MACCS2 was developed as a general-purpose tool applicable to diverse reactor and nonreactor facilities licensed by the Nuclear Regulatory Commission or operated by the Department of Energy or the Department of Defense. The MACCS2 package includes three primary enhancements: 1 a more flexible emergency-response model, 2 an expanded library of radionuclides, and 3 a semidynamic food-chain model.
Other improvements are in the areas of phenomenological modeling and new output options. Similar records in OSTI. GOV collections:. Full Record Other Related Research. United States: N. Volume 3 : Includes the full system programming guide, parts 1, 2, 3, and 4. This document allows for easy navigation of the instruction set reference through functional cross-volume table of contents, references, and index. This document allows for easy navigation of the system programming guide through functional cross-volume table of contents, references, and index.
This volume also contains the table of contents for volumes 2A, 2B, 2C, and 2D. This volume also contains the appendices and index support for volumes 2A, 2B, 2C, and 2D. This volume also contains the table of contents for volumes 3A, 3B, 3C and 3D. Volume 3B covers thermal and power management features, debugging, and performance monitoring.
This volume also contains the appendices and indexing support for volumes 3A, 3B, 3C, and 3D. A public repository is available with open source code samples from select chapters of this manual. These code samples are released under a 0-Clause BSD license.
Intel provides additional code samples and updates to the repository as the samples are created and verified. Logic responsible for managing coherency, managing access to the DIMMs, managing power distribution and sleep states, and so forth. Most of these components provide similar performance monitoring capabilities. Speculative Execution Side Channel Mitigations This document provides a detailed explanation of the security vulnerabilities and possible mitigations.
The document provides an overview of x86 hybrid architecture, hybrid core usage with Windows, and provides details on how software applications and drivers can ensure optimal core usage. This document is a work in progress and is subject to change based on customer feedback and internal analysis.
Secure Access of Performance Monitoring Unit by User Space Profilers This paper proposes a software mechanism targeting performance profilers which would run at user space privilege to access performance monitoring hardware.
The latter requires privileged access in kernel mode, in a secure manner without causing unintended interference to the software stack. Product and Performance Information 1 Performance varies by use, configuration and other factors. Give Feedback. This document contains the full instruction set reference, A-Z, in one volume.
This document contains the full system programming guide, parts 1, 2, 3, and 4, in one volume. Describes the format of the instruction and provides reference pages for instructions from A to L.
Includes the safer mode extensions reference. Continues the coverage on system programming subjects begun in volume 3A.
0コメント