Massachusetts Institute of Technology

Displaying 1-40 of 468 results

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Saddle Point in the Minimax Converse for Channel Coding

    A mini-max meta-converse has recently been proposed as a simultaneous generalization of a number of classical results and a tool for the non-asymptotic analysis. In this paper it is shown that the order of optimizing the input and output distributions can be interchanged without affecting the bound. In the course...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Empirical Rate-Distortion Study of Compressive Sensing-Based Joint Source-Channel Coding

    Compressive Sensing (CS) is a novel technique which allows to reconstruct signals using much fewer measurements than traditional sampling methods by taking advantage of the sparsity of the signals to be compressed. Previous works related to the rate-distortion analysis of CS have been focused on its performance related to image...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Excellence Is A Shared Path: Student Remarks

    In their brief remarks honoring the legacy of Dr. Martin Luther King, Jr., two students strike the theme of collaboration. They touch on the importance of humility and listening to one's inner voice while pursuing a shared vision of justice and equality.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Future Of Finance

    In this webcast, the author chooses not to focus on the financial crisis. It is clear to him there were "Fools and knaves," as well as "Many structural elements that would have happened even if people were well behaved and well informed" - risks are simply "Embedded in our systems."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Finance In Action

    The moderator introduces the panelists as distinguished academics and practitioners who share not only their status as MIT alums, but also their innovative application of finance theory to entrepreneurship. "They were in the middle of the action," said the moderator.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    The Growth Of Cryptography

    It's not every day that Euclid appears in public with "Alice and Bob," but in a lecture spanning a few thousand years, the presenter summons these and other notables in his history of cryptography. While citing milestones of code-making and breaking, the presenter also brings his audience up to date...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Evolution Of Financial Technology

    An unmistakable glow of nostalgia rises from this reunion of "Five of the founding fathers of modern finance," in the words of the moderator. The speakers reminisce about their start in economics, and their professional lives at MIT, a decades-long era of intense collaboration and creativity that both transformed the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Economic Policy Challenges: Microeconomics And Regulation

    Given its contributions to policy and practice in such key sectors as health care, industrial organization and technological innovation, and energy and the environment, microeconomics may not be getting the kind of respect, or at least attention, it deserves, the authors suggest.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Gaza In Crisis

    Two speakers steeped in the ongoing crisis of the Middle East describe abominable conditions for Palestinians living inside Gaza, which has been blockaded by Israel since 2007. They demand urgent action for civilian victims, and condemn both the Israeli and U.S. governments for pursuing policies of "Genocide."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Economic Policy Challenges: Macroeconomics And Fiscal Policy

    The economists, MIT PhDs all, ponder what remains in the macroeconomist's toolkit to pull the U.S., and much of the developed world, out of recession. They discuss aspects of fiscal and monetary policy that may prove useful in spurring recovery, as well as the complicating matter of politics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Evolution Of Economic Science: Macroeconomics, Growth, And Development

    This webcast first looks inward, at the evolution of macroeconomics in the past century, and the emergence of microeconomic foundations in macroeconomics, then shifts outward, to the application of economic analysis to such issues as structural unemployment, the ongoing U.S. recession, and the best ways to help developing nations.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Evolution Of Economic Science: Individual And Firm Behavior

    The astonishing contributions MIT has made to the world of economics emerged from "A melting pot of analytical tools and mathematical methods, mixed with a healthy interest in real world questions, grounded in real world problems," says the moderator, crystallizing many of the themes of the symposium, and its inaugural...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2010

    Perceptive Mobile Robots Working Safely Alongside Humans

    Although we are still far from the moment of singularity, or even Star Wars 'Droids, we can anticipate robot colleagues in the near future, believes by the author. The author is developing 'Situationally aware' machines to help out humans in those "Unstructured environments?where we live, work and recreate."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2010

    Mathematics, Common Sense, And Good Luck: My Life And Careers

    Don't expect to glean any market tips or trading secrets from the author, who steadfastly refuses to disclose the method behind his remarkable record in investing. Instead, listen to this mathematician, hedge fund manager and philanthropist sum up a remarkably varied and rich career, and offer some "Guiding principles" distilled...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2010

    Communications In Slow-Moving Crises

    What's a journalist to do when a major story must be coaxed reluctantly into public view, or emerges on what seems like a geological time scale? These panelists discuss how to approach slowly evolving but urgent stories at a time when news coverage has shifted inexorably from print and its...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2010

    Relaunching Growth In Europe

    The presenter finds it difficult to witness the calamitous decline of Spain, a nation he led to robust economic health as prime minister from 1996 to 2004. The gains during his administration have vanished following the international financial crisis. But the economic misfortunes of Spain and other European nations are...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2010

    The Future Is Gray, Small & Female: Disruptive Demographics And Transportation Tomorrow

    If the prospect of aging and infirmity seems remote, you could use some time with AGNES (Age Gain Now Empathy System), a wearable apparatus that approximates "What it feels like to be a 75-year-old woman."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2010

    The Financial Crisis, The Recession, And The American Political Economy: A Systemic Perspective

    The author shows how useful a varied background in math, political science and business can be, as he dissects the complexities and recent crisis of the U.S. financial system. In a lecture that distills many of the arguments of his recent film, Inside Job, the author conveys dispassionately yet persuasively...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Humanities In The Digital Age

    Reports of the demise of the humanities are exaggerated, suggest these panelists, but there may be reason to fear its loss of relevance. Three scholars whose work touches a variety of disciplines and with wide knowledge of the worlds of academia and publishing ponder the meaning and mission of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Negotiating The Gulf Disaster

    The Gulf Oil spill hurt many individuals and businesses, and there is broad agreement that they deserve compensation. But working out the nuances of damage payment is no simple matter, as the presenter describes in conversation with an MIT Museum audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Toward Efficient Airport Operations

    Few of us would elect to spend countless hours at the airport watching planes arrive, depart and sit at gates. But what constitutes a punishment for some actually energizes the presenter, whose research focuses on improving airport operations. Her goal is to make air travel more efficient, robust and green.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Open Payment, A New Approach To Public Transportation Fare Collection

    Soon, a ticket to ride won't require paper coupons, tokens, human vendors, or even Boston's CharlieCard. Urban transit is abandoning a century old payment system for sophisticated digital payment technology, says the author. The author has been toiling for a decade on technology and methods that will enable transit industry...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    A Trigger-Based Middleware Cache for ORMs

    Caching is an important technique in scaling storage for high-traffic web applications. Usually, building caching mechanisms involves significant effort from the application developer to maintain and invalidate data in the cache. In this paper, the authors present CacheGenie, a caching middleware which makes it easy for web application developers to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise

    Many popular and well-established cyber security Capture The Flag (CTF) exercises are held each year in a variety of settings, including universities and semi-professional security conferences. CTF formats also vary greatly, ranging from linear puzzle-like challenges to team-based offensive and defensive free-for-all hacking competitions. While these events are exciting and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Separating Web Applications From User Data Storage With BSTORE

    This paper presents BSTORE, a framework that allows developers to separate their web application code from user data storage. With BSTORE, storage providers implement a standard file system API, and applications access user data through that same API without having to worry about where the data might be stored. A...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Faster Information Dissemination in Dynamic Networks Via Network Coding

    In this paper, the authors demonstrate that network coding can significantly improve the efficiency of distributed computations in dynamic networks. Network coding breaks with the classical paradigm of routing atomic packets through a network and recognizes that information can be mixed and coded together in ways other (physical) quantities can...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2010

    Dependability Arguments With Trusted Bases

    An approach is suggested for arguing that a system is dependable. The key idea is to structure the system so that critical requirements are localized in small, reliable subsets of the system's components called trusted bases. This paper describes an idiom for modeling systems with trusted bases, and a technique...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    From Relational Specifications to Logic Programs

    This paper presents a compiler from expressive, relational specifications to logic programs. Specifically, the compiler translates the Imperative Alloy specification language to Prolog. Imperative Alloy is a declarative, relational specification language based on first-order logic and extended with imperative constructs; Alloy specifications are traditionally not executable. In spite of this...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    Mixed Context and Privacy

    Users engaging Online Service Providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by multiple actors. For the ten OSPs analyzed, privacy policies only cover content provided directly by the OSP. Content provided...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Characterizing Cyberspace: Past, Present and Future David Clark

    This paper is funded by the Office of Naval Research under award number N00014091059 and N000140810898. Any opinions, findings, and conclusions or recommendations expressed in this email are those of the author(s) and do not necessarily reflect the views of the Office of Naval Research. In general terms, most practitioners...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Probabilistically Accurate Program Transformations

    The standard approach to program transformation involves the use of discrete logical reasoning to prove that the applied transformation does not change the observable semantics of the program. This paper, in contrast, introduces a novel approach that uses probabilistic reasoning to justify transformations that may change the result that the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes

    This paper presents a new challenge - verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. The authors describe an approach called the Remote Assessment of Fault Tolerance (RAFT). The key technique in a RAFT is to measure...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2008

    Predicate Privacy in Encryption Systems

    Predicate encryption is a new encryption paradigm which gives a master secret key owner fine-grained control over access to encrypted data. The master secret key owner can generate secret key tokens corresponding to predicates. An encryption of data x can be evaluated using a secret token corresponding to a predicate...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Improving Wireless Network Performance Using Sensor Hints

    With the proliferation of mobile wireless devices such as smartphones and tablets that are used in a wide range of locations and movement conditions, it has become important for wireless protocols to adapt to different settings over short periods of time. Network protocols that perform well in static settings where...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Accurate, Low-Energy Trajectory Mapping for Mobile Devices

    CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important component in many location based services including...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    On the Role of Queue Length Information in Network Control

    In this paper, the authors study the role played by queue length information in the operation of flow control and server allocation policies. They first consider a simple model of a single server queue with congestion-based flow control. The input rate at any instant is decided by a flow control...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks

    The authors describe a non-cooperative Interference Alignment (IA) technique which allows an opportunistic Multiple Input Multiple Output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmitting along the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Efficient Cache Attacks on AES, and Countermeasures

    The authors describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2009

    Effect of Pronunciations on OOV Queries in Spoken Term Detection

    The Spoken Term Detection (STD) task aims to return relevant segments from a spoken archive that contain the query terms whether or not they are in the system vocabulary. This paper focuses on pronunciation modeling for Out-Of-Vocabulary (OOV) terms which frequently occur in STD queries. The STD system described in...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Optimizing MapReduce for Multicore Architectures

    MapReduce is a programming model for data-parallel programs originally intended for data centers. MapReduce simplifies parallel programming, hiding synchronization and task management. These properties make it a promising programming model for future processors with many cores, and existing MapReduce libraries such as Phoenix have demonstrated that applications written with MapReduce...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Training-Based Schemes Are Suboptimal for High Rate Asynchronous Communication

    Synchronization and information transmission of virtually all practical communication systems are performed separately, on the basis of different communication bits. Moreover, in general, the rate of these strategies is computed with respect to the information transmission time period, ignoring the delay overhead caused by various hand-shake protocols used to guarantee...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    BOOM: Broadcast Optimizations for On-Chip Meshes

    Future many-core chips will require an on-chip network that can support broadcasts and multicasts at good power-performance. A vanilla on-chip network would send multiple unicast packets for each broadcast packet, resulting in latency, throughput and power overheads. Recent research in on-chip multicast support has proposed forking of broadcast/multicast packets within...

    Provided By Massachusetts Institute of Technology