Massachusetts Institute of Technology

Displaying 1-40 of 512 results

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Saddle Point in the Minimax Converse for Channel Coding

    A mini-max meta-converse has recently been proposed as a simultaneous generalization of a number of classical results and a tool for the non-asymptotic analysis. In this paper it is shown that the order of optimizing the input and output distributions can be interchanged without affecting the bound. In the course...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Empirical Rate-Distortion Study of Compressive Sensing-Based Joint Source-Channel Coding

    Compressive Sensing (CS) is a novel technique which allows to reconstruct signals using much fewer measurements than traditional sampling methods by taking advantage of the sparsity of the signals to be compressed. Previous works related to the rate-distortion analysis of CS have been focused on its performance related to image...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Toward Sustainable Networking: Storage Area Networks with Network Coding

    Current projections indicate that the worldwide Data Center (DC) industry will require a quadrupling of capacity by the year 2020, primarily through increased demand for high-definition video streaming. In addition to requiring significant financial investments, worldwide DC capacities are approaching a scale in which their energy consumption and carbon footprint...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2009

    Leading An Environmentally Sustainable Enterprise

    Climate Change poses perhaps the premiere threat to Coming generations says Martin Madaus but to avoid its worst impacts. We must Confront the issue now to that end. Madaus exhorts business leaders to focus immediately on building environmental sustainability into their operations as he has begun to do at Millipore.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2009

    Energy Entrepreneurship And Innovation: Today's Challenges, Tomorrow's Opportunities

    There are sample opportunities for new energy entrepreneurs, these panelists agree, but motivation and certain kinds of know how play key roles in bringing new ventures to fruition. Idealism led Christina Lampe-Onnerud to "Go into the energy space" at 23, but "Inertia" surrounding the energy business may intimidate today's entrepreneurs.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Global And Domestic Imbalances: Why Rural China Is The Key

    China owes its astonishing economic expansion not to far-sighted government policy but to hundreds of millions of entrepreneurial peasants. Yasheng Huang's research reveals not only how small-scale rural businesses created China's miracle but how that nation's recovery from the global recession and righting the massive East-West trade imbalance depend on...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    The Power Of Competition: How To Focus The World's Brains On Your Innovation Challenges

    Cooperation may be making us "A little bit too nice" when it comes to innovation, suggests Fiona Murray. She believes there's nothing like competition for injecting energy into the process of solving key innovation problems, whether in business or society.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    Financial Services: Prospect For Your Future

    In a lively discussion with Simon Johnson, Lawrence Fish deconstructs the near collapse of the banking system and points out the multiple factors that have contributed to the financial crisis.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2009

    Leadership Amidst Crisis

    In thirty years. S. D. Shibulal has seen his share of economic crises, but in thinking hard about the role of crises in the future for today's students he predicts: they will occur more frequently and will be less predictable, longer lasting and more costly.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Creating A Game Plan For Transition To A Sustainable Economy

    The "Chief inspired protagonist" of one of the nation's oldest and most successful green manufacturers apologizes for delivering a talk "More depressing than expected." While discussing the challenges facing businesses attempting to transition to a more just and sustainable economy, Jeffrey Hollender enumerates the many reasons he's feeling bleak these...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Sustainable Accessibility: A Grand Challenge For The World And For MIT

    Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Leading Through Adversity

    Few Companies have endured such hardship or risen to such heights in a brief span of time as Akamai Technologies. Paul Sagan tells how he became the CEO of this young firm and helped it survive and then flourish despite "Unimaginable adversity".

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    Automotive Lightweighting As A Strategic Opportunity For India's Automotive Industry

    Suppose you could leapfrog 100 years of experience in the automotive industry and begin a new manufacturing epoch the strategic change you would make is to lightweight the vehicle, observes Charles Fine although steel has been the material of choice for many automotive components since the dawn of the automotive...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    A Policy On Leadership

    Ted Kelly walks a Sloan audience through the process of turning around a failing company. His formula? Develop two key things: a fact based analytical organization and great management teams that value people.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    13 Bankers: The Wall Street Takeover And The Next Financial Meltdown

    In 13 Bankers Johnson, a former chief economist for the International Monetary Fund and co-author James Kwak cite historical precedents offers financial analysis to conclude that a second financial shock is inevitable unless the financial and political stranglehold held on Washington by the nation's biggest banks is broken.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Lunch With A Laureate: Robert Merton

    Merton starts with the breakthrough work that earned him his laurels and which has recently stirred up controversy: derivative& there are "No mysteries" to these financial instruments, insists Merton they are neither complex nor threatening Derivatives are "Nothing more than insurance."

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2008

    Attention Modulates Initial Stages of Visual Word Processing

    Selective attention has the potential to enhance the initial processing of objects, their spatial locations, or their constituent features. The present study shows that this capacity to modulate initial stages of processing also applies to linguistic attributes. A cueing paradigm focused attention at different levels of word representations on a...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Measuring And Understanding Hierarchy As An Architectural Element In Industry Sectors

    Hierarchy is a generic structure in which levels are asymmetrically ordered. In an industry setting, classic supply chains display strict hierarchy, whereas clusters of firms have linkages going in many different directions. The empirical measurement and model analysis together indicate that it is the low transaction specificity that drives down...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Productivity Differences Between And Within Countries

    The authors document substantial within-country (cross-municipality) differences in incomes for a large number of countries in the Americas. A significant fraction of the within-country differences cannot be explained by observed human capital. They conjecture that the sources of within-country and between-country differences are related. As a first step towards a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    Whither Industrial Relations: Does It Have A Future In Post-Industrial Society

    Industrial relations are in trouble. It is in trouble both as a set of institutions and practices, linked to trade unions and collective bargaining and as a scholarly endeavor. The title of talk here, which the author was obliged to provide long in advance, is essentially a place holder for...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Post-2008 Crisis In Labor Standards: Prospects For Labor Regulation Around The World

    Over the course of the last thirty years, government policy has been increasingly dominated by neoclassical economic thought and neoliberal public policies. This has been especially true in the United States, but the trends are evident in one way or another in every part of the world. They reflect in...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Frequency Estimation of Internet Packet Streams With Limited Space

    The authors consider a router on the Internet analyzing the statistical properties of a TCP/IP packet stream. A fundamental difficulty with measuring traffic behavior on the Internet is that there is simply too much data to be recorded for later analysis, on the order of gigabytes a second. As a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Algebraic Network Coding Approach to Deterministic Wireless Relay Networks

    The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and interference. Avestimehr et al. showed that the Min-cut Max-flow theorem holds in the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Accelerated Dual Descent for Network Optimization

    Dual descent methods are commonly used to solve network optimization problems because their implementation can be distributed through the network. However, their convergence rates are typically very slow. This paper introduces a family of dual descent algorithms that use approximate Newton directions to accelerate the convergence rate of conventional dual...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Competition, Market Coverage, and Quality Choice in Interconnected Platforms

    The authors study duopoly competition between two interconnected Internet Service Providers (ISP) that compete in quality and prices for both Content Providers (CP) and consumers. They develop a game theoretic model using a two-sided market framework, where ISP's are modeled as interconnected plat-forms with quality bottlenecks; a consumer on a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

    The authors study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. The objective is to design a power control scheme that achieves a (near) optimal power allocation with respect to any predetermined network objective (such as the maximization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2008

    Completion Time Minimization and Robust Power Control in Wireless Packet Networks

    A wireless packet network is considered in which each user transmits a stream of packets to its destination. The transmit power of each user interferes with the transmission of all other users. A convex cost function of the completion times of the user packets are minimized by optimally allocating the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2008

    Competitive Scheduling in Wireless Collision Channels With Correlated Channel State

    The authors consider a wireless collision channel, shared by a finite number of mobile users who transmit to a common base station. Each user wishes to optimize its individual network utility that incorporates a natural tradeoff between throughput and power. The channel quality of every user is affected by global...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2008

    Modeling Computational Security in Long-Lived Systems

    For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Performance of Multihop Wireless Networks: Shortest Path Is Not Enough

    Existing wireless ad hoc routing protocols typically find routes with the minimum hop-count. This paper presents experimental evidence from two wireless test-beds which shows that there are usually multiple minimum hop-count paths, many of which have poor throughput. As a result, minimum-hop-count routing often chooses routes that have significantly less...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2008

    Modeling Computational Security in Long-Lived Systems, Version 2

    For many cryptographic protocols, security relies on the assumption that adversarial entities have limited computational power. This type of security degrades progressively over the lifetime of a protocol. However, some cryptographic services, such as timestamping services or digital archives, are long-lived in nature; they are expected to be secure and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Peering Peer-To-Peer Providers

    The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distributed computational infrastructure. While this cooperative end-user approach works well in many application settings, it does not provide a sufficiently stable platform for certain peer-to-peer applications (e.g., DHTs...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Geographic Routing Without Planarization

    The authors present a new geographic routing algorithm, the Greedy Distributed Spanning Tree Routing (GDSTR), that finds shorter routes and generates less maintenance traffic than previous algorithms. While geographic routing potentially scales well, it faces the problem of what to do at local dead ends where greedy forwarding fails. Existing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Pastwatch: A Distributed Version Control System

    Pastwatch is a version control system that acts like a traditional client-server system when users are connected to the network; users can see each other's changes immediately after the changes are committed. When a user is not connected, Pastwatch also allows users to read revisions from the repository, commit new...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Proactive Replication for Data Durability

    Many wide area storage systems replicate data for durability. A common way of maintaining the replicas is to detect node failures and respond by creating additional copies of objects that were stored on failed nodes and hence suffered a loss of redundancy. Reactive techniques can minimize total bytes sent since...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    F2F: Reliable Storage in Open Networks

    A major hurdle to deploying a distributed storage infrastructure in peer-to-peer systems is storing data reliably using nodes that have little incentive to remain in the system. The authors argue that a node should choose its neighbors (The nodes with which it shares resources) based on existing social relationships instead...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2009

    Usher: Improving Data Quality With Dynamic Forms

    Data quality is a critical problem in modern databases. Data entry forms present the first and arguably best opportunity for detecting and mitigating errors, but there has been little research into automatic methods for improving data quality at entry time. In this paper, the authors propose Usher, an end-to-end system...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    The Fruits Of Diversity

    In a webcast the authors offers a bounty of visual and aural pleasures, a museum curator and two artists describe how their work "Dissolves boundaries," in the words of moderator, often "Leading to new frontiers."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Excellence Is A Shared Path: Working Together For Justice And The Quality Of Life

    Exploring the past opens up new perspectives on the present and offers ways of navigating a challenging future, these speakers suggest, in a call to action on the occasion of Martin Luther King, Jr.'s birthday.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Excellence Is A Shared Path: Student Remarks

    In their brief remarks honoring the legacy of Dr. Martin Luther King, Jr., two students strike the theme of collaboration. They touch on the importance of humility and listening to one's inner voice while pursuing a shared vision of justice and equality.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Future Of Finance

    In this webcast, the author chooses not to focus on the financial crisis. It is clear to him there were "Fools and knaves," as well as "Many structural elements that would have happened even if people were well behaved and well informed" - risks are simply "Embedded in our systems."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Finance In Action

    The moderator introduces the panelists as distinguished academics and practitioners who share not only their status as MIT alums, but also their innovative application of finance theory to entrepreneurship. "They were in the middle of the action," said the moderator.

    Provided By Massachusetts Institute of Technology