18 research outputs found

    Installation Practices of California HVAC Contractors: Implications for Residential Building Codes

    Get PDF
    This report documents a study that was conducted by XENERGY. Inc. for the CEC and a consortium of California utilities. The utilities primarily involved in the study were Pacific Gas and Electric Company (PG and E), Sacramento Municipal Utility District (SMUD), Southern California Edison Company (SEC), and Southern California Gas Company (SCG)

    User's guide to SERICPAC: A computer program for calculating electric-utility avoided costs rates

    No full text
    SERICPAC is a computer program developed to calculate average avoided cost rates for decentralized power producers and cogenerators that sell electricity to electric utilities. SERICPAC works in tandem with SERICOST, a program to calculate avoided costs, and determines the appropriate rates for buying and selling of electricity from electric utilities to qualifying facilities (QF) as stipulated under Section 210 of PURA. SERICPAC contains simulation models for eight technologies including wind, hydro, biogas, and cogeneration. The simulations are converted in a diversified utility production which can be either gross production or net production, which accounts for an internal electricity usage by the QF. The program allows for adjustments to the production to be made for scheduled and forced outages. The final output of the model is a technology-specific average annual rate. The report contains a description of the technologies and the simulations as well as complete user's guide to SERICPAC

    Support of Explicit Time and Event Flows in the Object-Oriented Visualization Toolkit MAM/VRS

    No full text
    We present an object-oriented architecture of a visualization toolkit which integrates geometric modeling and behavioral modeling. It is based on sharing graphics objects between geometrical scene descriptions and descriptions for the flow of time and events. We discuss the properties graphics objects should possess in such a system so that they can be used by different rendering toolkits and can be linked to time- and event-dependent processes. We introduce a new methodology for the symmetric modeling of geometry and behavior based on geometry graphs and behavior graphs

    Interprocedural analysis for privileged code placement and tainted variable detection

    No full text
    Abstract. In Java 2 and Microsoft.NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted clients. Since an untrusted client will be on the call stack when access control is enforced, an access-restricted operation will not succeed unless the client is authorized. To avoid this, a portion of the trusted code can be made “privileged. ” When access control is enforced, privileged code causes the stack traversal to stop at the trusted code frame, and the untrusted code stack frames will not be checked for authorization. For large programs, manually understanding which portions of code should be made privileged is a difficult task. Developers must understand which authorizations will implicitly be extended to client code and make sure that the values of the variables used by the privileged code are not “tainted” by client code. This paper presents an interprocedural analysis for Java bytecode to automatically identify which portions of trusted code should be made privileged, ensure that there are no tainted variables in privileged code, and detect “unnecessary ” and “redundant ” privileged code. We implemented the algorithm and present the results of our analyses on a set of large programs. While the analysis techniques are in the context of Java code, the basic concepts are also applicable to non-Java systems with a similar authorization model
    corecore