Massachusetts Institute of Technology

Displaying 1-40 of 392 results

  • White Papers // Jan 2015

    Augmented Reality Through Wearable Computing

    Wearable computing moves computation from the desktop to the user. The authors are forming a community of networked wearable computer users to explore, over a long period, the augmented realities that these systems can provide. By adapting its behavior to the user's changing environment, a body-worn computer can assist the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2014

    Call Center Stress Recognition with Person-Specific Models

    Nine call center employees wore a skin conductance sensor on the wrist for a week at work and reported stress levels of each call. Although everyone had the same job profile, they found large differences in how individuals reported stress levels, with similarity from day-to-day within the same participant, but...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2014

    Measuring Affective-Cognitive Experience and Predicting Market Success

    In this paper, the authors present a new Affective-Behavioral-Cognitive (ABC) framework to measure the usual cognitive self-report information and behavioral information, together with affective information while a customer makes repeated selections in a random-outcome two-option decision task to obtain their preferred product. The affective information consists of human-labeled facial expression...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2004

    Hiding and Revealing in Online Poker Games

    Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to the psychological aspect of the game, making the games less authentic and less enjoyable than they could be. The paper explores how card...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2002

    Dispersed Employment, Commuting, and Mixed Land-Use in Modern Cities

    This paper has two objectives. The first is to review a range of empirical evidence that suggests this vision of urban form is largely incorrect. Over time, in most cities, real estate rents and asset prices grow little more than inflation. In addition, recently released data on the spatial distribution...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2000

    Ski Resort Real Estate Markets: Why Not to Invest

    This paper examines the behavior of ski resort property in a major New England market over the last 25 years. A property price series is constructed for the Loon Mountain resort, which is believed to be quite typical of New England Ski areas. This series reveals that nominal prices are...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2004

    The Role of Software in Spacecraft Accidents

    The first and most important step in solving any problem is understanding the problem well enough to create effective solutions. To this end, several software-related spacecraft accidents were studied to determine common systemic factors. Although the details in each accident were different, very similar factors related to flaws in the...

    Provided By Massachusetts Institute of Technology

  • Tools & Templates // May 2006

    Project Control Book

    This is a template for project control book.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Efficient Cache Coherence on Manycore Optical Networks

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Institutional Foundations for Cyber Security: Current Responses and New Challenges

    This paper profiles institutions that are responsible for addressing threats to cyber security. Rather than focusing primarily on the private sector, the authors analyze key organizations at the national, international, and intergovernmental level. The purpose is to highlight emerging responses and challenges, while simultaneously evaluating the strengths and weaknesses of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Mobile Broadband and Implications for Broadband Competition and Adoption

    The growth of wireless mobile broadband has the potential to drive significant new growth in Internet applications, services, and equipment markets. It is likely to represent as important a change for the Internet as the transition from dial-up to broadband, fundamentally changing the landscape for broadband Internet access by adding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

    Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Locating Cache Performance Bottlenecks Using Data Profiling

    Every organization understands the need of effective use of CPU data caches to ensure good performance. Yet, this is made difficult due to the fact that it is extremely tough to spot poor cache patterns with the existing execution profiling tools. Typical profilers attribute costs to specific code locations. It...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes

    This paper describes a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    A Policy On Leadership

    Ted Kelly walks a Sloan audience through the process of turning around a failing company. His formula? Develop two key things: a fact based analytical organization and great management teams that value people.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    13 Bankers: The Wall Street Takeover And The Next Financial Meltdown

    In 13 Bankers Johnson, a former chief economist for the International Monetary Fund and co-author James Kwak cite historical precedents offers financial analysis to conclude that a second financial shock is inevitable unless the financial and political stranglehold held on Washington by the nation's biggest banks is broken.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Lunch With A Laureate: Robert Merton

    Merton starts with the breakthrough work that earned him his laurels and which has recently stirred up controversy: derivative& there are "No mysteries" to these financial instruments, insists Merton they are neither complex nor threatening Derivatives are "Nothing more than insurance."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    Financial Services: Prospect For Your Future

    In a lively discussion with Simon Johnson, Lawrence Fish deconstructs the near collapse of the banking system and points out the multiple factors that have contributed to the financial crisis.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2009

    Leadership Amidst Crisis

    In thirty years. S. D. Shibulal has seen his share of economic crises, but in thinking hard about the role of crises in the future for today's students he predicts: they will occur more frequently and will be less predictable, longer lasting and more costly.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Creating A Game Plan For Transition To A Sustainable Economy

    The "Chief inspired protagonist" of one of the nation's oldest and most successful green manufacturers apologizes for delivering a talk "More depressing than expected." While discussing the challenges facing businesses attempting to transition to a more just and sustainable economy, Jeffrey Hollender enumerates the many reasons he's feeling bleak these...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Sustainable Accessibility: A Grand Challenge For The World And For MIT

    Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Leading Through Adversity

    Few Companies have endured such hardship or risen to such heights in a brief span of time as Akamai Technologies. Paul Sagan tells how he became the CEO of this young firm and helped it survive and then flourish despite "Unimaginable adversity".

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    Automotive Lightweighting As A Strategic Opportunity For India's Automotive Industry

    Suppose you could leapfrog 100 years of experience in the automotive industry and begin a new manufacturing epoch the strategic change you would make is to lightweight the vehicle, observes Charles Fine although steel has been the material of choice for many automotive components since the dawn of the automotive...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    Whither Industrial Relations: Does It Have A Future In Post-Industrial Society

    Industrial relations are in trouble. It is in trouble both as a set of institutions and practices, linked to trade unions and collective bargaining and as a scholarly endeavor. The title of talk here, which the author was obliged to provide long in advance, is essentially a place holder for...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Post-2008 Crisis In Labor Standards: Prospects For Labor Regulation Around The World

    Over the course of the last thirty years, government policy has been increasingly dominated by neoclassical economic thought and neoliberal public policies. This has been especially true in the United States, but the trends are evident in one way or another in every part of the world. They reflect in...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Transparent Detection of Computer Malware Using Virtualization

    In this paper, the author explores malware detection using a combination of virtualization- and storage-based intrusion detection techniques. By monitoring disk activity of a virtual machine and correlating that activity to knowledge of the filesystem structure on the virtual machine's disk, an intrusion detection system can react to file changes...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2007

    Low-Cost Airports For Low-Cost Airlines: Flexible Design To Manage The Risks

    The paradigm of airport planning and design is changing fundamentally. Low-cost airlines have become significant drivers of airport planning, along with aircraft size and other technical factors. They have different requirements than the "Legacy" carriers. They focus on cost and on alternative ways to handle passengers. Now being sizeable participants...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2010

    Price Of Airline Frequency Competition

    Frequency competition influences capacity allocation decisions in airline markets and has important implications to airline profitability and airport congestion. Market share of a competing airline is a function of its frequency share and the relationship between the two is pivotal for understanding the impacts of frequency competition on airline business....

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Evolution Of The Lean Enterprise System: A Critical Synthesis And Agenda For The Future

    Many aerospace enterprises and other organizations have adopted a variety of management approaches to achieve continuous process improvement, enterprise change and transformation, such as the lean enterprise system, Total Quality Management (TQM), Theory Of Constraints (TOC), agile manufacturing, and Business Process Reengineering (BPR). Among them, the lean enterprise system, with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Simulating The Impact Of Strategy Development Frameworks On Transportation Infrastructure System Performance

    This paper develops, through a simulation model, a deeper understanding of the relationship between transportation infrastructure strategy development frameworks and system performance. A strategy development framework for transportation can be characterized by the infrastructure ownership structures, cross-modal and cross-sectoral linkages, revenue sources, resource allocation decision-making processes, and geographic scales of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Financial Development, Gender And Entrepreneurship

    Female entrepreneurs are much less frequent than male entrepreneurs. In this paper the authors investigate a possible culprit: access to financial services. They use a dataset with entrepreneurship rates by opportunity and by need from the Global Entrepreneurship Monitor and indicators of financial institutions from Beck, Demirguc-Kunt and Levine (2000)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    ESD And Health Care Systems: Some Strategic Considerations

    Proper health care delivery to a growing but aging population is becoming one of the most challenging tasks of the time. It becomes also one of the most complexes. Although many tools are at hand, grand designs and implementation systems are mostly lacking. In the industrialized countries, requests for optimal...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The 24-Hour Knowledge Factory Paradigm: The Evolving Model For Offshoring Based On Strategic, Economic, Legal, Health, Technical, And Other Considerations

    The 24-Hour Knowledge Factory paradigm involves 3 (or more) collaborating centers, each located in a different continent. Individuals at each center work from 9 am to 5 pm in that country, and then pass the work-in-progress to the next collaborating center to enable round-the clock performance in a manner somewhat...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    The Portuguese High Speed Rail Network; Relating Financing To Strategic And Operating Issues

    This paper describes the implementation of the Portuguese High Speed Rail (HSR) Network. The business model developed by RAVE for the PPP's related with the HSR infrastructure is described and discussed. Following a recently awarded research project (EXPRESS) aimed at studying the strategic aspects related with the implementation of HSR...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Towards An Integration Of The Lean Enterprise System, Total Quality Management, Six Sigma And Related Enterprise Process Improvement Methods

    The lean enterprise system, total quality management, six sigma, theory of constraints, agile manufacturing, and business process reengineering have been introduced as universally applicable best methods to improve the performance of enterprise operations through continuous process improvement and systemic planned enterprise change. Generally speaking, they represent practice-based, rather than theory-grounded,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Lean Visual Management In An ERP/MES-Controlled Production Cell

    As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Secure Network Coding for Multi-Resolution Wireless Video Streaming

    Emerging practical schemes indicate that algebraic mixing of different packets by means of random linear network coding can increase the throughput and robustness of streaming services over wireless networks. However, concerns with the security of wireless video, in particular when only some of the users are entitled to the highest...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Matching With Couples: Stability And Incentives In Large Markets

    Accommodating couples has been a longstanding issue in the design of centralized labor market clearinghouses for doctors and psychologists, because couples view pairs of jobs as complements. A stable matching may not exist when couples are present. The authors find conditions under which a stable matching exists with high probability...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Financial Integration, Entrepreneurial Risk And Global Dynamics

    This paper investigates within a two-country, general equilibrium, incomplete-markets model that focuses on the importance of idiosyncratic entrepreneurial risk - a risk that introduces, not only a precautionary motive for saving, but also a wedge between the interest rate and the marginal product of capital. The contribution is then to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    The China Syndrome: Local Labor Market Effects Of Import Competition In The United States

    Growing import exposure spurs a substantial increase in transfer payments to individuals and households in the form of unemployment insurance benefits, disability benefits, income support payments, and in-kind medical benefits. These transfer payments are two orders of magnitude larger than the corresponding rise in Trade Adjustment Assistance benefits. Nevertheless, transfers...

    Provided By Massachusetts Institute of Technology