Abstract

One of the most important challenges for network administrators is the identification of applications behind the Internet traffic. This identification serves for many purposes as in network security, traffic engineering and monitoring. The classical methods based on standard port [...]

Abstract

This report provides an estimate of the leak rate from the emergency pump well in L-basin that is to be expected during an off-normal event. This estimate is based on expected shrinkage of the engineered grout (i.e., controlled low strength material) used to fill the emergency pump [...]