Massachusetts Institute of Technology

Displaying 281-320 of 456 results

  • Webcasts // Mar 2010

    The Future Of Civic Engagement In A Broadband-Enabled World

    The digital revolution that brought Facebook, Twitter and YouTube could help revive participatory democracy in the U.S., says the author. The author unveils the FCC's plan for providing broadband access to every American, and describes how its recommendations could spur more open government and greater civic engagement.

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Multithreaded Simulation to Increase Performance Modeling Throughput on Large Compute Grids

    Simulation for performance modeling of computer architectures is a compute intensive operation requiring many compute resources and CPU cycles. Typical usage models involve running multiple sequential jobs across multiple machines. Multithreading can be used to speed up individual simulation jobs, but only provides higher throughput than multiprogramming on large workloads...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Locating Cache Performance Bottlenecks Using Data Profiling

    Every organization understands the need of effective use of CPU data caches to ensure good performance. Yet, this is made difficult due to the fact that it is extremely tough to spot poor cache patterns with the existing execution profiling tools. Typical profilers attribute costs to specific code locations. It...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Rebuilding Haiti

    The author begins with a view of Haiti's history of "Insecurite", a term used to describe "Cycles of political violence, crime, and economic deterioration that have accompanied periods of political and economic upheaval, foreign occupation, dictatorship, and continued environment decline."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Why History Matters: International Law And The Origins Of The Arab-Israeli Conflict

    The presenter set out to explore how the conflict began, and so pored over the writing of scores of European political figures, and leaders of Zionist and Arab nationalist movements of the late 19th and 20th centuries. His key insight: Neither Arabs nor Jews were to blame for triggering hostilities,...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Leading Through Adversity

    Few Companies have endured such hardship or risen to such heights in a brief span of time as Akamai Technologies. Paul Sagan tells how he became the CEO of this young firm and helped it survive and then flourish despite "Unimaginable adversity".

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Core Count Vs Cache Size for Manycore Architectures in the Cloud

    The number of cores which fit on a single chip is growing at an exponential rate while off-chip main memory bandwidth is growing at a linear rate at best. This core count to off-chip bandwidth disparity causes per-core memory bandwidth to decrease as process technology advances. Continuing per-core off-chip bandwidth...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Efficient Cache Coherence on Manycore Optical Networks

    Ever since industry has turned to parallelism instead of frequency scaling to improve processor performance, multicore processors have continued to scale to larger and larger numbers of cores. Some believe that multicores will have 1000 cores or more by the middle of the next decade. However, their promise of increased...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    The Cost of Global Broadcast Using Abstract MAC Layers

    The authors analyze greedy algorithms for broadcasting messages throughout a multi-hop wireless network, using a slot-based model that includes message collisions without collision detection. The algorithms are split formally into two pieces: A high-level piece for broadcast and a low-level piece for contention management. They accomplish the split using abstract...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Sustainable Accessibility: A Grand Challenge For The World And For MIT

    Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    The Economic Meltdown: What Have We Learned, If Anything?

    The U.S. has had more than 70 years to come to terms with the Great Depression, and we really thought we knew how to avoid another one, says the author. "It wasn't supposed to be possible. Then came the current crisis."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Deploying Our Gifts For The Betterment Of Humankind: What Would Dr. King Say About Us?

    Woven into the fabric of MIT life, says the author, is the "Perpetual striving to be ever better." To this end, the author has been laboring to create a "True culture of inclusion."

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    SWIFT: A Narrowband-Friendly Cognitive Wideband Network

    Wideband technologies in the unlicensed spectrum can satisfy the ever-increasing demands for wireless bandwidth created by emerging rich media applications. The key challenge for such systems, however, is to allow narrowband technologies that share these bands (say, 802.11 a/b/g/n, Zigbee) to achieve their normal performance, without compromising the throughput or...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Wealth Accumulation And Factors Accounting For Success

    The authors use detailed income, balance sheet, and cash flow statements constructed for households in a long monthly panel in an emerging market economy, and some recent contributions in economic theory, to document and better understand the factors underlying success in achieving upward mobility in the distribution of net worth....

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jan 2010

    Health Care Reform In The U.S.: What Will It Look Like And What Does It Mean?

    Years of extreme partisanship and lobbying have left Americans cynical and bewildered about health care reform, but, say the authors, the urgency of achieving some measure of change is not diminished, both for American families and the nation as a whole. The sad truth is that the problem may have...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Collision Helps Algebraic Collision Recovery for Wireless Erasure Networks

    Current medium access control mechanisms are based on collision avoidance and collided packets are discarded. The recent work on ZigZag decoding departs from this approach by recovering the original packets from multiple collisions. In this paper, the authors present an algebraic representation of collisions which allows one to view each...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Secure Storage of Fingerprint Biometrics Using Slepian-Wolf Codes

    This paper describes a method to encode fingerprint biometrics securely for use, e.g., in encryption or access control. The system is secure because the stored data suffices to validate a probe fingerprint but not to recreate the original fingerprint biometric. Therefore, a breach in database security does not lead to...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

    Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Dos and Don'ts of Client Authentication on the Web

    Client authentication has been a continuous source of problems on the web. Although many well-studied techniques exist for authentication, websites continue to use extremely weak authentication schemes, especially in non-enterprise environments such as store fronts. These weaknesses often result from careless use of authenticators within Web cookies. Of the twenty-seven...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Graphite: A Distributed Parallel Simulator for Multicores

    This paper introduces the Graphite open-source distributed parallel multicore simulator infrastructure. Graphite is designed from the ground up for exploration of future multicore processors containing dozens, hundreds, or even thousands of cores. It provides high performance for fast design space exploration and software development. Several techniques are used to achieve...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Near-Optimal Power Control in Wireless Networks: A Potential Game Approach

    The authors study power control in a multi-cell CDMA wireless system whereby self-interested users share a common spectrum and interfere with each other. The objective is to design a power control scheme that achieves a (near) optimal power allocation with respect to any predetermined network objective (such as the maximization...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    From Spectrum Pooling to Space Pooling: Opportunistic Interference Alignment in MIMO Cognitive Networks

    The authors describe a non-cooperative Interference Alignment (IA) technique which allows an opportunistic Multiple Input Multiple Output (MIMO) link (secondary) to harmlessly coexist with another MIMO link (primary) in the same frequency band. Assuming perfect channel knowledge at the primary receiver and transmitter, capacity is achieved by transmitting along the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Scheduling Policies for Single-Hop Networks With Heavy-Tailed Traffic

    The area of control of communication networks is one of the most active and fruitful fields of research in recent years, including several elaborate and interconnected forms of control, such as congestion control, routing, scheduling and power control. Much of the theoretical foundation regarding network stability was laid out in...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Optimal Control of Wireless Networks With Finite Buffers

    Design of low delay wireless networks that optimally utilize the network capacity is one of the most important problems in network theory and engineering. Since the seminal paper of Tassiulas and Ephremides which proposed a joint routing and scheduling algorithm that achieves the maximum network throughput, significant efforts have been...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Network Reliability With Geographically Correlated Failures

    Fiber-optic networks are vulnerable to natural disasters, such as tornadoes or earthquakes, as well as to physical failures, such as an anchor cutting underwater fiber cables. Such real-world events occur in specific geographical locations and disrupt specific parts of the network. Therefore, the geography of the network determines the effect...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Cache Replacement Policies for Multicore Processors

    Almost all of the modern computers use multiple cores, and the number of cores is expected to increase as hardware prices go down, and Moore's law fails to hold. Most of the theoretical algorithmic work so far has focused on the setting where multiple cores are performing the same task....

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol

    Public-key quantum money is a cryptographic protocol in which a bank can create quantum states which anyone can verify, but no one except possibly the bank can clone or forge. There are no secure public-key quantum money schemes in the literature; as the authors show in this paper, the only...

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Proof-Carrying Data and Hearsay Arguments From Signature Cards

    Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special cases include integrity of programs running on untrusted platforms, various forms of confidentiality and side-channel resilience, and domain-specific invariants. The authors propose a new...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2009

    Autism: What Do We Know? What Do We Need?

    The author provides the latest medical and scientific views on this complex developmental brain disorder. The formal definition of autism includes three main components: deficits in social behavior, abnormal language, and repetitive or restricted (motor) behaviors (hand flapping, for instance).

    Provided By Massachusetts Institute of Technology

  • White Papers // Dec 2009

    Temperature Shocks And Economic Growth: Evidence From The Last Half Century

    This paper uses use historical fluctuations in temperature within countries to identify its effects on aggregate economic outcomes. The authors find three primary results. First, higher temperatures substantially reduce economic growth in poor countries. Second, higher temperatures appear to reduce growth rates, not just the level of output. Third, higher...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    A Unified Operating System for Clouds and Manycore: Fos

    Single chip processors with thousands of cores will be available in the next ten years and clouds of multicore processors afford the operating system designer thousands of cores today. Constructing operating systems for manycore and cloud systems face similar challenges. This paper identifies these shared challenges and introduces them solution:...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Mobile Broadband and Implications for Broadband Competition and Adoption

    The growth of wireless mobile broadband has the potential to drive significant new growth in Internet applications, services, and equipment markets. It is likely to represent as important a change for the Internet as the transition from dial-up to broadband, fundamentally changing the landscape for broadband Internet access by adding...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Creating A Game Plan For Transition To A Sustainable Economy

    The "Chief inspired protagonist" of one of the nation's oldest and most successful green manufacturers apologizes for delivering a talk "More depressing than expected." While discussing the challenges facing businesses attempting to transition to a more just and sustainable economy, Jeffrey Hollender enumerates the many reasons he's feeling bleak these...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    The Tough Get Growing: How To Succeed In A Down Economy

    Stay calm, stick with your vision and business fundamentals, and you'll survive and perhaps even thrive in rough economic times, counsel these entrepreneurial aces. In a conversation with the Kauffman Foundation's, the authors reflect on their experiences bringing novel tech products to market and new companies to fruition, in good...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    The Culture Beat And New Media

    Celebrity culture and the brutal economics of print journalism have conspired to kill arts criticism, but it has begun migrating to the web, where it just may survive and even thrive. Panelists discuss the field's colorful history, current decline, and possibly vibrant future. Arts criticism went through a Wild West...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2009

    Distributed Computation in Dynamic Networks

    In this paper the authors investigate distributed computation in dynamic networks in which the network topology changes from round to round. They consider a worst-case model in which the communication links for each round are chosen by an adversary, and nodes do not know who their neighbors for the current...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Liberty By Design

    Recalling a lecture he gave at MIT in 2005, the author returns to the questions of the impact of public policy on the way technology is evolving in the Internet space. Instead of viewing it as a lawyer for a public policy interest group - his previous role - he...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Understanding Enterprise Behavior Using Hybrid Simulation Of Enterprise Architecture

    Today, the design of business enterprises is much more art than science. The complex structure and behavior of enterprises makes it difficult to untangle cause and effect amidst its components and their relationships. In order for managers to understand how an enterprise's architecture affects its behavior, they need tools and...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    Enabling Cultural Shifts: An Enterprise Approach Toward Lean Thinking

    The Supply Planning Operations team, in a large manufacturing firm, faced a future where their complexity of scope was increasing without an increase in resource levels. As an effort to improve both efficiency and effectively within the organization, they chose to adopt Lean Thinking as a method to streamline and...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2009

    A Screening Model To Explore Planning Decisions In Automotive Manufacturing Systems Under Demand Uncertainty

    Large-scale, complex engineering systems, as for automotive manufacturing, often require significant capital investment and resources for systems configuration. Furthermore, these systems operate in environments that are constantly changing due to shifts in macroeconomic, market demand and regulations, which can significantly influence systems' performance. It is often very difficult or prohibitively...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2009

    Electricity Transmission Policy For America: Enabling A Smart Grid, End-to-End

    This paper proposes a framework of policies to guide the future development of America's electric transmission grid so that the electric power industry will be able to serve more effectively the changing needs of the U.S. economy and society. The paper provides a factual overview of the American electric power...

    Provided By Massachusetts Institute of Technology

  • White Papers // Oct 2010

    Dynamic Pricing Through Sampling Based Optimization

    In this paper the authors develop an approach to dynamic pricing that combines ideas from data-driven and robust optimization to address the uncertain and dynamic aspects of the problem. In this setting, a firm offers multiple products to be sold over a fixed discrete time horizon. Each product sold consumes...

    Provided By Massachusetts Institute of Technology

  • White Papers // May 2010

    Transparent Detection of Computer Malware Using Virtualization

    In this paper, the author explores malware detection using a combination of virtualization- and storage-based intrusion detection techniques. By monitoring disk activity of a virtual machine and correlating that activity to knowledge of the filesystem structure on the virtual machine's disk, an intrusion detection system can react to file changes...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2012

    A Framework for Thermal and Performance Management

    In modern computing facilities, higher and higher operating temperatures are due to the employment of power-hungry devices, hence the need for cost-effective heat dissipation solutions to guarantee proper operating temperatures. Within this context, Dynamic Thermal Management techniques (DTM) can be highly beneficial in proactively control heat dissipation, avoiding overheating. The...

    Provided By Massachusetts Institute of Technology

  • White Papers // Aug 2004

    Hiding and Revealing in Online Poker Games

    Poker is largely a game of social and psychological information. However, online card room interfaces do not support the subtle communication between players that is integral to the psychological aspect of the game, making the games less authentic and less enjoyable than they could be. The paper explores how card...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2002

    Dispersed Employment, Commuting, and Mixed Land-Use in Modern Cities

    This paper has two objectives. The first is to review a range of empirical evidence that suggests this vision of urban form is largely incorrect. Over time, in most cities, real estate rents and asset prices grow little more than inflation. In addition, recently released data on the spatial distribution...

    Provided By Massachusetts Institute of Technology

  • White Papers // Nov 2000

    Ski Resort Real Estate Markets: Why Not to Invest

    This paper examines the behavior of ski resort property in a major New England market over the last 25 years. A property price series is constructed for the Loon Mountain resort, which is believed to be quite typical of New England Ski areas. This series reveals that nominal prices are...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2004

    The Role of Software in Spacecraft Accidents

    The first and most important step in solving any problem is understanding the problem well enough to create effective solutions. To this end, several software-related spacecraft accidents were studied to determine common systemic factors. Although the details in each accident were different, very similar factors related to flaws in the...

    Provided By Massachusetts Institute of Technology

  • Tools & Templates // May 2006

    Project Control Book

    This is a template for project control book.

    Provided By Massachusetts Institute of Technology

  • White Papers // Jul 2010

    A Multi-Hop Multi-Source Algebraic Watchdog

    In the authors' previous work ('An Algebraic Watchdog for Wireless Network Coding'), they proposed a new scheme in which nodes can detect malicious behaviors probabilistically, police their downstream neighbors locally using overheard messages; thus, provide a secure global self-checking network. As the first building block of such a system, they...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2009

    Challenges To The Global Economy

    Martin Feldstein had a hard time choosing which of the innumerable problems to focus on, he admits, but ultimately settles on near-term challenges faced by the U.S. First off, this downturn is a typical, past recessions generally resulted from the Federal Reserve responding to inflation by nudging up interest rates...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Mar 2009

    Observations On The Science Of Finance In The Practice Of Finance

    Merton uses deceptively simple graphs to show how risk propagated rapidly across financial networks, bringing down financial institutions. While he admits the crisis "Is very big and complicated," Merton boils a piece of it down to the use of put options, a derivative contract that's been around since the 17th...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2009

    Innovative Leadership During Economic Crisis

    Bain constructs innovative leadership around three pillars: customers (clients), people and products, Maceda says. His company seeks a winning edge by establishing warm and lasting client relationships. At Bain, this means even top executives commit to working directly with clients, and assigning teams to the "Client interface."

    Provided By Massachusetts Institute of Technology

  • Webcasts // Apr 2009

    Leading An Environmentally Sustainable Enterprise

    Climate Change poses perhaps the premiere threat to Coming generations says Martin Madaus but to avoid its worst impacts. We must Confront the issue now to that end. Madaus exhorts business leaders to focus immediately on building environmental sustainability into their operations as he has begun to do at Millipore.

    Provided By Massachusetts Institute of Technology

  • Webcasts // May 2009

    Energy Entrepreneurship And Innovation: Today's Challenges, Tomorrow's Opportunities

    There are sample opportunities for new energy entrepreneurs, these panelists agree, but motivation and certain kinds of know how play key roles in bringing new ventures to fruition. Idealism led Christina Lampe-Onnerud to "Go into the energy space" at 23, but "Inertia" surrounding the energy business may intimidate today's entrepreneurs.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    Global And Domestic Imbalances: Why Rural China Is The Key

    China owes its astonishing economic expansion not to far-sighted government policy but to hundreds of millions of entrepreneurial peasants. Yasheng Huang's research reveals not only how small-scale rural businesses created China's miracle but how that nation's recovery from the global recession and righting the massive East-West trade imbalance depend on...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Jun 2009

    The Power Of Competition: How To Focus The World's Brains On Your Innovation Challenges

    Cooperation may be making us "A little bit too nice" when it comes to innovation, suggests Fiona Murray. She believes there's nothing like competition for injecting energy into the process of solving key innovation problems, whether in business or society.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2009

    Financial Services: Prospect For Your Future

    In a lively discussion with Simon Johnson, Lawrence Fish deconstructs the near collapse of the banking system and points out the multiple factors that have contributed to the financial crisis.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2009

    Leadership Amidst Crisis

    In thirty years. S. D. Shibulal has seen his share of economic crises, but in thinking hard about the role of crises in the future for today's students he predicts: they will occur more frequently and will be less predictable, longer lasting and more costly.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Nov 2009

    Creating A Game Plan For Transition To A Sustainable Economy

    The "Chief inspired protagonist" of one of the nation's oldest and most successful green manufacturers apologizes for delivering a talk "More depressing than expected." While discussing the challenges facing businesses attempting to transition to a more just and sustainable economy, Jeffrey Hollender enumerates the many reasons he's feeling bleak these...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Dec 2009

    The Great Climategate Debate

    The hacking of emails from the University of East Anglia's Climate Research Unit in November rocked the world of climate change science, energized global warming skeptics and threatened to derail policy negotiations at Copenhagen, these panelists, who differ on the scientific implications of the released emails generally agree that the...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Feb 2010

    Sustainable Accessibility: A Grand Challenge For The World And For MIT

    Transportation systems, as we know them today, will simply not sustain the worlds' growing population. John Sterman says it is self-evident that the current transportation model simply will not scale. But, since the Gross World Product (GWP) is growing at 3.2% annually, and doubles every twenty years, the current model...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2009

    Distributed Quota Enforcement for Spam Control

    Spam, by overwhelming inboxes, has made email a less reliable medium than it was just a few years ago. Spam filters are undeniably useful but unfortunately can flag non-spam as spam. To restore email's reliability, a recent spam control approach grants quotas of stamps to senders and has the receiver...

    Provided By Massachusetts Institute of Technology

  • White Papers // Apr 2009

    Rethinking Wireless Broadband Platforms

    A platform network is an integrated high-capacity general-purpose network. The platform model dominates the market for wired broadband services, reducing the amount of infrastructure required and enabling rapid deployment of new services. It argues that wireless broadband is fundamentally different from wired broadband in ways that limit the benefits of...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jun 2009

    A Distributed Wearable, Wireless Sensor System for Evaluating Professional Baseball Pitchers and Batters

    This paper introduces a compact, wireless, wearable system that measures signals indicative of forces, torques and other descriptive and evaluative features that the human body undergoes during bursts of extreme physical activity (such as during athletic performance). Standard approaches leverage high-speed camera systems, which need significant infrastructure and provide limited...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Unmanaged Internet Protocol: Taming the Edge Network Management Crisis

    Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarchical, administratively assigned addresses. Existing ad-hoc routing protocols address the management problem but do not scale to Internet-wide networks. The promise of ubiquitous network computing...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Efficient and Robust TCP Stream Normalization

    Network intrusion detection and prevention systems are vulnerable to evasion by attackers who craft ambiguous traffic to breach the defense of such systems. A normalizer is an in line network element that thwarts evasion attempts by removing ambiguities in network traffic. A particularly challenging step in normalization is the sound...

    Provided By Massachusetts Institute of Technology

  • White Papers // Feb 2010

    Locating Cache Performance Bottlenecks Using Data Profiling

    Every organization understands the need of effective use of CPU data caches to ensure good performance. Yet, this is made difficult due to the fact that it is extremely tough to spot poor cache patterns with the existing execution profiling tools. Typical profilers attribute costs to specific code locations. It...

    Provided By Massachusetts Institute of Technology

  • White Papers // Jan 2010

    Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications

    Peer-to-peer systems and applications are distributed systems without any centralized control or hierarchical organization, where the software running at each node is equivalent in functionality. A fundamental problem that confronts peer-to-peer applications is to efficiently locate the node that stores a particular data item. This paper presents Chord, a distributed...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    The Art Of Science Communication

    You wouldn't know that the moderator felt nervous in advance of addressing this audience of neuroscientists. In his trademark style, moderator chats up the crowd like an old friend, sharing anecdotes involving one of his great pursuits: "I love to talk to scientists," moderator says.

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    What Does Re-Engineering Mean For Real Estate?

    Moderated by prominent real estate economist, this panel includes five senior executives with well over a century of collective experience at major development and investment firms and an industry information organization. On the critical topic of the impending trillion dollar debt rollover, one of the authors refutes doomsayers, forecasting that...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    From Experimental Physics To Internet Entrepreneurship: One Scientist?s Journey

    Few better personify the vitality and ambition fueling China's economic surge than the author. In this energetic and revelatory talk, the author relates his personal evolution from MIT physicist to leading Chinese entrepreneur. An industrious student from a poor family, the author was one of the fortunate few in his...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Re-Engineering Buildings: Innovations In Building Technology

    The built environment consumes a very large share of the nation's energy, and so offers rich opportunities for reducing the overall carbon footprint. MIT researchers share innovations that could soon radically alter the energy profile, as well as form and function, of buildings. Their work may prove invaluable to those...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Engineering Smarter Drivers

    While automakers market increasingly intelligent cars, they may be missing the point. No matter how sophisticated the vehicle's brain, suggests by the author, the smartest element on the road is still the human driver. In search of safe, responsive vehicles, designers should not think of separate components - machine and...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Oct 2010

    Financial Re-Engineering

    Moderator William Wheaton starts the discussion by suggesting that the interconnected global system of financial markets may be inherently unmanageable and overly risky, due to its complexity. Financial transactions in a world of 8 billion people can become too complex, leading to uncontrollable systemic risk and disaster, much the way...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Planning The Response: Establishing The Impacts And Identifying The Parties At Risk

    The Deepwater Horizon disaster spread through not just a vast coastal ecosystem, but into diverse human communities lining the Gulf, many entirely dependent on the sea for their livelihoods. These three panelists describe their involvement in quite disparate response projects, which began shortly after the oil began gushing, and in...

    Provided By Massachusetts Institute of Technology

  • Webcasts // Sep 2010

    Moving Ahead: Engineering Challenges Of Deep Water Drilling And Future Oil Resource Recovery

    To keep up with demand, the oil industry ventures increasingly farther and deeper offshore, extracting resources as fast as possible in often hazardous conditions with newly minted technology. So to these panelists, the BP Deepwater Horizon accident did not come as a complete surprise. However, they view the disaster from...

    Provided By Massachusetts Institute of Technology