Massachusetts Institute of Technology

Displaying 1-40 of 413 results

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Achieving Non-Inclusive Cache Performance With Inclusive Caches

    Inclusive caches are commonly used by processors to simplify cache coherence. However, the trade-off has been lower performance compared to non-inclusive and exclusive caches. Contrary to conventional wisdom, the authors show that the limited performance of inclusive caches is mostly due to inclusion victims - lines that are evicted from...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2007

    Continual Hashing for Efficient Fine-Grain State Inconsistency Detection

    Transaction-Level Modeling (TLM) allows a designer to save functional verification effort during the modular refinement of an SoC by reusing the prior implementation of a module as a golden model for state inconsistency detection. One problem in simulation-based verification is the performance and bandwidth overhead of state dump and comparison...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2006

    Implementing a Functional/Timing Partitioned Microprocessor Simulator with an FPGA

    When creating a microarchitectural simulator, one desires three things: confidence in correctness, speed of design, and speed of simulation. The first requirement is necessary for accurate experimentation. The second impacts the architect's ability to perform microarchitectural exploration by rapidly describing a range of systems. The third affects the number of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Asymptotic Interference Alignment for Optimal Repair of MDS codes in Distributed Data Storage

    In distributed storage systems, Maximum Distance Separable (MDS) erasure codes are well-known coding schemes that can offer maximum reliability for a given storage overhead. Consider a scenario where a file of size M is to be stored in n distributed storage nodes. The file is split into k equal parts...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2011

    Polynomial Length MDS Codes With Optimal Repair in Distributed Storage

    Erasure coding is a fundamental technique to build redundancy in distributed storage systems. In classical literature in coding theory, erasure codes have been developed so that they provide the maximum tolerance to disk failure (erasures) for a given storage overhead. In particular, it is well known that Maximum Distance Separable...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Multithreaded Simulation to Increase Performance Modeling Throughput on Large Compute Grids

    Simulation for performance modeling of computer architectures is a compute intensive operation requiring many compute resources and CPU cycles. Typical usage models involve running multiple sequential jobs across multiple machines. Multithreading can be used to speed up individual simulation jobs, but only provides higher throughput than multiprogramming on large workloads...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Designing Energy-Efficient Low-Diameter On-Chip Networks with Equalized Interconnects

    In a power and area constrained multicore system, the on-chip communication network needs to be carefully designed to maximize the system performance and programmer productivity while minimizing energy and area. In this paper, the authors explore the design of energy-efficient low-diameter networks (flattened butterfly and Clos) using equalized on-chip interconnects....

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2011

    A Low-Swing Crossbar and Link Generator for Low-Power Networks-on-Chip

    Network-on-Chips (NoCs) are emerging as the answer to non-scalable buses for connecting multiple cores in Chip Multi-Processors (CMPs), and multiple IP blocks in Multi-Processor System-on-Chips (MPSoCs). These networks require an extremely low-power datapath to ensure sustained scalability, and higher performance/watt. Crossbars and links form the core of a network datapath,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    SWIFT: A SWing-Reduced Interconnect for a Token-Based Network-on-Chip in 90nm CMOS

    With the advent of Chip Multi-Processors (CMPs), on-chip networks are critical for providing low-power communications that scale to high core counts. With this motivation, the authors present a 64-bit, 8x8 mesh Network-on-Chip (NoC) in 90nm CMOS that: bypasses flit buffering in routers using Token Flow Control, thereby reducing buffer power...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Physical Vs. Virtual Express Topologies with Low-Swing Links for Future Many-Core NoCs

    The number of cores present on-chip is increasing rapidly. The on-chip network that connects these cores needs to scale efficiently. The topology of on-chip networks is an important design choice that affects how these networks scale. Most current on-chip networks use 2-D mesh topologies which do not scale due to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2007

    Joint Scheduling of Rate-Guaranteed and Best-Effort Users over aWireless Fading Channel

    The authors address multi-user scheduling over the downlink channel in wireless data systems. Specifically, they consider a time-slotted system with a single transmitter serving multiple users, where the channel condition of each user is time varying. Based on the throughput requirements, the user set is divided into two classes throughput...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2012

    Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay

    The authors consider the optimal control problem for networks subjected to time-varying channels, reconfiguration delays, and interference constraints. They model the network by a graph consisting of nodes, links, and a set of link interference constraints, where based on the current network state, the controller decides either to stay with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Controlled Mobility in Stochastic and Dynamic Wireless Networks

    The authors consider the use of controlled mobility in wireless networks where messages arriving randomly in time and space are collected by mobile receivers (collectors). The collectors are responsible for receiving these messages via wireless communication by dynamically adjusting their position in the network. Their goal is to utilize a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2006

    Fair Allocation of a Wireless Fading Channel: An Auction Approach

    The authors study the use of auction algorithm in allocating a wireless fading channel among a set of non-cooperating users in both downlink and uplink communication scenarios. For the downlink case, they develop a novel auction-based algorithm to allow users to fairly compete for a wireless fading channel. They use...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    The Reliability Value of Storage in a Volatile Environment

    In this paper, the authors examine the value of storage in securing reliability of a system with uncertain supply and demand, and supply friction. The storage is frictionless as a supply source, but once used, it cannot be filled up instantaneously. The focus application is a power supply network in...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2002

    Dispersed Employment, Commuting, and Mixed Land-Use in Modern Cities

    This paper has two objectives. The first is to review a range of empirical evidence that suggests this vision of urban form is largely incorrect. Over time, in most cities, real estate rents and asset prices grow little more than inflation. In addition, recently released data on the spatial distribution...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2000

    Ski Resort Real Estate Markets: Why Not to Invest

    This paper examines the behavior of ski resort property in a major New England market over the last 25 years. A property price series is constructed for the Loon Mountain resort, which is believed to be quite typical of New England Ski areas. This series reveals that nominal prices are...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2004

    Hiding and Revealing in Online Poker Games

    Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to the psychological aspect of the game, making the games less authentic and less enjoyable than they could be. The paper explores how card...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2004

    The Role of Software in Spacecraft Accidents

    The first and most important step in solving any problem is understanding the problem well enough to create effective solutions. To this end, several software-related spacecraft accidents were studied to determine common systemic factors. Although the details in each accident were different, very similar factors related to flaws in the...

    Provided By Massachusetts Institute of Technology

  • Tools & Templates // May 2006

    Project Control Book

    This is a template for project control book.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    A Distributed Wearable, Wireless Sensor System for Evaluating Professional Baseball Pitchers and Batters

    This paper introduces a compact, wireless, wearable system that measures signals indicative of forces, torques and other descriptive and evaluative features that the human body undergoes during bursts of extreme physical activity (such as during athletic performance). Standard approaches leverage high-speed camera systems, which need significant infrastructure and provide limited...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Locating Cache Performance Bottlenecks Using Data Profiling

    Every organization understands the need of effective use of CPU data caches to ensure good performance. Yet, this is made difficult due to the fact that it is extremely tough to spot poor cache patterns with the existing execution profiling tools. Typical profilers attribute costs to specific code locations. It...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

    Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Efficient Cache Coherence on Manycore Optical Networks

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Institutional Foundations for Cyber Security: Current Responses and New Challenges

    This paper profiles institutions that are responsible for addressing threats to cyber security. Rather than focusing primarily on the private sector, the authors analyze key organizations at the national, international, and intergovernmental level. The purpose is to highlight emerging responses and challenges, while simultaneously evaluating the strengths and weaknesses of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Mobile Broadband and Implications for Broadband Competition and Adoption

    The growth of wireless mobile broadband has the potential to drive significant new growth in Internet applications, services, and equipment markets. It is likely to represent as important a change for the Internet as the transition from dial-up to broadband, fundamentally changing the landscape for broadband Internet access by adding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes

    This paper describes a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    ATAC: On-Chip Optical Networks for Multicore Processors

    ˆe trend in modern microprocessor architectures is clear: multicore is here. As silicon resources become increasingly abundant, processor designers are able to place more and more cores on a chip: AMD and Intel have released 2-core chips with 4-core offerings coming soon. Forecasts show that by 2014, processors may contain...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Secure Network Coding for Multi-Resolution Wireless Video Streaming

    Emerging practical schemes indicate that algebraic mixing of different packets by means of random linear network coding can increase the throughput and robustness of streaming services over wireless networks. However, concerns with the security of wireless video, in particular when only some of the users are entitled to the highest...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Towards An Integration Of The Lean Enterprise System, Total Quality Management, Six Sigma And Related Enterprise Process Improvement Methods

    The lean enterprise system, total quality management, six sigma, theory of constraints, agile manufacturing, and business process reengineering have been introduced as universally applicable best methods to improve the performance of enterprise operations through continuous process improvement and systemic planned enterprise change. Generally speaking, they represent practice-based, rather than theory-grounded,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Disciplined Agility For Process Control & Automation

    Process Automation systems can impact the operating cost of manufacturing equipment, the safe control of large quantities of energy and the safety of dangerous substances used during manufacturing. The manufacturing segment expects greater automation of larger processes, increased capability of process automation systems, and higher quality of those systems. At...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Lean Visual Management In An ERP/MES-Controlled Production Cell

    As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Mitigating The Risk Of A New Workforce By Reducing Rework And Rightsizing On Hand Inventory

    Dramatically increasing the hourly workforce at a rapid pace to support accelerated product demand in an aircraft manufacturing facility in a short amount of time resulted in: increased rework, and increased part damage during assembly. The majority of rework results from simple workmanship mistakes from the new workforce. The approach...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Understanding Enterprise Behavior Using Hybrid Simulation Of Enterprise Architecture

    Today, the design of business enterprises is much more art than science. The complex structure and behavior of enterprises makes it difficult to untangle cause and effect amidst its components and their relationships. In order for managers to understand how an enterprise's architecture affects its behavior, they need tools and...

    Provided By Massachusetts Institute of Technology