ETH Zurich

Displaying 1-40 of 321 results

  • White Papers // Feb 2015

    The Business Model Bank: Conceptualizing a Database Structure for Large-Sample Study of an Emerging Management Concept

    The 'Business model' represents an increasingly important management concept. However, progress in research related to the concept is currently inhibited from inconsistencies in terms of formalizing and therewith also empirically measuring the 'business model' concept. Taking this as a starting point, this paper offers a conceptualization for building a scalable...

    Provided By ETH Zurich

  • White Papers // Aug 2014

    Deterministic Leader Election in Multi-Hop Beeping Networks

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of...

    Provided By ETH Zurich

  • White Papers // Jul 2014

    Securing Cloud Data in the New Attacker Model

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    BlueWallet: The Secure Bitcoin Wallet

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims'...

    Provided By ETH Zurich

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    A Constructive Approach to Functional Encryption

    Functional encryption is an important generalization of several types of encryption such as public-key, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

    Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a client-server setting where only the server has a certified public...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    A Dynamic Trade-off Between Active and Passive Corruptions in Secure Multi-Party Computation

    Multi-Party Computation (MPC) allows a set of n parties to securely compute a (probabilistic) function f in a distributed manner, where security means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest. The dishonesty of parties is modeled with...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    Convergence in (Social) Influence Networks

    What do social networks, belief propagation, spring embedders, cellular automata, distributed message passing algorithms, traffic networks, the brain, biological cell systems, or ant colonies have in common? They are all examples of \"Networks\", where the entities of the network are continuously influenced by the states of their respective neighbors. All...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Optimising Conceptual Data Models through Profiling in Object Databases

    Agile methods promote iterative development with short cycles, where user feedback from the previous iteration is used to refactor and improve the current version. For information systems development, the authors propose to extend this feedback loop by using database pro ling information to propose adaptations to the conceptual model to...

    Provided By ETH Zurich

  • White Papers // May 2013

    Tailing RFID Tags for Clone Detection

    RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply \"Wireless barcodes,\" themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    On Limitations of Friendly Jamming for Confidentiality

    Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    SoK: Secure Data Deletion

    Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the...

    Provided By ETH Zurich

  • White Papers // Jan 2013

    Pricing in Information-Centric Network Interconnection

    The authors propose a pricing model to study the economic incentives for caching and sharing content in the interconnection of Information-Centric Networks (ICNs). While collaborative caching in ICNs is a key feature to success in improving network performance and reducing delivery costs in content distribution, the current pricing strategies in...

    Provided By ETH Zurich

  • White Papers // Dec 2012

    Main-Memory Hash Joins on Multi-Core CPUs: Tuning to the Underlying Hardware

    The architectural changes introduced with multi-core CPUs have triggered a redesign of main-memory join algorithms. In the last few years, two diverging views have appeared. One approach advocates careful tailoring of the algorithm to the architectural parameters (cache sizes, TLB, and memory bandwidth). The other approach argues that modern hardware...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Relaying and Base Station Cooperation: A Comparative Survey for Future Cellular Networks

    The authors develop a unified framework to investigate the performance of future cellular networks with relays and/or Coordinated MultiPoint (CoMP) transmission. Based on this framework, they study the benefits of CoMP and relaying in a realistic setup. They consider imperfect channel knowledge, different power levels, and simple (thus practically relevant)...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Universal Computation With Low-Complexity Wireless Relay Networks

    The authors propose a method for enabling complex computations in a network of low-complexity wireless devices. By utilizing multi-hop relaying, such devices can form the wireless equivalent of an Artificial Neural Network (ANN). They provide a method for programming the network functionality in a decentralized fashion and demonstrate the robustness...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Scheduling Wireless Links With Successive Interference Cancellation

    In this paper, the authors study the problem of scheduling wireless links in a model where successive interference cancellation is combined with the physical interference model and uniform power assignment. Successive interference cancellation is based on the observation that interfering signals should not be treated as random noise, but as...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    On Finding Better Friends in Social Networks

    The authors study the dynamics of a social network. Each node has to decide locally which other node it wants to befriend, i.e., to which other node it wants to create a connection in order to maximize its welfare, which is defined as the sum of the weights of incident...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    Coupling MPARM with DOL

    Multi-Processor System-on-Chip (MPSoC) becomes prevalent for modern embedded system design, which provides high computation power, lower power dissipation, and low cost. This paper summarizes the work of coupling the MPARM cycle-accurate multi-processor simulator with the Distributed Operation Layer (DOL) system-level MPSoC development framework. The main contribution of this work is...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Aug 2008

    A Unified Approach to Calibrate a Network of Camcorders and ToF Cameras

    In this paper, the authors propose a unified calibration technique for a heterogeneous sensor network of video camcorders and Time-of-Flight (ToF) cameras. By moving a spherical calibration target around the commonly observed scene, they can robustly and conveniently extract the sphere centers in the observed images and recover the geometric...

    Provided By ETH Zurich

  • White Papers // Jul 2009

    Static Multi-Camera Factorization Using Rigid Motion

    Camera networks have gained increased importance in recent years. Previous approaches mostly used point correspondences between different camera views to calibrate such systems. However, it is often difficult or even impossible to establish such correspondences. In this paper, the authors present an approach to calibrate a static camera network where...

    Provided By ETH Zurich

  • White Papers // Apr 2008

    Direct Computation of Sound and Microphone Locations From Time-Difference-of-Arrival Data

    The use of microphone arrays is now widespread. Microphone arrays enable beam forming and speaker tracking for applications such as smart rooms, surveillance and event recording. In this paper, the authors present a novel approach to directly recover the location of both microphones and sound sources from time-difference-of-arrival measurements only....

    Provided By ETH Zurich

  • White Papers // Aug 2014

    Deterministic Leader Election in Multi-Hop Beeping Networks

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    BlueWallet: The Secure Bitcoin Wallet

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims'...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    Convergence in (Social) Influence Networks

    What do social networks, belief propagation, spring embedders, cellular automata, distributed message passing algorithms, traffic networks, the brain, biological cell systems, or ant colonies have in common? They are all examples of \"Networks\", where the entities of the network are continuously influenced by the states of their respective neighbors. All...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    On Finding Better Friends in Social Networks

    The authors study the dynamics of a social network. Each node has to decide locally which other node it wants to befriend, i.e., to which other node it wants to create a connection in order to maximize its welfare, which is defined as the sum of the weights of incident...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Distributed Algorithms for Sensor Networks

    Many of today's computing and communication systems are distributed - systems that are composed of autonomous computational entities that communicate with each other, usually by passing messages. Distributed systems encompass a variety of applications. The most obvious distributed system is the Internet itself, and various of its applications such as...

    Provided By ETH Zurich

  • White Papers // May 2012

    SINR Diagrams: Convexity and its Applications in Wireless Networks

    The rules governing the availability and quality of connections in a wireless network are described by physical models such as the Signal-to-Interference & Noise Ratio (SINR) model. For a collection of simultaneously transmitting stations in the plane, it is possible to identify a reception zone for each station, consisting of...

    Provided By ETH Zurich

  • White Papers // Jul 2014

    Securing Cloud Data in the New Attacker Model

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    TinyLTS: Efficient Network-Wide Logging and Tracing System for TinyOS

    Logging and tracing are important methods to gain insight into the behavior of sensor network applications. Existing generic solutions are often limited to nodes with a direct serial connection and do not provide the required efficiency for network-wide logging. Instead, this is often realized by application-specific subsystems developed for custom...

    Provided By ETH Zurich

  • White Papers // Feb 2011

    Optimal Liability Apportionment In Programmatic Credit-Based Emissions Trading

    The authors study the optimal liability apportionment in programmatic credit-based emissions trading systems, like Programmes of Activities within the Clean Development Mechanism (CDM PoAs). Within the latter, the currently implemented regulation is often criticized for holding the validator fully liable for erroneous inclusion of activities within the program. They develop...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Finance For Renewable Energy: An Empirical Analysis Of Developing And Transition Economies

    This paper examines the role of the financial sector in Renewable Energy (RE) development. Although RE can bring socio-economic and environmental benefits, its implementation faces a number of obstacles, especially in non-OECD countries. One of these obstacles is financing: underdeveloped financial sectors are unable to efficiently channel loans to RE...

    Provided By ETH Zurich

  • White Papers // May 2009

    Constitutional Design: Separation Of Financing And Project Decision

    The authors examine the provision of public projects under separate tax and subsidy rules. They find that tax rules separated from project cum subsidy decisions exhibit several advantages when incentive problems of the agenda-setter are taken into account. In particular, tax rules may prevent the proposal of inefficient projects which...

    Provided By ETH Zurich

  • White Papers // Jul 2011

    Optimal Diversity-Multiplexing Tradeoff in Selective-Fading MIMO Channels

    The authors establish the optimal Diversity-Multiplexing (DM) trade-off of coherent time, frequency, and time-frequency selective-fading Multiple-Input Multiple-Output (MIMO) channels and provide a code design criterion for DM trade-off optimality. The results are based on the new concept of the "Jensen channel" associated to a given selective-fading MIMO channel. While the...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Selective-Fading Multiple-Access MIMO Channels: Diversity-Multiplexing Tradeoff and Dominant Outage Event Regions

    The authors establish the optimal Diversity-Multiplexing (DM) trade-off for coherent selective-fading multiple-access MIMO channels and provide corresponding code design criteria. As a byproduct, on the conceptual level, they find an interesting relation between the DM trade-off framework and the notion of dominant error event regions, first introduced in the AWGN...

    Provided By ETH Zurich

  • White Papers // Jul 2010

    On Maximizing Collaboration in Wireless Mesh Networks Without Monetary Incentives

    In distributed network settings, where nodes are not under the control of a single administrative entity, the fulfillment of fundamental network operations is heavily dependent on their cooperation. Nevertheless, individual interests in combination with resource constraints do not always encourage cooperative behavior. In this paper, the authors focus on static...

    Provided By ETH Zurich

  • White Papers // Oct 2010

    Globs in the Primordial Soup

    The analysis of mobile networks spurred a lot of research and recently focused on node encounters, or "Contacts", as the contact process determines whether space-time path connecting far-flung nodes exist. But the contact process alone yields an incomplete picture. People tend to gather at points of interest and as a...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Aggregating Sensor Data From Overlapping Multi-Hop Network Neighborhoods: Push or Pull?

    Network neighborhoods are a key communication abstraction in sensor networks, allowing sensor nodes to collect and aggregate sensor data from nearby other nodes. In many applications, multi-hop neighborhoods of several nodes overlap, such that nodes participate in many neighborhoods, having to contribute their data items to all containing neighborhoods. The...

    Provided By ETH Zurich

  • White Papers // Aug 2010

    A Performance Evaluation Of The Collection Tree Protocol Based On Its Implementation For The Castalia Wireless Sensor Networks Simulator

    Many wireless sensor network applications rely on the availability of a collection service to route data packets towards a sink node. The service is typically accessed through well-defined interfaces so as to hide the details of its implementation. Providing for efficient network operation, however, often requires investigating the interplay between...

    Provided By ETH Zurich

  • White Papers // Aug 2011

    Monitoring Churn in Wireless Networks

    Wireless networks often experience a significant amount of churn, i.e. the arrival and departure of nodes, and often it is necessary to keep all nodes informed about all other nodes in the network. In this paper, the authors propose a distributed algorithm for single-hop networks that detects churn, meaning that...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Poster Abstract: Message Position Modulation for Power Saving and Increased Bandwidth in Sensor Networks

    The authors use a form of pulse-position modulation, i.e. Message-Position Modulation (MPM), to reduce the payload of a message by encoding parts of the message through its transmission time. MPM allows conserving energy and channeling usage, thus reducing the risk of collisions and increasing available bandwidth. They evaluate their ideas...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Data Management in the Cloud: How Megastore Meets the Storage Requirements of Today' Interactive Online Services

    Everything shifts to the cloud. Interactive online services like collaborative documents, email and social networking request certain properties to a storage system in the cloud. The focus of this paper is Megastore. The goal of Megastore is to satisfy the requests of interactive online services. Megastore goes a novel way...

    Provided By ETH Zurich

  • White Papers // Feb 2010

    ICT for Green - How Computers Can Help Us to Conserve Energy

    Information and Communication Technology (ICT) consumes energy, but is also an important means of conserving energy. Conventionally, it has done so by optimizing the performance of energy-using systems and processes in industry and commerce. In the near future, ICT will also play a critical role in supporting the necessary paradigm...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    WebPlug: A Framework for the Web of Things

    The authors present WebPlug, a framework for the emerging Web of Things. It consists of several building blocks which ease integration of things, including their sensors and actuators with the Web. For example, WebPlug supports versioning of and eventing for arbitrary Web resources, like sensor readings, thus simplifying the process...

    Provided By ETH Zurich

  • White Papers // Jul 2010

    From the Internet of Computers to the Internet of Things

    This paper discusses the vision, the challenges, possible usage scenarios and technological building blocks of the "Internet of Things". In particular, the authors consider RFID and other important technological developments such as IP stacks and web servers for smart everyday objects. The paper concludes with a discussion of social and...

    Provided By ETH Zurich

  • White Papers // Jun 2009

    Deployment Techniques for Sensor Networks

    The prominent visions of wireless sensor networks that appeared about a decade ago have spurred enormous efforts in research and development of this new class of wireless networked embedded systems. Despite the significant effort made, successful deployments and real-world applications of sensor networks are still scarce, labor-intensive and often cumbersome...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    SPARK Rapid Prototyping Environment - Mobile Phone Development Made Easy

    Over the past few years mobile phones have evolved into attractive platforms for novel types of applications. However, compared to the design and prototyping of desktop software, mobile phone development still requires programmers to have a high level of expertise in both phone architectures and their low-level programming languages. In...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    Adaptive Random Sensor Selection for Field Reconstruction in Wireless Sensor Networks

    Wireless Sensor Networks (WSNs) allow for the sampling of a physical phenomenon over long periods of time and across extended geographical areas. Once reported to a central collecting unit, the samples may be used to re-construct the developing of the physical phenomenon of interest - also referred to as signal...

    Provided By ETH Zurich

  • White Papers // Aug 2009

    SOA-Based Integration of the Internet of Things in Enterprise Services

    Advances in the areas of embedded systems, computing, and networking are leading to an infrastructure composed of millions of heterogeneous devices. These devices will not simply convey information but process it in transit, connect peer to peer, and form advanced collaborations. This "Internet of Things" infrastructure will be strongly integrated...

    Provided By ETH Zurich

  • White Papers // Jun 2009

    Discovery and On-Demand Provisioning of Real-World Web Services

    The increasing usage of smart embedded devices is blurring the line between the virtual and real worlds. This creates new opportunities for applications to better integrate the real-world, providing services that are more diverse, highly dynamic and efficient. Service Oriented Architecture is on the verge of extending its applicability from...

    Provided By ETH Zurich

  • White Papers // May 2009

    BurstMAC - An Efficient MAC Protocol for Correlated Traffic Bursts

    Many sensor network applications feature correlated traffic bursts: after a period of idle time with almost no network traffic, many nodes have to transmit large amounts of data simultaneously. One example is volcano monitoring, where rare eruptions trigger many nodes simultaneously to transmit seismic data traces. For such applications, a...

    Provided By ETH Zurich

  • White Papers // Mar 2009

    Usable Security and Privacy for Spontaneous Interactions and Data Sharing Systems

    A core property of pervasive computing is smooth data flow with continuous availability across heterogeneous devices. In this paper, the multitude of devices, the spontaneous nature of interactions, together with user mobility and frequent disconnections, pose novel challenges to designing secure systems. Furthermore, security related tasks such as setting up...

    Provided By ETH Zurich

  • White Papers // Sep 2008

    Using a Movable RFID Antenna to Automatically Determine the Position and Orientation of Objects on a Tabletop

    Augmented tabletop games support players by sensing the context of game figures (i.e., position and/or orientation) and then using this information to display additional game information, or to perform game related calculations. In the authors' paper they try to detect the position and orientation of game figures using small, unobtrusive...

    Provided By ETH Zurich

  • White Papers // Nov 2010

    Foreign Market Entry Under Incomplete Contracts

    The author shows in this paper that incomplete contracts affect a firm's decision about serving foreign customers through exports or local sales from an affiliated plant. When contracts between two agents within a firm are too costly to write, the share of multinational firms may be higher or lower compared...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    UWB Impulse Radio Based Distance Bounding

    Today's communication systems are often vulnerable to wormhole or relaying attacks, leading to severe security problems. Distance Bounding (DB) protocols are authentication protocols designed to protect against these attacks. They determine an upper bound on the physical distance between two communication parties - the verifier V (e.g. a door requiring...

    Provided By ETH Zurich

  • White Papers // Oct 2009

    Secure Remote Execution of Sequential Computations

    The authors describe a scheme that secures the remote execution of sequential computations in grid-computing scenarios. To the best of the knowledge, this is the first contribution that addresses the security of generic sequential computations. By dividing sequential tasks into smaller subtasks and permuting them among participants, they show that...

    Provided By ETH Zurich