruckman, K.

    2011-03-01T23:59:59.000Z

    This fact sheet provides an overview of the DOE Solar America Communities report Guide to Community Solar: Utility, Private, and Non-profit Project Development.

  12. A Strategy to Engage the Private Sector in Climate Change Adaptation...

    Open Energy Info (EERE)

    Sector in Climate Change Adaptation in Bangladesh Jump to: navigation, search Name A Strategy to Engage the Private Sector in Climate Change Adaptation in Bangladesh Agency...

  13. Public Regulation and Private Lawsuits in the American Separation of Powers System

    E-Print Network [OSTI]

    Farhang, Sean

    2007-01-01T23:59:59.000Z

    mechanism, grounded in economic incentives, that Congressfundamentally grounded in economic incentives, that is theii The operation of economic incentives on private litigants

  14. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  15. Deeply Virtual Compton Scattering off the neutron

    E-Print Network [OSTI]

    M. Mazouz; A. Camsonne; C. Muńoz Camacho; for the Jefferson Lab Hall A collaboration

    2007-12-12T23:59:59.000Z

    The present experiment exploits the interference between the Deeply Virtual Compton Scattering (DVCS) and the Bethe-Heitler processes to extract the imaginary part of DVCS amplitudes on the neutron and on the deuteron from the helicity-dependent D$({\\vec e},e'\\gamma)X$ cross section measured at $Q^2$=1.9 GeV$^2$ and $x_B$=0.36. We extract a linear combination of generalized parton distributions (GPDs) particularly sensitive to $E_q$, the least constrained GPD. A model dependent constraint on the contribution of the up and down quarks to the nucleon spin is deduced.

  16. Diffraction Patterns in Deeply Virtual Compton Scattering

    E-Print Network [OSTI]

    Asmita Mukherjee

    2006-11-30T23:59:59.000Z

    We report on a calculation to show that the Fourier transform of the Deeply Virtual Compton Scattering (DVCS) amplitude with respect to the skewness variable \\zeta at fixed invariant momentum transfer squared t gives results that are analogous to the diffractive scattering of a wave in optics. As a specific example, we utilize the quantum fluctuations of a fermion state at one loop in QED to obtain the behavior of the DVCS amplitude for electron-photon scattering. We then simulate the wavefunctions for a hadron by differentiating the above LFWFs with respect to M^2 and study the corresponding DVCS amplitudes in light-front longitudinal space.

  17. Deeply Virtual Compton Scattering at HERA II

    E-Print Network [OSTI]

    Laurent Schoeffel

    2007-05-22T23:59:59.000Z

    A new measurement is presented of elastic deeply virtual Compton scattering (DVCS) based on data taken by the H1 detector during the complete HERA II period. The data are well described by QCD based calculations. For the first time, a beam charge asymmetry is obtained in a colliding mode, using data recorded in $e^-p$ and $e^+p$. A significant non zero value is measured, related to the interference of QCD and QED processes, namely the DVCS and Bethe-Heitler reactions.

  18. Virtual Compton Scattering off the nucleon

    E-Print Network [OSTI]

    P. A. M. Guichon; M. Vanderhaeghen

    1998-06-08T23:59:59.000Z

    We review the recent developments of virtual Compton scattering. We focus on the kinematical regimes which look the most promising. The threshold regime gives access to the generalized polarizabilities of the proton. The hard scattering regime allows tests of perturbative QCD predictions and of the valence quark wave function. The Bjorken regime is closely related to deep inelastic scattering. It gives access to the off-forward parton distributions which generalize the ordinary parton distributions and may shed a new light on the spin problem. For each regime we discuss the experimental perspectives and the role of the Bethe-Heitler background.

  19. The Virtual Observatory and Grid in Spain

    E-Print Network [OSTI]

    J. D. Santander-Vela

    2008-07-08T23:59:59.000Z

    The Virtual Observatory (VO) is nearing maturity, and in Spain the Spanish VO (SVO) exists since June 2004. There have also been numerous attempts at providing more or less encompassing grid initiatives at the national level, and finally Spain has an official National Grid Initiative (NGI). In this article we will show the VO and Grid development status of nationally funded initiatives in Spain, and we will hint at potential joint VO-Grid use-cases to be developed in Spain in the near future.

  20. Virtual environments for nuclear power plant design

    SciTech Connect (OSTI)

    Brown-VanHoozer, S.A.; Singleterry, R.C. Jr.; King, R.W. [and others

    1996-03-01T23:59:59.000Z

    In the design and operation of nuclear power plants, the visualization process inherent in virtual environments (VE) allows for abstract design concepts to be made concrete and simulated without using a physical mock-up. This helps reduce the time and effort required to design and understand the system, thus providing the design team with a less complicated arrangement. Also, the outcome of human interactions with the components and system can be minimized through various testing of scenarios in real-time without the threat of injury to the user or damage to the equipment. If implemented, this will lead to a minimal total design and construction effort for nuclear power plants (NPP).

  1. Spring 2015 Virtual Toolkit | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE's Nuclear EnergySmartOverviewEnergySpotlightingVirtual

  2. HPSS Yearly Network Traffic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    growth in network traffic to storage over the years. Network Traffic Growth Network Distribution 2010 Network Distribution 2010 Network Distribution 2009 Network Distribution...

  3. On virtual phonons, photons and electrons

    E-Print Network [OSTI]

    G. Nimtz

    2009-07-09T23:59:59.000Z

    A macroscopic realization of the strange virtual particles is presented. The classical Helmholtz and the quantum mechanical Schr\\"odinger equations are analogous differential equations. Their imaginary solutions are called evanescent modes in the case of elastic and electromagnetic fields. In the case of non-relativistic quantum mechanical fields they are called tunneling solutions. The imaginary solutions of this differential equation point to strange consequences: They are non local, they are not observable, and they described as virtual particles. During the last two decades QED calculations of the imaginary solutions have been experimentally confirmed for phonons, photons, and for electrons. The experimental proofs of the predictions of the non-relativistic quantum mechanics and of the Wigner phase time approach for the elastic, the electromagnetic and the Schr\\"odinger fields will be presented in this article. The results are zero tunneling time and an interaction time (i.e. a phase shift) at the barrier interfaces. The measured barrier interaction time (i.e. the barrier transmission time) scales approximately inversely with the particle energy.

  4. International Working Group for New Virtual Reality Applications in Architecture

    E-Print Network [OSTI]

    's developed VR applications in architecture. Group members come from eight universities around the worldWORLD8 International Working Group for New Virtual Reality Applications in Architecture YOSHIHIRO the activities of World8, an international working group on virtual reality (VR), and demonstrates the group

  5. The Role of Virtualization in Embedded Systems Gernot Heiser

    E-Print Network [OSTI]

    in the embedded domain. Starting from a comparison of key characteristics of enterprise systems and embedded virtualization has become a mainstream tool in the com- puting industry, as indicated by billion-dollar IPOs virtual ma- chines on demand on a lightly-used host, or even migrating live VMs. This utilises

  6. AI and Virtual Crowds: Populating the Diego Gutierrez

    E-Print Network [OSTI]

    Frischer, Bernard

    and geometrical representation of buildings and sites. Only very recently, works are starting to go beyond of virtual creatures interact and behave in a smart manner. In this paper we present a novel use of virtual traditionally been limited to illustration of buildings and sites through digital reconstruction. While

  7. Efficiency Assessment of Parallel Workloads on Virtualized Resources Javier Delgado,

    E-Print Network [OSTI]

    Sadjadi, S. Masoud

    Efficiency Assessment of Parallel Workloads on Virtualized Resources Javier Delgado, S. Masoud,ygliu,bobroff,sseelam}@us.ibm.com Abstract--In cloud computing, virtual containers on phys- ical resources are provisioned to requesting users. Resource providers may pack as many containers as possible onto each of their physical machines

  8. MultiDimensional Storage Virtualization Lan Huang y

    E-Print Network [OSTI]

    Chiueh, Tzi-cker

    Multi­Dimensional Storage Virtualization #3; Lan Huang y 650 Harry Rd. IBM Almaden Research Center-of-the-art commercial storage virtualization systems focus only on one particular storage attribute, capacity. This paper describes the design, implementa- tion and evaluation of a multi-dimensional storage vir

  9. The Case for Partitioning Virtual Machines on Manycore Architectures

    E-Print Network [OSTI]

    Department of Energy is evaluating virtualization and cloud computing technologies in the Magellan [4 of proper NUMA support determines an average performance degradation of 55% when compared to native single node native performance: in a partitioned system with one virtual machine per socket the average

  10. Steering Behaviors for Autonomous Vehicles in Virtual Environments Hongling Wang

    E-Print Network [OSTI]

    Kearney, Joseph K.

    This paper presents steering behaviors that control autonomous ve- hicles populating roadways in virtualSteering Behaviors for Autonomous Vehicles in Virtual Environments Hongling Wang Dept of Computer are modeled as three-dimensional ribbons that make the local orientation of the road explicit and allow

  11. Constructivism, virtual reality and tools to support Cara Winterbottom

    E-Print Network [OSTI]

    Blake, Edwin

    230 Constructivism, virtual reality and tools to support design Cara Winterbottom Collaborative +27 21 650 2663 edwin@cs.uct.ac.za ABSTRACT This paper describes a process for creating a design tool in designing virtual environment interactions, however it can be generalized to other design domains

  12. Proceedings of Virtual Concept 2005 Biarritz, France, November 8th

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of concurrent engineering. This leads us to draw a control architecture enabling to drive virtual humans. The Virtual Human (VH) we are designing is to fit the concurrent engineering design approach. Large scale concurrent engineering (also known as "engineers' dream") is now regarded as very attractive [1]. It is held

  13. The Heavy Ion Fusion Science Virtual National Laboratory

    E-Print Network [OSTI]

    Gilson, Erik

    and collaborators. P. K. Roy et al., Nucl. Instr. and Meth. in Phys. Res. A 606 22, (2009). The four CAPS produce current through each of the four sources. P. K. Roy #12;The Heavy Ion Fusion Science Virtual National P. Gilson Princeton Plasma Physics Laboratory #12;The Heavy Ion Fusion Science Virtual National

  14. Creating Highquality Roadmaps for Motion Planning in Virtual Environments

    E-Print Network [OSTI]

    Geraerts, R.J.

    Creating High­quality Roadmaps for Motion Planning in Virtual Environments Roland Geraerts and Mark, the Netherlands Email: {roland,markov}@cs.uu.nl Abstract--- Our goal is to create roadmaps that are particularly suited for motion planning in virtual environments. We use our Reachability Roadmap Method to compute

  15. VIRTUAL LIGHT: DIGITALLY-GENERATED LIGHTING FOR VIDEO CONFERENCING APPLICATIONS

    E-Print Network [OSTI]

    Fisher, Kathleen

    VIRTUAL LIGHT: DIGITALLY-GENERATED LIGHTING FOR VIDEO CONFERENCING APPLICATIONS Andrea Basso method to improve the lighting conditions of a real scene or video sequence. In particular we concentrate on modifying real light sources intensities and inserting virtual lights into a real scene viewed from a fixed

  16. An Ontology for Semantic Representation of an Urban Virtual Environment

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Ontology for Semantic Representation of an Urban Virtual Environment K. Harkouken Saiah1, N of semantic representation of a dynamic virtual environment. Our model is embodied into a simulation with the semantic state of their environment. The idea is to represent the services offered by the environment

  17. Virtual Agent for Deaf Signing Gestures S. Gibet, 1

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    a virtual human representation. The quality of this representation relies upon the ability of the animation and modelling human motion stands for an important challenge in researches dedicated to virtual reality into integrating within an animation framework some properties of human motions extracted from data captured

  18. Animations of Medical Training Scenarios in Immersive Virtual Environments

    E-Print Network [OSTI]

    Animations of Medical Training Scenarios in Immersive Virtual Environments Ivelina V. Alexandrova-line me- dia applications using Virtual Humans (VHs) 1 http://www.meti.com/ 3 http to express emotions, and syn- chronized body and facial animations, including human-like gaze behavior

  19. A Virtual Reality-Based Exercise Program For Stroke Rehabilitation

    E-Print Network [OSTI]

    New Jersey, University of Medicine and Dentistry of

    Several researchers have shown in both animal and human studies that important variables in reA Virtual Reality-Based Exercise Program For Stroke Rehabilitation David Jack 2, 3 , Rares Boian 1 1 and Howard Poizner 2 * ABSTRACT A PC based desktop Virtual Reality system was developed

  20. Attention Based, Naive Strategies, for Guiding Intelligent Virtual Agents

    E-Print Network [OSTI]

    Corran, Ruth

    communication be- tween the components Several studies have demonstrated that human's feelings towards virtualAttention Based, Naive Strategies, for Guiding Intelligent Virtual Agents Damien Clauzel1 , Claudia). It is composed of speech, animations, expressions and other actions. Any action in the script may be assigned

  1. Air Traffic Control Using Virtual Stationary Automata Matthew D. Brown

    E-Print Network [OSTI]

    Lynch, Nancy

    Air Traffic Control Using Virtual Stationary Automata by Matthew D. Brown B.S., Massachusetts by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;Air Traffic Control Using Virtual of Engineering Abstract As air travel has become an essential part of modern life, the air traffic control system

  2. Trusted Integrity Measurement and Reporting for Virtualized Platforms

    E-Print Network [OSTI]

    Ryan, Mark

    Trusted Integrity Measurement and Reporting for Virtualized Platforms (Work-in-Progress) Serdar of the whole set of platform components. It is, however, difficult to use this technology directly in virtualized platforms because of com- plexity and dynamic changes of platform components. In this paper, we

  3. LANL/PNNL Virtual Center for Chemical Hydrides and New Concepts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LANLPNNL Virtual Center for Chemical Hydrides and New Concepts for Hydrogen Storage LANLPNNL Virtual Center for Chemical Hydrides and New Concepts for Hydrogen Storage...

  4. Proposal to Lead the Virtual Center on Carbon Materials and Support...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Proposal to Lead the Virtual Center on Carbon Materials and Support the Chemical Hydrides Center Proposal to Lead the Virtual Center on Carbon Materials and Support the Chemical...

  5. Study of energy R and D in the private sector

    SciTech Connect (OSTI)

    Not Available

    1980-01-01T23:59:59.000Z

    This study supplies DOE with information pertinent to the formulation of realistic national energy research policies and facilitates cooperation between government and business in the development and commercialization of new and improved energy technologies. The study gathered information on the amount of energy-related research and development that private companies are doing, types of energy-related programs they report, and their perceptions about appropriate areas for government support. Mail questionnaires obtained data on the amount of corporate research funding in specific energy-related technology areas and the interviews gathered information on corporate energy strategies, major commercial activities, and specific research plans in four major areas - conservation, supply, energy production and transmission, and new products. (MCW)

  6. Flexible quantum private queries based on quantum key distribution

    E-Print Network [OSTI]

    Fei Gao; Bin Liu; Qiao-Yan Wen; Hui Chen

    2011-11-07T23:59:59.000Z

    We present a flexible quantum-key-distribution-based protocol for quantum private queries. Similar to M. Jakobi et al's protocol [Phys. Rev. A 83, 022301 (2011)], it is loss tolerant, practical and robust against quantum memory attack. Furthermore, our protocol is more flexible and controllable. We show that, by adjusting the value of $\\theta$, the average number of the key bits Alice obtains can be located on any fixed value the users wanted for any database size. And the parameter $k$ is generally smaller (even $k=1$ can be achieved) when $\\theta<\\pi/4$, which implies lower complexity of both quantum and classical communications. Furthermore, the users can choose a smaller $\\theta$ to get better database security, or a larger $\\theta$ to obtain a lower probability with which Bob can correctly guess the address of Alice's query.

  7. TWRS privatization support project waste characterization database development

    SciTech Connect (OSTI)

    NONE

    1995-11-01T23:59:59.000Z

    Pacific Northwest National Laboratory requested support from ICF Kaiser Hanford Company in assembling radionuclide and chemical analyte sample data and inventory estimates for fourteen Hanford underground storage tanks: 241-AN-102, -104, -105, -106, and -107, 241-AP-102, -104, and -105, 241-AW-101, -103, and -105, 241 AZ-101 and -102; and 241-C-109. Sample data were assembled for sixteen radionuclides and thirty-five chemical analytes. The characterization data were provided to Pacific Northwest National Laboratory in support of the Tank Waste Remediation Services Privatization Support Project. The purpose of this report is to present the results and document the methodology used in preparing the waste characterization information data set to support the Tank Waste Remediation Services Privatization Support Project. This report describes the methodology used in assembling the waste characterization information and how that information was validated by a panel of independent technical reviewers. Also, contained in this report are the various data sets created: the master data set, a subset, and an unreviewed data set. The master data set contains waste composition information for Tanks 241-AN-102 and -107, 241-AP-102 and -105, 241-AW-101; and 241-AZ-101 and -102. The subset contains only the validated analytical sample data from the master data set. The unreviewed data set contains all collected but unreviewed sample data for Tanks 241-AN-104, -105, and -106; 241-AP-104; 241-AW-103 and-105; and 241-C-109. The methodology used to review the waste characterization information was found to be an accurate, useful way to separate the invalid or questionable data from the more reliable data. In the future, this methodology should be considered when validating waste characterization information.

  8. Towards secure virtual directories : a risk analysis framework.

    SciTech Connect (OSTI)

    Claycomb, William R.

    2010-07-01T23:59:59.000Z

    Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

  9. Methods and systems relating to an augmented virtuality environment

    DOE Patents [OSTI]

    Nielsen, Curtis W; Anderson, Matthew O; McKay, Mark D; Wadsworth, Derek C; Boyce, Jodie R; Hruska, Ryan C; Koudelka, John A; Whetten, Jonathan; Bruemmer, David J

    2014-05-20T23:59:59.000Z

    Systems and methods relating to an augmented virtuality system are disclosed. A method of operating an augmented virtuality system may comprise displaying imagery of a real-world environment in an operating picture. The method may further include displaying a plurality of virtual icons in the operating picture representing at least some assets of a plurality of assets positioned in the real-world environment. Additionally, the method may include displaying at least one virtual item in the operating picture representing data sensed by one or more of the assets of the plurality of assets and remotely controlling at least one asset of the plurality of assets by interacting with a virtual icon associated with the at least one asset.

  10. Network Based Approaches for Clustering and Location Decisions

    E-Print Network [OSTI]

    Verma, Anurag

    2012-10-19T23:59:59.000Z

    in large scale graphs, determining location of facilities for pre-positioning emergency relief supplies, and selecting nodes to form a virtual backbone in a wireless sensor network. To begin with, a new clique relaxation called a k-community is defined...

  11. System-Level Virtualization Research at Oak Ridge National Laboratory

    SciTech Connect (OSTI)

    Scott, Stephen L [ORNL; Vallee, Geoffroy R [ORNL; Naughton, III, Thomas J [ORNL; Tikotekar, Anand A [ORNL; Engelmann, Christian [ORNL; Ong, Hong Hoe [ORNL

    2010-01-01T23:59:59.000Z

    System-level virtualization is today enjoying a rebirth as a technique to effectively share what were then considered large computing resources to subsequently fade from the spotlight as individual workstations gained in popularity with a one machine - one user approach. One reason for this resurgence is that the simple workstation has grown in capability to rival that of anything available in the past. Thus, computing centers are again looking at the price/performance benefit of sharing that single computing box via server consolidation. However, industry is only concentrating on the benefits of using virtualization for server consolidation (enterprise computing) whereas our interest is in leveraging virtualization to advance high-performance computing (HPC). While these two interests may appear to be orthogonal, one consolidating multiple applications and users on a single machine while the other requires all the power from many machines to be dedicated solely to its purpose, we propose that virtualization does provide attractive capabilities that may be exploited to the benefit of HPC interests. This does raise the two fundamental questions of: is the concept of virtualization (a machine sharing technology) really suitable for HPC and if so, how does one go about leveraging these virtualization capabilities for the benefit of HPC. To address these questions, this document presents ongoing studies on the usage of system-level virtualization in a HPC context. These studies include an analysis of the benefits of system-level virtualization for HPC, a presentation of research efforts based on virtualization for system availability, and a presentation of research efforts for the management of virtual systems. The basis for this document was material presented by Stephen L. Scott at the Collaborative and Grid Computing Technologies meeting held in Cancun, Mexico on April 12-14, 2007.

  12. Running head: Virtual Peer Technology for Children with Autism Using Virtual Peer Technology as an Intervention for Children with Autism

    E-Print Network [OSTI]

    Cassell, Justine

    an affinity for computers. Instead of labeling these technologies as useless for children with ASD1 Running head: Virtual Peer Technology for Children with Autism Using Virtual Peer Technology of key features that we believe to be important ­ and as yet undervalued -- in technological

  13. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing

    E-Print Network [OSTI]

    Beimel, Amos

    Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing Amos Beimel Yuval Ishai Tal Malkin§ June 12, 2003 Abstract Private information retrieval (PIR) enables a user if the user requires only a single bit. In this paper, we study the computational complexity of PIR. We show

  14. A Random Server Model for Private Information How to Achieve Information Theoretic PIR

    E-Print Network [OSTI]

    Goldwasser, Shafi

    A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR, Cambridge, MA 02139, USA fshafi,talg@theory.lcs.mit.edu Abstract. Private information retrieval (PIR the database managers. We propose a new model for PIR, utilizing auxiliary random servers to provide privacy

  15. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing

    E-Print Network [OSTI]

    Beimel, Amos

    Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing #3; Amos Beimel y Yuval Ishai z Tal Malkin x June 9, 2003 Abstract Private information retrieval (PIR) enables of PIR. We show that in the standard PIR model, where the servers hold only the database, linear

  16. Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing

    E-Print Network [OSTI]

    Ishai, Yuval

    Reducing the Servers' Computation in Private Information Retrieval: PIR with Preprocessing #3; Amos Beimel y Yuval Ishai z Tal Malkin x January 26, 2006 Abstract Private information retrieval (PIR) enables of PIR. We show that in the standard PIR model, where the servers hold only the database, linear

  17. Efficient Private Information Retrieval Using Secure Xiangyao Yu, Christopher W. Fletcher

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    attention from the cryptography and security communities. Two main approaches to solve PIR have appearedEfficient Private Information Retrieval Using Secure Hardware Xiangyao Yu, Christopher W. Fletcher, marten, devadas}@mit.edu ABSTRACT Existing crypto-based Private Information Retrieval (PIR) schemes

  18. rPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval

    E-Print Network [OSTI]

    Information Retrieval) is a promising security primitive to protect the privacy of users' interests. PIRrPIR: Ramp Secret Sharing based Communication Efficient Private Information Retrieval Lichun Li/diseases from a stock/medical database leaks sensitive information to the database server. PIR (Private

  19. Noisy Processing and the Distillation of Private States Joseph M. Renes1

    E-Print Network [OSTI]

    Noisy Processing and the Distillation of Private States Joseph M. Renes1 and Graeme Smith2 1 general private state is distilled. Besides a more general target state, the usual entanglement distillation tools are employed (in par- ticular, Calderbank-Shor-Steane (CSS)-like codes), with the crucial

  20. Staff use of private vehicles on University of Exeter Policy Statement

    E-Print Network [OSTI]

    Bearhop, Stuart

    Staff use of private vehicles on University of Exeter business Policy Statement The University of Exeter will permit its staff to use private vehicles for University Business provided that: (a) they hold a full and current UK Driver's licence; (b) their vehicles are taxed, roadworthy and suitable

  1. Inter-organizational Information Systems and Interaction in Public vs. Private Sector Comparing two

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Inter-organizational Information Systems and Interaction in Public vs. Private Sector ­ Comparing, Sweden {karin.axelsson, ulf.melin}@liu.se Abstract. This paper compares inter-organizational (IO) interaction and inter- organizational information systems (IOS) in public and private sector. The purpose

  2. Kobe Journal of Higher Education The Attitudes and Behaviors of Private School Parents

    E-Print Network [OSTI]

    Banbara, Mutsunori

    ;#12;#12;#12;#12;#12;#12;#12;#12;#12;The Attitudes and Behaviors of Private School Parents under Yutori Reform An Analysis on Private University) A Japanese education reform initiative introduced in 2002, has led to dramatic reductions in required public school curriculum content and class time. There are widely shared concerns that this reform

  3. How to safely compost Cameraria ohridella-infested horse chestnut leaf litter on private compost heaps

    E-Print Network [OSTI]

    Richner, Heinz

    How to safely compost Cameraria ohridella-infested horse chestnut leaf litter on private compost the deposition of pest-infested litter on private compost heaps was dissuaded because of the risk of leafminer emergence in the following spring. Thus, the aim of this study was to test safe ways to compost pest

  4. Why Private Labels Show Long-Term Market Share Evolution Stephen J. Hoch

    E-Print Network [OSTI]

    Faloutsos, Christos

    Why Private Labels Show Long-Term Market Share Evolution Stephen J. Hoch Alan L. Montgomery Young School of Management, Cornell University. #12;2 Why Private Labels Show Long-Term Market Share Evolution brand to take unilateral action to increase share. We find a clear exception to this rule -- during

  5. On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks

    E-Print Network [OSTI]

    Merhav, Neri

    On the Capacity Game of Private Fingerprinting Systems under Collusion Attacks Anelia Somekh;ngerprints in order not to be detected. Their action is modelled by a multiple access channel (MAC- Capacity, coding with side information, error exponents, information hiding, MMI decoder, private

  6. Economic Implications of Natural Gas Vehicle Technology in U.S. Private Automobile Transportation

    E-Print Network [OSTI]

    1 Economic Implications of Natural Gas Vehicle Technology in U.S. Private Automobile Transportation, Technology and Policy Program #12;2 #12;3 Implications of Natural Gas Vehicle Technology in U.S. Private natural gas resources, and the growing international liquefied natural gas (LNG) market, gas prices

  7. Do Private Firms Invest Dierently than Public Firms? Taking Cues from the Natural Gas Industry

    E-Print Network [OSTI]

    Lin, Xiaodong

    Do Private Firms Invest Dierently than Public Firms? Taking Cues from the Natural Gas Industry Erik and public rms using a unique dataset of onshore U.S. natural gas producers. In rm-level regressions we nd that investments by private rms are 68% less responsive to changes in natural gas prices, a measure that captures

  8. From Grid to private Clouds, to interClouds. Project Team

    E-Print Network [OSTI]

    Vialle, Stéphane

    24/10/2011 1 From Grid to private Clouds, to interClouds. AlGorille Project Team An overviewGorille INRIA Project Team October 21, 2011 I Premise of Grid ComputingI Premise of Grid Computing... From Grid to private Clouds, to inter

  9. Communication synthesis for on chip networks

    E-Print Network [OSTI]

    Swaminathan, Narayanan

    2002-01-01T23:59:59.000Z

    to Corlesign Environment C. Synthesize&l Communication Architecl, urc VI COXCLUSIO&U REFFREUCES . VITA LIST OF TABLES TABLE Page III ITRANS 2001 Roadmap . Effect of Virtual Channels and Bulfers in Area of Network Area Cost Comparison of 128 and 256... Roadmap for Semiconductors (ITRS) identifies design productivity, power management, multi-core organization, I/O bandwidth, and circuit and process tech- nologies as key contexts for future evolution of microprocessing units [I]. Commu- nication...

  10. Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks

    E-Print Network [OSTI]

    Kjellström, Hedvig

    Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization 1 Artificial Neural Networks Properties Applications Classical Examples Biological Background 2 Single Layer

  11. Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks

    E-Print Network [OSTI]

    Kjellström, Hedvig

    Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization Artificial Neural Networks #12;Artificial Neural Networks Single Layer Networks Multi Layer Networks Generalization 1 Artificial Neural Networks Properties Applications Classical Examples Biological Background 2

  12. Work, Nonwork, and Network: The Public and Private Lives of Women Chief Student Affairs Officers 

    E-Print Network [OSTI]

    Spurlock, Rebecca L.

    2010-01-14T23:59:59.000Z

    Women make up a majority of those employed in higher education, yet they are still a minority in leadership positions. Completing a doctoral degree, relocating for career advancement, and working in demanding, high time ...

  13. Work, Nonwork, and Network: The Public and Private Lives of Women Chief Student Affairs Officers

    E-Print Network [OSTI]

    Spurlock, Rebecca L.

    2010-01-14T23:59:59.000Z

    at all stages in their careers including in their roles as CSAOs on issues of discrimination, leadership style, spousal expectations, and choices regarding if and when - or whether - to have children. Respondents also articulated the different domains...

  14. C3E also includes a network of leaders from the public, private, non-profit

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the YouTube platformBuilding Removal Ongoing atGreenhouse GasesRespond toTable o f

  15. Unitary constraints on Deeply Virtual Compton Scattering

    SciTech Connect (OSTI)

    J.M. Laget

    2007-11-01T23:59:59.000Z

    At moderately low momentum transfer ($-t$ up to 1 GeV$^2$) the coupling to the vector meson production channels gives the dominant contribution to real Compton and deeply virtual Compton scattering (DVCS). Starting from a Regge Pole approach that successfully describes vector meson production, the singular part of the corresponding box diagrams (where the intermediate vector meson-baryon pair propagates on-shell) is evaluated without any further assumptions (unitarity). Such a treatment explains not only the unexpectedly large DVCS unpolarized cross section that has been recently measured at Jefferson Laboratory (JLab), but also all the beam spin and charge asymmetries that has been measured at JLab and Hermes, without explicit need of Generalized Parton Distributions (GPD). The issue of the relationship between the two approaches is addressed.

  16. Operating System Research at ORNL: System-level Virtualization

    E-Print Network [OSTI]

    Engelmann, Christian

    Research Office Building Research Office Building Computational Sciences Building Computational Sciences.S. Department of Energywithin the U.S. Department of Energy · Privately managed for US DOE · $1.08 billion

  17. Using design flexibility and real options to reduce risk in Private Finance Initiatives : the case of Japan

    E-Print Network [OSTI]

    Ohama, Dai

    2008-01-01T23:59:59.000Z

    Private Finance Initiative (PFI) is a delivery system for public works projects to design construct, manage and maintain public facilities by using private capital, management skills, and technical abilities. It was ...

  18. private investment cooperation. The book's uniqueness lies in achieving mean-

    E-Print Network [OSTI]

    Handy, Susan L.

    and environmental planning pro- gram at the University of Michigan, Ann Arbor. She has a background in architecture and a Master's degree in Heritage Manage- ment from the University of Birmingham, U.K. Sustainable that sustainable transport networks can be achieved. The book presents a rigorous yet practicable framework

  19. Analysis of Rotating Collectors from the Private Region of JET with Carbon Wall and Metallic ITER-Like Wall

    E-Print Network [OSTI]

    Analysis of Rotating Collectors from the Private Region of JET with Carbon Wall and Metallic ITER-Like Wall

  20. ACE: A Platform for the Real Time Simulation of Virtual Human Agents

    E-Print Network [OSTI]

    Kallmann, Marcelo

    . Keywords: Agents, Virtual Humans, Virtual Environments, Behavioral Animation, Object Interaction, Script. Nowadays many systems are available to animate virtual humans. Such systems encompass several differentACE: A Platform for the Real Time Simulation of Virtual Human Agents Marcelo Kallmann, Jean