399 research outputs found

    TECHNICAL EVALUATION OF REMEDIATION TECHNOLOGIES FOR PLUTONIUM-CONTAMINATED SOILS AT THE NEVADA TEST SITE (NTS)

    Full text link

    Spartan Daily, November 12, 1986

    Get PDF
    Volume 87, Issue 54https://scholarworks.sjsu.edu/spartandaily/7511/thumbnail.jp

    Singularities

    Get PDF
    SINGULARITIES is a work of fiction; it is the beginning of a novel about a mathematician, Allie Waters, who is haunted--and still mesmerized--by her lover, Shelby, more than twenty years after her death. The novel is structured as a collection of individual pieces of Allie's memory as filtered through her mathematically-inspired theory of life based on the "Calculus of Residues." Some of Allie's "singularities" include her experiences growing up in rural Florida with her best friend Michael, a series of mystical out-of-body experiences that are ultimately diagnosed as temporal lobe seizures, her short but intense relationship with Shelby in college, and the complex connection she continues to share with both Shelby and Michael throughout her life

    Durability and Availability of Erasure-Coded Storage Systems with Concurrent Maintenance

    Full text link
    This initial version of this document was written back in 2014 for the sole purpose of providing fundamentals of reliability theory as well as to identify the theoretical types of machinery for the prediction of durability/availability of erasure-coded storage systems. Since the definition of a "system" is too broad, we specifically focus on warm/cold storage systems where the data is stored in a distributed fashion across different storage units with or without continuous operation. The contents of this document are dedicated to a review of fundamentals, a few major improved stochastic models, and several contributions of my work relevant to the field. One of the contributions of this document is the introduction of the most general form of Markov models for the estimation of mean time to failure. This work was partially later published in IEEE Transactions on Reliability. Very good approximations for the closed-form solutions for this general model are also investigated. Various storage configurations under different policies are compared using such advanced models. Later in a subsequent chapter, we have also considered multi-dimensional Markov models to address detached drive-medium combinations such as those found in optical disk and tape storage systems. It is not hard to anticipate such a system structure would most likely be part of future DNA storage libraries. This work is partially published in Elsevier Reliability and System Safety. Topics that include simulation modelings for more accurate estimations are included towards the end of the document by noting the deficiencies of the simplified canonical as well as more complex Markov models, due mainly to the stationary and static nature of Markovinity. Throughout the document, we shall focus on concurrently maintained systems although the discussions will only slightly change for the systems repaired one device at a time.Comment: 58 pages, 20 figures, 9 tables. arXiv admin note: substantial text overlap with arXiv:1911.0032

    Oral History Interview: Joseph Anderson Kovich

    Get PDF
    Joseph Kovich was born in Mercer County, West Virginia. His father, a Croatian, and his mother, a Serbian, came to America in the early 1900\u27s. Mr. Kovich received a civil engineering degree from West Virginia University and worked for the Appalachian Power Company. He discusses his parents, mining, and schooling. At the time of the intrview, Mr. Kovich was residing in Huntington, West Virginia.https://mds.marshall.edu/oral_history/1082/thumbnail.jp

    Toward least-privilege isolation for software

    Get PDF
    Hackers leverage software vulnerabilities to disclose, tamper with, or destroy sensitive data. To protect sensitive data, programmers can adhere to the principle of least-privilege, which entails giving software the minimal privilege it needs to operate, which ensures that sensitive data is only available to software components on a strictly need-to-know basis. Unfortunately, applying this principle in practice is dif- �cult, as current operating systems tend to provide coarse-grained mechanisms for limiting privilege. Thus, most applications today run with greater-than-necessary privileges. We propose sthreads, a set of operating system primitives that allows �ne-grained isolation of software to approximate the least-privilege ideal. sthreads enforce a default-deny model, where software components have no privileges by default, so all privileges must be explicitly granted by the programmer. Experience introducing sthreads into previously monolithic applications|thus, partitioning them|reveals that enumerating privileges for sthreads is di�cult in practice. To ease the introduction of sthreads into existing code, we include Crowbar, a tool that can be used to learn the privileges required by a compartment. We show that only a few changes are necessary to existing code in order to partition applications with sthreads, and that Crowbar can guide the programmer through these changes. We show that applying sthreads to applications successfully narrows the attack surface by reducing the amount of code that can access sensitive data. Finally, we show that applications using sthreads pay only a small performance overhead. We applied sthreads to a range of applications. Most notably, an SSL web server, where we show that sthreads are powerful enough to protect sensitive data even against a strong adversary that can act as a man-in-the-middle in the network, and also exploit most code in the web server; a threat model not addressed to date

    The BG News October 27, 2006

    Get PDF
    The BGSU campus student newspaper October 27, 2006. Volume 97 - Issue 48https://scholarworks.bgsu.edu/bg-news/8665/thumbnail.jp
    corecore