ETH Zurich

Displaying 1-40 of 315 results

  • White Papers // Feb 2015

    The Business Model Bank: Conceptualizing a Database Structure for Large-Sample Study of an Emerging Management Concept

    The 'Business model' represents an increasingly important management concept. However, progress in research related to the concept is currently inhibited from inconsistencies in terms of formalizing and therewith also empirically measuring the 'business model' concept. Taking this as a starting point, this paper offers a conceptualization for building a scalable...

    Provided By ETH Zurich

  • White Papers // Aug 2014

    Deterministic Leader Election in Multi-Hop Beeping Networks

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of...

    Provided By ETH Zurich

  • White Papers // Jul 2014

    Securing Cloud Data in the New Attacker Model

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    BlueWallet: The Secure Bitcoin Wallet

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims'...

    Provided By ETH Zurich

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    A Constructive Approach to Functional Encryption

    Functional encryption is an important generalization of several types of encryption such as public-key, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

    Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a client-server setting where only the server has a certified public...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    A Dynamic Trade-off Between Active and Passive Corruptions in Secure Multi-Party Computation

    Multi-Party Computation (MPC) allows a set of n parties to securely compute a (probabilistic) function f in a distributed manner, where security means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest. The dishonesty of parties is modeled with...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    Convergence in (Social) Influence Networks

    What do social networks, belief propagation, spring embedders, cellular automata, distributed message passing algorithms, traffic networks, the brain, biological cell systems, or ant colonies have in common? They are all examples of \"Networks\", where the entities of the network are continuously influenced by the states of their respective neighbors. All...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Optimising Conceptual Data Models through Profiling in Object Databases

    Agile methods promote iterative development with short cycles, where user feedback from the previous iteration is used to refactor and improve the current version. For information systems development, the authors propose to extend this feedback loop by using database pro ling information to propose adaptations to the conceptual model to...

    Provided By ETH Zurich

  • White Papers // May 2013

    Tailing RFID Tags for Clone Detection

    RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply \"Wireless barcodes,\" themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    On Limitations of Friendly Jamming for Confidentiality

    Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    SoK: Secure Data Deletion

    Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the...

    Provided By ETH Zurich

  • White Papers // Jan 2013

    Pricing in Information-Centric Network Interconnection

    The authors propose a pricing model to study the economic incentives for caching and sharing content in the interconnection of Information-Centric Networks (ICNs). While collaborative caching in ICNs is a key feature to success in improving network performance and reducing delivery costs in content distribution, the current pricing strategies in...

    Provided By ETH Zurich

  • White Papers // Dec 2012

    Main-Memory Hash Joins on Multi-Core CPUs: Tuning to the Underlying Hardware

    The architectural changes introduced with multi-core CPUs have triggered a redesign of main-memory join algorithms. In the last few years, two diverging views have appeared. One approach advocates careful tailoring of the algorithm to the architectural parameters (cache sizes, TLB, and memory bandwidth). The other approach argues that modern hardware...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Relaying and Base Station Cooperation: A Comparative Survey for Future Cellular Networks

    The authors develop a unified framework to investigate the performance of future cellular networks with relays and/or Coordinated MultiPoint (CoMP) transmission. Based on this framework, they study the benefits of CoMP and relaying in a realistic setup. They consider imperfect channel knowledge, different power levels, and simple (thus practically relevant)...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Universal Computation With Low-Complexity Wireless Relay Networks

    The authors propose a method for enabling complex computations in a network of low-complexity wireless devices. By utilizing multi-hop relaying, such devices can form the wireless equivalent of an Artificial Neural Network (ANN). They provide a method for programming the network functionality in a decentralized fashion and demonstrate the robustness...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Scheduling Wireless Links With Successive Interference Cancellation

    In this paper, the authors study the problem of scheduling wireless links in a model where successive interference cancellation is combined with the physical interference model and uniform power assignment. Successive interference cancellation is based on the observation that interfering signals should not be treated as random noise, but as...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    On Finding Better Friends in Social Networks

    The authors study the dynamics of a social network. Each node has to decide locally which other node it wants to befriend, i.e., to which other node it wants to create a connection in order to maximize its welfare, which is defined as the sum of the weights of incident...

    Provided By ETH Zurich

  • White Papers // Sep 2003

    STARS - A Ubiquitous Computing Platform for Computer Augmented Tabletop Games

    This presentation paper demonstrates the STARS platform for realizing computer augmented tabletop games within a smart Room ware environment. STARS dynamically couples multiple types of interaction devices such as personal digital assistants or headsets with an interactive game table. STARS augmented tabletop games provide a number of features like dynamic...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Fast Data Analytics with FPGAs

    The rapidly increasing amount of data available for real-time analysis (i.e., so-called operational business intelligence) is creating an interesting opportunity for creative approaches to speeding up data processing algorithms. One such approach that is starting to become more common is using hardware accelerators for stream processing. Typically these accelerators are...

    Provided By ETH Zurich

  • White Papers // Mar 2012

    Groundhog-A Serial ATA Host Bus Adapter (HBA) for FPGAs

    In this paper, the authors describe Groundhog, an open-source SATA Host Bus Adapter (HBA) for FPGAs. This system makes it easy for FPGA-based applications to directly interact with permanent storage devices. This allows reconfigurable computing devices to be used in new applications that require bulk storage and presents additional opportunities...

    Provided By ETH Zurich

  • White Papers // Feb 2010

    Asymmetries in Multi-Core Systems - Or Why We Need Better Performance Measurement Units

    Future exascale systems will be based on multi-core processors, but even today's multi-core processors can be asymmetric and exhibit limitations and bottlenecks that are different from those found on a symmetric multiprocessor. In this paper the authors investigate the performance of a cluster node based on the Intel Xeon E5345...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Apr 2012

    Power Agnostic Technique for Efficient Temperature Estimation of Multicore Embedded Systems

    Temperature plays an increasingly important role in the overall performance of a computing system and in its reliability. Increased availability of multi- and many-core systems provides an opportunity to manage the overall temperature profile of the system by cleverly designing the application-to-core mapping and the associated scheduling policies. There are...

    Provided By ETH Zurich

  • White Papers // Jan 2012

    Worst-Case Temperature Guarantees for Real-Time Applications on Multi-Core Systems

    Due to increased on-chip power density, multi-core systems face various thermal issues. In particular, exceeding a certain threshold temperature can reduce the system's performance and reliability. Therefore, when designing a real-time application with non-deterministic workload, the designer has to be aware of the maximum possible temperature of the system. This...

    Provided By ETH Zurich

  • White Papers // Feb 2012

    Fast Worst-Case Peak Temperature Evaluation for Real-Time Applications on Multi-Core Systems

    The reliability of multi-core systems is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short-term functional errors. In real-time systems, high chip temperatures are even adherent to potential deadline violations. Therefore, correct functionality can only be guaranteed if the worst-case peak temperature is incorporated in real-time...

    Provided By ETH Zurich

  • White Papers // Mar 2012

    Methods and Tools for Mapping Process Networks onto Multi-Processor Systems-On-Chip

    Applications based on the Kahn Process Network (KPN) model of computation are determinate, modular, and based on FIFO communication for interprocess communication. While these properties allow KPN applications to efficiently execute on Multi-Processor System-on-Chip (MPSoC), they also enable the automation of the design process. This chapter focuses on the second...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Worst-Case Temperature Analysis for Different Resource Models

    The rapid increase in heat dissipation in real-time systems imposes various thermal issues. For instance, real-time constraints cannot be guaranteed if a certain threshold temperature is exceeded, as it would immediately reduce the system reliability and performance. Dynamic thermal management techniques are promising methods to prevent a system from over-heating....

    Provided By ETH Zurich

  • White Papers // Sep 2007

    SHAPES - a Scalable Parallel HW/SW Architecture Applied to Wave Field Synthesis

    The usage of advanced audio processing algorithms in products has always been limited by the available processing power. For powerful concepts like the Wave Field Synthesis (WFS) the performance is limited by the execution speed. In the past it was possible to increase the performance of digital signal processors by...

    Provided By ETH Zurich

  • White Papers // Jun 2006

    Flexible MPSoC Platform with Fast Interconnect Exploration for Optimal System Performance for a Specific Application

    One of the key elements in Multi-Processor Systems-on-Chip (MPSoC) design is to select the optimal on-chip interconnect architecture, in order to maximize the overall system performance. This paper proposes a flexible MPSoC platform, designed for a target application, which allows customizing the interconnect by selecting various architectures. It allows fast...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    Coupling MPARM with DOL

    Multi-Processor System-on-Chip (MPSoC) becomes prevalent for modern embedded system design, which provides high computation power, lower power dissipation, and low cost. This paper summarizes the work of coupling the MPARM cycle-accurate multi-processor simulator with the Distributed Operation Layer (DOL) system-level MPSoC development framework. The main contribution of this work is...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Feb 2011

    The Case for Fine-Grained Stream Provenance

    The current state of the art for provenance in Data Stream Management Systems (DSMS) is to provide provenance at a high level of abstraction (such as, from which sensors in a sensor network an aggregated value is derived from). This limitation was imposed by high-throughput requirements and an anticipated lack...

    Provided By ETH Zurich

  • White Papers // Nov 2010

    Extending XQuery With A Pattern Matching Facility

    Considering the growing usage of XML for communication and data representation, the need for more advanced analytical capabilities on top of XQuery is emerging. In this regard, a pattern matching facility can be considered as a natural extension to empower XQuery. In this paper, the authors first provide some use...

    Provided By ETH Zurich

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Timing Predictability on Multi-Processor Systems with Shared Resources

    Multi-processor systems are becoming increasingly important in consumer electronics as well as in industrial applications, such as automotive software. Multi-processor platforms provide more flexibility in the design and adaptation of a system to meet the increasing performance requirements and to reduce Time-To-Market (TTM) of new products. These systems are typically...

    Provided By ETH Zurich

  • White Papers // Nov 2010

    Foreign Market Entry Under Incomplete Contracts

    The author shows in this paper that incomplete contracts affect a firm's decision about serving foreign customers through exports or local sales from an affiliated plant. When contracts between two agents within a firm are too costly to write, the share of multinational firms may be higher or lower compared...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Multicore OS Benchmarks: We Can Do Better

    Current multicore OS benchmarks do not provide workloads that sufficiently reflect real-world use: they typically run a single application, whereas real workloads consist of multiple concurrent programs. In this paper the authors show that this lack of mixed workloads leads to benchmarks that do not fully exercise the OS and...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Hedging Of Game Options With The Presence Of Transaction Costs

    The authors study the problem of super - replication for game options under proportional transaction costs. They consider a multidimensional model which is an extension of the usual Black - Scholes (BS) model, in the sense that the volatility is a progressively measurable function of the stock. For this case...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Equilibrium With Exponential Utility And Non-negative Consumption

    The authors study a multi-period Arrow-Debreu equilibrium in a heterogeneous economy populated by agents trading in a complete market. Each agent is represented by an exponential utility function, where additionally no negative level of consumption is permitted. They derive an explicit formula for the optimal consumption policies involving a put...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Additive Habit Formation: Consumption In Incomplete Markets With Random Endowments

    The authors provide a detailed characterization of the optimal consumption stream for the additive habit-forming utility maximization problem, in a framework of general discrete-time incomplete markets and random endowments. This characterization allows them to derive the monotonicity and concavity of the optimal consumption as a function of wealth, for several...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Conservative Delta Hedging Under Transaction Costs

    Explicit robust hedging strategies for convex or concave payoffs under a continuous semimartingale model with uncertainty and small transaction costs are constructed. In an asymptotic sense, the upper and lower bounds of the cumulative volatility enable us to super-hedge convex and concave payoffs respectively. The idea is a combination of...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    PowerPedia - Changing Energy Usage With the Help of a Smartphone Application

    When it comes to conserving electricity, it is crucial for users to know how much energy is consumed by individual appliances. However, the technical feedback provided by existing energy consumption feedback systems in the form of dry numbers and intangible units is not appropriate for most users. To address this...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    Simulation and Emulation of MIMO Wireless Baseband Transceivers

    The development of state-of-the-art wireless communication transceivers in semiconductor technology is a challenging process due to complexity and stringent requirements of modern communication standards such as IEEE 802.11n. This paper describes a complete design, verification, and performance characterization methodology that is tailored to the needs of the development of state-of-the-art...

    Provided By ETH Zurich

  • White Papers // May 2009

    BurstMAC - An Efficient MAC Protocol for Correlated Traffic Bursts

    Many sensor network applications feature correlated traffic bursts: after a period of idle time with almost no network traffic, many nodes have to transmit large amounts of data simultaneously. One example is volcano monitoring, where rare eruptions trigger many nodes simultaneously to transmit seismic data traces. For such applications, a...

    Provided By ETH Zurich

  • White Papers // Sep 2008

    Using a Movable RFID Antenna to Automatically Determine the Position and Orientation of Objects on a Tabletop

    Augmented tabletop games support players by sensing the context of game figures (i.e., position and/or orientation) and then using this information to display additional game information, or to perform game related calculations. In the authors' paper they try to detect the position and orientation of game figures using small, unobtrusive...

    Provided By ETH Zurich

  • White Papers // Jul 2010

    From the Internet of Computers to the Internet of Things

    This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, the authors consider RFID and other important technological developments such as IP stacks and web servers for smart everyday objects. The paper concludes with a discussion of social and...

    Provided By ETH Zurich

  • White Papers // Jun 2009

    Deployment Techniques for Sensor Networks

    The prominent visions of wireless sensor networks that appeared about a decade ago have spurred enormous efforts in research and development of this new class of wireless networked embedded systems. Despite the significant effort made, successful deployments and real-world applications of sensor networks are still scarce, labor-intensive and often cumbersome...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    SPARK Rapid Prototyping Environment - Mobile Phone Development Made Easy

    Over the past few years mobile phones have evolved into attractive platforms for novel types of applications. However, compared to the design and prototyping of desktop software, mobile phone development still requires programmers to have a high level of expertise in both phone architectures and their low-level programming languages. In...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Adaptive Random Sensor Selection for Field Reconstruction in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) allow for the sampling of a physical phenomenon over long periods of time and across extended geographical areas. Once reported to a central collecting unit, the samples may be used to re-construct the developing of the physical phenomenon of interest - also referred to as signal...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    SOA-Based Integration of the Internet of Things in Enterprise Services

    Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This "Internet of Things" infrastructure will be strongly integrated...

    Provided By ETH Zurich

  • White Papers // Jun 2009

    Discovery and On-Demand Provisioning of Real-World Web Services

    The increasing usage of smart embedded devices is blurring the line between the virtual and real worlds. This creates new opportunities for applications to better integrate the real-world, providing services that are more diverse, highly dynamic and efficient. Service Oriented Architecture is on the verge of extending its applicability from...

    Provided By ETH Zurich