Search
Now showing items 51-60 of 67
Beyond the Bits: Cooperative Packet Recovery Using Physical Layer Information
(2007-05-29)
Wireless networks can suffer from high packet loss rates. This paper shows that the loss rate can be significantly reduced by exposing information readily available at the physical layer. We make the physical layer convey ...
Amorphous Computing
(2007)
The goal of amorphous computing is to identify organizationalprinciples and create programming technologies for obtainingintentional, pre-specified behavior from the cooperation of myriadunreliable parts that are arranged ...
Team MIT Urban Challenge Technical Report
(2007-12-14)
This technical report describes Team MIT s approach to theDARPA Urban Challenge. We have developed a novel strategy forusing many inexpensive sensors, mounted on the vehicle periphery,and calibrated with a new cross-modal ...
Quantitative Information Flow as Network Flow Capacity
(2007-12-10)
We present a new technique for determining how much information abouta program's secret inputs is revealed by its public outputs. Incontrast to previous techniques based on reachability from secretinputs (tainting), it ...
Verifiably Secure Devices
(2007-12-05)
We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices1. Provide a perfect solution to the problem of ...
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-10-20)
Instruction in higher education must adapt more rapidly to: changes in workforce needs, global issues, advances in disciplines, and resource constraints. The pace of such improvement depends on the speed with which new ...
Factors Affecting the Adoption of Faculty-Developed Academic Software: A Study of Five iCampus Projects
(2007-08-20)
Initiated in 1999, iCampus is a research collaboration between Microsoft Research and MIT whose goal is to create and demonstrate technologies with the potential for revolutionary change throughout the university curriculum. ...
Toward Secure Services from Untrusted Developers
(2007-08-06)
We present a secure service prototype built from untrusted,contributed code.The service manages private data for a variety of different users, anduser programs frequently require access to other users' private data.However, ...
Agent Organization and Request Propagation in the Knowledge Plane
(2007-07-26)
In designing and building a network like the Internet, we continue to face the problems of scale and distribution. In particular, network management has become an increasingly difficult task, and network applications often ...
Learning by Learning To Communicate
(2007-08-23)
Human intelligence is a product of cooperation among many different specialists. Much of this cooperation must be learned, but we do not yet have a mechanism that explains how this might happen for the "high-level" agile ...