Massachusetts Institute of Technology

Displaying 1-40 of 394 results

  • White Papers // Jan 2015

    Augmented Reality Through Wearable Computing

    Wearable computing moves computation from the desktop to the user. The authors are forming a community of networked wearable computer users to explore, over a long period, the augmented realities that these systems can provide. By adapting its behavior to the user's changing environment, a body-worn computer can assist the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2014

    Call Center Stress Recognition with Person-Specific Models

    Nine call center employees wore a skin conductance sensor on the wrist for a week at work and reported stress levels of each call. Although everyone had the same job profile, they found large differences in how individuals reported stress levels, with similarity from day-to-day within the same participant, but...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2014

    Measuring Affective-Cognitive Experience and Predicting Market Success

    In this paper, the authors present a new Affective-Behavioral-Cognitive (ABC) framework to measure the usual cognitive self-report information and behavioral information, together with affective information while a customer makes repeated selections in a random-outcome two-option decision task to obtain their preferred product. The affective information consists of human-labeled facial expression...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Peer-to-Peer Communication Across Network Address Translators

    Network Address Translation (NAT) causes well-known difficulties for Peer-To-Peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System

    Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative security measures needed to prevent and respond to cyber-security emergencies. The Exploring Cyber International Relations (ECIR) Data Dashboard project is an...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Legal Challenges and Strategies for Comparison Shopping and Data Reuse

    New technologies have been continuously emerging to enable effective reuse of an ever-growing amount of data on the Web. Innovative firms can leverage the available technologies and data to provide useful services. Comparison-shopping services are an example of reusing existing data to make bargain-finding easier. Certain reuses have caused conflicts...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    How to Construct a Correct and Scalable IBGP Conguration

    The Internet's current inter domain routing protocol, BGP (Border Gateway Protocol), has two modes of operation: eBGP (external BGP), used to exchange routing information between autonomous systems, and iBGP (internal BGP), used to propagate that information within an Autonomous System (AS). In a "Full mesh" iBGP configuration, every router has...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2008

    Global Television

    There's a lot that seems familiar on TV in other countries, and indeed, as these panelists recount, there's been a flow across borders of TV content and style nearly as long as the medium's been around.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2008

    The Way David Macaulay Works: Finding Ideas, Making Books And Visualizing Our World

    This webcast feels akin to a new Disney ride: During your tour inside the presenter's imagination, prepare to soar over Rome's great monuments, raft within the human body's circulatory system, and dismantle and rebuild the Empire State Building.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2007

    Is There A Black Architect In The House?

    "If there is any kind of profession that's gotten away with a kind of benign neglect of diversifying itself over the course of last 30 years, it's architecture," says the presenter. With one chart after another, he plots the dismal record of design schools, firms and professional associations in modifying...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Network Coding for Multi-Resolution Multicast

    Multi-resolution codes enable multicast at different rates to different receivers, a setup that is often desirable for graphics or video streaming. The authors propose a simple, distributed, two-stage message passing algorithm to generate network codes for single-source multicast of multi-resolution codes. The goal of this pushback algorithm is to maximize...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Collision Helps: Algebraic Collision Recovery for Wireless Erasure Networks

    Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recovering the original packets from multiple collisions. In this paper, the authors present an algebraic representation of collisions which allows them to view each...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Fleets: Scalable Services in a Factored Operating System

    Current monolithic operating systems are designed for uniprocessor systems, and their architecture reflects this. The rise of multicore and cloud computing is drastically changing the tradeoffs in operating system design. The culture of scarce computational resources is being replaced with one of abundant cores, where spatial layout of processes supplants...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    CryptDB: A Practical Encrypted Relational DBMS

    CryptDB is a DBMS that provides provable and practical privacy in the face of a compromised database server or curious database administrators. CryptDB works by executing SQL queries over encrypted data. At its core are three novel ideas: an SQL-aware encryption strategy that maps SQL operations to encryption schemes, adjustable...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    SoftCast: Clean-Slate Scalable Wireless Video

    Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional design however forces the source to pick a single bit rate and degrades sharply when the channel cannot...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Core Count Vs Cache Size for Manycore Architectures in the Cloud

    The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core memory bandwidth to decrease as process technology advances. Continuing per-core off-chip bandwidth...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    A Unified Operating System for Clouds and Manycore: Fos

    Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for manycore and cloud systems face similar challenges. This paper identifies these shared challenges and introduces them solution:...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Understanding and Supporting Directed Content Sharing on the Web

    To find interesting, personally relevant web content, the authors often rely on friends and colleagues to pass links along as they encounter them. This paper studies and augments link-sharing via e-mail, the most popular means of sharing web content today. Armed with survey data indicating that active sharers of novel...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Whanaungatanga: Sybil-Proof Routing With Social Networks

    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Middleboxes No Longer Considered Harmful

    Intermediate network elements, such as Network Address Translators (NATs), firewalls, and transparent caches are now commonplace. The usual reaction in the network architecture community to these so-called middleboxes is a combination of scorn (because they violate important architectural principles) and dismay (because these violations make the Internet less flexible). While...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Technology: Do Kids Need More or Less?

    The ultimate questions for this Sandbox 2011 panel, posed by the presenter, are "Where is technology not working? When is technology not the answer?" That's a bold agenda for a panel of children's media creators and a roomful of other producers in the industry, from Sesame Workshop, WGBH, 360 Kid,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Learning 3.0: Why Technology Belongs in Every Classroom

    The Obama Administration's recently unveiled plan for transforming American education through technology does not envision "Plugging kids in and making them smarter," declares the presenter. Instead, it focuses on leveraging aspects of digital technology "To create way more compelling environments in schools," and to address educational inequities and the larger...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Cache Replacement Policies for Multicore Processors

    Almost all of the modern computers use multiple cores, and the number of cores is expected to increase as hardware prices go down, and Moore's law fails to hold. Most of the theoretical algorithmic work so far has focused on the setting where multiple cores are performing the same task....

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol

    Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify, but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as the authors show in this paper, the only...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Proof-Carrying Data and Hearsay Arguments From Signature Cards

    Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special cases include integrity of programs running on untrusted platforms, various forms of confidentiality and side-channel resilience, and domain-specific invariants. The authors propose a new...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    On the Geometry of Wireless Network Multicast in 2-D

    The authors provide a geometric solution to the problem of optimal relay positioning to maximize the multicast rate for low-SNR networks. The network they consider consists of a single source, multiple receivers and the only intermediate and locatable node as the relay. They construct network the hypergraph of the system...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Dos and Don'ts of Client Authentication on the Web

    Client authentication has been a continuous source of problems on the web. Although many well-studied techniques exist for authentication, websites continue to use extremely weak authentication schemes, especially in non-enterprise environments such as store fronts. These weaknesses often result from careless use of authenticators within Web cookies. Of the twenty-seven...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Collections, Cardinalities, and Relations

    Logics that involve collections (sets, multisets), and cardinality constraints are useful for reasoning about unbounded data structures and concurrent processes. To make such logics more useful in verification this paper extends them with the ability to compute direct and inverse relation and function images. The authors establish decidability and complexity...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Detecting Evolving Patterns of Self-Organizing Networks by Flow Hierarchy Measurement

    Hierarchies occur widely in evolving self-organizing ecological, biological, technological and social networks, but detecting and comparing hierarchies is difficult. Here the authors present a metric and technique to quantitatively assess the extent to which self-organizing directed networks exhibit a flow hierarchy. Flow hierarchy is a commonly observed but theoretically overlooked...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    History, Expectations, And Leadership In Evolution Of Cooperation

    The authors study the evolution of the social norm of "Cooperation" in a dynamic environment. Each agent lives for two periods and interacts with agents from the previous and next generations via a coordination game. "History" matters because agents only receive noisy information about the play of the previous generation...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Opinion Fluctuations And Disagreement In Social Networks

    The authors study a stochastic gossip model of continuous opinion dynamics in a society consisting of two types of agents: regular agents, who update their beliefs according to information that they receive from their social neighbors; and stubborn agents, who never update their opinions and might represent leaders, political parties...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Automatically Patching Errors in Deployed Software

    The authors present ClearView, a system for automatically patching errors in deployed software. ClearView works on stripped Windows x86 binaries without any need for source code, debugging information, or other external information, and without human intervention. ClearView observes normal executions to learn invariants that characterize the application's normal behavior, uses...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Design and Performance of Multipath MIN Architecture

    In this paper, the authors discuss the use of multipath Multistage Interconnection Networks (MINs) in the design of a fault-tolerant parallel computer. Multipath networks have multiple paths between any input and any output. In particular, they examine networks with either the property of expansion or maximal-fanout. The authors present a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Detecting BGP Configuration Faults With Static Analysis

    The Internet is composed of many independent Autonomous Systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. Faults in BGP configuration can cause forwarding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Guidelines for Interdomain Traffic Engineering

    Network operators must have control over the flow of traffic into, out of, and across their networks. However, the Border Gateway Protocol (BGP) does not facilitate common traffic engineering tasks, such as balancing load across multiple links to a neighboring AS or directing traffic to a different neighbor. Solving these...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Practical Verification Techniques for Wide-Area Routing

    Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "Correct" operation of BGP. BGP's distributed dependencies cause small configuration mistakes or oversights to spur complex errors, which sometimes have devastating effects on global connectivity. These errors are often...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    An Empirical Study of "Bogo" Route Advertisements

    An important factor in the robustness of the inter-domain routing system is whether the routers in Autonomous Systems (ASes) filter routes for "Bogon" address space - i.e., private address space and address space that has not been allocated by the Internet Assigned Numbers Authority (IANA). This paper presents an empirical...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Securing the Borealis Data Stream Engine

    As Data Stream Management Systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper the authors present an approach to secure DSMSs. They propose a general security framework and an access control model to secure DSMSs. The authors implement...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2010

    Robust Routing for Local Area Optical Access Networks

    One approach to providing the benefits of the high data rates afforded by optics is to attempt to implement traditional electronic and electro-optic approaches using optical technologies. In electronics, operations such as buffering, adding packets and dropping packets, or merging packet streams, are done with ease. In optics, however, buffering...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    No Bits Left Behind

    One of the key tenets of database system design is making efficient use of storage and memory resources. However, existing database system implementations are actually extremely wasteful of such resources; for example, most systems leave a great deal of empty space in tuples, index pages, and data pages, and spend...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Wealth Accumulation And Factors Accounting For Success

    The authors use detailed income, balance sheet, and cash flow statements constructed for households in a long monthly panel in an emerging market economy, and some recent contributions in economic theory, to document and better understand the factors underlying success in achieving upward mobility in the distribution of net worth....

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Scheduling Policies for Single-Hop Networks With Heavy-Tailed Traffic

    The area of control of communication networks is one of the most active and fruitful fields of research in recent years, including several elaborate and interconnected forms of control, such as congestion control, routing, scheduling and power control. Much of the theoretical foundation regarding network stability was laid out in...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    The Impact of Queue Length Information on Buffer Overflow in Parallel Queues

    The authors consider a system consisting of N parallel queues, served by one server. Time is slotted, and the server serves one of the queues in each time slot, according to some scheduling policy. In the first part of the paper, they characterize the buffer overflow exponents and the likeliest...

    Provided By Massachusetts Institute of Technology