ETH Zurich

Displaying 1-40 of 287 results

  • White Papers // Feb 2015

    The Business Model Bank: Conceptualizing a Database Structure for Large-Sample Study of an Emerging Management Concept

    The 'Business model' represents an increasingly important management concept. However, progress in research related to the concept is currently inhibited from inconsistencies in terms of formalizing and therewith also empirically measuring the 'business model' concept. Taking this as a starting point, this paper offers a conceptualization for building a scalable...

    Provided By ETH Zurich

  • White Papers // Aug 2014

    Deterministic Leader Election in Multi-Hop Beeping Networks

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of...

    Provided By ETH Zurich

  • White Papers // Jul 2014

    Securing Cloud Data in the New Attacker Model

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    BlueWallet: The Secure Bitcoin Wallet

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims'...

    Provided By ETH Zurich

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    A Constructive Approach to Functional Encryption

    Functional encryption is an important generalization of several types of encryption such as public-key, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

    Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a client-server setting where only the server has a certified public...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    A Dynamic Trade-off Between Active and Passive Corruptions in Secure Multi-Party Computation

    Multi-Party Computation (MPC) allows a set of n parties to securely compute a (probabilistic) function f in a distributed manner, where security means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest. The dishonesty of parties is modeled with...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    Convergence in (Social) Influence Networks

    What do social networks, belief propagation, spring embedders, cellular automata, distributed message passing algorithms, traffic networks, the brain, biological cell systems, or ant colonies have in common? They are all examples of \"Networks\", where the entities of the network are continuously influenced by the states of their respective neighbors. All...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Optimising Conceptual Data Models through Profiling in Object Databases

    Agile methods promote iterative development with short cycles, where user feedback from the previous iteration is used to refactor and improve the current version. For information systems development, the authors propose to extend this feedback loop by using database pro ling information to propose adaptations to the conceptual model to...

    Provided By ETH Zurich

  • White Papers // May 2013

    Tailing RFID Tags for Clone Detection

    RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply \"Wireless barcodes,\" themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind...

    Provided By ETH Zurich

  • White Papers // May 2013

    Achieving 10Gbps Line-Rate Key-Value Stores with FPGAs

    Distributed in-memory key-value stores such as memcached have become a critical middleware application within current web infrastructure. However, typical x86- based systems yield limited performance scalability and high power consumption as their architecture with its optimization for single thread performance is not well-matched towards the memory-intensive and parallel nature of...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    On Limitations of Friendly Jamming for Confidentiality

    Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    SoK: Secure Data Deletion

    Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the...

    Provided By ETH Zurich

  • White Papers // Jan 2013

    Pricing in Information-Centric Network Interconnection

    The authors propose a pricing model to study the economic incentives for caching and sharing content in the interconnection of Information-Centric Networks (ICNs). While collaborative caching in ICNs is a key feature to success in improving network performance and reducing delivery costs in content distribution, the current pricing strategies in...

    Provided By ETH Zurich

  • White Papers // Dec 2012

    Main-Memory Hash Joins on Multi-Core CPUs: Tuning to the Underlying Hardware

    The architectural changes introduced with multi-core CPUs have triggered a redesign of main-memory join algorithms. In the last few years, two diverging views have appeared. One approach advocates careful tailoring of the algorithm to the architectural parameters (cache sizes, TLB, and memory bandwidth). The other approach argues that modern hardware...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Relaying and Base Station Cooperation: A Comparative Survey for Future Cellular Networks

    The authors develop a unified framework to investigate the performance of future cellular networks with relays and/or Coordinated MultiPoint (CoMP) transmission. Based on this framework, they study the benefits of CoMP and relaying in a realistic setup. They consider imperfect channel knowledge, different power levels, and simple (thus practically relevant)...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Universal Computation With Low-Complexity Wireless Relay Networks

    The authors propose a method for enabling complex computations in a network of low-complexity wireless devices. By utilizing multi-hop relaying, such devices can form the wireless equivalent of an Artificial Neural Network (ANN). They provide a method for programming the network functionality in a decentralized fashion and demonstrate the robustness...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Scheduling Wireless Links With Successive Interference Cancellation

    In this paper, the authors study the problem of scheduling wireless links in a model where successive interference cancellation is combined with the physical interference model and uniform power assignment. Successive interference cancellation is based on the observation that interfering signals should not be treated as random noise, but as...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Probabilistic Multicast

    Gossip-based broadcast algorithms have been considered as a viable alternative to traditional deterministic reliable broadcast algorithms in large scale environments. However, these algorithms focus on broadcasting events inside a large group of processes, while the multicasting of events to a subset of processes in a group only, potentially varying for...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Virtualizing Hardware With Multi-Context Recon Gurable Arrays

    In contrast to processors, current reconfigurable devices totally lack programming models that would allow for device independent compilation and forward compatibility. The key to overcome this limitation is hardware virtualization. In this paper, the authors resort to a macro-pipelined execution model to achieve hardware virtualization for data streaming applications. As...

    Provided By ETH Zurich

  • White Papers // Aug 2010

    Performance Evaluation of the Collection Tree Protocol Based on Its Implementation for the Castalia Wireless Sensor Networks Simulator

    Many wireless sensor network applications rely on the availability of a collection service to route data packets towards a sink node. The service is typically accessed through well defined interfaces so as to hide the details of its implementation. Providing for efficient network operation, however, often requires investigating the interplay...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    secuBT: Hacking the Hackers With User-Space Virtualization

    In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe execution framework for the execution of untrusted binary code based on the fastBT dynamic binary translator. secuBT implements user-space virtualization using dynamic binary translation and adds a system call...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    OpenXL: An Adaptable Web-Service Middleware

    The inherent complexity of current software systems has reached a critical level. This affects the general deployment complexity in the form of a huge amount of varying Non-Functional Requirements (NFRs). With regard to flexibility and maintenance, changes to software systems need to be automated in order to deploy different configurations...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    Embedded Systems FS 2010

    The BTnode is an autonomous wireless communication and computing platform based on a Bluetooth radio and a microcontroller. It serves as a demonstration platform for research in mobile and ad-hoc connected networks (MANETs) and distributed sensor networks. The BTnode has been jointly developed at ETH Zurich by the Computer Engineering...

    Provided By ETH Zurich

  • White Papers // Dec 2009

    A First Step Towards Integration Independence

    Two major forms of information integration, federation and materialization, continue to dominate the market, embedded in separate products, each with their strengths and weaknesses. Application developers must make difficult choices among techniques and products, choices that are hard to change later. The authors propose a new design principle, Integration Independence,...

    Provided By ETH Zurich

  • White Papers // Feb 2011

    Inflation Perceptions And Expectations In Sweden - Are Media Reports The? Missing Link??

    Using quantitative survey data from the Swedish Consumer Tendency Survey as well as a unique data set on media reports about inflation, the authors analyze the formation process of inflation perceptions and expectations as well as interrelations between the variables. Throughout the analysis, the role of media reports about inflation...

    Provided By ETH Zurich

  • White Papers // Jun 2010

    Innovation, Competition And Incentives For R&D

    Exploring the links between the type of innovation and the type of competition is essential to understand the mutual impacts of competition policy and innovation policy. This is of particular importance for countries which rely on innovation as a competitive advantage such as Germany and Switzerland, which are the focus...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    Insights Into The Determinants Of Innovation In Energy Efficiency

    Given the increasing interest in understanding (and supporting by means of public policy) innovative activity related to Energy Efficient Technology (EET), the author attempt to identify firm-level determinants of innovation and research in this field. A novel dataset of Swiss firms has been assembled by means of a survey in...

    Provided By ETH Zurich

  • White Papers // Jun 2010

    Realization of RF Distance Bounding

    One of the main obstacles for the wider deployment of radio (RF) distance bounding is the lack of platforms that implement these protocols. The authors address this problem and they build a prototype system that demonstrates that radio distance bounding protocols can be implemented to match the strict processing that...

    Provided By ETH Zurich

  • White Papers // Jun 2010

    SEPIA: Privacy-Preserving Aggregation of Multi-Domain Network Events and Statistics

    Secure MultiParty Computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, the authors investigate the practical usefulness of MPC for multi-domain network...

    Provided By ETH Zurich

  • White Papers // Feb 2010

    SEPIA: Security Through Private Information Aggregation

    Secure Multi Party computation (MPC) allows joint privacy-preserving computations on data of multiple parties. Although MPC has been studied substantially, building solutions that are practical in terms of computation and communication cost is still a major challenge. In this paper, the authors investigate the practical usefulness of MPC for multi-domain...

    Provided By ETH Zurich

  • White Papers // Dec 2009

    Secure Ranging With Message Temporal Integrity

    In this paper, the authors address the problem of delay attacks on radio frequency Time of Arrival (ToA) secure ranging. In secure ranging, two mutually trusted devices try to determine their distance in the presence of an attacker. A delay attack consists of delaying the ranging messages exchanged between the...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Distance Hijacking Attacks on Distance Bounding Protocols

    Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. The authors define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. They show that many proposed distance bounding protocols are vulnerable to these attacks,...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario

    Web services are an important series of industry standards for adding semantics to web-based and XML-based communication, in particular among enterprises. Like the entire series, the security standards and proposals are highly modular. Combinations of several standards are put together for testing as interoperability scenarios, and these scenarios are likely...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Luby-Rackoff Ciphers from Weak Round Functions?

    The Feistel-network is a popular structure underlying many block-ciphers where the cipher is constructed from many simpler rounds, each defined by some function which is derived from the secret key. Luby and Racko showed that the three-round Feistel-network - each round instantiated with a pseudorandom function secure against adaptive Chosen...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    A Java-Based Framework for Real-Time Control Systems

    This paper presents the Java version of the AOCS Framework. The AOCS Framework is an object-oriented software framework for real-time satellite control systems. It provides a set of design patterns, an adaptable architecture, and a set of configurable components that support the instantiation of satellite control applications. It was originally...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Multicore OS Benchmarks: We Can Do Better

    Current multicore OS benchmarks do not provide workloads that sufficiently reflect real-world use: they typically run a single application, whereas real workloads consist of multiple concurrent programs. In this paper the authors show that this lack of mixed workloads leads to benchmarks that do not fully exercise the OS and...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Equilibrium With Exponential Utility And Non-negative Consumption

    The authors study a multi-period Arrow-Debreu equilibrium in a heterogeneous economy populated by agents trading in a complete market. Each agent is represented by an exponential utility function, where additionally no negative level of consumption is permitted. They derive an explicit formula for the optimal consumption policies involving a put...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Additive Habit Formation: Consumption In Incomplete Markets With Random Endowments

    The authors provide a detailed characterization of the optimal consumption stream for the additive habit-forming utility maximization problem, in a framework of general discrete-time incomplete markets and random endowments. This characterization allows them to derive the monotonicity and concavity of the optimal consumption as a function of wealth, for several...

    Provided By ETH Zurich

  • White Papers // May 2011

    DISSense: An Adaptive Ultralow-Power Communication Protocol for Wireless Sensor Networks

    This paper presents DISSense, an adaptive, ultralow-power communication protocol for wireless sensor networks. DISSense is specifically designed for long-term environmental monitoring applications and it provides for both data collection and data dissemination services. By automatically adapting the length of its active phases, DISSense can guarantee for both a very low...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Compiling Business Process Models for Sensor Networks

    Wireless sensor networks are increasingly being used to improve business processes. The behavior of such a process is usually captured in models while its implementation is typically created manually. Besides being expensive, this paper entails deviations between the model and the implementation of a business process, thus rendering it less...

    Provided By ETH Zurich

  • White Papers // Jun 2011

    Demo Abstract: Human-CoAP Interaction With Copper

    The authors introduce 'Copper,' a generic browser for the Internet of Things based on the Constrained Application Protocol (CoAP). Current estimates foresee that the number of networked embedded devices encompassed by the Internet of Things will be vast. Additionally, most systems will be optimized for the constrained environment with its...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Opportunistic Sensing for Smart Heating Control in Private Households

    This position paper provides qualitative considerations on the design and implementation of a smart heating control system for private households. The authors envision the system to rely on the opportunistic exploitation of information made available by existing smart devices. Since heating represents the major source of energy consumption in domestic...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Balancing Load in Stream Processing With the Cloud

    Stream processing systems must handle stream data coming from real-time, high-throughput applications, for example in financial trading. Timely processing of streams is important and requires sufficient available resources to achieve high throughput and deliver accurate results. However, static allocation of stream processing resources in terms of machines is inefficient when...

    Provided By ETH Zurich

  • White Papers // Dec 2010

    The Impact of Network Topology on Collection Performance

    The network topology has a significant impact on the performance of collection protocols in wireless sensor networks. In this paper, the authors introduce an unobtrusive methodology to quantify the impact of the topology on the performance of collection protocols. Specifically, they propose a protocol-independent metric, the Expected Network Delivery, that...

    Provided By ETH Zurich

  • White Papers // Oct 2010

    Using Adaptive Sensor Ranking to Reduce the Overhead of the Coverage Configuration Protocol

    Several application scenarios of wireless sensor networks require coverage of a given region of interest to be guaranteed. In order to establish a coverage preserving configuration, sensor nodes must coordinate and thus invest precious energy resources for both computation and communication. Reducing this overhead is particularly important in applications requiring...

    Provided By ETH Zurich

  • White Papers // Jun 2010

    BIT - A Browser for the Internet of Things

    Mobile phones are increasingly able to read auto-id labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, this opens the possibility for a wide range of novel digital services building on physical products. In this paper, the authors discuss...

    Provided By ETH Zurich

  • White Papers // Feb 2010

    ICT for Green - How Computers Can Help Us to Conserve Energy

    Information and Communication Technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance of energy-using systems and processes in industry and commerce. In the near future, ICT will also play a critical role in supporting the necessary paradigm...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    WebPlug: A Framework for the Web of Things

    The authors present WebPlug, a framework for the emerging Web of Things. It consists of several building blocks which ease integration of things, including their sensors and actuators with the Web. For example, WebPlug supports versioning of and eventing for arbitrary Web resources, like sensor readings, thus simplifying the process...

    Provided By ETH Zurich

  • White Papers // Jul 2010

    From the Internet of Computers to the Internet of Things

    This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, the authors consider RFID and other important technological developments such as IP stacks and web servers for smart everyday objects. The paper concludes with a discussion of social and...

    Provided By ETH Zurich

  • White Papers // Oct 2010

    Evaluating Mobile Phones as Energy Consumption Feedback Devices

    With smart electricity meters being widely deployed, data on residential energy usage is increasingly becoming available. To make sensible use of these data, the authors investigated the suitability of mobile phones as an interface to provide feedback on overall and device-related energy consumption. Based on the results of a user...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    A Real-Time Search Engine for the Web of Things

    The increasing penetration of the real world with embedded and globally networked sensors leads to the formation of the Internet of Things, offering global online access to the current state of the real world. The authors argue that on top of this real-time data, a Web of Things is needed,...

    Provided By ETH Zurich

  • White Papers // Nov 2010

    Facilitating the Integration and Interaction of Real-World Services for the Web of Things

    The "Web of Things" (WoT) is a vision of a World Wide Web that reaches into the physical world by providing a seamless integration of digitally augmented everyday objects. In this paper, the authors present the AutoWoT project, a toolkit that facilitates the rapid integration of smart devices into the...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    BIT - A Framework and Architecture for Providing Digital Services for Physical Products

    Mobile phones are increasingly able to read auto id labels, such as barcodes or RFID tags. As virtually all consumer products sold today are equipped with such a label, this opens the possibility for a wide range of novel digital services building on physical products. In this paper, the authors...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    Real-Time Search for Real-World Entities: A Survey

    People are observing an increasing trend of connecting embedded sensors and sensor networks to the Internet and publishing their output on the Web. They believe that this development is a precursor of a Web of Things, which gives real-world objects and places a Web presence that not only contains a...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    Evaluation of 1D Barcode Scanning on Mobile Phones

    1D or linear barcodes are the black-and-white-striped codes that can be found on most consumer products. This paper evaluates existing 1D barcode scanners for mobile phones on their applicability towards consumers. The tested scanners identify the data stored in these codes, and thus enable users of mobile phones to conveniently...

    Provided By ETH Zurich

  • White Papers // Jul 2010

    Embedding Internet Technology for Home Automation

    As more and more digital appliances populate the homes, networking them to form a Home Automation (HA) system not only becomes an option, but almost a necessity. While comfort, security, and energy efficiency can be provided by many existing systems, they all remain complex islands that are difficult to expand...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    Influence of User Perception, Security Needs, and Social Factors on Device Pairing Method Choices

    With the increasing proliferation of mobile devices, the need to spontaneously connect two devices over a wireless link (to exchange business cards and appointments, send les to Bluetooth-enabled printers and to make electronic payments in busses, train stations, and coffee shops) has become prominent. To authenticate spontaneous wireless device communication,...

    Provided By ETH Zurich