James W. Landry
Sandia National Laboratories
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by James W. Landry.
Physical Review E | 2006
Chris H. Rycroft; Gary S. Grest; James W. Landry; Martin Z. Bazant
Pebble-bed nuclear reactor technology, which is currently being revived around the world, raises fundamental questions about dense granular flow in silos. A typical reactor core is composed of graphite fuel pebbles, which drain very slowly in a continuous refueling process. Pebble flow is poorly understood and not easily accessible to experiments, and yet it has a major impact on reactor physics. To address this problem, we perform full-scale, discrete-element simulations in realistic geometries, with up to 440,000 frictional, viscoelastic 6-cm-diam spheres draining in a cylindrical vessel of diameter 3.5m and height 10 m with bottom funnels angled at 30 degrees or 60 degrees. We also simulate a bidisperse core with a dynamic central column of smaller graphite moderator pebbles and show that little mixing occurs down to a 1:2 diameter ratio. We analyze the mean velocity, diffusion and mixing, local ordering and porosity (from Voronoi volumes), the residence-time distribution, and the effects of wall friction and discuss implications for reactor design and the basic physics of granular flow.
Physical Review E | 2003
James W. Landry; Gary S. Grest; Leonardo E. Silbert; Steven J. Plimpton
The structure and stresses of static granular packs in cylindrical containers are studied by using large-scale discrete element molecular dynamics simulations in three dimensions. We generate packings by both pouring and sedimentation and examine how the final state depends on the method of construction. The vertical stress becomes depth independent for deep piles and we compare these stress depth profiles to the classical Janssen theory. The majority of the tangential forces for particle-wall contacts are found to be close to the Coulomb failure criterion, in agreement with the theory of Janssen, while particle-particle contacts in the bulk are far from the Coulomb criterion. In addition, we show that a linear hydrostaticlike region at the top of the packings unexplained by the Janssen theory arises because most of the particle-wall tangential forces in this region are far from the Coulomb yield criterion. The distributions of particle-particle and particle-wall contact forces P(f) exhibit exponential-like decay at large forces in agreement with previous studies.
Physics of Fluids | 2003
Leonardo E. Silbert; James W. Landry; Gary S. Grest
The rheology of granular particles in an inclined plane geometry is studied using three dimensional molecular dynamics simulations. The flow–no-flow boundary is determined for piles of varying heights over a range of inclination angles θ. Three angles determine the phase diagram: θr, the angle of repose, is the angle at which a flowing system comes to rest; θm, the maximum angle of stability, is the inclination required to induce flow in a static system; and θmax is the maximum angle for which stable, steady state flow is observed. In the stable flow region θr<θ<θmax, three flow regimes can be distinguished that depend on how close θ is to θr: (i) θ≫θr: Bagnold rheology, characterized by a mean particle velocity vx in the direction of flow that scales as vx∝h3/2, for a pile of height h, (ii) θ≳θr: The slow flow regime, characterized by a linear velocity profile with depth, and (iii) θ≈θr: Avalanche flow characterized by a slow underlying creep motion combined with occasional free surface events and large ...
Physical Review E | 2002
Leonardo E. Silbert; Gary S. Grest; James W. Landry
Simulated granular packings with different particle friction coefficient mu are examined. The distribution of the particle-particle and particle-wall normal and tangential contact forces P(f) are computed and compared with existing experimental data. Here f identical with F/(-)F is the contact force F normalized by the average value (-)F. P(f) exhibits exponential-like decay at large forces, a plateau/peak near f=1, with additional features at forces smaller than the average that depend on mu. Additional information beyond the one-point force distribution functions is provided in the form of the force-force spatial distribution function and the contact point radial distribution function. These quantities indicate that correlations between forces are only weakly dependent on friction and decay rapidly beyond approximately three particle diameters. Distributions of particle-particle contact angles show that the contact network is not isotropic and only weakly dependent on friction. High force-bearing structures, or force chains, do not play a dominant role in these three-dimensional, unloaded packings.
Physical Review E | 2004
James W. Landry; Gary S. Grest
The effects of movement of the side walls of a confined granular packing are studied by discrete element, molecular dynamics simulations. The dynamical evolution of the stress is studied as a function of wall movement both in the direction of gravity as well as opposite to it. For all wall velocities explored, the stress in the final state of the system after wall movement is fundamentally different from the original state obtained by pouring particles into the container and letting them settle under the influence of gravity. The original packing possesses a hydrostaticlike region at the top of the container which crosses over to a depth-independent stress. As the walls are moved in the direction opposite to gravity, the saturation stress first reaches a minimum value independent of the wall velocity, then increases to a steady-state value dependent on the wall velocity. After wall movement ceases and the packing reaches equilibrium, the stress profile fits the classic Janssen form for high wall velocities, while some deviations remain for low wall velocities. The wall movement greatly increases the number of particle-wall and particle-particle forces at the Coulomb criterion. Varying the wall velocity has only small effects on the particle structure of the final packing so long as the walls travel a similar distance.
computer and communications security | 2018
Benjamin E. Ujcich; Samuel Jero; Anne Edmundson; Qi Wang; Richard Skowyra; James W. Landry; Adam M. Bates; William H. Sanders; Cristina Nita-Rotaru; Hamed Okhravi
Software-defined networking (SDN) continues to grow in popularity because of its programmable and extensible control plane realized through network applications (apps). However, apps introduce significant security challenges that can systemically disrupt network operations, since apps must access or modify data in a shared control plane state. If our understanding of how such data propagate within the control plane is inadequate, apps can co-opt other apps, causing them to poison the control planes integrity. We present a class of SDN control plane integrity attacks that we call cross-app poisoning (CAP), in which an unprivileged app manipulates the shared control plane state to trick a privileged app into taking actions on its behalf. We demonstrate how role-based access control (RBAC) schemes are insufficient for preventing such attacks because they neither track information flow nor enforce information flow control (IFC). We also present a defense, ProvSDN, that uses data provenance to track information flow and serves as an online reference monitor to prevent CAP attacks. We implement ProvSDN on the ONOS SDN controller and demonstrate that information flow can be tracked with low-latency overheads.
annual computer security applications conference | 2017
Richard Skowyra; Steven R. Gomez; David Bigelow; James W. Landry; Hamed Okhravi
Computer security has long been an arms race between attacks and defenses. While new defenses are proposed and built to stop specific vectors of attacks, novel, sophisticated attacks are devised by attackers to bypass them. This rapid cycle of defenses and attacks has made it difficult to strategically reason about the protection offered by each defensive technique, the coverage of a set of defenses, and possible new vectors of attack for which to design future defenses. In this work, we present QUASAR, a framework that systematically analyzes attacks and defenses at the granularity of the capabilities necessary to mount the attacks. We build a model of attacks in the memory corruption domain, and represent various prominent defenses in this domain. We demonstrate that QUASAR can be used to compare defenses at a fundamental level (what they do instead of how they do it), reason about the coverage of a defensive configuration, and hypothesize about possible new attack strategies. We show that of the top five hypothesized new attack strategies, in fact, four have been published in security venues over the past two years. We investigate the fifth hypothesized vector ourselves and demonstrate that it is, in fact, a viable vector of attack.
Powder Technology | 2004
James W. Landry; Gary S. Grest; Stephen J. Plimpton
Physical Review E | 2006
Chris H. Rycroft; Martin Z. Bazant; Gary S. Grest; James W. Landry
dependable systems and networks | 2018
Richard Skowyra; Lei Xu; Guofei Gu; Veer Dedhia; Thomas Hobson; Hamed Okhravi; James W. Landry