ETH Zurich

Displaying 1-40 of 324 results

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    A Constructive Approach to Functional Encryption

    Functional encryption is an important generalization of several types of encryption such as public-key, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

    Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a client-server setting where only the server has a certified public...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    A Dynamic Trade-off Between Active and Passive Corruptions in Secure Multi-Party Computation

    Multi-Party Computation (MPC) allows a set of n parties to securely compute a (probabilistic) function f in a distributed manner, where security means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest. The dishonesty of parties is modeled with...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Optimising Conceptual Data Models through Profiling in Object Databases

    Agile methods promote iterative development with short cycles, where user feedback from the previous iteration is used to refactor and improve the current version. For information systems development, the authors propose to extend this feedback loop by using database pro ling information to propose adaptations to the conceptual model to...

    Provided By ETH Zurich

  • White Papers // May 2013

    Tailing RFID Tags for Clone Detection

    RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply \"Wireless barcodes,\" themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    On Limitations of Friendly Jamming for Confidentiality

    Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    SoK: Secure Data Deletion

    Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the...

    Provided By ETH Zurich

  • White Papers // Jan 2013

    Pricing in Information-Centric Network Interconnection

    The authors propose a pricing model to study the economic incentives for caching and sharing content in the interconnection of Information-Centric Networks (ICNs). While collaborative caching in ICNs is a key feature to success in improving network performance and reducing delivery costs in content distribution, the current pricing strategies in...

    Provided By ETH Zurich

  • White Papers // Dec 2012

    Main-Memory Hash Joins on Multi-Core CPUs: Tuning to the Underlying Hardware

    The architectural changes introduced with multi-core CPUs have triggered a redesign of main-memory join algorithms. In the last few years, two diverging views have appeared. One approach advocates careful tailoring of the algorithm to the architectural parameters (cache sizes, TLB, and memory bandwidth). The other approach argues that modern hardware...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Relaying and Base Station Cooperation: A Comparative Survey for Future Cellular Networks

    The authors develop a unified framework to investigate the performance of future cellular networks with relays and/or Coordinated MultiPoint (CoMP) transmission. Based on this framework, they study the benefits of CoMP and relaying in a realistic setup. They consider imperfect channel knowledge, different power levels, and simple (thus practically relevant)...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Universal Computation With Low-Complexity Wireless Relay Networks

    The authors propose a method for enabling complex computations in a network of low-complexity wireless devices. By utilizing multi-hop relaying, such devices can form the wireless equivalent of an Artificial Neural Network (ANN). They provide a method for programming the network functionality in a decentralized fashion and demonstrate the robustness...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Scheduling Wireless Links With Successive Interference Cancellation

    In this paper, the authors study the problem of scheduling wireless links in a model where successive interference cancellation is combined with the physical interference model and uniform power assignment. Successive interference cancellation is based on the observation that interfering signals should not be treated as random noise, but as...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Worst-Case Temperature Analysis for Different Resource Models

    The rapid increase in heat dissipation in real-time systems imposes various thermal issues. For instance, real-time constraints cannot be guaranteed if a certain threshold temperature is exceeded, as it would immediately reduce the system reliability and performance. Dynamic thermal management techniques are promising methods to prevent a system from over-heating....

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory

    The authors propose the Data Node Encrypted File System (DNEFS), which uses on-the-y encryption and decryption of le system data nodes to efficiently and securely delete data on ash memory systems. DNEFS is a generic modification of existing ash le systems or controllers that enables secure data deletion while preserving...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Performance Analysis of SCOOP Programs

    To support developers in writing reliable and efficient concurrent programs, novel concurrent programming abstractions have been proposed in recent years. Programming with such abstractions requires new analysis tools because the execution semantics often differs considerably from established models. The authors present a performance analyzer that is based on new metrics...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Can Asynchronous Exceptions Expire?

    A multitude of asynchronous exception mechanisms have been proposed. They specify where and when an asynchronous exception propagates. The authors highlight another aspect that has largely been overlooked: can an asynchronous exception expire? They discuss scenarios where it is meaningful for an asynchronous exception to expire. They further elaborate on...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Exploring the Physical-Layer Identification of GSM Devices

    In this paper, the authors study the physical-layer identification of GSM devices. For their exploration, they build an ad-hoc acquisition setup that collects GSM signals during voice calls. They collect signals from a population of 18 mobile devices and build fingerprints by considering both the transient and the data parts...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Counting Stream Registers: An Efficient and Effective Snoop Filter Architecture

    The authors introduce a counting stream register snoop filter, which improves the performance of existing snoop filters based on stream registers. Over time, this class of snoop filters loses the ability to filter memory addresses that have been loaded, and then evicted, from the caches that are filtered; they include...

    Provided By ETH Zurich

  • White Papers // May 2012

    Classifying Internet One-Way Traffic

    Internet Background Radiation (IBR) is a very interesting piece of Internet traffic as it is the result of attacks and mis-configurations. Previous work has primarily analyzed IBR traffic to large unused IP address blocks called network telescopes. In this paper, the authors build new techniques for monitoring one-way traffic in...

    Provided By ETH Zurich

  • White Papers // Nov 2008

    Optimum Time-Division in MIMO Two-Way Decode-and-Forward Relaying Systems

    The authors consider a Multiple-Input Multiple-Output (MIMO) two-way relaying system, where two wireless terminals exchange data via a half-duplex Decode-and-Forward (DF) relay. The problem of optimum Time-Division (TD) between the Multiple ACcess (MAC) phase and the BRoadCast (BRC) phase is addressed in this paper. They characterize the achievable rate regions...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    On Capacity Scaling of (Long) MIMO Amplify-and-Forward Multihop Networks

    The authors consider wireless Multiple-Input-Multiple-Output (MIMO) communication between nS no-cooperating source antennas and nD fully cooperating destination antennas. Let them suppose the source antennas are either far apart or shadowed from the destination antennas. The installation of intermediate nodes that relay the source signals to the destination (multi-hop) is well...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Sep 2011

    Basis Pursuit in Sensor Networks

    In this paper, the authors propose a distributed algorithm to solve BP. This means no central node is used for the processing and no node has access to all the data: the rows of M and the vector b are distributed over a set of interconnected compute nodes. A typical...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Calling the Cloud: Enabling Mobile Phones as Interfaces to Cloud Applications

    Mobile phones are set to become the universal interface to online services and cloud computing applications. However, using them for this purpose today is limited to two configurations: applications either run on the phone or run on the server and are remotely accessed by the phone. These two options do...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Early Experience with the Barrelfish OS and the Single-Chip Cloud Computer

    Traditional OS architectures based on a single, shared-memory kernel face significant challenges from hardware trends, in particular the increasing cost of system-wide cache-coherence as core counts increase, and the emergence of heterogeneous architectures - both on a single die, and also between CPUs, co-processors like GPUs, and programmable peripherals within...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2011

    Parallel I/O and The Metadata Wall

    Large HPC installations typically make use of parallel file systems that adhere to POSIX I/O conventions, and that implement a separation of data and metadata in order to maintain high performance. File systems such as GPFS and Lustre have evolved to enable an increase in data bandwidth that is primarily...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // May 2012

    Collection and Analysis of Multi-Dimensional Network Data for Opportunistic Networking Research

    Opportunistic networks use human mobility and consequent wireless contacts between mobile devices to disseminate data in a peer-to-peer manner. Designing appropriate algorithms and protocols for such networks is challenging as it requires understanding patterns of mobility (who meets whom), social relations (who knows whom) and communication (who communicates with whom)....

    Provided By ETH Zurich

  • White Papers // Apr 2012

    Forecasting DTN Performance Under Heterogeneous Mobility: The Case of Limited Replication

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi).Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only partly...

    Provided By ETH Zurich

  • White Papers // May 2012

    Classifying Internet One-Way Traffic

    Internet Background Radiation (IBR) is a very interesting piece of Internet traffic as it is the result of attacks and mis-configurations. Previous work has primarily analyzed IBR traffic to large unused IP address blocks called network telescopes. In this paper, the authors build new techniques for monitoring one-way traffic in...

    Provided By ETH Zurich

  • White Papers // May 2012

    Passive Corruption in Statistical Multi-Party Computation

    The goal of Multi-Party Computation (MPC) is to perform an arbitrary computation in a distributed, private, and fault-tolerant way. For this purpose, a fixed set of n parties runs a protocol that tolerates an adversary corrupting a subset of the parties, preserving certain security guarantees like correctness, secrecy, robustness, and...

    Provided By ETH Zurich

  • White Papers // Apr 2012

    An Algorithm for Online Reconfiguration of Resource Reservations for Hard Real-Time Systems

    Now-a-days, real-time applications expect the supporting computing system to be reconfigured at run-time. Even during such reconfiguration, timing requirements of the applications must be met. By extension, such requirements are relevant in the design of resource reservations techniques. In this paper, the authors consider such a reconfiguration of the reservation...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Stumbl: Using Facebook to Collect Rich Datasets for Opportunistic Networking Research

    Opportunistic networks use human mobility and consequent wireless contacts between mobile devices to disseminate data in a peer-to-peer manner. Designing appropriate algorithms and protocols for such networks is challenging as it requires understanding patterns of mobility (who meets whom), social relations (who knows whom) and communication (who communicates with whom)....

    Provided By ETH Zurich

  • White Papers // Jun 2011

    The Role Of Country-Of-Origin Characteristics For Foreign Direct Investment And Technical Cooperation In Post-Reform India

    The decisions of foreign investors on technical cooperation versus equity engagements and on the degree of ownership in FDI projects are likely to depend on their relative bargaining position vis-?-vis the host country. India provides an interesting case for analyzing the interplay between country-of origin-characteristics and host-country-characteristics and their respective...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Has The EMU Reduced Wage Growth And Unemployment? Testing A Model Of Trade Union Behaviour

    By using a model of trade union behaviour Gr?ner (2010) argues that the introduction of the European Monetary Union (EMU) led to lower wage growth and lower unemployment in participating countries. Following Gr?ner's model, monetary centralization lets the central bank react less flexibly to national business cycle movements. This increases...

    Provided By ETH Zurich

  • White Papers // Apr 2009

    The Role Of Media For Inflation Forecast Disagreement Of Households And Professional Forecasters

    This paper investigates the effects of media coverage and macroeconomic conditions on inflation forecast disagreement of German households and professional forecasters. The authors adopt a Bayesian learning model in which media coverage of inflation affects forecast disagreement by influencing information sets as well as predictor choice. The empirical results show...

    Provided By ETH Zurich

  • White Papers // Dec 2009

    The Formation Of Inflation Perceptions - Some Empirical Facts For European Countries

    This paper investigates how households form their perceptions of consumer price inflation. Using data from the harmonized EU consumer survey, the authors find that inflation perceptions are inefficient and highly heterogeneous, yet contemporaneously related to the actual rate of inflation. Consequently, they estimate how often households update their beliefs employing...

    Provided By ETH Zurich

  • White Papers // Aug 2010

    Endogenous Growth, Asymmetric Trade And Resource Taxation

    Since 1980, the aggregate income of oil-exporting countries relative to that of oil-poor countries has been remarkably constant despite structural gaps in productivity growth rates. This stylized fact is analyzed in a two-country model where resource-poor (Home) and resource-rich (Foreign) economies display productivity differences but stable income shares due to...

    Provided By ETH Zurich

  • White Papers // Oct 2010

    Membership Has Its Privileges - The Effect Of Membership In International Organizations On FDI

    The authors argue that membership in International Organizations (IOs) is an important determinant of FDI inflows. To the extent that membership restricts a country from pursuing policies that are harmful to investors, it can signal low political risk. Using data over the 1971-2005 period, they find that membership in IOs...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    On the Security of Bottleneck Bandwidth Estimation Techniques

    Several wide-area services are increasingly relying on bottleneck bandwidth estimation tools to enhance their network performance. Selfish hosts have, therefore, considerable incentives to fake their bandwidths in order to increase their benefit in the network. In this paper, the authors address this problem and they investigate the vulnerabilities of current...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Secure Deletion on Log-Structured File Systems

    The authors address the problem of secure data deletion on log-structured file systems. They focus on the YAFFS file system, widely used on Android smartphones. They show that these systems provide no temporal guarantees on data deletion and that deleted data still persists for nearly 44 hours with average phone...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Investigation of Signal and Message Manipulations on The Wireless Channel

    The authors explore the suitability of Dolev-Yao-based attacker models for the security analysis of wireless communication. The Dolev-Yao model is commonly used for wireline and wireless networks. It is defined on abstract messages exchanged between entities and includes arbitrary, real-time modification of messages by the attacker. In this paper, the...

    Provided By ETH Zurich

  • White Papers // Nov 2010

    GDB: Group Distance Bounding Protocols

    Secure Distance Bounding (DB) protocols allow one entity, the verifier, to securely obtain an upper-bound on the distance to another entity, the prover. Thus far, DB was considered mostly in the context of a single prover and a single verifier. There has been no substantial prior work on secure DB...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    UWB Impulse Radio Based Distance Bounding

    Today's communication systems are often vulnerable to wormhole or relaying attacks, leading to severe security problems. Distance Bounding (DB) protocols are authentication protocols designed to protect against these attacks. They determine an upper bound on the physical distance between two communication parties - the verifier V (e.g. a door requiring...

    Provided By ETH Zurich

  • White Papers // Oct 2009

    Secure Remote Execution of Sequential Computations

    The authors describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of the knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, they show that...

    Provided By ETH Zurich

  • White Papers // Jun 2009

    Let's Get Physical: Models and Methods for Real-World Security Protocols

    Traditional security protocols are mainly concerned with key establishment and principal authentication and rely on predistributed keys and properties of cryptographic operators. In contrast, new application areas are emerging that establish and rely on properties of the physical world. Examples include protocols for secure localization, distance bounding, and device pairing....

    Provided By ETH Zurich

  • White Papers // May 2009

    Small Coalitions: Lightweight Collaboration for Efficient P2P Downloads

    Peer-To-Peer (P2P) architectures are gaining increasing popularity in disseminating content to a large number of nodes. In this paper, the authors show that small coalitions between peers can further enhance the performance of current P2P architectures. Small coalitions bridge the gap between inefficient non-cooperative and fully cooperative architectures by establishing...

    Provided By ETH Zurich

  • White Papers // May 2009

    Jamming-Resistant Broadcast Communication Without Shared Keys

    Jamming-resistant broadcast communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. These applications share the need for guaranteed authenticity and availability of messages which are broadcasted by base stations to a large and unknown number of (potentially untrusted) receivers....

    Provided By ETH Zurich

  • White Papers // Jul 2011

    Role Of Diversification Risk In Financial Bubbles

    The authors present an extension of the Johansen-Ledoit-Sornette (JLS) model to include an additional pricing factor called the "Zipf factor", which describes the diversification risk of the stock market portfolio. Keeping all the dynamical characteristics of a bubble described in the JLS model, the new model provides additional information about...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Diagnosis And Prediction Of Market Rebounds In Financial Markets

    The authors introduce the concept of "Negative bubbles" as the mirror (but not necessarily exactly symmetric) image of standard financial bubbles, in which positive feedback mechanisms may lead to transient accelerating price falls. To model these negative bubbles, they adapt the Johansen-Ledoit-Sornette (JLS) model of rational expectation bubbles with a...

    Provided By ETH Zurich

  • White Papers // Jul 2011

    The Network Of Global Corporate Control

    The structure of the control network of transnational corporations affects global market competition and financial stability. So far, only small national samples were studied and there was no appropriate methodology to assess control globally. The authors present the first investigation of the architecture of the international ownership network, along with...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    Aid Allocation By German NGOs: Does the Degree Of Public Refinancing Matter?

    Using a new dataset for 41 German Non-Governmental Organizations (NGOs), the authors analyze the allocation of NGO aid across recipient countries in a Tobit regression framework. By identifying for each NGO the degree of public refinancing, they address the largely unresolved issue of whether financial dependence on the government impairs...

    Provided By ETH Zurich