Massachusetts Institute of Technology

Displaying 1-40 of 443 results

  • White Papers // Apr 2014

    Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach

    The authors consider an opportunistic communication system in which a transmitter selects one of multiple channels over which to schedule a transmission, based on partial knowledge of the network state. They characterize a fundamental limit on the rate that channel state information must be conveyed to the transmitter in order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2013

    Optimal Channel Probing in Communication Systems: The Two-Channel Case

    The authors consider a multi-channel communication system in which a transmitter has access to two channels, but does not know the state of either channel. They model the channel state using an ON/OFF Markovian model, and allow the transmitter to probe one of the channels at predetermined probing intervals to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    On Analyzing and Improving COPE Performance

    COPE is a new architecture for unicasts in wireless mesh networks that employs opportunistic network coding to improve total throughput. Katti et al. showed through experiments that this system significantly improves the throughput of wireless networks with UDP traffic, and several attempts have been made to analyze the COPE performance....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Experimental Study of the Interplay of Channel and Network Coding in Low Power Sensor Applications

    In this paper, the authors evaluate the performance of Random Linear Network Coding (RLNC) in low data rate indoor sensor applications operating in the ISM frequency band. They also investigate the results of its synergy with Forward Error Correction (FEC) codes at the PHY-layer in a Joint Channel-Network Coding (JCNC)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Handwritten Signature Verification using Instance Based Learning

    For authentication and authorization in legal matter humans are recognized by their Signature. Every human being has their own writing style and hence their signature is used in the financial domain for identity verification. So it is necessary to develop a technique which is efficient in verifying the Handwritten Signature...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Quasi-Static SIMO Fading Channels at Finite Blocklength

    The authors investigate the maximal achievable rate for a given block-length and error probability over quasi-static Single-Input Multiple-Output (SIMO) fading channels. Under mild conditions on the channel gains, it is shown that the channel dispersion is zero regardless of whether the fading realizations are available at the transmitter and/or the...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2013

    Breaking the On-Chip Latency Barrier Using SMART

    As the number of on-chip cores increases, scalable on-chip topologies such as meshes inevitably add multiple hops in each network traversal. The best, the authors can do right now is to design 1-cycle routers, such that the low-load network latency between a source and destination is equal to the number...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Cloud Computing

    In this webcast, the presenter will focus on how cloud computing has already penetrated the enterprise, best practices in rolling out cloud technologies, and how small and large vendors can address new opportunities in this sector.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    TR10: Cloud Programming

    The presenter TR10 innovator who is trying to make life easier for programmers by creating tools that can take over data management within a cloud. The presenter going to explain about the potential of cloud computing and how his approach will unlock that potential.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Cloud Security

    In this webcast, the presenter explains about the cloud security which is one of the evolving technology to protect data, application and infrastructure problems. The presenter also describes the potential benefits, and security challenges, of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Investigations of Platform Savings Reveal Systemic Management Challenges

    Companies from aerospace to white goods use platforming strategies to deliver more variety to their customers while saving internally by sharing parts and overhead. However, many firms fail to earn a return on their investment in platforms. In this webcast, the presenter will explore whether such failures are the result...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    IT Risk

    In this webcast, the presenter discusses the following key concepts in IT risk management: how IT managers can improve alignment and understanding, both in IT and the business, by discussing IT risk considerations in terms of key enterprise risks; how organizations build effective IT risk management capability through the disciplines...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Inventory Productivity: Missing Link Between Supply Chain Management and Sales

    Traditionally, supply chain and sales have been managed relatively independently, despite the critical impact that each has on the other. Systems thinking provide the key to linking these two critical business functions. In this webcast, the presenter will explain the central importance of this critical metric; describe how to measure...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    WebPub Presents: Make IT Work! Using Web Engagement Management to Maximize Your Message

    Web Engagement Management (WEM) is a concept to bridge business processes and technology to manage content, conversations, and messaging to enhance the user digital presence. In this webcast, the presenter will discuss how to use WEM to make decisions to position their organization for the rapidly changing world of the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Code in the Air: Programming Smartphones From the Cloud

    In this webcast, the presenter going to explain about Code in the Air a system that lowers the barrier for programming and executing tasking applications. CITA includes an activity layer which makes it easy for developers to express conditions that reference high-level activities.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Perspectives on Enterprise Transformation

    In this webcast, the presenter explains about the importance of fostering a corporate \"Stretch culture\" that supports taking big steps in culture change and business process improvement while maintaining a sense of customer satisfaction.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Big Data: The Management Revolution

    In this webcast, the presenter going to explain the ways that Information Technology (IT) affects businesses and business as a whole. The presenter research investigates how IT changes the way companies perform, organize themselves, and compete.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Innovation in Manufacturing: The Small Business Conundrum

    The small business conundrum this webcast focused on the essential components and growth opportunities for manufacturing and innovation. Small businesses, in particular, feel they must innovate new products to grow, but can be handicapped by little access to capital.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Education Entrepreneurship in India

    The education sector in India offers enormous opportunity to employ entrepreneurial business models to create a lasting and positive impact. In this webcast, the presenter shares his experiences as an entrepreneur building a sustainable venture in a domain that has only recently started accepting the role of private enterprise.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Web Strategy: Using Drupal to Transform Your Business

    Drupal is an amazingly flexible framework, with literally thousands of contributed modules to extend and transform its functionality. In this webcast, the presenter will explore that nexus between their business, design and technology, and cover some of the strategies they can use to go beyond the basics.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Create a B2B Content Marketing Strategy

    In this webcast, the presenter going to explain about how to create a B2B content marketing strategy? Content marketing which is an approach that involves creating, distributing and exchanging information in order to attract, retain and engage with the group of intended audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Unleashing Business and Technology Growth Through Change Transformation

    Technological growth can only sustain a company's growth and evolution so far in this global market. Even a start up or early stage company must consider change transformation in order to reach the break points and/or next levels of growth. The level of consciousness an organization has about change will...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    New Insights Into Technology, Innovation and Entrepreneurship

    Are there any formulas for simultaneously achieving technological innovation and steady growth on a global basis? In this webcast, the presenter describes companies must continuously access and leverage technical resources, which means they must not \"Just think globally but locate globally.\"

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Modeling and Understanding Enterprise Behavior Using a Hybrid Simulation Approach

    In this webcast, the presenter going to discuss about the enterprise behavior. The presenter will lead the user to know how to understand and model the enterprise behavior by using a hybrid simulation approach.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Craig Mundie's Cloud Vision

    In this webcast the presenter going to explain about the vision of cloud. Cloud computing which will allow the wider range of computing possibilities. The presenter also going to discuss about the different kinds of ways to transform personal computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage

    In this webcast, the presenter going to explain about vulnerability for competitive advantage. An organization can be taught to know things faster, by deploying better detection methods, including statistical process control; and creating layers of defense.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    MITEF-NYC: Business Plan Presentations: Innovations in Digital Commerce

    E-commerce has come a long way since the early days of eBay, Amazon, and Yahoo. Users are constantly being provided with services and platforms that are more specialized and more in tune with their needs and tastes. And retailers are constantly seeking ways to make their offerings more targeted.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    How to Build a Great Company

    In this webcast, the presenter explains why startups are not small versions of large companies, and why they require processes and guidelines all their own. The presenter also describes the detailed customer development process for building scalable startups.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Mastering Business Model Innovation

    The business model canvas, a conceptual management tool to visualize, discuss, and invent business models, has known a phenomenal success around the world. In this webcast, the presenter going to explain the usability of management concepts and how this will change the way they approach business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Start-Up Thinking: How Systems Thinking Helps Entrepreneurial Ventures Start, Grow, and Mature

    Soon after a business plan is hatched and long before manufacturing ramps up, start-ups begin to apply systems design principles to create their breakthrough products. It turns out that systems engineering, an art developed and perfected in large organizations, applies just as well to small entrepreneurial ventures.

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. The authors propose a simple network layer protocol for star networks, adapting redundancy based on both transmission and reception energies for data and control packets, as well...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    On Counteracting Byzantine Attacks in Network Coded Peer-to-Peer Networks

    Random linear network coding can be used in peer-to-peer networks to increase the efficiency of content distribution and distributed storage. However, these systems are particularly susceptible to Byzantine attacks. The authors quantify the impact of Byzantine attacks on the coded system by evaluating the probability that a receiver node fails...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    Security Impact Ratings Considered Harmful

    In this paper, the authors question the common practice of assigning security impact ratings to OS updates. Specifically, they present evidence that ranking updates by their perceived security importance, in order to defer applying some updates, exposes systems to significant risk. They argue that OS vendors and security groups should...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Geographic Locality of IP Prefixes

    Information about the geographic locality of IP prefixes can be useful for understanding the issues related to IP address allocation, aggregation, and BGP routing table growth. In this paper, the authors use traceroute data and geographic mappings of IP addresses to study the geographic properties of IP prefixes and their...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Crowds and Clouds: Data, Sheep, and Collaboration in the Works of Aaron Koblin

    Where others see just data points and fodder for bar graphs, presenter visualizes dynamic systems where information assumes forms both abstract and familiar. In this talk, presenter shares recent projects that meld statistical science and art to convey a really big picture, while often inviting the viewer to partake in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    Data-Driven Traffic Modeling, Prediction, and Planning

    Some professors work primarily in labs and others mainly at desks. Presenter conducts her research on the bustling streets of Singapore, where she is helping to design a "Future mobility project" Whose goal is to "Marry information technology with the transportation industry."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Network-Driven Transportation

    Today, cell phones are a menace to safe driving, as they distract operators who should otherwise focus on the road. Tomorrow, cell phones could actually improve the driving, and help drivers avoid traffic congestion, use the road system more effectively, and manage the parking supply.

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Fully Leakage-Resilient Signatures

    A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2007

    Process Improvement In The Rarefied Environment Of Academic Medicine

    In this webcast the author says, "Medicine for the most part remains a cottage industry," then how can you impose system-wide improvements - especially if you're presiding over an academic hospital, where the culture rewards brilliant, independent, free-thinking doctors?

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2010

    Fully Homomorphic Encryption Over the Integers

    The authors describe a very simple "Somewhat homomorphic" encryption scheme using only elementary modular arithmetic, and use Gentry's techniques to convert it into a fully homomorphic scheme. Compared to Gentry's construction, the somewhat homomorphic scheme merely uses addition and multiplication over the integers rather than working with ideal lattices over...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes

    This paper presents a new challenge - verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. The authors describe an approach called the Remote Assessment of Fault Tolerance (RAFT). The key technique in a RAFT is to measure...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Improving Wireless Network Performance Using Sensor Hints

    With the proliferation of mobile wireless devices such as smartphones and tablets that are used in a wide range of locations and movement conditions, it has become important for wireless protocols to adapt to different settings over short periods of time. Network protocols that perform well in static settings where...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Accurate, Low-Energy Trajectory Mapping for Mobile Devices

    CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important component in many location based services including...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    On the Role of Queue Length Information in Network Control

    In this paper, the authors study the role played by queue length information in the operation of flow control and server allocation policies. They first consider a simple model of a single server queue with congestion-based flow control. The input rate at any instant is decided by a flow control...

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Disrupting Class: How Disruptive Innovation Will Change The Way The World Learns

    The author describes how the idea of disruptive innovation, developed by management researcher and author Clayton M. Christensen, can provide a fresh perspective on struggling education systems, and perhaps offer some solutions. Business history, the author tells his audience, is littered with cases of unlikely triumphs, when a smaller firm...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    International Media Flows: Global Media And Culture

    The moderator introduces five graduates of the Comparative Media Studies Program - in this final webcast, who share their views and experiences about the international/global dimension of the program. 'Comparative' can be interpreted across time - media through history, media in times of transition or across media - across platforms,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Creativity And Collaboration In The Digital Age

    In a panel moderated by the presenter of this webcast, five former Comparative Media Studies (CMS) students discuss their personal experiences within the CMS program and the impact it has had on their understanding, interpretation, and implementation of creativity in the digital age.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Visual Overviews For Cultural Heritage: Interactive Exploration For Scholars In The Humanities, Arts, And Beyond

    A focus on designing technologies that allow the "Visualization of things not visible" has been at the center of the presenter's work over the past two decades. The presenter advocates the discovery of temporal patterns, relationships and clusters via an empowering user experience which enables discovery at a customizable pace...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Innovation In Energy Storage: What I Learned In 3.091 Was All I Needed To Know

    In a lecture that could have been titled, Better Education through Chemistry, the author begins with solar energy, grid-level storage, and liquid metal batteries and moves into education innovation, sharing creative ways to teach chemistry.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    Humanistic Approaches To The Graphical Expression Of Interpretation

    It is in sharp contrast to a period of enlightenment and empirical science that a re-humanization of digital activities may now take place, says the author. Humanistic approaches are the motif against which she frames her assertion that "Interpretation" introduces an epistemological shift - which she identifies by the rubric...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Capitalism 3.0: An Institutional Revolution In The Making

    The author points to what he calls a "Blind spot" in contemporary leadership research: the organization and management of attention. The author argues that there are different kinds of awareness or attentiveness, that different problems require different qualities of or approaches to awareness.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    Shaped By Booms And Busts: How The Economy Impacts CEO Management Style

    If you read the press or talk to practitioners, according to the author, the worst thing for an entrepreneur [is] to be one who grew up in a boom time. These entrepreneurs never learn to manage finances or build efficient firms because they're so used to having ample availability of...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2010

    MIT?s Entrepreneurial Development And Impact Over The Past 50 Years

    The author reviews the effects of entrepreneurship within MIT and the relation of MIT entrepreneurship to larger communities. The webcast polled MIT alumni about companies they had started or co-founded and which were still in business.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Denialism: Media In The Age Of Disinformation

    A few hundred years after the Enlightenment, western civilization is rushing back to the Dark Ages. The causes are debatable, but, argue these science journalists, the public increasingly rejects the findings of science, from climate change to evolution, and is turning away from rationality and reason in general.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Transportation, The Built Environment And Greenhouse Gas Emissions In Developing Cities

    It seems that income and travel are inextricably linked. As communities gain wealth and prosperity, their travel footprint increases. Global population is projected to increase by nearly 2 billion people by 2030. If this newly added population drove just 3,000 kilometers a year, they would emit more tonnes of C02...

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2010

    The Interaction Between Poverty, Growth And Democracy

    The presenter has remained a passionate advocate of reform since departing the presidency of Peru in 2006. In his home country, the presenter embodied the possibility of transformation, having risen from poverty in an Andean village to top political power, where he initiated a process of economic and social change...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Civics In Difficult Places

    Moderator wonders if these new digital forms are fundamentally liberating, providing users access to public spaces they might otherwise be denied. Moderator pursues this line of inquiry in a series of internet conversations with correspondents covering some of the world's most ravaged or oppressed regions.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    From Relief To Reconstruction ? Practical And Policy Challenge

    As the United Nations and worldwide NGOs face the challenges of providing basic services to the survivors of the January 2010 Haitian earthquake, the author scrutinizes what will ultimately be "Crucial to the outcome, in the Haitian context, of a successful recovery and rehabilitation by the Haitian people and for...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Giving Back: Finding The Best Way To Make A Difference

    The world's most intractable problems might be cracked if more of the "Brightest minds" could be tempted to work on them, asserts Bill Gates. Too many graduates of top universities like MIT find it infinitely more satisfying to deal in derivatives, he says, or lucrative areas of medical science like...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    The Gutenberg Parenthesis: Oral Tradition And Digital Technologies

    In this webcast, the author makes the deliberately provocative case for a Gutenberg "Parenthesis" - a period marked by the reign of the printing press and isolated from the largely oral culture that came before, and the digitally shaped culture emerging today. The author, who finds an upside in society's...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2010

    Transportation In Contemporary Society: A Complex Systems Approach

    In the nineteen fifties and sixties, students of transportation focused on building infrastructure and applied lessons from the physical sciences to designing mobility. Mobility was facilely linked to the engines of economic growth and expanding GDP. In time, that perspective was replaced by a focus on transportation systems and networks....

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Understanding and Supporting Directed Content Sharing on the Web

    To find interesting, personally relevant web content, the authors often rely on friends and colleagues to pass links along as they encounter them. This paper studies and augments link-sharing via e-mail, the most popular means of sharing web content today. Armed with survey data indicating that active sharers of novel...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Whanaungatanga: Sybil-Proof Routing With Social Networks

    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    ATAC: A Manycore Processor With On-Chip Optical Network

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    Risk Allocation for Multi-Agent Systems Using T??tonnement

    This paper proposes a new market-based distributed planning algorithm for multi-agent systems under uncertainty; called MIRA (Market based Iterative Risk Allocation). In large coordination problems, from power grid management to multi-vehicle missions, multiple agents act collectively in order to optimize the performance of the system, while satisfying mission constraints. These...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Oblivious Routing in On-Chip Bandwidth-Adaptive Networks

    Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex hardware to determine and configure new routing paths. The authors propose on-chip bandwidth-adaptive networks to mitigate the performance problems...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2008

    Global Television

    There's a lot that seems familiar on TV in other countries, and indeed, as these panelists recount, there's been a flow across borders of TV content and style nearly as long as the medium's been around.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2008

    The Way David Macaulay Works: Finding Ideas, Making Books And Visualizing Our World

    This webcast feels akin to a new Disney ride: During your tour inside the presenter's imagination, prepare to soar over Rome's great monuments, raft within the human body's circulatory system, and dismantle and rebuild the Empire State Building.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2007

    Is There A Black Architect In The House?

    "If there is any kind of profession that's gotten away with a kind of benign neglect of diversifying itself over the course of last 30 years, it's architecture," says the presenter. With one chart after another, he plots the dismal record of design schools, firms and professional associations in modifying...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Explorations in Cyber International Relations (ECIR) Data Dashboard Report #1: CERT Data Sources and Prototype Dashboard System

    Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative security measures needed to prevent and respond to cyber-security emergencies. The Exploring Cyber International Relations (ECIR) Data Dashboard project is an...

    Provided By Massachusetts Institute of Technology