Massachusetts Institute of Technology

Displaying 361-400 of 413 results

  • White Papers // Aug 2009

    Service Objects: Adaptable, Metadata-Based Services for Multi-Tenant On-Demand Enterprise Applications

    An adaptive, standardized service layer is a key feature of a multi-tenant on-demand enterprise application. Custom business logic and data need to be exposed via services that are tailored to the respective customer organization. Ideally, this layer of web services can be automatically derived from the underlying domain model. This...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    MapperMania: A Framework for Native Multi-Tenancy Business Object Mapping to a Persistent Data Store

    Enterprise resource planning software mainly occurs in large enterprises. Nevertheless, processes conducted by Small and Midsize Enterprises (SMEs) do have the same complexity. The Software-as-a-Service delivery model bears new challenges for application developers. Especially in the context of enterprise resource planning software targeting the SME market, new problems arise. Most...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Automatically Patching Errors in Deployed Software

    The authors present ClearView, a system for automatically patching errors in deployed software. ClearView works on stripped Windows x86 binaries without any need for source code, debugging information, or other external information, and without human intervention. ClearView observes normal executions to learn invariants that characterize the application's normal behavior, uses...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Bandwidth Extension of Low Noise Fractional-N Synthesizers

    In this paper, the authors examine issues with extending the bandwidth of fractional-N synthesizers. Quantization noise is shown to be the limiting factor in state-of-the-art fractional-N synthesis. A re-framing of the noise model used to analyze synthesizer phase noise leads directly to a methodology to enable high bandwidth synthesis. They...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    ESD And Health Care Systems: Some Strategic Considerations

    Proper health care delivery to a growing but aging population is becoming one of the most challenging tasks of the time. It becomes also one of the most complexes. Although many tools are at hand, grand designs and implementation systems are mostly lacking. In the industrialized countries, requests for optimal...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The 24-Hour Knowledge Factory Paradigm: The Evolving Model For Offshoring Based On Strategic, Economic, Legal, Health, Technical, And Other Considerations

    The 24-Hour Knowledge Factory paradigm involves 3 (or more) collaborating centers, each located in a different continent. Individuals at each center work from 9 am to 5 pm in that country, and then pass the work-in-progress to the next collaborating center to enable round-the clock performance in a manner somewhat...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    ATAC: On-Chip Optical Networks for Multicore Processors

    ˆe trend in modern microprocessor architectures is clear: multicore is here. As silicon resources become increasingly abundant, processor designers are able to place more and more cores on a chip: AMD and Intel have released 2-core chips with 4-core offerings coming soon. Forecasts show that by 2014, processors may contain...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Designing Energy-Efficient Low-Diameter On-Chip Networks with Equalized Interconnects

    In a power and area constrained multicore system, the on-chip communication network needs to be carefully designed to maximize the system performance and programmer productivity while minimizing energy and area. In this paper, the authors explore the design of energy-efficient low-diameter networks (flattened butterfly and Clos) using equalized on-chip interconnects....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Multiple Experiments For The Causal Link between The Quantity And Quality Of Children

    A longstanding question in the economics of the family is the relationship between family size and subsequent human capital formation and welfare. If there is a causal "Quantity-quality trade-off," then policies that discourage large families should lead to increased human capital and higher earnings. Ordinary least squares estimates and a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Productivity Differences Between And Within Countries

    The authors document substantial within-country (cross-municipality) differences in incomes for a large number of countries in the Americas. A significant fraction of the within-country differences cannot be explained by observed human capital. They conjecture that the sources of within-country and between-country differences are related. As a first step towards a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Electricity Transmission Policy For America: Enabling A Smart Grid, End-to-End

    This paper proposes a framework of policies to guide the future development of America's electric transmission grid so that the electric power industry will be able to serve more effectively the changing needs of the U.S. economy and society. The paper provides a factual overview of the American electric power...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Programming Manifolds

    Many programming domains involve the manipulation of values distributed through a manifold - examples include sensor networks, smart materials, and biofilms. This paper describes a programming semantics for manifolds based on the amorphous medium abstraction, which places a computational device at every point in the manifold. This abstraction enables the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Interactive Visual Histories for Vector Graphics

    Presentation and graphics software enables users to experiment with variations of illustrations. They can revisit recent editing operations using the ubiquitous undo command, but they are limited to sequential exploration. The authors propose a new interaction metaphor and visualization for operation history. While editing, a user can access a history...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    A Distributed Wearable, Wireless Sensor System for Evaluating Professional Baseball Pitchers and Batters

    This paper introduces a compact, wireless, wearable system that measures signals indicative of forces, torques and other descriptive and evaluative features that the human body undergoes during bursts of extreme physical activity (such as during athletic performance). Standard approaches leverage high-speed camera systems, which need significant infrastructure and provide limited...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Efficient Cache Attacks on AES, and Countermeasures

    The authors describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, which can be used for cryptanalysis of cryptographic primitives that employ data-dependent table lookups. The attacks allow an unprivileged process to attack other processes running...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Critical Issues And Grand Challenges

    The panelists use the lens of systems engineering to focus sharply on some signature global challenges in finance, healthcare, energy and IT. The system failure that undid the small but influential financial services industry was a few decades in the making, says one of the presenter.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Grand Challenges And Engineering Systems: Inspiring And Educating The Next Generation

    It's a good thing for a world increasingly beset by mammoth challenges that universities are responding with new engineering systems programs. These initiatives, as one of the presenter attests, are swiftly proliferating in the U.S. and abroad to equip students to address such complex issues as health care, sustainable energy,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Competition, Market Coverage, and Quality Choice in Interconnected Platforms

    The authors study duopoly competition between two interconnected Internet Service Providers (ISP) that compete in quality and prices for both Content Providers (CP) and consumers. They develop a game theoretic model using a two-sided market framework, where ISP's are modeled as interconnected plat-forms with quality bottlenecks; a consumer on a...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Global And Domestic Imbalances: Why Rural China Is The Key

    China owes its astonishing economic expansion not to far-sighted government policy but to hundreds of millions of entrepreneurial peasants. Yasheng Huang's research reveals not only how small-scale rural businesses created China's miracle but how that nation's recovery from the global recession and righting the massive East-West trade imbalance depend on...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    The Power Of Competition: How To Focus The World's Brains On Your Innovation Challenges

    Cooperation may be making us "A little bit too nice" when it comes to innovation, suggests Fiona Murray. She believes there's nothing like competition for injecting energy into the process of solving key innovation problems, whether in business or society.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Modeling Radio Networks

    The authors describe a modeling framework and collection of foundational composition results for the study of probabilistic distributed algorithms in synchronous radio networks. Existing results in this setting rely on informal descriptions of the channel behavior and therefore lack easy comparability and are prone to error caused by definition subtleties....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    VPriv: Protecting Privacy in Location-Based Vehicular Services

    A variety of location-based vehicular services are currently being woven into the national transportation infrastructure in many countries. These include usage- or congestion-based road pricing, traffic law enforcement, traffic monitoring, "Pay-as-you-go" insurance, and vehicle safety systems. Although such applications promise clear benefits, there are significant potential violations of the location...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Wishbone: Profile-Based Partitioning for Sensor net Applications

    The ability to partition sensor network application code across sensor nodes and back-end servers is important for running complex, data-intensive applications on sensor platforms that have CPU, energy, and bandwidth limitations. This paper presents Wishbone, a system that takes a data flow graph of operators and produces an optimal partitioning....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Wishbone: Profile-Based Partitioning for Sensornet Applications

    The ability to partition sensor network application code across sensor nodes and backend servers is important for running complex, data-intensive applications on sensor platforms that have CPU, energy, and bandwidth limitations. This paper presents Wishbone, a system that takes a dataflow graph of operators and produces an optimal partitioning. With...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Income And Health Spending: Evidence From Oil Price Shocks

    Health expenditures as a share of GDP have more than tripled over the last half century. A common conjecture is that this is primarily a consequence of rising real per capita income, which more than doubled over the same period. The authors investigate this hypothesis empirically by instrumenting for local...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Disciplined Agility For Process Control & Automation

    Process Automation systems can impact the operating cost of manufacturing equipment, the safe control of large quantities of energy and the safety of dangerous substances used during manufacturing. The manufacturing segment expects greater automation of larger processes, increased capability of process automation systems, and higher quality of those systems. At...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Lean Visual Management In An ERP/MES-Controlled Production Cell

    As a company grows, more and more effort is needed to control and coordinate operations. Typically, this is accomplished through an evolving collection of systems and processes, such as an Enterprise Resource Planning (ERP) system, but such systems also influence how a company does business, reviews performance, and communicate results....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Mitigating The Risk Of A New Workforce By Reducing Rework And Rightsizing On Hand Inventory

    Dramatically increasing the hourly workforce at a rapid pace to support accelerated product demand in an aircraft manufacturing facility in a short amount of time resulted in: increased rework, and increased part damage during assembly. The majority of rework results from simple workmanship mistakes from the new workforce. The approach...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Understanding Enterprise Behavior Using Hybrid Simulation Of Enterprise Architecture

    Today, the design of business enterprises is much more art than science. The complex structure and behavior of enterprises makes it difficult to untangle cause and effect amidst its components and their relationships. In order for managers to understand how an enterprise's architecture affects its behavior, they need tools and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Enabling Cultural Shifts: An Enterprise Approach Toward Lean Thinking

    The Supply Planning Operations team, in a large manufacturing firm, faced a future where their complexity of scope was increasing without an increase in resource levels. As an effort to improve both efficiency and effectively within the organization, they chose to adopt Lean Thinking as a method to streamline and...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Gradient Clock Synchronization in Dynamic Networks

    Establishing coordination between participants is at the core of many algorithmic challenges in distributed computing. A fundamental coordination task, and a basic prerequisite for many applications, is achieving a common notion of time. Typically every node in the network has access to a local hardware clock, but the hardware clocks...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Oblivious Routing in On-Chip Bandwidth-Adaptive Networks

    Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex hardware to determine and configure new routing paths. The authors propose on-chip bandwidth-adaptive networks to mitigate the performance problems...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    A Screening Model To Explore Planning Decisions In Automotive Manufacturing Systems Under Demand Uncertainty

    Large-scale, complex engineering systems, as for automotive manufacturing, often require significant capital investment and resources for systems configuration. Furthermore, these systems operate in environments that are constantly changing due to shifts in macroeconomic, market demand and regulations, which can significantly influence systems' performance. It is often very difficult or prohibitively...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2008

    Entrepreneurs in Supply Chain Management

    How is supply chain professionals involved in start-up firms? What sorts of companies employ them? What kinds of decisions do they make? In this webcast, the presenter will discuss how they became involved in entrepreneurial activities and how they utilize their supply chain expertise to help the enterprise work.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2008

    Leveraging Risk Management in the Sales and Operations Planning Process

    In order to incorporate risk management into the Sales and Operations Planning (S&OP) process, companies must segment their products and customers based on business importance, demand forecast, and order lead time. After completing these segmentation steps, companies can then apply appropriate risk management tactics to mitigate uncertainty in demand and...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2008

    The Way David Macaulay Works: Finding Ideas, Making Books And Visualizing Our World

    This webcast feels akin to a new Disney ride: During your tour inside the presenter's imagination, prepare to soar over Rome's great monuments, raft within the human body's circulatory system, and dismantle and rebuild the Empire State Building.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2008

    Global Television

    There's a lot that seems familiar on TV in other countries, and indeed, as these panelists recount, there's been a flow across borders of TV content and style nearly as long as the medium's been around.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2007

    Part 1: MIT Innovations in Management: Strategies for Sustainable Business Practice

    In this webcast, the presenter going to discuss about the innovations in management strategies for sustainable business practice. The presenter will discuss how are they doing it? How can eco-friendly, socially responsible business practices translate to the user bottom line? Where are the most promising areas of business opportunity today?...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2007

    Part 2: MIT Innovations in Management: Strategies for Sustainable Business Practice

    Sustainability is no longer relegated to offices that handle isolated issues like waste management or corporate charitable giving. Innovative leaders from a wide range of industries and functional areas are recognizing they can improve their business by embracing sustainable business practices.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2007

    Process Improvement In The Rarefied Environment Of Academic Medicine

    In this webcast the author says, "Medicine for the most part remains a cottage industry," then how can you impose system-wide improvements - especially if you're presiding over an academic hospital, where the culture rewards brilliant, independent, free-thinking doctors?

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2011

    A Power Efficient Sensing/Communication Scheme: Joint Source-Channel-Network Coding by Using Compressive Sensing

    The authors propose a joint source-channel-network coding scheme, based on compressive sensing principles, for wireless networks with AWGN channels (that may include multiple access and broadcast), with sources exhibiting temporal and spatial dependencies. Their goal is to provide a reconstruction of sources within an allowed distortion level at each receiver....

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    Optimal Routing and Scheduling for a Simple Network Coding Scheme

    The authors consider jointly optimal routing, scheduling, and network coding strategies to maximize throughput in wireless networks. While routing and scheduling techniques for wireless networks have been studied for decades, network coding is a relatively new technique that allows for an increase in throughput under certain topological and routing conditions....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2010

    A Multi-Hop Multi-Source Algebraic Watchdog

    In the authors' previous work ('An Algebraic Watchdog for Wireless Network Coding'), they proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, they...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    A Converse for the Wideband Relay Channel with Physically Degraded Broadcast

    The authors investigate the multipath fading relay channel in the limit of a large bandwidth, and in the non-coherent setting, where the channel state is unknown to all terminals, including the relay and the destination. They derive a lower bound on the capacity by proposing and analyzing a peaky frequency...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    On the Performance of Network Coding in Multi-Resolution Wireless Video Streaming

    Scalable video can be used to provide video streaming reliably to a heterogeneous set of receivers with different subscription levels. However, the performance of such schemes can be highly affected by scheduling constraints and unreliable feedback. Network coding, on the other hand, has been shown to reduce scheduling and prioritization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Bandwidth Extension of Low Noise Fractional-N Synthesizers

    In this paper, the authors examine issues with extending the bandwidth of fractional-N synthesizers. Quantization noise is shown to be the limiting factor in state-of-the-art fractional-N synthesis. A re-framing of the noise model used to analyze synthesizer phase noise leads directly to a methodology to enable high bandwidth synthesis. They...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2012

    Network Coding for Robust Wireless Networks

    Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. The authors aim to provide...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Equivalent Models for Multi-Terminal Channels

    The recently introduced network equivalence results are used to create bit-pipe models that can replace multi-terminal channels within a discrete memoryless network. The goal is to create a set of simple "Components" or "Blocks" that can be substituted for the channel in such a way that the resulting network is...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Optimality of Network Coding with Buffers

    The authors analyze distributed and Packetized implementations of random linear Network Coding (PNC) with buffers. In these protocols, nodes store received packets to later produce coded packets that reflect this information. They show the optimality of PNC for any buffer size; i.e., they show that PNC performs at least as...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2012

    A Fast Distributed Proximal-Gradient Method

    The authors present a distributed proximal-gradient method for optimizing the average of convex functions, each of which is the private local objective of an agent in a network with time-varying topology. The local objectives have distinct differentiable components, but they share a common non-differentiable component, which has a favorable structure...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2012

    Privacy Against Statistical Inference

    The authors propose a general statistical inference framework to capture the privacy threat incurred by a user that releases data to a passive but curious adversary, given utility constraints. They show that applying this general framework to the setting where the adversary uses the self-information cost function naturally leads to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Prioritized Gossip in Vehicular Networks

    The authors propose using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. Specifically, they derive a vehicular ad hoc network model from a large corpus of position data generated by San Francisco-area taxicabs. Unlike previous work, their model does not...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    Non-Asymptotic Analysis of Compressed Sensing Random Matrices: An U-Statistics Approach

    The authors apply Heoffding's U-statistics to obtain non-asymptotic analysis for Compressed Sensing (CS) random matrices. These powerful (U-statistics) tools appear to apply naturally to CS theory, in particular here they focus on one particular large deviation result. They chose two applications to outline how Ustatistics may apply to various CS...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2010

    Graph Coloring and Conditional Graph Entropy

    The authors consider the remote computation of a function of two sources where one is receiver side information. Specifically, given side information Y, they wish to compute f(X, Y) based on information transmitted by X over a noise-less channel. The goal is to characterize the minimal rate at which X...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2012

    Joint Coding and Scheduling Optimization in Wireless Systems With Varying Delay Sensitivities

    Throughput and per-packet delay can present strong trade-offs that are important in the cases of delay sensitive applications. The authors investigate such trade-offs using a random linear network coding scheme for one or more receivers in single hop wireless packet erasure broadcast channels. They capture the delay sensitivities across different...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    Whether and Where to Code in the Wireless Relay Channel

    The throughput benefits of random linear network codes have been studied extensively for wire-lined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations, for minimal centralized control while maximizing the throughput. In energy-constrained systems, however, coding sub-graphs should be chosen to minimize...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    A Fast and Secure Software Solution [ss7.0] That Counters Shoulder Surfing Attack

    Shoulder Surfing is a direct observation technique, such as looking over someone's shoulder to trap the information. It is relatively easy to stand next to someone and watch, what data the user types as an information to authenticate himselfherself to enter into a particular system. Often users are unaware of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2012

    A Framework for Thermal and Performance Management

    In modern computing facilities, higher and higher operating temperatures are due to the employment of power-hungry devices, hence the need for cost-effective heat dissipation solutions to guarantee proper operating temperatures. Within this context, Dynamic Thermal Management techniques (DTM) can be highly beneficial in proactively control heat dissipation, avoiding overheating. The...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2013

    Policy Enforcement Framework for Cloud Data Management

    Cloud computing is a major emerging technology that is significantly changing industrial computing paradigms and business practices. However, security and privacy concerns have arisen as obstacles to widespread adoption of clouds by users. While much cloud security research focuses on enforcing standard access control policies typical of centralized systems, such...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2014

    Guaranteeing Cloud Security

    Cloud computing offers numerous advantages to businesses and individuals by enabling them to store data and run websites on remote computers rather than ones they own. But many hesitate to use the technology for fear of what might happen if a cloud provider's systems aren't secured properly or break down.

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    The Reliability Value of Storage in a Volatile Environment

    In this paper, the authors examine the value of storage in securing reliability of a system with uncertain supply and demand, and supply friction. The storage is frictionless as a supply source, but once used, it cannot be filled up instantaneously. The focus application is a power supply network in...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2006

    Implementing a Functional/Timing Partitioned Microprocessor Simulator with an FPGA

    When creating a microarchitectural simulator, one desires three things: confidence in correctness, speed of design, and speed of simulation. The first requirement is necessary for accurate experimentation. The second impacts the architect's ability to perform microarchitectural exploration by rapidly describing a range of systems. The third affects the number of...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2013

    Efficient Private Information Retrieval Using Secure Hardware

    Existing crypto-based Private Information Retrieval (PIR) schemes are either limited in the set of queries they can per-form, or have prohibitively large performance overheads in making query comparisons. On the other hand, most previous tamper-resistant hardware schemes can support more general queries and have lower performance overheads, but need to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Asymptotic Interference Alignment for Optimal Repair of MDS codes in Distributed Data Storage

    In distributed storage systems, Maximum Distance Separable (MDS) erasure codes are well-known coding schemes that can offer maximum reliability for a given storage overhead. Consider a scenario where a file of size M is to be stored in n distributed storage nodes. The file is split into k equal parts...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2011

    Polynomial Length MDS Codes With Optimal Repair in Distributed Storage

    Erasure coding is a fundamental technique to build redundancy in distributed storage systems. In classical literature in coding theory, erasure codes have been developed so that they provide the maximum tolerance to disk failure (erasures) for a given storage overhead. In particular, it is well known that Maximum Distance Separable...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Achieving Non-Inclusive Cache Performance With Inclusive Caches

    Inclusive caches are commonly used by processors to simplify cache coherence. However, the trade-off has been lower performance compared to non-inclusive and exclusive caches. Contrary to conventional wisdom, the authors show that the limited performance of inclusive caches is mostly due to inclusion victims - lines that are evicted from...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2012

    Dynamic On-Chip Thermal Optimization for 3D Networks-on-Chip

    The complex thermal behavior prohibits the advancement of 3D VLSI system. Particularly, the high-density through-silicon-via-based 3D integration could lead to ultra-high temperature hot-spots and permanents silicon device damage. In this paper, the authors introduce an adaptive strategy to effectively diffuse heat throughout the 3D geometry. This strategy employs a dynamic...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Multithreaded Simulation to Increase Performance Modeling Throughput on Large Compute Grids

    Simulation for performance modeling of computer architectures is a compute intensive operation requiring many compute resources and CPU cycles. Typical usage models involve running multiple sequential jobs across multiple machines. Multithreading can be used to speed up individual simulation jobs, but only provides higher throughput than multiprogramming on large workloads...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2007

    Continual Hashing for Efficient Fine-Grain State Inconsistency Detection

    Transaction-Level Modeling (TLM) allows a designer to save functional verification effort during the modular refinement of an SoC by reusing the prior implementation of a module as a golden model for state inconsistency detection. One problem in simulation-based verification is the performance and bandwidth overhead of state dump and comparison...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2013

    Components and Considerations in Building an Insider Threat Program

    In this webcast, the presenter going to explain about the steps that every organization need to know about the insider threat. The presenter will discuss about the components and considerations in building an insider threat program.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Discovery and Security in Social Network Models: Graph-Theoretic Characterizations

    In this webcast, the presenter will explain about discovery and security in social network. Information dissemination/processing in social networks can often be abstractly modeled as dynamics defined on a graph. Security and discovery considered as an external observer that measures the network dynamics at a few nodes.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Cyber Security and the Risk of Cyber War

    Experts talk about the growing threat of cyber crime, espionage, and warfare, and how to thwart it. In this webcast, the presenter will explain about cyber security and the risk of cyber war.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Encrypting Sensitive Data: What You Need to Know

    Does the users' laptop or desktop computer contain sensitive data - such as social security numbers, credit card numbers, protected health information, proprietary research data, or confidential legal data? In this webcast, the presenter explains about the things that the users need to know to encrypt sensitive data.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2012

    6.033: Computer Systems Engineering

    In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Network Coded TCP (CTCP)

    The authors introduce CTCP, a reliable transport protocol using network coding. CTCP is designed to incorporate TCP features such as congestion control and reliability while improving on TCP's performance in lossy and/or dynamic networks. CTCP builds upon the ideas of TCP/NC introduced by Sundararajan et al. and uses network coding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    CTCP: Coded TCP using Multiple Paths

    The authors introduce CTCP, a novel multi-path transport protocol using network coding. CTCP is designed to incorporate TCP's good features, such as congestion control and reliability, while improving on TCP's performance in lossy and/or dynamic networks. CTCP builds upon the ideas of TCP/NC introduced by Sundararajan et al. and uses...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Cross-Layer Design to Maintain Earthquake Sensor Network Connectivity After Loss of Infrastructure

    The authors present the design of a cross-layer protocol to maintain connectivity in an earthquake monitoring and early warning sensor network in the absence of communications infrastructure. However, the data they provide is of critical importance to emergency and rescue decision making in the immediate aftermath of such events, as...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2007

    Multi-Modal User Authentication from Video for Mobile or Variable-Environment Applications

    In this paper, the authors apply a combination of face and speaker identification techniques to the task of multi-modal (i.e., multi-biometric) user authentication for mobile or variable environment applications. Audio-visual data was collected using a web camera connected to a laptop computer in three different environments: a quiet indoor office,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2012

    Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay

    The authors consider the optimal control problem for networks subjected to time-varying channels, reconfiguration delays, and interference constraints. They model the network by a graph consisting of nodes, links, and a set of link interference constraints, where based on the current network state, the controller decides either to stay with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Controlled Mobility in Stochastic and Dynamic Wireless Networks

    The authors consider the use of controlled mobility in wireless networks where messages arriving randomly in time and space are collected by mobile receivers (collectors). The collectors are responsible for receiving these messages via wireless communication by dynamically adjusting their position in the network. Their goal is to utilize a...

    Provided By Massachusetts Institute of Technology