Massachusetts Institute of Technology

Displaying 81-120 of 413 results

  • White Papers // Nov 2011

    Polynomial Length MDS Codes With Optimal Repair in Distributed Storage

    Erasure coding is a fundamental technique to build redundancy in distributed storage systems. In classical literature in coding theory, erasure codes have been developed so that they provide the maximum tolerance to disk failure (erasures) for a given storage overhead. In particular, it is well known that Maximum Distance Separable...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2011

    A Systems View of Enabling Enterprise Change

    Enterprise change is hard, especially for mature, successful companies. Many of the keys to accomplishing enterprise change come from seeing the enterprise itself as a complex system. In this webcast, the presenter will discuss many of the ingredients necessary for an enterprise to change itself and acquire new capabilities.

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2011

    Energy-Efficient Time-Stampless Adaptive Nonuniform Sampling

    Now-a-days, since more and more battery-operated devices are involved in applications with continuous sensing, development of efficient sampling mechanisms is an important issue for these applications. In this paper, the authors investigate power efficiency aspects of a recently proposed adaptive non-uniform sampling. This sampling scheme minimizes the energy consumption of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2011

    A Power Efficient Sensing/Communication Scheme: Joint Source-Channel-Network Coding by Using Compressive Sensing

    The authors propose a joint source-channel-network coding scheme, based on compressive sensing principles, for wireless networks with AWGN channels (that may include multiple access and broadcast), with sources exhibiting temporal and spatial dependencies. Their goal is to provide a reconstruction of sources within an allowed distortion level at each receiver....

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    The Reliability Value of Storage in a Volatile Environment

    In this paper, the authors examine the value of storage in securing reliability of a system with uncertain supply and demand, and supply friction. The storage is frictionless as a supply source, but once used, it cannot be filled up instantaneously. The focus application is a power supply network in...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    Whether and Where to Code in the Wireless Relay Channel

    The throughput benefits of random linear network codes have been studied extensively for wire-lined and wireless erasure networks. It is often assumed that all nodes within a network perform coding operations, for minimal centralized control while maximizing the throughput. In energy-constrained systems, however, coding sub-graphs should be chosen to minimize...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    Speeding Multicast by Acknowledgment Reduction Technique (SMART)

    The authors present a novel feedback protocol for wireless broadcast networks that utilize linear network coding. They consider transmission of packets from one source to many receivers over a single-hop broadcast erasure channel. Their method utilizes a predictive model to request feedback only when the probability that all receivers have...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2011

    A Trigger-Based Middleware Cache for ORMs

    Caching is an important technique in scaling storage for high-traffic web applications. Usually, building caching mechanisms involves significant effort from the application developer to maintain and invalidate data in the cache. In this paper, the authors present CacheGenie, a caching middleware which makes it easy for web application developers to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2011

    The Sender-Excited Secret Key Agreement Model: Capacity Theorems

    The authors consider the fundamental limits of the secret key generation problem when the sources are excited by the sender. In many practical communication settings, the channel may be influenced by the parties involved. Similar to recent works on probing capacity and channels with action-dependent states, their system model captures...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Experiences In Cyber Security Education: The MIT Lincoln Laboratory Capture-the-Flag Exercise

    Many popular and well-established cyber security Capture The Flag (CTF) exercises are held each year in a variety of settings, including universities and semi-professional security conferences. CTF formats also vary greatly, ranging from linear puzzle-like challenges to team-based offensive and defensive free-for-all hacking competitions. While these events are exciting and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    A Software Approach to Unifying Multicore Caches

    Multicore chips will have large amounts of fast on-chip cache memory, along with relatively slow DRAM interfaces. The on-chip cache memory, however, will be fragmented and spread over the chip; this distributed arrangement is hard for certain kinds of applications to exploit efficiently, and can lead to needless slow DRAM...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Asymptotic Interference Alignment for Optimal Repair of MDS codes in Distributed Data Storage

    In distributed storage systems, Maximum Distance Separable (MDS) erasure codes are well-known coding schemes that can offer maximum reliability for a given storage overhead. Consider a scenario where a file of size M is to be stored in n distributed storage nodes. The file is split into k equal parts...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Probabilistically Accurate Program Transformations

    The standard approach to program transformation involves the use of discrete logical reasoning to prove that the applied transformation does not change the observable semantics of the program. This paper, in contrast, introduces a novel approach that uses probabilistic reasoning to justify transformations that may change the result that the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Faster Information Dissemination in Dynamic Networks Via Network Coding

    In this paper, the authors demonstrate that network coding can significantly improve the efficiency of distributed computations in dynamic networks. Network coding breaks with the classical paradigm of routing atomic packets through a network and recognizes that information can be mixed and coded together in ways other (physical) quantities can...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2011

    Rank Minimization Over Finite Fields

    The problem of matrix completion has been well studied in recent years. Essentially, one is given a (small) subset of entries of a low-rank matrix and one is required to estimate all the the remaining entries. In this paper, the authors establish information-theoretic limits in estimating a finite field low-rank...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    On the Geometry of Wireless Network Multicast in 2-D

    The authors provide a geometric solution to the problem of optimal relay positioning to maximize the multicast rate for low-SNR networks. The network they consider consists of a single source, multiple receivers and the only intermediate and locatable node as the relay. They construct network the hypergraph of the system...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    Detecting and Escaping Infinite Loops With Jolt

    Infinite loops can make applications unresponsive. Potential problems include lost work or output, denied access to application functionality, and a lack of responses to urgent events. The authors present Jolt, a novel system for dynamically detecting and escaping infinite loops. At the user's request, Jolt attaches to an application to...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    Manipulating Program Functionality to Eliminate Security Vulnerabilities

    Security vulnerabilities can be seen as excess undesirable functionality present in a software system. The authors present several mechanisms that can either excise or change system functionality in ways that may eliminate security vulnerabilities while, enabling the system to continue to deliver acceptable service. They discuss several automatic techniques for...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2011

    History, Expectations, And Leadership In Evolution Of Cooperation

    The authors study the evolution of the social norm of "Cooperation" in a dynamic environment. Each agent lives for two periods and interacts with agents from the previous and next generations via a coordination game. "History" matters because agents only receive noisy information about the play of the previous generation...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    The Future of Learning

    In this Webcast, the presenter explains about the future of education. One of the assumptions on which the presenter has built is that the future of education is about learning, not about schooling. The companion assumption is that technology has a critical role to play, not as an end but...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Technology: Do Kids Need More or Less?

    The ultimate questions for this Sandbox 2011 panel, posed by the presenter, are "Where is technology not working? When is technology not the answer?" That's a bold agenda for a panel of children's media creators and a roomful of other producers in the industry, from Sesame Workshop, WGBH, 360 Kid,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Learning 3.0: Why Technology Belongs in Every Classroom

    The Obama Administration's recently unveiled plan for transforming American education through technology does not envision "Plugging kids in and making them smarter," declares the presenter. Instead, it focuses on leveraging aspects of digital technology "To create way more compelling environments in schools," and to address educational inequities and the larger...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Plays Well With Others: Leadership in Online Collaboration

    In this Webcast, the presenter finds the accomplishments of such online collaborations as Wikipedia, Apache and Firefox "Nothing less than astounding," and is both eagerly seeking and hoping to foster the next creative group Internet sensation. The presenter identifies some typical collaborative modes, including the remix (adapting someone else's project);...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2011

    Gasping for AIR - Why We Need Linked Rules and Justifications on the Semantic Web

    The Semantic Web is a distributed model for publishing, utilizing and extending structured information using Web protocols. One of the main goals of this technology is to automate the retrieval and integration of data and to enable the inference of interesting results. This automation requires logics and rule languages that...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2011

    Exact Distance Oracles for Planar Graphs

    A fast shortest-path query data structure may be of use whenever an application needs to compute shortest path distances between some but not all pairs of nodes. Indeed, shortest-path query processing is an integral part of many applications, in particular in Geographic Information Systems (GIS) and intelligent transportation systems. These...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2011

    Business and Economics

    Even the most sophisticated technology and computational methods may not be enough to prevent the kind of disastrous errors that recently played out across the global economy, suggest these two speakers. Human temperament and judgment will remain critical factors in financial markets.

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Remote Oblivious Storage: Making Oblivious RAM Practical

    Remote storage of data has become an increasingly attractive and advantageous option, especially due to cloud systems. While encryption protects the data, it does not hide the access pattern to the data. A natural solution is to access remote storage using an Oblivious RAM (ORAM) which provably hides all access...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Controlled Mobility in Stochastic and Dynamic Wireless Networks

    The authors consider the use of controlled mobility in wireless networks where messages arriving randomly in time and space are collected by mobile receivers (collectors). The collectors are responsible for receiving these messages via wireless communication by dynamically adjusting their position in the network. Their goal is to utilize a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Robust Distributed Routing in Dynamical Flow Networks - Part I: Locally Responsive Policies and Weak Resilience

    Robustness of distributed routing policies is studied for dynamical flow networks, with respect to adversarial disturbances that reduce the link flow capacities. A dynamical flow network is modeled as a system of ordinary differential equations derived from mass conservation laws on a directed acyclic graph with a single origin-destination pair...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    Data-Driven Traffic Modeling, Prediction, and Planning

    Some professors work primarily in labs and others mainly at desks. Presenter conducts her research on the bustling streets of Singapore, where she is helping to design a "Future mobility project" Whose goal is to "Marry information technology with the transportation industry."

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    BOOM: Broadcast Optimizations for On-Chip Meshes

    Future many-core chips will require an on-chip network that can support broadcasts and multicasts at good power-performance. A vanilla on-chip network would send multiple unicast packets for each broadcast packet, resulting in latency, throughput and power overheads. Recent research in on-chip multicast support has proposed forking of broadcast/multicast packets within...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Fully Leakage-Resilient Signatures

    A signature scheme is fully leakage resilient (Katz and Vaikuntanathan, ASIACRYPT '09) if it is existentially unforgeable under an adaptive chosen-message attack even in a setting where an adversary may obtain bounded (yet arbitrary) leakage information on all intermediate values that are used throughout the lifetime of the system. This...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Fleets: Scalable Services in a Factored Operating System

    Current monolithic operating systems are designed for uniprocessor systems, and their architecture reflects this. The rise of multicore and cloud computing is drastically changing the tradeoffs in operating system design. The culture of scarce computational resources is being replaced with one of abundant cores, where spatial layout of processes supplants...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Deterministic Network Model Revisited: An Algebraic Network Coding Approach

    The capacity of multiuser networks has been a longstanding problem in information theory. Recently, Avestimehr et al. have proposed a deterministic network model to approximate multiuser wireless networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and interference. The authors show...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Sample Complexity for Topology Estimation in Networks of LTI Systems

    In this paper, the authors propose a consistent and computationally efficient FFT-based algorithm for inferring the network topology where each node in the network is associated to a widesense stationary, ergodic, Gaussian process. Each edge of the tree network is characterized by a linear, time-invariant dynamical system and additive white...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Improving Wireless Network Performance Using Sensor Hints

    With the proliferation of mobile wireless devices such as smartphones and tablets that are used in a wide range of locations and movement conditions, it has become important for wireless protocols to adapt to different settings over short periods of time. Network protocols that perform well in static settings where...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Accurate, Low-Energy Trajectory Mapping for Mobile Devices

    CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important component in many location based services including...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. The authors propose a simple network layer protocol for star networks, adapting redundancy based on both transmission and reception energies for data and control packets, as well...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    Decomposing Broadcast Algorithms Using Abstract MAC Layers

    In much of the theoretical literature on global broadcast algorithms for wireless networks, issues of message dissemination are considered together with issues of contention management. This combination leads to complicated algorithms and analysis, and makes it difficult to extend the work to more difficult communication problems. In this paper, the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    Optimality of Network Coding in Packet Networks

    The authors resolve the question of optimality for a well studied packetized implementation of random linear network coding, called PNC. In PNC, in contrast to the classical memory-less setting, nodes store received information in memory to later produce coded packets that reflect this information. PNC is known to achieve order...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2010

    Lunch With A Laureate: Robert Merton

    Merton starts with the breakthrough work that earned him his laurels and which has recently stirred up controversy: derivative& there are "No mysteries" to these financial instruments, insists Merton they are neither complex nor threatening Derivatives are "Nothing more than insurance."

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Experiences and Challenges With Using CERT Data to Analyze International Cyber Security

    With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The Explorations in Cyber International Relations (ECIR) Data Dashboard Project is an initiative to gather worldwide cyber security data publicly provided...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    The Evolution of Internet Congestion

    This paper discusses the evolution of the congestion controls that govern all Internet traffic. In particular the authors chronicle and discuss the implications of the fact that the most significant "Congestion Signals" are increasingly coming from network operators, not the TCP stack. Providers now nudge users into different traffic patterns...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    SCADA for the Rest of Us: Unlicensed Bands Supporting Long-Range Communications

    The authors are on the cusp of the next big wave in Internet and wireless technology for the mass market: the emergence of ubiquitous smart environments capable of automated sensing and interaction with the physical world around one.. A critical ingredient for this future is the deployment and availability of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Hybrid Wireless Broadband

    Wireless access networks are evolving rapidly and hold the promise of significantly altering the landscape for broadband competition. In a companion paper, the authors explained why wireless networks are unlikely to converge toward the sort of broadband platform network exemplified by wired Next Generation Access Networks. In this paper the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    On the Convergence of Wired and Wireless Access Network Architectures

    Wired and wireless access networks continue to evolve toward higher-capacity, multi-service systems. Recent wireless broadband networks such as 3G LTE and WiMax provide a general-purpose IP platform with over-the-top services at the application layer, which is similar to the design of wired IP platform networks. This paper examines whether wired...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2009

    Understanding Broadband Speed Measurements

    Broadband speed has emerged as the single most commonly cited metric for characterizing the quality of broadband offerings. However speed measurements for the same service can vary significantly. These differences arise from a complex set of factors including different test methodologies and test conditions. For any testing methodology, teasing apart...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Broadband Microfoundations: The Need for Traffic Data

    To date, most of the empirical effort to understand broadband service markets has focused on availability and adoption metrics and data. Data of this sort is indeed valuable when the dominant policy questions concern penetration and uptake. However, as broadband availability and penetration saturate, such data will become less informative....

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Competition, Market Coverage, and Quality Choice in Interconnected Platforms

    The authors study duopoly competition between two interconnected Internet Service Providers (ISP) that compete in quality and prices for both Content Providers (CP) and consumers. They develop a game theoretic model using a two-sided market framework, where ISP's are modeled as interconnected plat-forms with quality bottlenecks; a consumer on a...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

    The authors study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. The objective is to design a power control scheme that achieves a (near) optimal power allocation with respect to any predetermined network objective (such as the maximization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Accelerated Dual Descent for Network Optimization

    Dual descent methods are commonly used to solve network optimization problems because their implementation can be distributed through the network. However, their convergence rates are typically very slow. This paper introduces a family of dual descent algorithms that use approximate Newton directions to accelerate the convergence rate of conventional dual...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Performance of Multihop Wireless Networks: Shortest Path Is Not Enough

    Existing wireless ad hoc routing protocols typically find routes with the minimum hop-count. This paper presents experimental evidence from two wireless test-beds which shows that there are usually multiple minimum hop-count paths, many of which have poor throughput. As a result, minimum-hop-count routing often chooses routes that have significantly less...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Collision Helps Algebraic Collision Recovery for Wireless Erasure Networks

    Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recovering the original packets from multiple collisions. In this paper, the authors present an algebraic representation of collisions which allows one to view each...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    When Both Transmitting and Receiving Energies Matter: An Application of Network Coding in Wireless Body Area Networks

    A network coding scheme for practical implementations of wireless body area networks is presented, with the objective of providing reliability under low-energy constraints. The authors propose a simple network layer protocol for star networks, adapting redundancy based on both transmission and reception energies for data and control packets, as well...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Improving Wireless Network Performance Using Sensor Hints

    With the proliferation of mobile wireless devices such as smartphones and tablets that are used in a wide range of locations and movement conditions, it has become important for wireless protocols to adapt to different settings over short periods of time. Network protocols that perform well in static settings where...

    Provided By Massachusetts Institute of Technology

  • White Papers // Mar 2011

    Accurate, Low-Energy Trajectory Mapping for Mobile Devices

    CTrack is an energy-efficient system for trajectory mapping using raw position tracks obtained largely from cellular base station fingerprints. Trajectory mapping, which involves taking a sequence of raw position samples and producing the most likely path followed by the user, is an important component in many location based services including...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Relational Cloud: A Database-as-a-Service for the Cloud

    This paper introduces a new transactional "DataBase-as-a-Service" (DBaaS) called Relational Cloud. A DBaaS promises to move much of the operational burden of provisioning, configuration, scaling, performance tuning, backup, privacy, and access control from the database users to the service operator, offering lower overall costs to users. Early DBaaS efforts include...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2009

    Whanaungatanga: Sybil-Proof Routing With Social Networks

    Decentralized systems, such as distributed hash tables, are subject to the Sybil attack, in which an adversary creates many false identities to increase its influence. This paper proposes a routing protocol for a distributed hash table that is strongly resistant to the Sybil attack. This is the first solution to...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    Oblivious Routing in On-Chip Bandwidth-Adaptive Networks

    Oblivious routing can be implemented on simple router hardware, but network performance suffers when routes become congested. Adaptive routing attempts to avoid hot spots by re-routing flows, but requires more complex hardware to determine and configure new routing paths. The authors propose on-chip bandwidth-adaptive networks to mitigate the performance problems...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2008

    Global Television

    There's a lot that seems familiar on TV in other countries, and indeed, as these panelists recount, there's been a flow across borders of TV content and style nearly as long as the medium's been around.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2008

    The Way David Macaulay Works: Finding Ideas, Making Books And Visualizing Our World

    This webcast feels akin to a new Disney ride: During your tour inside the presenter's imagination, prepare to soar over Rome's great monuments, raft within the human body's circulatory system, and dismantle and rebuild the Empire State Building.

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2011

    SoftCast: Clean-Slate Scalable Wireless Video

    Video broadcast and mobile video challenge the conventional wireless design. In broadcast and mobile scenarios the bit rate supported by the channel differs across receivers and varies quickly over time. The conventional design however forces the source to pick a single bit rate and degrades sharply when the channel cannot...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Core Count Vs Cache Size for Manycore Architectures in the Cloud

    The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core memory bandwidth to decrease as process technology advances. Continuing per-core off-chip bandwidth...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    A Unified Operating System for Clouds and Manycore: Fos

    Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for manycore and cloud systems face similar challenges. This paper identifies these shared challenges and introduces them solution:...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2009

    Understanding and Supporting Directed Content Sharing on the Web

    To find interesting, personally relevant web content, the authors often rely on friends and colleagues to pass links along as they encounter them. This paper studies and augments link-sharing via e-mail, the most popular means of sharing web content today. Armed with survey data indicating that active sharers of novel...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Crowds and Clouds: Data, Sheep, and Collaboration in the Works of Aaron Koblin

    Where others see just data points and fodder for bar graphs, presenter visualizes dynamic systems where information assumes forms both abstract and familiar. In this talk, presenter shares recent projects that meld statistical science and art to convey a really big picture, while often inviting the viewer to partake in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2011

    Data-Driven Traffic Modeling, Prediction, and Planning

    Some professors work primarily in labs and others mainly at desks. Presenter conducts her research on the bustling streets of Singapore, where she is helping to design a "Future mobility project" Whose goal is to "Marry information technology with the transportation industry."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Network-Driven Transportation

    Today, cell phones are a menace to safe driving, as they distract operators who should otherwise focus on the road. Tomorrow, cell phones could actually improve the driving, and help drivers avoid traffic congestion, use the road system more effectively, and manage the parking supply.

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2010

    How to Tell if Your Cloud Files Are Vulnerable to Drive Crashes

    This paper presents a new challenge - verifying that a remote server is storing a file in a fault-tolerant manner, i.e., such that it can survive hard-drive failures. The authors describe an approach called the Remote Assessment of Fault Tolerance (RAFT). The key technique in a RAFT is to measure...

    Provided By Massachusetts Institute of Technology

  • White Papers // Sep 2010

    Algebraic Network Coding Approach to Deterministic Wireless Relay Networks

    The deterministic wireless relay network model, introduced by Avestimehr et al., has been proposed for approximating Gaussian relay networks. This model, known as the ADT network model, takes into account the broadcast nature of wireless medium and interference. Avestimehr et al. showed that the Min-cut Max-flow theorem holds in the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Analyzing Network Coding Gossip Made Easy

    The authors give a new technique to analyze the stopping time of gossip protocols that are based on Random Linear Network Coding (RLNC). The analysis drastically simplifies, extends and strengthens previous results. They analyze RLNC gossip in a general framework for network and communication models that encompasses and unifies the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Geographic Locality of IP Prefixes

    Information about the geographic locality of IP prefixes can be useful for understanding the issues related to IP address allocation, aggregation, and BGP routing table growth. In this paper, the authors use traceroute data and geographic mappings of IP addresses to study the geographic properties of IP prefixes and their...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Geographic Routing Without Planarization

    The authors present a new geographic routing algorithm, the Greedy Distributed Spanning Tree Routing (GDSTR), that finds shorter routes and generates less maintenance traffic than previous algorithms. While geographic routing potentially scales well, it faces the problem of what to do at local dead ends where greedy forwarding fails. Existing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Pastwatch: A Distributed Version Control System

    Pastwatch is a version control system that acts like a traditional client-server system when users are connected to the network; users can see each other's changes immediately after the changes are committed. When a user is not connected, Pastwatch also allows users to read revisions from the repository, commit new...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Proactive Replication for Data Durability

    Many wide area storage systems replicate data for durability. A common way of maintaining the replicas is to detect node failures and respond by creating additional copies of objects that were stored on failed nodes and hence suffered a loss of redundancy. Reactive techniques can minimize total bytes sent since...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2011

    Peering Peer-To-Peer Providers

    The early peer-to-peer applications eschewed commercial arrangements and instead established a grass-roots model in which the collection of end-users provided their own distributed computational infrastructure. While this cooperative end-user approach works well in many application settings, it does not provide a sufficiently stable platform for certain peer-to-peer applications (e.g., DHTs...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Critical Issues And Grand Challenges

    The panelists use the lens of systems engineering to focus sharply on some signature global challenges in finance, healthcare, energy and IT. The system failure that undid the small but influential financial services industry was a few decades in the making, says one of the presenter.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Grand Challenges And Engineering Systems: Inspiring And Educating The Next Generation

    It's a good thing for a world increasingly beset by mammoth challenges that universities are responding with new engineering systems programs. These initiatives, as one of the presenter attests, are swiftly proliferating in the U.S. and abroad to equip students to address such complex issues as health care, sustainable energy,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    What?s New At The MIT Center For Future Civic Media?

    The moderator of this webcast presents the Landman Report Card, a tool for helping communities contend with oil and gas companies eager to lease private land for energy drilling. In these deals, a salesman comes by with a pitch and a contract, leaving some property owners to deal with disastrous...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2009

    Education Across Borders: The India Perspective

    Rickshaw drivers in India are frequent victims of tuberculosis after just a few years inhaling traffic fumes. This near-epidemic went unacknowledged until the author demanded a solution. The fix, now gaining traction across the country, is a solar-powered vehicle that eliminates pedaling. But what began as a project to assist...

    Provided By Massachusetts Institute of Technology