Massachusetts Institute of Technology

Displaying 41-80 of 394 results

  • Webcasts // Jan 2013

    Designing for the Cloud

    In this webcast, the presenter going to explain about the cloud computing which is one of the emerging technology. The presenter explains a startup that is developing a database designed to cope with the idiosyncrasies of cloud computing.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Software Systems Architecture in the World of Cloud Computing

    In this webcast, the presenter will discuss about the software system architecture using cloud computing. The presenter describes about the cost of change decreases when software applications are put in the cloud.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2013

    Security Introduction

    In this Webcast, the presenter going explain about the topic protection which is like fault tolerance recover ability one of these properties of systems building secure and protective system has implication for entire design of systems. The presenter will also explain about the set of issues related to security management.

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Saddle Point in the Minimax Converse for Channel Coding

    A mini-max meta-converse has recently been proposed as a simultaneous generalization of a number of classical results and a tool for the non-asymptotic analysis. In this paper it is shown that the order of optimizing the input and output distributions can be interchanged without affecting the bound. In the course...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Empirical Rate-Distortion Study of Compressive Sensing-Based Joint Source-Channel Coding

    Compressive Sensing (CS) is a novel technique which allows to reconstruct signals using much fewer measurements than traditional sampling methods by taking advantage of the sparsity of the signals to be compressed. Previous works related to the rate-distortion analysis of CS have been focused on its performance related to image...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Toward Sustainable Networking: Storage Area Networks with Network Coding

    Current projections indicate that the worldwide Data Center (DC) industry will require a quadrupling of capacity by the year 2020, primarily through increased demand for high-definition video streaming. In addition to requiring significant financial investments, worldwide DC capacities are approaching a scale in which their energy consumption and carbon footprint...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Lists That Are Smaller Than Their Parts: A Coding Approach to Tunable Secrecy

    Classic information-theoretic approaches to secrecy are concerned with unconditionally secure systems, i.e. schemes that manage to hide all the bits of a message from an adversary with unbounded computational resources. It is well known that, for a noiseless setting, unconditional (i.e. perfect) secrecy can only be attained when both communicating...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Cross-Layer Design to Maintain Earthquake Sensor Network Connectivity After Loss of Infrastructure

    The authors present the design of a cross-layer protocol to maintain connectivity in an earthquake monitoring and early warning sensor network in the absence of communications infrastructure. However, the data they provide is of critical importance to emergency and rescue decision making in the immediate aftermath of such events, as...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Network Coded TCP (CTCP)

    The authors introduce CTCP, a reliable transport protocol using network coding. CTCP is designed to incorporate TCP features such as congestion control and reliability while improving on TCP's performance in lossy and/or dynamic networks. CTCP builds upon the ideas of TCP/NC introduced by Sundararajan et al. and uses network coding...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    CTCP: Coded TCP using Multiple Paths

    The authors introduce CTCP, a novel multi-path transport protocol using network coding. CTCP is designed to incorporate TCP's good features, such as congestion control and reliability, while improving on TCP's performance in lossy and/or dynamic networks. CTCP builds upon the ideas of TCP/NC introduced by Sundararajan et al. and uses...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2012

    Broadcasting XORs: On the Application of Network Coding in Access Point-to-Multipoint Networks

    The authors investigate Network Coding (NC) in access Point-to-Multi-Point (PMP) broadcast networks. Characterized by a shared unicast up-stream channel and a time-shared broadcast downstream channel, PMP networks are widely deployed in optical and wireless access networks. They develop a queuing-theoretic model of NC at the Medium Access Control (MAC) sub-layer...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2012

    Rethinking Supply Chain Strategy in Complex Markets

    In today's complex world Supply Chain Strategy (SCS) has to keep pace with ever-changing markets. This is no easy task. In this webcast, the presenter going to discuss about how to evaluate and implement an SCS that is aligned with the company's business goals and market outlook.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2012

    Supply Chain Innovation Conference - Big Data: A Game Changer for Supply Chain 2.0

    In this Webcast, the presenter going explain about the bid data which is a game changer for supply chain innovation. The presenter going to explain about the Flextronics and their primary groups in which they are focused on the development of the supply chain innovations.

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2012

    A Fast Distributed Proximal-Gradient Method

    The authors present a distributed proximal-gradient method for optimizing the average of convex functions, each of which is the private local objective of an agent in a network with time-varying topology. The local objectives have distinct differentiable components, but they share a common non-differentiable component, which has a favorable structure...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2012

    Privacy Against Statistical Inference

    The authors propose a general statistical inference framework to capture the privacy threat incurred by a user that releases data to a passive but curious adversary, given utility constraints. They show that applying this general framework to the setting where the adversary uses the self-information cost function naturally leads to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2012

    Commitments and Efficient Zero-Knowledge Proofs From Learning Parity with Noise

    Commitment schemes and zero-knowledge proofs are fundamental cryptographic primitives. In this paper, the authors propose a simple string commitment scheme and show efficient zero-knowledge proofs for any relation amongst committed values. The security (more precisely, the computational hiding property) of their commitment scheme relies on the Learning Parity with Noise...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2012

    A Framework for Thermal and Performance Management

    In modern computing facilities, higher and higher operating temperatures are due to the employment of power-hungry devices, hence the need for cost-effective heat dissipation solutions to guarantee proper operating temperatures. Within this context, Dynamic Thermal Management techniques (DTM) can be highly beneficial in proactively control heat dissipation, avoiding overheating. The...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2012

    P3: Privacy Preservation Protocol for Appliance Control Application

    To address recently emerging concerns on privacy violations, this paper investigates possible sensitive information leakages in the appliance control, which is one of the handiest and most visible applications in smart grids. Without a consistent privacy preservation mechanism, the appliance control system can capture, model and divulge customers' behavior, activities,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    A General Distributed Approach to Slice Embedding with Guarantees

    The challenge of deploying and managing virtualization based network services (slices) recently spurred interest in both the business and the research communities. To provide wide-area network services, resources from different infrastructure providers are needed. Leveraging the consensus-based task allocation algorithms from the robotics literature, the authors propose a general distributed...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Prioritized Gossip in Vehicular Networks

    The authors propose using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. Specifically, they derive a vehicular ad hoc network model from a large corpus of position data generated by San Francisco-area taxicabs. Unlike previous work, their model does not...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    The Adversarial Joint Source-Channel Problem

    This paper introduces the problem of joint source-channel coding in the setup where channel errors are adversarial and the distortion is worst case. Unlike the situation in the case of stochastic source-channel model, the separation principle does not hold in adversarial setup. This surprising observation demonstrates that designing good distortion-correcting...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    A Converse for the Wideband Relay Channel with Physically Degraded Broadcast

    The authors investigate the multipath fading relay channel in the limit of a large bandwidth, and in the non-coherent setting, where the channel state is unknown to all terminals, including the relay and the destination. They derive a lower bound on the capacity by proposing and analyzing a peaky frequency...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Equivalent Models for Multi-Terminal Channels

    The recently introduced network equivalence results are used to create bit-pipe models that can replace multi-terminal channels within a discrete memoryless network. The goal is to create a set of simple "Components" or "Blocks" that can be substituted for the channel in such a way that the resulting network is...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2012

    Optimality of Network Coding with Buffers

    The authors analyze distributed and Packetized implementations of random linear Network Coding (PNC) with buffers. In these protocols, nodes store received packets to later produce coded packets that reflect this information. They show the optimality of PNC for any buffer size; i.e., they show that PNC performs at least as...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2012

    Diversity Versus Channel Knowledge at Finite Block-Length

    The authors study the maximal achievable rate for a given block-length n and block error probability over Rayleigh block-fading channels in the non-coherent setting and in the finite block-length regime. Their results show that for a given block-length and error probability, is not monotonic in the channel's coherence time, but...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    Non-Asymptotic Analysis of Compressed Sensing Random Matrices: An U-Statistics Approach

    The authors apply Heoffding's U-statistics to obtain non-asymptotic analysis for Compressed Sensing (CS) random matrices. These powerful (U-statistics) tools appear to apply naturally to CS theory, in particular here they focus on one particular large deviation result. They chose two applications to outline how Ustatistics may apply to various CS...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    Network Coding With Association Policies in Heterogeneous Networks

    The authors focus on implementing a modified TCP/IP protocol stack by positioning network coding functionalities in the form of a new layer in between the transport and the network layer, thereby allowing incremental deployment. They implement this proposed modification for the TCP/IP stack in the OPNET Modeler and analyze implemented...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    On Reliability Functions for Single-Message Unequal Error Protection

    Single-message Unequal Error Protection (UEP) is a channel coding scheme that protects one special message differently from other (regular) messages. This induces three different types of errors in the system: miss (where the authors decode the special codeword as a regular codeword), false alarm (where they decode a regular codeword...

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2012

    6.033: Computer Systems Engineering

    In this webcast, the presenter focuses on topics on the engineering of computer software and hardware systems: techniques for controlling complexity; strong modularity using client-server design, virtual memory, threads, privacy, security and encryption.

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2012

    Optimal Routing and Scheduling for a Simple Network Coding Scheme

    The authors consider jointly optimal routing, scheduling, and network coding strategies to maximize throughput in wireless networks. While routing and scheduling techniques for wireless networks have been studied for decades, network coding is a relatively new technique that allows for an increase in throughput under certain topological and routing conditions....

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2012

    MITEF-NYC: Cloud Computing: The Next Generation

    IDC predicts that spending on hardware, software and services in cloud computing systems alone will be $60 billion in 2012. The growth rate in the cloud sector is four and a half times that of the IT industry overall. Cloud computing is a compelling option for many small and mid-sized...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2012

    MIT Sloan Africa Innovate - Panel - Mobile and Technology

    The growth in the mobile telecoms is considered a major factor in the strong growth rate in sub-saharan economies. Also the introduction of business, social and health solutions facilitated by the growing availability of mobile technologies show the potential for rapid transformation.

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2012

    Dynamic On-Chip Thermal Optimization for 3D Networks-on-Chip

    The complex thermal behavior prohibits the advancement of 3D VLSI system. Particularly, the high-density through-silicon-via-based 3D integration could lead to ultra-high temperature hot-spots and permanents silicon device damage. In this paper, the authors introduce an adaptive strategy to effectively diffuse heat throughout the 3D geometry. This strategy employs a dynamic...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2012

    Random Access Compressed Sensing Over Fading and Noisy Communication Channels

    Random Access Compressed Sensing (RACS) is an efficient method for data gathering from a network of distributed sensors with limited resources. RACS relies on integrating random sensing with the communication architecture, and achieves overall efficiency in terms of the energy per bit of information successfully delivered. To address realistic deployment...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2012

    Joint Coding and Scheduling Optimization in Wireless Systems With Varying Delay Sensitivities

    Throughput and per-packet delay can present strong trade-offs that are important in the cases of delay sensitive applications. The authors investigate such trade-offs using a random linear network coding scheme for one or more receivers in single hop wireless packet erasure broadcast channels. They capture the delay sensitivities across different...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2012

    On Asynchronous Capacity and Dispersion

    Recently Tchamkerten et al. proposed a mathematical formulation of the problem of joint synchronization and error-correction in noisy channels. A variation of their formulation in this paper considers a strengthened requirement that the decoder estimate both the message and the location of the codeword exactly. It is shown that the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2012

    Cryptographic Path Hardening: Hiding Vulnerabilities in Software Through Cryptography

    The authors propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "Harden" they mean that certain error-checking if-conditionals in a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2012

    Network Coding for Robust Wireless Networks

    Wireless networks and communications promise to allow improved access to services and information, ubiquitous connectivity, and mobility. However, current wireless networks are not well-equipped to meet the high bandwidth and strict delay requirements of future applications. Wireless networks suffer from frequent losses and low throughput. The authors aim to provide...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2012

    Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay

    The authors consider the optimal control problem for networks subjected to time-varying channels, reconfiguration delays, and interference constraints. They model the network by a graph consisting of nodes, links, and a set of link interference constraints, where based on the current network state, the controller decides either to stay with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2011

    Sparse Random Linear Network Codes

    In this paper, the authors presented a randomized approach to linear network coding. In this scheme each intermediate node chooses linear coding coefficients randomly and uniformly from the finite field Fq. This approach can be used in various types of networks. It is shown that the capacity of multicast network...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Negotiating The Gulf Disaster

    The Gulf Oil spill hurt many individuals and businesses, and there is broad agreement that they deserve compensation. But working out the nuances of damage payment is no simple matter, as the presenter describes in conversation with an MIT Museum audience.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Toward Efficient Airport Operations

    Few of us would elect to spend countless hours at the airport watching planes arrive, depart and sit at gates. But what constitutes a punishment for some actually energizes the presenter, whose research focuses on improving airport operations. Her goal is to make air travel more efficient, robust and green.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Open Payment, A New Approach To Public Transportation Fare Collection

    Soon, a ticket to ride won't require paper coupons, tokens, human vendors, or even Boston's CharlieCard. Urban transit is abandoning a century old payment system for sophisticated digital payment technology, says the author. The author has been toiling for a decade on technology and methods that will enable transit industry...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    The Art Of Science Communication

    You wouldn't know that the moderator felt nervous in advance of addressing this audience of neuroscientists. In his trademark style, moderator chats up the crowd like an old friend, sharing anecdotes involving one of his great pursuits: "I love to talk to scientists," moderator says.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Excellence Is A Shared Path: Working Together For Justice And The Quality Of Life

    Exploring the past opens up new perspectives on the present and offers ways of navigating a challenging future, these speakers suggest, in a call to action on the occasion of Martin Luther King, Jr.'s birthday.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    Excellence Is A Shared Path: Student Remarks

    In their brief remarks honoring the legacy of Dr. Martin Luther King, Jr., two students strike the theme of collaboration. They touch on the importance of humility and listening to one's inner voice while pursuing a shared vision of justice and equality.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Future Of Finance

    In this webcast, the author chooses not to focus on the financial crisis. It is clear to him there were "Fools and knaves," as well as "Many structural elements that would have happened even if people were well behaved and well informed" - risks are simply "Embedded in our systems."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Finance In Action

    The moderator introduces the panelists as distinguished academics and practitioners who share not only their status as MIT alums, but also their innovative application of finance theory to entrepreneurship. "They were in the middle of the action," said the moderator.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2011

    The Growth Of Cryptography

    It's not every day that Euclid appears in public with "Alice and Bob," but in a lecture spanning a few thousand years, the presenter summons these and other notables in his history of cryptography. While citing milestones of code-making and breaking, the presenter also brings his audience up to date...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    The Evolution Of Financial Technology

    An unmistakable glow of nostalgia rises from this reunion of "Five of the founding fathers of modern finance," in the words of the moderator. The speakers reminisce about their start in economics, and their professional lives at MIT, a decades-long era of intense collaboration and creativity that both transformed the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2011

    Economic Policy Challenges: Microeconomics And Regulation

    Given its contributions to policy and practice in such key sectors as health care, industrial organization and technological innovation, and energy and the environment, microeconomics may not be getting the kind of respect, or at least attention, it deserves, the authors suggest.

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Report: NSF Workshop on Future Wireless Communication Research

    The wireless communication industry is a trillion-dollar, worldwide business that represents a substantial fraction of the global Gross Domestic Product. Over the past two decades, it has had a transformative impact on the society and has revolutionized almost all aspects of human interaction. These networks are inescapably intertwined with the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Geographic Routing Without Planarization

    The authors present a new geographic routing algorithm, the Greedy Distributed Spanning Tree Routing (GDSTR), that finds shorter routes and generates less maintenance traffic than previous algorithms. While geographic routing potentially scales well, it faces the problem of what to do at local dead ends where greedy forwarding fails. Existing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Pastwatch: A Distributed Version Control System

    Pastwatch is a version control system that acts like a traditional client-server system when users are connected to the network; users can see each other's changes immediately after the changes are committed. When a user is not connected, Pastwatch also allows users to read revisions from the repository, commit new...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Proactive Replication for Data Durability

    Many wide area storage systems replicate data for durability. A common way of maintaining the replicas is to detect node failures and respond by creating additional copies of objects that were stored on failed nodes and hence suffered a loss of redundancy. Reactive techniques can minimize total bytes sent since...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Relational Cloud: A Database-as-a-Service for the Cloud

    This paper introduces a new transactional "DataBase-as-a-Service" (DBaaS) called Relational Cloud. A DBaaS promises to move much of the operational burden of provisioning, configuration, scaling, performance tuning, backup, privacy, and access control from the database users to the service operator, offering lower overall costs to users. Early DBaaS efforts include...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Accelerated Dual Descent for Network Optimization

    Dual descent methods are commonly used to solve network optimization problems because their implementation can be distributed through the network. However, their convergence rates are typically very slow. This paper introduces a family of dual descent algorithms that use approximate Newton directions to accelerate the convergence rate of conventional dual...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

    The authors study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. The objective is to design a power control scheme that achieves a (near) optimal power allocation with respect to any predetermined network objective (such as the maximization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Performance of Multihop Wireless Networks: Shortest Path Is Not Enough

    Existing wireless ad hoc routing protocols typically find routes with the minimum hop-count. This paper presents experimental evidence from two wireless test-beds which shows that there are usually multiple minimum hop-count paths, many of which have poor throughput. As a result, minimum-hop-count routing often chooses routes that have significantly less...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Peering Peer-To-Peer Providers

    The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distributed computational infrastructure. While this cooperative end-user approach works well in many application settings, it does not provide a sufficiently stable platform for certain peer-to-peer applications (e.g., DHTs...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Understanding Broadband Speed Measurements

    Broadband speed has emerged as the single most commonly cited metric for characterizing the quality of broadband offerings. However speed measurements for the same service can vary significantly. These differences arise from a complex set of factors including different test methodologies and test conditions. For any testing methodology, teasing apart...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Broadband Microfoundations: The Need for Traffic Data

    To date, most of the empirical effort to understand broadband service markets has focused on availability and adoption metrics and data. Data of this sort is indeed valuable when the dominant policy questions concern penetration and uptake. However, as broadband availability and penetration saturate, such data will become less informative....

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Hybrid Wireless Broadband

    Wireless access networks are evolving rapidly and hold the promise of significantly altering the landscape for broadband competition. In a companion paper, the authors explained why wireless networks are unlikely to converge toward the sort of broadband platform network exemplified by wired Next Generation Access Networks. In this paper the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    On the Convergence of Wired and Wireless Access Network Architectures

    Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-purpose IP platform with over-the-top services at the application layer, which is similar to the design of wired IP platform networks. This paper examines whether wired...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The Evolution of Internet Congestion

    This paper discusses the evolution of the congestion controls that govern all Internet traffic. In particular the authors chronicle and discuss the implications of the fact that the most significant "Congestion Signals" are increasingly coming from network operators, not the TCP stack. Providers now nudge users into different traffic patterns...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    SCADA for the Rest of Us: Unlicensed Bands Supporting Long-Range Communications

    The authors are on the cusp of the next big wave in Internet and wireless technology for the mass market: the emergence of ubiquitous smart environments capable of automated sensing and interaction with the physical world around one.. A critical ingredient for this future is the deployment and availability of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    F2F: Reliable Storage in Open Networks

    A major hurdle to deploying a distributed storage infrastructure in peer-to-peer systems is storing data reliably using nodes that have little incentive to remain in the system. The authors argue that a node should choose its neighbors (The nodes with which it shares resources) based on existing social relationships instead...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2010

    Throughput Optimization in Mobile Backbone Networks

    This paper describes new algorithms for throughput optimization in a mobile backbone network. This hierarchical communication framework combines mobile backbone nodes, which have superior mobility and communication capability, with regular nodes, which are constrained in mobility and communication capability. An important quantity of interest in mobile backbone networks is the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2007

    Low-Cost Airports For Low-Cost Airlines: Flexible Design To Manage The Risks

    The paradigm of airport planning and design is changing fundamentally. Low-cost airlines have become significant drivers of airport planning, along with aircraft size and other technical factors. They have different requirements than the "Legacy" carriers. They focus on cost and on alternative ways to handle passengers. Now being sizeable participants...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2010

    Price Of Airline Frequency Competition

    Frequency competition influences capacity allocation decisions in airline markets and has important implications to airline profitability and airport congestion. Market share of a competing airline is a function of its frequency share and the relationship between the two is pivotal for understanding the impacts of frequency competition on airline business....

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Evolution Of The Lean Enterprise System: A Critical Synthesis And Agenda For The Future

    Many aerospace enterprises and other organizations have adopted a variety of management approaches to achieve continuous process improvement, enterprise change and transformation, such as the lean enterprise system, Total Quality Management (TQM), Theory Of Constraints (TOC), agile manufacturing, and Business Process Reengineering (BPR). Among them, the lean enterprise system, with...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2010

    Simulating The Impact Of Strategy Development Frameworks On Transportation Infrastructure System Performance

    This paper develops, through a simulation model, a deeper understanding of the relationship between transportation infrastructure strategy development frameworks and system performance. A strategy development framework for transportation can be characterized by the infrastructure ownership structures, cross-modal and cross-sectoral linkages, revenue sources, resource allocation decision-making processes, and geographic scales of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Financial Development, Gender And Entrepreneurship

    Female entrepreneurs are much less frequent than male entrepreneurs. In this paper the authors investigate a possible culprit: access to financial services. They use a dataset with entrepreneurship rates by opportunity and by need from the Global Entrepreneurship Monitor and indicators of financial institutions from Beck, Demirguc-Kunt and Levine (2000)...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    ESD And Health Care Systems: Some Strategic Considerations

    Proper health care delivery to a growing but aging population is becoming one of the most challenging tasks of the time. It becomes also one of the most complexes. Although many tools are at hand, grand designs and implementation systems are mostly lacking. In the industrialized countries, requests for optimal...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The 24-Hour Knowledge Factory Paradigm: The Evolving Model For Offshoring Based On Strategic, Economic, Legal, Health, Technical, And Other Considerations

    The 24-Hour Knowledge Factory paradigm involves 3 (or more) collaborating centers, each located in a different continent. Individuals at each center work from 9 am to 5 pm in that country, and then pass the work-in-progress to the next collaborating center to enable round-the clock performance in a manner somewhat...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    The Portuguese High Speed Rail Network; Relating Financing To Strategic And Operating Issues

    This paper describes the implementation of the Portuguese High Speed Rail (HSR) Network. The business model developed by RAVE for the PPP's related with the HSR infrastructure is described and discussed. Following a recently awarded research project (EXPRESS) aimed at studying the strategic aspects related with the implementation of HSR...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    U.S.-Cuba Relations: The Beginning Of A Long Thaw?

    To the dismay of these seasoned Cuba specialists, the Obama administration is not pursuing a rapid thaw in relations with the Castro regime. While there appears no speedy end to 50 years of icy antipathy toward Cuba, the speakers detect a few hopeful signs of warming in recent times.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    Entrepreneurship, Government, And Development In Africa

    After centuries of insufferable oppression by colonial powers, bloody independence struggles, and corrupt home-grown regimes, "Africa today is quickly awakening, and determined to mainstream itself in the phenomenon of the globalization process," says the author, who served as Ghana's president for two terms starting in 2000.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    Financial Services: Prospects For Your Future

    In a lively discussion with the authors deconstructs the near collapse of the banking system and points out the multiple factors that have contributed to the financial crisis. Topics in the discussion include the banks that did not fail, how Canadian and other countries' banking systems also did not fail,...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Algebraic Network Coding Approach to Deterministic Wireless Relay Networks

    The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and interference. Avestimehr et al. showed that the Min-cut Max-flow theorem holds in the...

    Provided By Massachusetts Institute of Technology