Now showing items 1-20 of 113

    • The expressive power of the Internet design 

      Clark, David D. (© Massachusetts Institute of Technology, 2009-04-27)
      The present Internet is not defined in terms of its semantics, at least at the packet level. The loose packet carriage model of “what comes out is what went in” is intentionally almost semantics-free. The packets just carry ...
    • Explorations in cyber international relations (ECIR)—data dashboard report #1: CERT data sources and prototype dashboard system 

      Madnick, Stuart E.; Choucri, Nazli; Camiña, Steven; Fogg, Erik; Li, Xitong; e.a. (© Massachusetts Institute of Technology, 2009-08-10)
      Growing global interconnection and interdependency of computer networks, in combination with increased sophistication of cyber attacks over time, demonstrate the need for better understanding of the collective and cooperative ...
    • Experiences and challenges with using CERT data to analyze international cyber security. 

      Madnick, Stuart E.; Li, Xitong; Choucri, Nazli (© Elsevier B.V., 2009-09)
      With the increasing interconnection of computer networks and sophistication of cyber attacks, it is important to understand the dynamics of such situations, especially in regards to cyber international relations. The ...
    • Toward the design of a future Internet 

      Clark, David D. (© Massachusetts Institute of Technology, 2009-10-10)
      This document is one very preliminary proposal for the design of a Future Internet—an outline of requirements and architecture. This document should only be seen as a first step in such a proposal; there are many parts ...
    • System dynamics modeling for pro-active intelligence 

      Anderson, Ed; Choucri, Nazli; Goldsmith, Daniel; Madnick, Stuart E.; Siegel, Michael; e.a. (© Massachusetts Institute of Technology, 2009-11-04)
      The Pro-Active Intelligence (PAINT) program, sponsored by the Intelligence Advanced Research Projects Activity (IARPA), was formed to address the challenges1 posed by distributed human networks, including terrorists and ...
    • Rational robustness for mechanism design 

      Chen, Jing; Micali, Silvio (© Massachusetts Institute of Technology, 2009-11-10)
      The currently prevailing equilibrium-based approach to mechanism design suffers from a plurality of fundamental problems, and new conceptual frameworks are needed to solve or sufficiently alleviate them. In this paper, ...
    • Text to Text : plot unit searches generated from English 

      Nackoul, David Douglas (Massachusetts Institute of Technology, 2010)
      The story of Macbeth centers around revenge. World War I was started by an act of revenge. Even though these two stories are seemingly unrelated, humans use the same concept to draw meaning from them. Plot units, revenge ...
    • A comparison of taxonomy generation techniques using bibliometric methods : applied to research strategy formulation 

      Camiña, Steven L (Massachusetts Institute of Technology, 2010)
      This paper investigates the modeling of research landscapes through the automatic generation of hierarchical structures (taxonomies) comprised of terms related to a given research field. Several different taxonomy generation ...
    • A matrix based integrated framework for multi disciplinary exploration of cyber-international relations 

      Gaurav, Agarwal (Massachusetts Institute of Technology, 2010)
      Cyberspace is the most pervasive and rapidly adopted communication media and the most disruptive until date. It is now indispensable for almost every facet of modern society and touches, practically, everyone by providing ...
    • Untangling attribution 

      Clark, David D.; Landau, Susan (© National Academy of Sciences, 2010-01-01)
      In February 2010, former NSA Director Mike McConnell wrote that, “We need to develop an early- warning system to monitor cyberspace, identify intrusions and locate the source of attacks with a trail of evidence that can ...
    • Resilient and virtually perfect revenue from perfectly informed players 

      Chen, Jing; Hassidim, Avinatan; Micali, Silvio (© Massachusetts Institute of Technology, 2010-01-13)
      We put forward a new extensive-form mechanism that, in a general context with perfectly informed players and quasi-linear utilities, • Virtually achieves optimal revenue at a unique subgame-perfect equilibrium; • Is ...
    • Understanding cyber complexity: Systems modeling and the financial services sector 

      Goldsmith, Daniel; Siegel, Michael (© Massachusetts Institute of Technology, 2010-02)
      Recent developments within the financial services sector have demonstrated that as the diffusion of cyber enabled technologies increases, so too does dependency on a cyber infrastructure susceptible to failure, outages, ...
    • Characterizing cyberspace: Past, present and future 

      Clark, David D. (© Massachusetts Institute of Technology, 2010-03-12)
      In general terms, most practitioners share a working concept of cyberspace—it is the collection of computing devices connected by networks in which electronic information is stored and utilized, and communication takes ...
    • The prevalence of descriptive referring expressions in news and narrative 

      Hervaś, Raquel; Finlayson, Mark Alan (© Association for Computational Linguistics, 2010-07-11)
      Generating referring expressions is a key step in Natural Language Generation. Researchers have focused almost exclusively on generating distinctive referring expressions, that is, referring expressions that uniquely ...
    • Mixed context and privacy 

      Sowell, Jesse (© TRPC, 2010-08-15)
      Users engaging online service providers (OSPs) such as Google, Amazon, and Facebook encounter environments architected by a single actor (the OSP), but comprised of content and executable elements potentially provided by ...
    • Simulation modeling for cyber resilience 

      Siegel, Michael; Goldsmith, Daniel (© Massachusetts Institute of Technology, 2010-10)
      Identifying high-leverage intervention points to increase cyber resiliency—the ability to provide and maintain acceptable service levels in the face of challenges— requires identifying, integrating, and framing a diverse ...
    • 2010 ECIR Annual Conference on "Cyber International Relations: Emergent Realities of Conflict and Cooperation" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2010-10-13)
      In international relations, the traditional approaches to theory, research, practice and policy were derived from experiences in the 18th and 19th centuries, refined further in the 20th century. But cyberspace has created ...
    • 2010 ECIR Workshop on "Cyber International Relations: Emergent Realities of Conflict and Cooperation" 

      Choucri, Nazli (Explorations in Cyber International Relations, 2010-10-13)
      An event of the MIT-Harvard multidisciplinary Minerva Project on "Explorations in Cyber International Relations" (ECIR), this conference seeks to adjust traditional views to the cyber realities of the 21st century. Of the ...
    • The problem isn't attribution: It's multi-stage attacks 

      Clark, David D.; Landau, Susan (© Association for Computing Machinery, New York, NY, USA, 2010-11-30)
      As a result of increasing spam, DDoS attacks, cybercrime, and data exfiltration from corporate and government sites, there have been multiple calls for an Internet architecture that enables better network attribution at ...
    • Story understanding in Genesis : exploring automatic plot construction through commonsense reasoning 

      Low, Harold William Capen, IV (Massachusetts Institute of Technology, 2011)
      Whether through anecdotes, folklore, or formal history, humans learn the lessons and expectations of life from stories. If we are to build intelligent programs that learn as humans do, such programs must understand stories ...