MIT

Displaying 1-32 of 32 results

  • White Papers // Nov 2013

    Securing Web Applications by Blindfolding the Server

    Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain all of the data stored there. This paper presents Mylar, a platform for building web applications that protects data confidentiality...

    Provided By MIT

  • White Papers // Aug 2013

    Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups

    The authors show that the class of polynomial-size branching programs can be obfuscated according to a virtual black-box notion akin to that of researcher, in an idealized black-box group model over pseudo-free groups. This class is known to lie between NC1 and P and includes most interesting cryptographic algorithms. The...

    Provided By MIT

  • White Papers // Jan 2013

    Towards Realizing the Performance and Availability Benefits of a Global Overlay Network

    Prior analyses of the benefits of routing overlays are based on platforms consisting of nodes located primarily in North America, on the academic Internet, and at the edge of the network. This paper is the first global study of the benefits of overlays on the commercial Internet in terms of...

    Provided By MIT

  • White Papers // May 2012

    Mosh: An Interactive Remote Shell for Mobile Clients

    Mosh (mobile shell) is a remote terminal application that supports intermittent connectivity, allows roaming, and speculatively and safely echoes user keystrokes for better interactive response over high-latency paths. Mosh is built on the State Synchronization Protocol (SSP), a new UDP-based protocol that securely synchronizes client and server state, even across...

    Provided By MIT

  • White Papers // Mar 2012

    Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

    Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently. One known fact...

    Provided By MIT

  • White Papers // Feb 2012

    UFlood: High-Throughput Flooding Over Wireless Mesh Networks

    This paper proposes UFlood, a flooding protocol for wireless mesh networks. UFlood targets situations such as software updates where all nodes need to receive the same large file of data, and where limited radio range requires forwarding. UFlood's goals are high throughput and low airtime, defined respectively as rate of...

    Provided By MIT

  • White Papers // Feb 2012

    Network Coded Gossip With Correlated Data

    The authors design and analyze gossip algorithms for networks with correlated data. In these networks, either the data to be distributed, the data already available at the nodes, or both, are correlated. Although coding schemes for correlated data have been studied extensively, the focus has been on characterizing the rate...

    Provided By MIT

  • Webcasts // Jun 2011

    Blocks + Computing = A New Kind of Interface

    The startup Sifteo, based in San Francisco, will bring to market handheld, computerized cubes that can sense each other and run a variety of interactive programs. Recently, Technology Review got a chance to review the blocks ahead of their launch. By adding computing power to blocks, the founders hope they...

    Provided By MIT

  • Podcasts // Jun 2011

    TR10: Cloud Streaming

    In the Silicon Valley conference room of OnLive, Steve Perlman touches the lifelike 3-D face of a computer-generated woman displayed on his iPad. Swiping the screen with his fingers, Perlman rotates her head; her eyes move to compensate, so that she continues to stare at one spot. None of this...

    Provided By MIT

  • Webcasts // May 2011

    Sony Sets Its Sights on Augmented Reality

    Sony has demonstrated a new augmented reality system called Smart AR that can be built into the company's future gaming devices. Augmented reality involves mapping virtual objects onto a view of the real world, usually as seen through the screen of a smart phone. The technology has so far been...

    Provided By MIT

  • Webcasts // May 2011

    Making 3-D Models From Your Photos

    The design software company Autodesk will release free software next week that could turn those snapshots into one's own personal replica from a 3-D printer. Called Photofly, the software extracts a detailed 3-D model from a collection of overlapping photos.

    Provided By MIT

  • Webcasts // May 2011

    The Invisible IPhone

    Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

    Provided By MIT

  • White Papers // May 2011

    Lightweight Implementations of Probabilistic Programming Languages Via Transformational Compilation

    The authors describe a general method of transforming arbitrary programming languages into probabilistic programming languages with straightforward MCMC inference engines. Random choices in the program are "Named" with information about their position in an execution trace; these names are used in conjunction with a database holding values of random variables...

    Provided By MIT

  • Webcasts // Apr 2011

    A Personalized Trip to the Grocery Store

    An iPhone app launching today provides a glimpse into the future of shopping. Created by Modiv Media, the app lets customers scan items while they shop, presents them with personalized offers as they go, and speeds up their checkout. One of the first companies to deploy the app is Stop...

    Provided By MIT

  • Webcasts // Mar 2011

    App Turns Your Phone Into a 3-D Scanner

    Capturing an object in three dimensions needn't require the budget of Avatar. A new cell phone app developed by Microsoft researchers can be sufficient. The software uses overlapping snapshots to build a photo-realistic 3-D model that can be spun around and viewed from any angle.

    Provided By MIT

  • Webcasts // Mar 2011

    An On-Off Switch for Anxiety

    The flick of a precisely placed light switch, mice can be induced to cower in a corner in fear or bravely explore their environment. The webcast highlights the power of optogenetics technology - which allows neuroscientists to control genetically engineered neurons with light - to explore the functions of complex...

    Provided By MIT

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Feb 2011

    Growing Lasers on Computer Chips

    The first time, researchers have grown lasers from high-performance materials directly on silicon. Bringing together electrical and optical components on computer chips would speed data transfer within and between computers, but the incompatibility of the best laser materials with the silicon used to make today's chips has been a major...

    Provided By MIT

  • White Papers // Jan 2011

    Observed Structure of Addresses in IP Traffic

    This paper investigates the structure of addresses contained in IP traffic. Specifically, the authors analyze the structural characteristics of destination IP addresses seen on Internet links, considered as a subset of the address space. These characteristics may have implications for algorithms that deal with IP address aggregates, such as routing...

    Provided By MIT

  • White Papers // Dec 2010

    Optimal Pricing in the Presence of Local Network Effects

    The authors study the optimal pricing strategies of a monopolist selling a divisible good (service) to consumers that are embedded in a social network. A key feature of the model is that consumers experience a (positive) local network effect. In particular, each consumer's usage level depends directly on the usage...

    Provided By MIT

  • White Papers // Sep 2010

    Scaling Laws for Learning High-Dimensional Markov Forest Distributions

    The problem of learning forest-structured discrete graphical models from i.i.d. samples is considered. An algorithm based on pruning of the Chow-Liu tree through adaptive thresholding is proposed. It is shown that this algorithm is structurally consistent and the error probability of structure learning decays faster than any polynomial in the...

    Provided By MIT

  • White Papers // Sep 2010

    Transactional Consistency and Automatic Management in an Application Data Cache

    Distributed in-memory application data caches like mem-cached are a popular solution for scaling database-driven web sites. These systems are easy to add to existing deployments, and increase performance significantly by reducing load on both the database and application servers. Unfortunately, such caches do not integrate well with the database or...

    Provided By MIT

  • Podcasts // Aug 2010

    Data Transfer at Light Speed

    The world of computing could change rapidly in coming years thanks to technology that replaces the metal wiring between components with faster, more efficient fiber-optic links. "All communications over long distance are driven by lasers, but one have never had it inside devices," says the speaker director of Intel's photonics...

    Provided By MIT

  • White Papers // Jun 2010

    Making Linux Protection Mechanisms Egalitarian With UserFS

    UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user - not just the system administrator - to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted code. One key idea in UserFS is representing user IDs as files...

    Provided By MIT

  • White Papers // Mar 2010

    Symmetric LDPC Codes and Local Testing

    Coding theoretic and complexity theoretic considerations naturally lead to the question of generating symmetric, sparse, redundant linear systems. This paper provides new way of constructions with better parameters and new lower bounds. Low Density Parity Check (LDPC) codes are linear codes defined by short constraints (a property essential for local...

    Provided By MIT

  • White Papers // Jan 2010

    Bit-Wise Unequal Error Protection for Variable Length Blockcodes with Feedback

    Bit-wise unequal error protection problem with two layers is considered for variable length block-codes with feedback. Inner and outer bounds are derived for achievable performance for finite expected decoding time. These bounds completely characterize the error exponent of the special bits as a function of overall rate R, overall error...

    Provided By MIT

  • White Papers // Jan 2010

    Will iSCSI Dominate SANs?

    The primary mode of data storage for computer servers has been direct-attached storage (DAS). In this mode, a computer issues commands to manage blocks of data on internal disk drives. This mode presents constraints to growth as the amount of servers and storage space increases. DAS is not very scalable...

    Provided By MIT

  • White Papers // Dec 2009

    Leakage-Resilient Signatures

    The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to \"Side-channel attacks\" which exploit leakage of information about the secret internal state. In this paper the authors put forward the notion of \"Leakage-resilient signatures,\" which...

    Provided By MIT

  • White Papers // Nov 2009

    Video-Centric Network Coding Strategies for 4G Wireless Networks: An Overview

    The impact of Internet content and IP based television on networks is growing. Video is now ubiquitous in the home and on the street. It demands new approaches to video transmission to meet the growing traffic volume. This paper presents a novel strategy for network coding in video transmission. It...

    Provided By MIT

  • White Papers // Mar 2009

    Deployment of Routing Strategy Based Firecracker Protocol for Data Dissemination in Wireless Sensor Networks During Natural Calamities

    The IT revolution made some glorious promises to the world's poor: instant access to far-flung markets, political empowerment, greater growth, even the possibility that countries could leapfrog entire stages of development. But when none of that happened in a hurry, the hoopla gave way to concern that rather than closing...

    Provided By MIT

  • White Papers // Jan 2009

    How Does Popularity Information Affect Choices? Theory and A Field Experiment

    Popularity information is usually thought to reinforce existing sales trends by encouraging customers to flock to mainstream products. A theoretical model was developed which predicts the opposite: popularity information may benefit niche products disproportionately, because the same level of popularity implies higher quality for a niche product than for a...

    Provided By MIT

  • White Papers // Sep 2007

    Relations Among Notions of Non-Malleability for Encryption

    The basic goal of an encryption scheme is to guarantee the privacy of data. A good formalization of privacy is the notion of semantic security as defined by the researchers. Since its introduction in the early 90's, the notion of non-malleability for encryption schemes has been formalized using a number...

    Provided By MIT

  • White Papers // Feb 2012

    Network Coded Gossip With Correlated Data

    The authors design and analyze gossip algorithms for networks with correlated data. In these networks, either the data to be distributed, the data already available at the nodes, or both, are correlated. Although coding schemes for correlated data have been studied extensively, the focus has been on characterizing the rate...

    Provided By MIT

  • White Papers // Mar 2012

    Privacy-Preserving Data Sharing Using Data Reconstruction Based Approach

    Data mining services require accurate input data for their results to be meaningful, but privacy concerns may influence users to provide spurious information. To preserve client privacy in the data mining process, a variety of techniques based on random perturbation of data records have been proposed recently. One known fact...

    Provided By MIT

  • White Papers // May 2012

    Mosh: An Interactive Remote Shell for Mobile Clients

    Mosh (mobile shell) is a remote terminal application that supports intermittent connectivity, allows roaming, and speculatively and safely echoes user keystrokes for better interactive response over high-latency paths. Mosh is built on the State Synchronization Protocol (SSP), a new UDP-based protocol that securely synchronizes client and server state, even across...

    Provided By MIT

  • White Papers // Feb 2012

    UFlood: High-Throughput Flooding Over Wireless Mesh Networks

    This paper proposes UFlood, a flooding protocol for wireless mesh networks. UFlood targets situations such as software updates where all nodes need to receive the same large file of data, and where limited radio range requires forwarding. UFlood's goals are high throughput and low airtime, defined respectively as rate of...

    Provided By MIT

  • White Papers // Jan 2013

    Towards Realizing the Performance and Availability Benefits of a Global Overlay Network

    Prior analyses of the benefits of routing overlays are based on platforms consisting of nodes located primarily in North America, on the academic Internet, and at the edge of the network. This paper is the first global study of the benefits of overlays on the commercial Internet in terms of...

    Provided By MIT

  • White Papers // Jan 2010

    Bit-Wise Unequal Error Protection for Variable Length Blockcodes with Feedback

    Bit-wise unequal error protection problem with two layers is considered for variable length block-codes with feedback. Inner and outer bounds are derived for achievable performance for finite expected decoding time. These bounds completely characterize the error exponent of the special bits as a function of overall rate R, overall error...

    Provided By MIT

  • White Papers // Sep 2010

    Scaling Laws for Learning High-Dimensional Markov Forest Distributions

    The problem of learning forest-structured discrete graphical models from i.i.d. samples is considered. An algorithm based on pruning of the Chow-Liu tree through adaptive thresholding is proposed. It is shown that this algorithm is structurally consistent and the error probability of structure learning decays faster than any polynomial in the...

    Provided By MIT

  • White Papers // Mar 2010

    Symmetric LDPC Codes and Local Testing

    Coding theoretic and complexity theoretic considerations naturally lead to the question of generating symmetric, sparse, redundant linear systems. This paper provides new way of constructions with better parameters and new lower bounds. Low Density Parity Check (LDPC) codes are linear codes defined by short constraints (a property essential for local...

    Provided By MIT

  • White Papers // Nov 2009

    Video-Centric Network Coding Strategies for 4G Wireless Networks: An Overview

    The impact of Internet content and IP based television on networks is growing. Video is now ubiquitous in the home and on the street. It demands new approaches to video transmission to meet the growing traffic volume. This paper presents a novel strategy for network coding in video transmission. It...

    Provided By MIT

  • White Papers // Jan 2009

    How Does Popularity Information Affect Choices? Theory and A Field Experiment

    Popularity information is usually thought to reinforce existing sales trends by encouraging customers to flock to mainstream products. A theoretical model was developed which predicts the opposite: popularity information may benefit niche products disproportionately, because the same level of popularity implies higher quality for a niche product than for a...

    Provided By MIT

  • White Papers // Jan 2010

    Will iSCSI Dominate SANs?

    The primary mode of data storage for computer servers has been direct-attached storage (DAS). In this mode, a computer issues commands to manage blocks of data on internal disk drives. This mode presents constraints to growth as the amount of servers and storage space increases. DAS is not very scalable...

    Provided By MIT

  • White Papers // Jan 2011

    Observed Structure of Addresses in IP Traffic

    This paper investigates the structure of addresses contained in IP traffic. Specifically, the authors analyze the structural characteristics of destination IP addresses seen on Internet links, considered as a subset of the address space. These characteristics may have implications for algorithms that deal with IP address aggregates, such as routing...

    Provided By MIT

  • White Papers // Dec 2010

    Optimal Pricing in the Presence of Local Network Effects

    The authors study the optimal pricing strategies of a monopolist selling a divisible good (service) to consumers that are embedded in a social network. A key feature of the model is that consumers experience a (positive) local network effect. In particular, each consumer's usage level depends directly on the usage...

    Provided By MIT

  • White Papers // Jun 2010

    Making Linux Protection Mechanisms Egalitarian With UserFS

    UserFS provides egalitarian OS protection mechanisms in Linux. UserFS allows any user - not just the system administrator - to allocate Unix user IDs, to use chroot, and to set up firewall rules in order to confine untrusted code. One key idea in UserFS is representing user IDs as files...

    Provided By MIT

  • Webcasts // Jun 2011

    Blocks + Computing = A New Kind of Interface

    The startup Sifteo, based in San Francisco, will bring to market handheld, computerized cubes that can sense each other and run a variety of interactive programs. Recently, Technology Review got a chance to review the blocks ahead of their launch. By adding computing power to blocks, the founders hope they...

    Provided By MIT

  • Podcasts // Aug 2010

    Data Transfer at Light Speed

    The world of computing could change rapidly in coming years thanks to technology that replaces the metal wiring between components with faster, more efficient fiber-optic links. "All communications over long distance are driven by lasers, but one have never had it inside devices," says the speaker director of Intel's photonics...

    Provided By MIT

  • Webcasts // May 2011

    Sony Sets Its Sights on Augmented Reality

    Sony has demonstrated a new augmented reality system called Smart AR that can be built into the company's future gaming devices. Augmented reality involves mapping virtual objects onto a view of the real world, usually as seen through the screen of a smart phone. The technology has so far been...

    Provided By MIT

  • Webcasts // May 2011

    Making 3-D Models From Your Photos

    The design software company Autodesk will release free software next week that could turn those snapshots into one's own personal replica from a 3-D printer. Called Photofly, the software extracts a detailed 3-D model from a collection of overlapping photos.

    Provided By MIT

  • Webcasts // May 2011

    The Invisible IPhone

    Over time, using a smart-phone touch screen becomes second nature, to the point where one can even do some tasks without looking. Researchers in Germany are now working on a system that would let one perform such actions without even holding the phone - instead one would tap one's palm,...

    Provided By MIT

  • Webcasts // Apr 2011

    A Personalized Trip to the Grocery Store

    An iPhone app launching today provides a glimpse into the future of shopping. Created by Modiv Media, the app lets customers scan items while they shop, presents them with personalized offers as they go, and speeds up their checkout. One of the first companies to deploy the app is Stop...

    Provided By MIT

  • Podcasts // Jun 2011

    TR10: Cloud Streaming

    In the Silicon Valley conference room of OnLive, Steve Perlman touches the lifelike 3-D face of a computer-generated woman displayed on his iPad. Swiping the screen with his fingers, Perlman rotates her head; her eyes move to compensate, so that she continues to stare at one spot. None of this...

    Provided By MIT

  • Webcasts // Mar 2011

    App Turns Your Phone Into a 3-D Scanner

    Capturing an object in three dimensions needn't require the budget of Avatar. A new cell phone app developed by Microsoft researchers can be sufficient. The software uses overlapping snapshots to build a photo-realistic 3-D model that can be spun around and viewed from any angle.

    Provided By MIT

  • Webcasts // Mar 2011

    An On-Off Switch for Anxiety

    The flick of a precisely placed light switch, mice can be induced to cower in a corner in fear or bravely explore their environment. The webcast highlights the power of optogenetics technology - which allows neuroscientists to control genetically engineered neurons with light - to explore the functions of complex...

    Provided By MIT

  • Webcasts // Mar 2011

    Hacks of the Microsoft Kinect

    A new generation of tools will soon make it even easier to tinker with the Kinect, the $150 Microsoft device that lets people control video games by gesturing. Since the Kinect's release in November, Microsoft has sold upwards of 8 million units and perhaps inadvertently started a frenzy of hacking,...

    Provided By MIT

  • Webcasts // Feb 2011

    Growing Lasers on Computer Chips

    The first time, researchers have grown lasers from high-performance materials directly on silicon. Bringing together electrical and optical components on computer chips would speed data transfer within and between computers, but the incompatibility of the best laser materials with the silicon used to make today's chips has been a major...

    Provided By MIT

  • White Papers // Mar 2009

    Deployment of Routing Strategy Based Firecracker Protocol for Data Dissemination in Wireless Sensor Networks During Natural Calamities

    The IT revolution made some glorious promises to the world's poor: instant access to far-flung markets, political empowerment, greater growth, even the possibility that countries could leapfrog entire stages of development. But when none of that happened in a hurry, the hoopla gave way to concern that rather than closing...

    Provided By MIT

  • White Papers // May 2011

    Lightweight Implementations of Probabilistic Programming Languages Via Transformational Compilation

    The authors describe a general method of transforming arbitrary programming languages into probabilistic programming languages with straightforward MCMC inference engines. Random choices in the program are "Named" with information about their position in an execution trace; these names are used in conjunction with a database holding values of random variables...

    Provided By MIT

  • White Papers // Sep 2010

    Transactional Consistency and Automatic Management in an Application Data Cache

    Distributed in-memory application data caches like mem-cached are a popular solution for scaling database-driven web sites. These systems are easy to add to existing deployments, and increase performance significantly by reducing load on both the database and application servers. Unfortunately, such caches do not integrate well with the database or...

    Provided By MIT

  • White Papers // Dec 2009

    Leakage-Resilient Signatures

    The strongest standard security notion for digital signature schemes is unforgeability under chosen message attacks. In practice, however, this notion can be insufficient due to \"Side-channel attacks\" which exploit leakage of information about the secret internal state. In this paper the authors put forward the notion of \"Leakage-resilient signatures,\" which...

    Provided By MIT

  • White Papers // Sep 2007

    Relations Among Notions of Non-Malleability for Encryption

    The basic goal of an encryption scheme is to guarantee the privacy of data. A good formalization of privacy is the notion of semantic security as defined by the researchers. Since its introduction in the early 90's, the notion of non-malleability for encryption schemes has been formalized using a number...

    Provided By MIT

  • White Papers // Nov 2013

    Securing Web Applications by Blindfolding the Server

    Web applications rely on servers to store and process confidential information. However, anyone who gains access to the server (e.g., an attacker, a curious administrator, or a government) can obtain all of the data stored there. This paper presents Mylar, a platform for building web applications that protects data confidentiality...

    Provided By MIT

  • White Papers // Aug 2013

    Obfuscating Branching Programs Using Black-Box Pseudo-Free Groups

    The authors show that the class of polynomial-size branching programs can be obfuscated according to a virtual black-box notion akin to that of researcher, in an idealized black-box group model over pseudo-free groups. This class is known to lie between NC1 and P and includes most interesting cryptographic algorithms. The...

    Provided By MIT