9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)

Public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing the burden, Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to any penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. This report results from a contract tasking Foundation for Research and Technology, Hellas (FORTH) as follows: The expected results include full understanding of the role of the periodicity on the negative index behavior. Exploitation of this understanding for optimization of Left Handed Materials (LHM) for different functionalities. (b) Negative Index Materials (NIM) operating in the THz regime and upwards. Determination of the frequency limits of the NIM behavior and understanding of the physical mechanism for these limits. Design, modeling, and, possible fabrication and characterization of negative index structures operating in the highest determined frequency limits. Deliverables: Reports on the results (a) and (b) mentioned above, at the end of the project, and interim reports documenting progress.

[1]  Edsger W. Dijkstra,et al.  The structure of the “THE”-multiprogramming system , 1968, CACM.

[2]  References , 1971 .

[3]  James P Anderson,et al.  Computer Security Technology Planning Study , 1972 .

[4]  D.W. Boettner,et al.  The michigan terminal system , 1975, Proceedings of the IEEE.

[5]  John M. Rushby,et al.  Design and verification of secure systems , 1981, SOSP.

[6]  A. Washburn On patrolling a channel , 1982 .

[7]  Rudolf Ruland,et al.  Two years of experience with a μ-Kernel based OS , 1991, OPSR.

[8]  Emin Gün Sirer,et al.  Protection is a software issue , 1995, Proceedings 5th Workshop on Hot Topics in Operating Systems (HotOS-V).

[9]  Úlfar Erlingsson,et al.  SASI enforcement of security policies: a retrospective , 1999, NSPW '99.

[10]  Peter M. Chen,et al.  The systematic improvement of fault tolerance in the Rio file cache , 1999, Digest of Papers. Twenty-Ninth Annual International Symposium on Fault-Tolerant Computing (Cat. No.99CB36352).

[11]  Laurent Réveillère,et al.  Devil: an IDL for hardware programming , 2000, OSDI.

[12]  Dulas Ltd BATTERYLESS PHOTOVOLTAIC REVERSE-OSMOSIS DESALINATION SYSTEM , 2001 .

[13]  Dan Weiner,et al.  Operation experience of a solar- and wind-powered desalination demonstration plant , 2001 .

[14]  Junfeng Yang,et al.  An empirical study of operating systems errors , 2001, SOSP.

[15]  L. Brinson,et al.  DEFENSE TECHNICAL INFORMATION CENTER , 2001 .

[16]  Y. Tripanagnostopoulos,et al.  Hybrid photovoltaic/thermal solar systems , 2002 .

[17]  HarrisTim,et al.  Xen and the art of virtualization , 2003 .

[18]  Martín Abadi,et al.  An Overview of the Singularity Project , 2005 .

[19]  A. Ray,et al.  Optical studies on chemical bath deposited nanocrystalline CdS thin films. , 2005, Journal of nanoscience and nanotechnology.

[20]  Emin Gün Sirer,et al.  Nexus: a new operating system for trustworthy computing , 2005, SOSP '05.

[21]  Gernot Heiser,et al.  User-Level Device Drivers: Achieved Performance , 2005, Journal of Computer Science and Technology.

[22]  Brian N. Bershad,et al.  Improving the reliability of commodity operating systems , 2005, TOCS.

[23]  A. Ray,et al.  Charge transport through a neural network of DNA nanocomposites , 2006 .

[24]  Martín Abadi,et al.  XFI: software guards for system address spaces , 2006, OSDI '06.

[25]  George C. Necula,et al.  SafeDrive: safe and recoverable extensions using language-based techniques , 2006, OSDI '06.

[26]  Gil Neiger,et al.  Intel ® Virtualization Technology for Directed I/O , 2006 .

[27]  Galen C. Hunt,et al.  Solving the starting problem: device drivers as self-describing artifacts , 2006, EuroSys '06.

[28]  Brian N. Bershad,et al.  Recovering device drivers , 2004, TOCS.

[29]  Sriram K. Rajamani,et al.  Thorough static analysis of device drivers , 2006, EuroSys.

[30]  Chris Hawblitzel,et al.  Checking the hardware-software interface in spec# , 2007, PLOS '07.

[31]  Andrew Warfield,et al.  Safe Hardware Access with the Xen Virtual Machine Monitor , 2007 .

[32]  Somesh Jha,et al.  Microdrivers: A New Architecture for Device Drivers , 2007, HotOS.

[33]  Robert Grimm,et al.  Jeannie: granting java native interface developers their wishes , 2007, OOPSLA.

[34]  Somesh Jha,et al.  The design and implementation of microdrivers , 2008, ASPLOS.

[35]  M. Kafesaki,et al.  Compact planar far-field superlens based on anisotropic left-handed metamaterials , 2009 .

[36]  C. Soukoulis,et al.  Repulsive Casimir force in chiral metamaterials. , 2009, Physical review letters.

[37]  M. Kafesaki,et al.  Magnetic response of nanoscale left-handed metamaterials , 2010, 1001.1073.