Massachusetts Institute of Technology

Displaying 1-40 of 424 results

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Multithreaded Simulation to Increase Performance Modeling Throughput on Large Compute Grids

    Simulation for performance modeling of computer architectures is a compute intensive operation requiring many compute resources and CPU cycles. Typical usage models involve running multiple sequential jobs across multiple machines. Multithreading can be used to speed up individual simulation jobs, but only provides higher throughput than multiprogramming on large workloads...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Physical Layer-Aware Wireless Link Layer Protocols

    With wireless devices becoming ubiquitous, the problem of designing high performance and reliable wireless networks is of great importance today. Wireless links are characterized by a rapidly varying channel, requiring transmitters to dynamically adapt their transmit bit rate. The broadcast nature of radio also necessitates the use of medium access...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Network-Wide BGP Route Prediction for Traffic Engineering

    The Internet consists of about 13,000 Autonomous Systems (AS's) that exchange routing information using the Border Gateway Protocol (BGP). The operators of each AS must have control over the flow of traffic through their network and between neighboring AS's. However, BGP is a complicated, policy-based protocol that does not include...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Disciplined Agility For Process Control & Automation

    Process Automation systems can impact the operating cost of manufacturing equipment, the safe control of large quantities of energy and the safety of dangerous substances used during manufacturing. The manufacturing segment expects greater automation of larger processes, increased capability of process automation systems, and higher quality of those systems. At...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Lean Visual Management In An ERP/MES-Controlled Production Cell

    As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Mitigating The Risk Of A New Workforce By Reducing Rework And Rightsizing On Hand Inventory

    Dramatically increasing the hourly workforce at a rapid pace to support accelerated product demand in an aircraft manufacturing facility in a short amount of time resulted in: increased rework, and increased part damage during assembly. The majority of rework results from simple workmanship mistakes from the new workforce. The approach...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Understanding Enterprise Behavior Using Hybrid Simulation Of Enterprise Architecture

    Today, the design of business enterprises is much more art than science. The complex structure and behavior of enterprises makes it difficult to untangle cause and effect amidst its components and their relationships. In order for managers to understand how an enterprise's architecture affects its behavior, they need tools and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Enabling Cultural Shifts: An Enterprise Approach Toward Lean Thinking

    The Supply Planning Operations team, in a large manufacturing firm, faced a future where their complexity of scope was increasing without an increase in resource levels. As an effort to improve both efficiency and effectively within the organization, they chose to adopt Lean Thinking as a method to streamline and...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    A Screening Model To Explore Planning Decisions In Automotive Manufacturing Systems Under Demand Uncertainty

    Large-scale, complex engineering systems, as for automotive manufacturing, often require significant capital investment and resources for systems configuration. Furthermore, these systems operate in environments that are constantly changing due to shifts in macroeconomic, market demand and regulations, which can significantly influence systems' performance. It is often very difficult or prohibitively...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Electricity Transmission Policy For America: Enabling A Smart Grid, End-to-End

    This paper proposes a framework of policies to guide the future development of America's electric transmission grid so that the electric power industry will be able to serve more effectively the changing needs of the U.S. economy and society. The paper provides a factual overview of the American electric power...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Sustainable Accessibility: A Grand Challenge For The World And For MIT

    Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Leading Through Adversity

    Few Companies have endured such hardship or risen to such heights in a brief span of time as Akamai Technologies. Paul Sagan tells how he became the CEO of this young firm and helped it survive and then flourish despite "Unimaginable adversity".

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    Automotive Lightweighting As A Strategic Opportunity For India's Automotive Industry

    Suppose you could leapfrog 100 years of experience in the automotive industry and begin a new manufacturing epoch the strategic change you would make is to lightweight the vehicle, observes Charles Fine although steel has been the material of choice for many automotive components since the dawn of the automotive...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    A Policy On Leadership

    Ted Kelly walks a Sloan audience through the process of turning around a failing company. His formula? Develop two key things: a fact based analytical organization and great management teams that value people.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    13 Bankers: The Wall Street Takeover And The Next Financial Meltdown

    In 13 Bankers Johnson, a former chief economist for the International Monetary Fund and co-author James Kwak cite historical precedents offers financial analysis to conclude that a second financial shock is inevitable unless the financial and political stranglehold held on Washington by the nation's biggest banks is broken.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Lunch With A Laureate: Robert Merton

    Merton starts with the breakthrough work that earned him his laurels and which has recently stirred up controversy: derivative& there are "No mysteries" to these financial instruments, insists Merton they are neither complex nor threatening Derivatives are "Nothing more than insurance."

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Evolution Of The Lean Enterprise System: A Critical Synthesis And Agenda For The Future

    Many aerospace enterprises and other organizations have adopted a variety of management approaches to achieve continuous process improvement, enterprise change and transformation, such as the lean enterprise system, Total Quality Management (TQM), Theory Of Constraints (TOC), agile manufacturing, and Business Process Reengineering (BPR). Among them, the lean enterprise system, with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Simulating The Impact Of Strategy Development Frameworks On Transportation Infrastructure System Performance

    This paper develops, through a simulation model, a deeper understanding of the relationship between transportation infrastructure strategy development frameworks and system performance. A strategy development framework for transportation can be characterized by the infrastructure ownership structures, cross-modal and cross-sectoral linkages, revenue sources, resource allocation decision-making processes, and geographic scales of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Financial Development, Gender And Entrepreneurship

    Female entrepreneurs are much less frequent than male entrepreneurs. In this paper the authors investigate a possible culprit: access to financial services. They use a dataset with entrepreneurship rates by opportunity and by need from the Global Entrepreneurship Monitor and indicators of financial institutions from Beck, Demirguc-Kunt and Levine (2000)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    ESD And Health Care Systems: Some Strategic Considerations

    Proper health care delivery to a growing but aging population is becoming one of the most challenging tasks of the time. It becomes also one of the most complexes. Although many tools are at hand, grand designs and implementation systems are mostly lacking. In the industrialized countries, requests for optimal...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The 24-Hour Knowledge Factory Paradigm: The Evolving Model For Offshoring Based On Strategic, Economic, Legal, Health, Technical, And Other Considerations

    The 24-Hour Knowledge Factory paradigm involves 3 (or more) collaborating centers, each located in a different continent. Individuals at each center work from 9 am to 5 pm in that country, and then pass the work-in-progress to the next collaborating center to enable round-the clock performance in a manner somewhat...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2007

    Low-Cost Airports For Low-Cost Airlines: Flexible Design To Manage The Risks

    The paradigm of airport planning and design is changing fundamentally. Low-cost airlines have become significant drivers of airport planning, along with aircraft size and other technical factors. They have different requirements than the "Legacy" carriers. They focus on cost and on alternative ways to handle passengers. Now being sizeable participants...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Experiences and Challenges With Using CERT Data to Analyze International Cyber Security

    With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cyber security data publicly provided...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    The Portuguese High Speed Rail Network; Relating Financing To Strategic And Operating Issues

    This paper describes the implementation of the Portuguese High Speed Rail (HSR) Network. The business model developed by RAVE for the PPP's related with the HSR infrastructure is described and discussed. Following a recently awarded research project (EXPRESS) aimed at studying the strategic aspects related with the implementation of HSR...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2010

    Price Of Airline Frequency Competition

    Frequency competition influences capacity allocation decisions in airline markets and has important implications to airline profitability and airport congestion. Market share of a competing airline is a function of its frequency share and the relationship between the two is pivotal for understanding the impacts of frequency competition on airline business....

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Throughput Optimization in Mobile Backbone Networks

    This paper describes new algorithms for throughput optimization in a mobile backbone network. This hierarchical communication framework combines mobile backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility and communication capability. An important quantity of interest in mobile backbone networks is the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Productivity Differences Between And Within Countries

    The authors document substantial within-country (cross-municipality) differences in incomes for a large number of countries in the Americas. A significant fraction of the within-country differences cannot be explained by observed human capital. They conjecture that the sources of within-country and between-country differences are related. As a first step towards a...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Report: NSF Workshop on Future Wireless Communication Research

    The wireless communication industry is a trillion-dollar, worldwide business that represents a substantial fraction of the global Gross Domestic Product. Over the past two decades, it has had a transformative impact on the society and has revolutionized almost all aspects of human interaction. These networks are inescapably intertwined with the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The Evolution of Internet Congestion

    This paper discusses the evolution of the congestion controls that govern all Internet traffic. In particular the authors chronicle and discuss the implications of the fact that the most significant "Congestion Signals" are increasingly coming from network operators, not the TCP stack. Providers now nudge users into different traffic patterns...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    SCADA for the Rest of Us: Unlicensed Bands Supporting Long-Range Communications

    The authors are on the cusp of the next big wave in Internet and wireless technology for the mass market: the emergence of ubiquitous smart environments capable of automated sensing and interaction with the physical world around one.. A critical ingredient for this future is the deployment and availability of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Hybrid Wireless Broadband

    Wireless access networks are evolving rapidly and hold the promise of significantly altering the landscape for broadband competition. In a companion paper, the authors explained why wireless networks are unlikely to converge toward the sort of broadband platform network exemplified by wired Next Generation Access Networks. In this paper the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    On the Convergence of Wired and Wireless Access Network Architectures

    Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-purpose IP platform with over-the-top services at the application layer, which is similar to the design of wired IP platform networks. This paper examines whether wired...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Understanding Broadband Speed Measurements

    Broadband speed has emerged as the single most commonly cited metric for characterizing the quality of broadband offerings. However speed measurements for the same service can vary significantly. These differences arise from a complex set of factors including different test methodologies and test conditions. For any testing methodology, teasing apart...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Broadband Microfoundations: The Need for Traffic Data

    To date, most of the empirical effort to understand broadband service markets has focused on availability and adoption metrics and data. Data of this sort is indeed valuable when the dominant policy questions concern penetration and uptake. However, as broadband availability and penetration saturate, such data will become less informative....

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Algebraic Network Coding Approach to Deterministic Wireless Relay Networks

    The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and interference. Avestimehr et al. showed that the Min-cut Max-flow theorem holds in the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Competition, Market Coverage, and Quality Choice in Interconnected Platforms

    The authors study duopoly competition between two interconnected Internet Service Providers (ISP) that compete in quality and prices for both Content Providers (CP) and consumers. They develop a game theoretic model using a two-sided market framework, where ISP's are modeled as interconnected plat-forms with quality bottlenecks; a consumer on a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

    The authors study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. The objective is to design a power control scheme that achieves a (near) optimal power allocation with respect to any predetermined network objective (such as the maximization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Accelerated Dual Descent for Network Optimization

    Dual descent methods are commonly used to solve network optimization problems because their implementation can be distributed through the network. However, their convergence rates are typically very slow. This paper introduces a family of dual descent algorithms that use approximate Newton directions to accelerate the convergence rate of conventional dual...

    Provided By Massachusetts Institute of Technology