Massachusetts Institute of Technology

Displaying 1-40 of 422 results

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2002

    Dispersed Employment, Commuting, and Mixed Land-Use in Modern Cities

    This paper has two objectives. The first is to review a range of empirical evidence that suggests this vision of urban form is largely incorrect. Over time, in most cities, real estate rents and asset prices grow little more than inflation. In addition, recently released data on the spatial distribution...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2000

    Ski Resort Real Estate Markets: Why Not to Invest

    This paper examines the behavior of ski resort property in a major New England market over the last 25 years. A property price series is constructed for the Loon Mountain resort, which is believed to be quite typical of New England Ski areas. This series reveals that nominal prices are...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2004

    The Role of Software in Spacecraft Accidents

    The first and most important step in solving any problem is understanding the problem well enough to create effective solutions. To this end, several software-related spacecraft accidents were studied to determine common systemic factors. Although the details in each accident were different, very similar factors related to flaws in the...

    Provided By Massachusetts Institute of Technology

  • Tools & Templates // May 2006

    Project Control Book

    This is a template for project control book.

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2004

    Hiding and Revealing in Online Poker Games

    Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to the psychological aspect of the game, making the games less authentic and less enjoyable than they could be. The paper explores how card...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Wealth Accumulation And Factors Accounting For Success

    The authors use detailed income, balance sheet, and cash flow statements constructed for households in a long monthly panel in an emerging market economy, and some recent contributions in economic theory, to document and better understand the factors underlying success in achieving upward mobility in the distribution of net worth....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    No Bits Left Behind

    One of the key tenets of database system design is making efficient use of storage and memory resources. However, existing database system implementations are actually extremely wasteful of such resources; for example, most systems leave a great deal of empty space in tuples, index pages, and data pages, and spend...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    BOOM: Broadcast Optimizations for On-Chip Meshes

    Future many-core chips will require an on-chip network that can support broadcasts and multicasts at good power-performance. A vanilla on-chip network would send multiple unicast packets for each broadcast packet, resulting in latency, throughput and power overheads. Recent research in on-chip multicast support has proposed forking of broadcast/multicast packets within...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    Decomposing Broadcast Algorithms Using Abstract MAC Layers

    In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated algorithms and analysis, and makes it difficult to extend the work to more difficult communication problems. In this paper, the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Remote Oblivious Storage: Making Oblivious RAM Practical

    Remote storage of data has become an increasingly attractive and advantageous option, especially due to cloud systems. While encryption protects the data, it does not hide the access pattern to the data. A natural solution is to access remote storage using an Oblivious RAM (ORAM) which provably hides all access...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    SEEC: A Framework for Self-aware Computing

    As the complexity of computing systems increases, application programmers must be experts in their application domain and have the systems knowledge required to address the problems that arise from parallelism, power, energy, and reliability concerns. One approach to relieving this burden is to make use of self-aware computing systems, which...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2010

    Heracles: Fully Synthesizable Parameterized MIPS-Based Multicore System

    Heracles is an open-source complete multicore system written in Verilog. It is fully parameterized and can be reconfigured and synthesized into different topologies and sizes. Each processing node has a 7-stage pipeline, fully bypassed, microprocessor running the MIPS-III ISA, a 4-stage input-buffer, virtual-channel router, and a local variable-size shared memory....

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    Scalable Directoryless Shared Memory Coherence Using Execution Migration

    The authors introduce the concept of deadlock-free migration-based coherent shared memory to the NUCA family of architectures. Migration-based architectures move threads among cores to guarantee sequential semantics in large multicores. Using an Execution Migration (EM) architecture, the authors achieve performance comparable to directory-based architectures without using directories: avoiding automatic data...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    The Abstract MAC Layer

    A diversity of possible communication assumptions complicates the study of algorithms and lower bounds for radio networks. The authors address this problem by defining an abstract MAC layer. This service provides reliable local broadcast communication, with timing guarantees stated in terms of a collection of abstract delay functions applied to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    MAC Design for Analog Network Coding

    Most medium access control mechanisms discard collided packets and consider interference harmful. Recent work on Analog Network Coding (ANC) suggests a different approach, in which multiple interfering transmissions are strategically scheduled. The received collisions are collected and then used in a decoding process, such as the ZigZag decoding process, where...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Broadcasting in Unreliable Radio Networks

    Practitioners agree that unreliable links, which fluctuate between working and not working, are an important characteristic of wireless networks. In contrast, most theoretical models of radio networks fix a static set of links and assume that these links work reliably throughout an execution. This gap between theory and practice motivates...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Dynamic Knobs for Power-Aware Computing

    The authors present PowerDial, a system for dynamically adapting application behavior to execute successfully in the face of load and power fluctuations. PowerDial transforms static configuration parameters into dynamic knobs that the PowerDial control system can manipulate to dynamically trade off the accuracy of the computation in return for reductions...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    The Cost of Global Broadcast Using Abstract MAC Layers

    The authors analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. The algorithms are split formally into two pieces: A high-level piece for broadcast and a low-level piece for contention management. They accomplish the split using abstract...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    SWIFT: A Narrowband-Friendly Cognitive Wideband Network

    Wideband technologies in the unlicensed spectrum can satisfy the ever-increasing demands for wireless bandwidth created by emerging rich media applications. The key challenge for such systems, however, is to allow narrowband technologies that share these bands (say, 802.11 a/b/g/n, Zigbee) to achieve their normal performance, without compromising the throughput or...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Distributed Computation in Dynamic Networks

    In this paper the authors investigate distributed computation in dynamic networks in which the network topology changes from round to round. They consider a worst-case model in which the communication links for each round are chosen by an adversary, and nodes do not know who their neighbors for the current...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Programming Manifolds

    Many programming domains involve the manipulation of values distributed through a manifold - examples include sensor networks, smart materials, and biofilms. This paper describes a programming semantics for manifolds based on the amorphous medium abstraction, which places a computational device at every point in the manifold. This abstraction enables the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Interactive Visual Histories for Vector Graphics

    Presentation and graphics software enables users to experiment with variations of illustrations. They can revisit recent editing operations using the ubiquitous undo command, but they are limited to sequential exploration. The authors propose a new interaction metaphor and visualization for operation history. While editing, a user can access a history...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Modeling Radio Networks

    The authors describe a modeling framework and collection of foundational composition results for the study of probabilistic distributed algorithms in synchronous radio networks. Existing results in this setting rely on informal descriptions of the channel behavior and therefore lack easy comparability and are prone to error caused by definition subtleties....

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Gradient Clock Synchronization in Dynamic Networks

    Establishing coordination between participants is at the core of many algorithmic challenges in distributed computing. A fundamental coordination task, and a basic prerequisite for many applications, is achieving a common notion of time. Typically every node in the network has access to a local hardware clock, but the hardware clocks...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2011

    Gasping for AIR - Why We Need Linked Rules and Justifications on the Semantic Web

    The Semantic Web is a distributed model for publishing, utilizing and extending structured information using Web protocols. One of the main goals of this technology is to automate the retrieval and integration of data and to enable the inference of interesting results. This automation requires logics and rule languages that...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2010

    Robust Routing for Local Area Optical Access Networks

    One approach to providing the benefits of the high data rates afforded by optics is to attempt to implement traditional electronic and electro-optic approaches using optical technologies. In electronics, operations such as buffering, adding packets and dropping packets, or merging packet streams, are done with ease. In optics, however, buffering...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Securing the Borealis Data Stream Engine

    As Data Stream Management Systems (DSMSs) become more and more popular, there is an increasing need to protect such systems from adversaries. In this paper the authors present an approach to secure DSMSs. They propose a general security framework and an access control model to secure DSMSs. The authors implement...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2010

    Demonstration of Multi-Robot Search and Secure

    The authors consider the search and secure problem, where intruders are to be detected in a bounded area without allowing them to escape. The problem is tackled by representing the area to be searched as a traversability graph, which is reduced to a tree graph by placing stationary robots to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Immersive Journalism: Immersive Virtual Reality for the First-Person Experience of News

    This paper introduces the concept and discusses the implications of immersive journalism, which is the production of news in a form in which people can gain first person experiences of the events or situation described in news stories. The fundamental idea of immersive journalism is to allow the participant, typically...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Whanau: A Sybil-Proof Distributed Hash Table

    Decentralized systems on the Internet are vulnerable to the "Sybil attack", in which an adversary creates numerous false identities to influence the system's behavior. This problem is particularly pernicious when the system is responsible for routing messages amongst nodes, as in the Distributed Hash Tables (DHT) which underlie many peer-to-peer...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    The Click Modular Router

    Click is a new software architecture for building flexible and configurable routers. A Click router is assembled from packet processing modules called elements. Individual elements implement simple router functions like packet classification, queuing, scheduling, and interfacing with network devices. A router configuration is a directed graph with elements at the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Opinion Fluctuations And Disagreement In Social Networks

    The authors study a stochastic gossip model of continuous opinion dynamics in a society consisting of two types of agents: regular agents, who update their beliefs according to information that they receive from their social neighbors; and stubborn agents, who never update their opinions and might represent leaders, political parties...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Design and Performance of Multipath MIN Architecture

    In this paper, the authors discuss the use of multipath Multistage Interconnection Networks (MINs) in the design of a fault-tolerant parallel computer. Multipath networks have multiple paths between any input and any output. In particular, they examine networks with either the property of expansion or maximal-fanout. The authors present a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    An Empirical Study of "Bogo" Route Advertisements

    An important factor in the robustness of the inter-domain routing system is whether the routers in Autonomous Systems (ASes) filter routes for "Bogon" address space - i.e., private address space and address space that has not been allocated by the Internet Assigned Numbers Authority (IANA). This paper presents an empirical...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Detecting BGP Configuration Faults With Static Analysis

    The Internet is composed of many independent Autonomous Systems (ASes) that exchange reachability information to destinations using the Border Gateway Protocol (BGP). Network operators in each AS configure BGP routers to control the routes that are learned, selected, and announced to other routers. Faults in BGP configuration can cause forwarding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Guidelines for Interdomain Traffic Engineering

    Network operators must have control over the flow of traffic into, out of, and across their networks. However, the Border Gateway Protocol (BGP) does not facilitate common traffic engineering tasks, such as balancing load across multiple links to a neighboring AS or directing traffic to a different neighbor. Solving these...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Practical Verification Techniques for Wide-Area Routing

    Protocol and system designers use verification techniques to analyze a system's correctness properties. Network operators need verification techniques to ensure the "Correct" operation of BGP. BGP's distributed dependencies cause small configuration mistakes or oversights to spur complex errors, which sometimes have devastating effects on global connectivity. These errors are often...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Technology: Do Kids Need More or Less?

    The ultimate questions for this Sandbox 2011 panel, posed by the presenter, are "Where is technology not working? When is technology not the answer?" That's a bold agenda for a panel of children's media creators and a roomful of other producers in the industry, from Sesame Workshop, WGBH, 360 Kid,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Learning 3.0: Why Technology Belongs in Every Classroom

    The Obama Administration's recently unveiled plan for transforming American education through technology does not envision "Plugging kids in and making them smarter," declares the presenter. Instead, it focuses on leveraging aspects of digital technology "To create way more compelling environments in schools," and to address educational inequities and the larger...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    History, Expectations, And Leadership In Evolution Of Cooperation

    The authors study the evolution of the social norm of "Cooperation" in a dynamic environment. Each agent lives for two periods and interacts with agents from the previous and next generations via a coordination game. "History" matters because agents only receive noisy information about the play of the previous generation...

    Provided By Massachusetts Institute of Technology