ETH Zurich

Displaying 1-40 of 289 results

  • White Papers // Feb 2015

    The Business Model Bank: Conceptualizing a Database Structure for Large-Sample Study of an Emerging Management Concept

    The 'Business model' represents an increasingly important management concept. However, progress in research related to the concept is currently inhibited from inconsistencies in terms of formalizing and therewith also empirically measuring the 'business model' concept. Taking this as a starting point, this paper offers a conceptualization for building a scalable...

    Provided By ETH Zurich

  • White Papers // Aug 2014

    Deterministic Leader Election in Multi-Hop Beeping Networks

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of...

    Provided By ETH Zurich

  • White Papers // Jul 2014

    Securing Cloud Data in the New Attacker Model

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not...

    Provided By ETH Zurich

  • White Papers // Jun 2014

    BlueWallet: The Secure Bitcoin Wallet

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims'...

    Provided By ETH Zurich

  • White Papers // May 2014

    Distributed Storage for Data Security

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot...

    Provided By ETH Zurich

  • White Papers // Feb 2014

    Isolated Execution in Many-core Architectures

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented...

    Provided By ETH Zurich

  • White Papers // Jan 2014

    Parallel Computing Patterns for Grid Workflows

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related...

    Provided By ETH Zurich

  • White Papers // Dec 2013

    Time Criticality Challenge in the Presence of Parallelised Execution

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    A Constructive Approach to Functional Encryption

    Functional encryption is an important generalization of several types of encryption such as public-key, identity-based, and attribute-based encryption. Numerous different security definitions for functional encryption have been proposed, most of them being rather complex and involving several algorithms. Many of these definitions differ in details such as which algorithm has...

    Provided By ETH Zurich

  • White Papers // Sep 2013

    Key Exchange with Unilateral Authentication: Composable Security Definition and Modular Protocol Design

    Key exchange with unilateral authentication (short: unilateral key exchange) is an important primitive in practical security protocols; a prime example is the widely deployed TLS protocol, which is usually run in this mode. Unilateral key-exchange protocols are employed in a client-server setting where only the server has a certified public...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    A Dynamic Trade-off Between Active and Passive Corruptions in Secure Multi-Party Computation

    Multi-Party Computation (MPC) allows a set of n parties to securely compute a (probabilistic) function f in a distributed manner, where security means that secrecy of the inputs and correctness of the output are maintained even when some of the parties are dishonest. The dishonesty of parties is modeled with...

    Provided By ETH Zurich

  • White Papers // Aug 2013

    Convergence in (Social) Influence Networks

    What do social networks, belief propagation, spring embedders, cellular automata, distributed message passing algorithms, traffic networks, the brain, biological cell systems, or ant colonies have in common? They are all examples of \"Networks\", where the entities of the network are continuously influenced by the states of their respective neighbors. All...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Expandable Process Networks to Efficiently Specify and Explore Task, Data, and Pipeline Parallelism

    Running each application of a many-core system on an isolated (virtual) guest machine is a widely considered solution for performance and reliability issues. When a new application is started, the guest machine is assigned with an amount of computing resources that depends on the overall workload of the system and...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Reliable and Efficient Execution of Multiple Streaming Applications on Intel's SCC Processor

    Intel's Single-chip Cloud Computer (SCC) is a prototype architecture for on-chip many-core systems. By incorporating 48 cores into a single die, it provides unique opportunities to gain insights into manycore software development. Earlier results have shown that programming efficient and reliable software for many-core processors is difficult due to a...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Efficient Worst-Case Temperature Evaluation for Thermal-Aware Assignment of Real-Time Applications on MPSoCs

    The reliability of Multi-Processor System-on-Chips (MPSoCs) is nowadays threatened by high chip temperatures leading to long-term reliability concerns and short0term functional errors. High chip temperatures might not only cause potential deadline violations, but also increase cooling costs and leakage power. Pro-active thermal-aware allocation and scheduling techniques that avoid thermal emergencies...

    Provided By ETH Zurich

  • White Papers // Jul 2013

    Optimising Conceptual Data Models through Profiling in Object Databases

    Agile methods promote iterative development with short cycles, where user feedback from the previous iteration is used to refactor and improve the current version. For information systems development, the authors propose to extend this feedback loop by using database pro ling information to propose adaptations to the conceptual model to...

    Provided By ETH Zurich

  • White Papers // May 2013

    Tailing RFID Tags for Clone Detection

    RFID (Radio-Frequency IDentification) is a key emerging technology for supply-chain monitoring and detection of counterfeit and grey-market goods. The most prevalent RFID tags are, however, simply \"Wireless barcodes,\" themselves vulnerable to cloning and counterfeiting. While continuous monitoring can, in principle, detect cloning attacks, real-world supply chains often contain significant blind...

    Provided By ETH Zurich

  • White Papers // May 2013

    Achieving 10Gbps Line-Rate Key-Value Stores with FPGAs

    Distributed in-memory key-value stores such as memcached have become a critical middleware application within current web infrastructure. However, typical x86- based systems yield limited performance scalability and high power consumption as their architecture with its optimization for single thread performance is not well-matched towards the memory-intensive and parallel nature of...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    VM-MAD: A Cloud/cluster Software for Service-Oriented Academic Environments

    The availability of powerful computing hardware in IaaS clouds makes cloud computing attractive also for computational workloads that were up to now almost exclusively run on HPC clusters. In this paper, the authors present the VM-MAD Orchestrator software: an open source framework for cloudbursting Linux-based HPC clusters into IaaS clouds...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    On Limitations of Friendly Jamming for Confidentiality

    Wireless communication provides unique security challenges, but also enables novel ways to defend against attacks. In the past few years, a number of works discussed the use of friendly jamming to protect the confidentiality of the communicated data as well as to enable message authentication and access control. In this...

    Provided By ETH Zurich

  • White Papers // Mar 2013

    SoK: Secure Data Deletion

    Secure data deletion is the task of deleting data irrecoverably from a physical medium. In the digital world, data is not securely deleted by default; instead, many approaches add secure deletion to existing physical medium interfaces. Interfaces to the physical medium exist at different layers, such as user-level applications, the...

    Provided By ETH Zurich

  • White Papers // Jan 2013

    Pricing in Information-Centric Network Interconnection

    The authors propose a pricing model to study the economic incentives for caching and sharing content in the interconnection of Information-Centric Networks (ICNs). While collaborative caching in ICNs is a key feature to success in improving network performance and reducing delivery costs in content distribution, the current pricing strategies in...

    Provided By ETH Zurich

  • White Papers // Dec 2012

    Main-Memory Hash Joins on Multi-Core CPUs: Tuning to the Underlying Hardware

    The architectural changes introduced with multi-core CPUs have triggered a redesign of main-memory join algorithms. In the last few years, two diverging views have appeared. One approach advocates careful tailoring of the algorithm to the architectural parameters (cache sizes, TLB, and memory bandwidth). The other approach argues that modern hardware...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    A Generic Database Benchmarking Service

    Benchmarks are widely applied for the development and optimization of database systems. Standard benchmarks such as TPC-C and TPC-H provide a way of comparing the performance of different systems. In addition, micro benchmarks can be exploited to test a specific behavior of a system. Yet, despite all the benefits that...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Relaying and Base Station Cooperation: A Comparative Survey for Future Cellular Networks

    The authors develop a unified framework to investigate the performance of future cellular networks with relays and/or Coordinated MultiPoint (CoMP) transmission. Based on this framework, they study the benefits of CoMP and relaying in a realistic setup. They consider imperfect channel knowledge, different power levels, and simple (thus practically relevant)...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Universal Computation With Low-Complexity Wireless Relay Networks

    The authors propose a method for enabling complex computations in a network of low-complexity wireless devices. By utilizing multi-hop relaying, such devices can form the wireless equivalent of an Artificial Neural Network (ANN). They provide a method for programming the network functionality in a decentralized fashion and demonstrate the robustness...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    Discovering Structure in Unstructured I/O

    Checkpointing is the predominant storage driver in today's petascale supercomputers and is expected to remain as such in tomorrow's exascale supercomputers. Users typically prefer to checkpoint into a shared file yet parallel file systems often perform poorly for shared file writing. A powerful technique to address this problem is to...

    Provided By ETH Zurich

  • White Papers // Nov 2012

    DTN-Meteo: Forecasting the Performance of DTN Protocols Under Heterogeneous Mobility

    Opportunistic or Delay Tolerant Networks (DTNs) may be used to enable communication in case of failure or lack of infrastructure (disaster, censorship, remote areas) and to complement existing wireless technologies (cellular, WiFi). Wireless peers communicate when in contact, forming an impromptu network, whose connectivity graph is highly dynamic and only...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    Distributed Medium Access Control With Dynamic Altruism

    In this paper, the authors consider medium access control of Local Area Networks (LANs) under limited-information conditions as benefits a distributed system. Rather than assuming "By rule" conformance to a protocol designed to regulate packet-flow rates (as in, e.g., CSMA windowing), they begin with a non-cooperative game framework and build...

    Provided By ETH Zurich

  • White Papers // Sep 2012

    ADMM for Consensus on Colored Networks

    The authors propose a novel distributed algorithm for one of the most fundamental problems in networks: the average consensus. They view the average consensus as an optimization problem, which allows one to use recent techniques and results from the optimization area. Based on the assumption that a coloring scheme of...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    A Cognitive-Inspired Model for Self-Organizing Networks

    In this paper, the authors propose a computational scheme inspired by the workings of human cognition. They embed some fundamental aspects of the human cognitive system into this scheme in order to obtain a minimization of computational resources and the evolution of a dynamic knowledge network over time, and apply...

    Provided By ETH Zurich

  • White Papers // Aug 2012

    Evaluating the Trade-Off Between Energy Efficiency and QoE in Wireless Mesh Networks

    The increasing usage of wireless networks creates new challenges for wireless access providers. On the one hand, providers want to satisfy the user demands but on the other hand, they try to reduce the operational costs by decreasing the energy consumption. In this paper, the authors evaluate the tradeoff between...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    VF2x: Fast, Efficient Virtual Network Mapping for Real Testbed Workloads

    Distributed network testbeds like GENI aim to support a potentially large number of experiments simultaneously on a complex, widely distributed physical network by mapping each requested network onto a share or "Slice" of physical hosts, switches and links. A significant challenge is network mapping: how to allocate virtual nodes, switches...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    PRO3D, Programming for Future 3D Manycore Architectures: Project Interim Status

    PRO3D tackles two important 3D technologies, that are Through Silicon Via (TSV) and liquid cooling, and investigates their consequences on stacked architectures and entire software development. In particular, memory hierarchies are being revisited and the thermal impact of software on the 3D stack is explored. As a key result, a...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Boosting Market Liquidity of Peer-to-Peer Systems Through Cyclic Trading

    Tit-for-tat trading lies at the heart of many incentive mechanisms for distributed systems where participants are anonymous. However, since the standard tit-for-tat approach is restricted to bilateral exchanges, data is transferred only between peers with direct and mutual interests. Generalizing tit-for-tat to multi-lateral trades where contributions can occur along cycles...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Scheduling Wireless Links With Successive Interference Cancellation

    In this paper, the authors study the problem of scheduling wireless links in a model where successive interference cancellation is combined with the physical interference model and uniform power assignment. Successive interference cancellation is based on the observation that interfering signals should not be treated as random noise, but as...

    Provided By ETH Zurich

  • White Papers // Jul 2012

    Thermal-Aware Task Assignment for Real-Time Applications on Multi-Core Systems

    The reduced feature size of electronic systems and the demand for high performance lead to increased power densities and high chip temperatures, which in turn reduce the system reliability. Thermal-aware task allocation and scheduling algorithms are promising approaches to reduce the peak temperature of multi-core systems with real-time constraints. However,...

    Provided By ETH Zurich

  • White Papers // Sep 2003

    STARS - A Ubiquitous Computing Platform for Computer Augmented Tabletop Games

    This presentation paper demonstrates the STARS platform for realizing computer augmented tabletop games within a smart Room ware environment. STARS dynamically couples multiple types of interaction devices such as personal digital assistants or headsets with an interactive game table. STARS augmented tabletop games provide a number of features like dynamic...

    Provided By ETH Zurich

  • White Papers // May 2010

    Meta-Debugging Pervasive Computers

    As computers get more complex, the task of programming them gets more complex as well. This is especially true for the "Pervasive Computer", which is a massively distributed system consisting of unreliable embedded devices that communicate with each other over lousy wireless links. A common approach to address the programming...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    A Java-Based Framework for Real-Time Control Systems

    This paper presents the Java version of the AOCS Framework. The AOCS Framework is an object-oriented software framework for real-time satellite control systems. It provides a set of design patterns, an adaptable architecture, and a set of configurable components that support the instantiation of satellite control applications. It was originally...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Virtualizing Hardware With Multi-Context Recon Gurable Arrays

    In contrast to processors, current reconfigurable devices totally lack programming models that would allow for device independent compilation and forward compatibility. The key to overcome this limitation is hardware virtualization. In this paper, the authors resort to a macro-pipelined execution model to achieve hardware virtualization for data streaming applications. As...

    Provided By ETH Zurich

  • White Papers // Aug 2010

    Performance Evaluation of the Collection Tree Protocol Based on Its Implementation for the Castalia Wireless Sensor Networks Simulator

    Many wireless sensor network applications rely on the availability of a collection service to route data packets towards a sink node. The service is typically accessed through well defined interfaces so as to hide the details of its implementation. Providing for efficient network operation, however, often requires investigating the interplay...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    Probabilistic Multicast

    Gossip-based broadcast algorithms have been considered as a viable alternative to traditional deterministic reliable broadcast algorithms in large scale environments. However, these algorithms focus on broadcasting events inside a large group of processes, while the multicasting of events to a subset of processes in a group only, potentially varying for...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    secuBT: Hacking the Hackers With User-Space Virtualization

    In the age of coordinated malware distribution and zero-day exploits security becomes ever more important. This paper presents secuBT, a safe execution framework for the execution of untrusted binary code based on the fastBT dynamic binary translator. secuBT implements user-space virtualization using dynamic binary translation and adds a system call...

    Provided By ETH Zurich

  • White Papers // Feb 2011

    Inflation Perceptions And Expectations In Sweden - Are Media Reports The? Missing Link??

    Using quantitative survey data from the Swedish Consumer Tendency Survey as well as a unique data set on media reports about inflation, the authors analyze the formation process of inflation perceptions and expectations as well as interrelations between the variables. Throughout the analysis, the role of media reports about inflation...

    Provided By ETH Zurich

  • White Papers // Jun 2010

    Innovation, Competition And Incentives For R&D

    Exploring the links between the type of innovation and the type of competition is essential to understand the mutual impacts of competition policy and innovation policy. This is of particular importance for countries which rely on innovation as a competitive advantage such as Germany and Switzerland, which are the focus...

    Provided By ETH Zurich

  • White Papers // Sep 2009

    What Determines The Innovation Capability Of Firm Founders?

    Innovative start-ups, not start-ups in general, seem to be important drivers of economic growth. However, little is known about how such firms look like. As activities of start-ups are strongly related to firm founders, the authors investigate this question focusing on the innovation capability of firm founders. They find that...

    Provided By ETH Zurich

  • White Papers // Sep 2010

    Insights Into The Determinants Of Innovation In Energy Efficiency

    Given the increasing interest in understanding (and supporting by means of public policy) innovative activity related to Energy Efficient Technology (EET), the author attempt to identify firm-level determinants of innovation and research in this field. A novel dataset of Swiss firms has been assembled by means of a survey in...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    Embedded Systems FS 2010

    The BTnode is an autonomous wireless communication and computing platform based on a Bluetooth radio and a microcontroller. It serves as a demonstration platform for research in mobile and ad-hoc connected networks (MANETs) and distributed sensor networks. The BTnode has been jointly developed at ETH Zurich by the Computer Engineering...

    Provided By ETH Zurich

  • White Papers // Jan 2011

    OpenXL: An Adaptable Web-Service Middleware

    The inherent complexity of current software systems has reached a critical level. This affects the general deployment complexity in the form of a huge amount of varying Non-Functional Requirements (NFRs). With regard to flexibility and maintenance, changes to software systems need to be automated in order to deploy different configurations...

    Provided By ETH Zurich

  • White Papers // Dec 2009

    A First Step Towards Integration Independence

    Two major forms of information integration, federation and materialization, continue to dominate the market, embedded in separate products, each with their strengths and weaknesses. Application developers must make difficult choices among techniques and products, choices that are hard to change later. The authors propose a new design principle, Integration Independence,...

    Provided By ETH Zurich

  • White Papers // May 2013

    Achieving 10Gbps Line-Rate Key-Value Stores with FPGAs

    Distributed in-memory key-value stores such as memcached have become a critical middleware application within current web infrastructure. However, typical x86- based systems yield limited performance scalability and high power consumption as their architecture with its optimization for single thread performance is not well-matched towards the memory-intensive and parallel nature of...

    Provided By ETH Zurich

  • White Papers // Mar 2011

    Empirical Assessment of Languages for Teaching Concurrency: Methodology and Application

    Concurrency has been rapidly gaining importance in computing, and correspondingly in computing curricula. Concurrent programming is, however, notoriously hard even for expert programmers. New language designs promise to make it easier, but such claims call for empirical validation. The authors present a methodology for comparing concurrent languages for teaching purposes....

    Provided By ETH Zurich

  • White Papers // Jul 2011

    Design of an Empirical Study for Comparing the Usability of Concurrent Programming Languages

    The recent turn towards multi-core processing architectures has made concurrency an important part of mainstream software development. As a result, an increasing number of developers have to learn to write concurrent programs, a task that is known to be hard even for the expert. Language designers are therefore working on...

    Provided By ETH Zurich

  • White Papers // Jul 2011

    Home Is Safer Than the Cloud! Privacy Concerns for Consumer Cloud Storage

    Several studies ranked security and privacy to be major areas of concern and impediments of cloud adoption for companies, but none have looked into end-users' attitudes and practices. Not much is known about consumers' privacy beliefs and expectations for cloud storage, such as webmail, document and photo sharing platforms, or...

    Provided By ETH Zurich

  • White Papers // Apr 2011

    Group Distance Bounding Protocols

    Distance Bounding (DB) protocols allow one entity, the verifier, to securely obtain an upper-bound on the distance to another entity, the prover. Thus far, DB was considered mostly in the context of a single prover and a single verifier. There has been no substantial prior work on secure DB in...

    Provided By ETH Zurich

  • White Papers // Nov 2011

    Verifying Implementations of Security Protocols by Refinement

    The authors propose a technique for verifying high-level security properties of cryptographic protocol implementations based on stepwise refinement. Their refinement strategy supports reasoning about abstract protocol descriptions in the symbolic model of cryptography and gradually concretizing them towards executable code. They have implemented the technique within a general-purpose program verifier...

    Provided By ETH Zurich

  • White Papers // Apr 2012

    A Comprehensive Operational Semantics of the SCOOP Programming Model

    Operational semantics is a flexible, but rigorous means to describe the meaning of programming languages. Small semantics are often preferred, for example to facilitate model checking. However, omitting too many details in a semantics limits results to a core language only, leaving a wide gap towards real implementations. In this...

    Provided By ETH Zurich

  • White Papers // May 2011

    How Do Distribution and Time Zones Affect Software Development? a Case Study on Communication

    Software projects have crossed seas and continents looking for talented developers, moving from local developments to geographically distributed projects. This paper presents a case study analyzing the effect of distribution and time zones on communication in distributed projects. The study was performed in a university course during two semesters, where...

    Provided By ETH Zurich

  • White Papers // Jul 2011

    Evotec: Evolving the Best Testing Strategy for Contract-Equipped Programs

    Automated random testing is effective at detecting faults but it is certainly not an optimal testing strategy for every given program. For example, an automated random testing tool ignores that some routines have stronger preconditions, they use certain literal values, or they are more error-prone. Taking into account such characteristics...

    Provided By ETH Zurich

  • White Papers // Aug 2010

    A Modular Scheme for Deadlock Prevention in an Object-Oriented Programming Model

    Despite the advancements of concurrency theory in the past decades, practical concurrent programming has remained a challenging activity. Fundamental problems such as data races and deadlocks still persist for programmers since available detection and prevention tools are unsound or have otherwise not been well adopted. In an alternative approach, programming...

    Provided By ETH Zurich

  • White Papers // Mar 2010

    Reasoning About Multiple Related Abstractions With MultiStar

    Encapsulated abstractions are fundamental in object-oriented programming. A single class may employ multiple abstractions to achieve its purpose. Such abstractions are often related and combined in disciplined ways. This paper explores ways to express, verify and rely on logical relationships between abstractions. It introduces two general specification mechanisms: export clauses...

    Provided By ETH Zurich

  • White Papers // Oct 2009

    Satisfying Test Preconditions Through Guided Object Selection

    A random testing strategy can be effective at finding faults, but may leave some routines entirely untested if it never gets to call them on objects satisfying their preconditions. This limitation is particularly frustrating if the object pool does contain some precondition-satisfying objects but the strategy, which selects objects at...

    Provided By ETH Zurich

  • White Papers // Mar 2012

    Moving Application Logic From the Firmware to the Cloud: Towards the Thin Server Architecture for the Internet of Things

    Unlike traditional networked embedded systems, the Internet of Things interconnects heterogeneous devices from various manufacturers with diverse functionalities. To foster the emergence of novel applications, this vast infrastructure requires a common application layer. As a single global standard for all device types and application domains is impracticable, the authors propose...

    Provided By ETH Zurich

  • White Papers // Dec 2011

    Compiler-Assisted Thread Abstractions for Resource-Constrained Systems

    Major operating systems for Wireless Sensor Networks (WSN) enforce an event-based programming paradigm for efficiency reasons. However, practice has shown that the resulting code complexity leads to problems during development, deployment, and operations. Although thread-based programming is known to solve these problems, the scarce resources of common WSN devices make...

    Provided By ETH Zurich

  • White Papers // Nov 2011

    In Search of an Internet of Things Service Architecture: REST or WS- a Developers' Perspective

    Current trends inspired from the development of the Web 2.0 advocate designing smart things (e.g., wireless sensors nodes or home appliances) as service platforms. Interoperable services are mainly achieved using two different approaches: WS- and RESTful Web services. These approaches have previously been compared with respect to performance and features,...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Performance Analysis of SCOOP Programs

    To support developers in writing reliable and efficient concurrent programs, novel concurrent programming abstractions have been proposed in recent years. Programming with such abstractions requires new analysis tools because the execution semantics often differs considerably from established models. The authors present a performance analyzer that is based on new metrics...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Can Asynchronous Exceptions Expire?

    A multitude of asynchronous exception mechanisms have been proposed. They specify where and when an asynchronous exception propagates. The authors highlight another aspect that has largely been overlooked: can an asynchronous exception expire? They discuss scenarios where it is meaningful for an asynchronous exception to expire. They further elaborate on...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Data Node Encrypted File System: Efficient Secure Deletion for Flash Memory

    The authors propose the Data Node Encrypted File System (DNEFS), which uses on-the-y encryption and decryption of le system data nodes to efficiently and securely delete data on ash memory systems. DNEFS is a generic modification of existing ash le systems or controllers that enables secure data deletion while preserving...

    Provided By ETH Zurich

  • White Papers // Oct 2012

    Evaluating User Privacy in Bitcoin

    Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system. In this paper, the authors investigate the...

    Provided By ETH Zurich

  • White Papers // Jun 2012

    Counting Stream Registers: An Efficient and Effective Snoop Filter Architecture

    The authors introduce a counting stream register snoop filter, which improves the performance of existing snoop filters based on stream registers. Over time, this class of snoop filters loses the ability to filter memory addresses that have been loaded, and then evicted, from the caches that are filtered; they include...

    Provided By ETH Zurich

  • White Papers // Dec 2009

    Diversity and Spatial Multiplexing of MIMO Amplitude Detection Receivers

    The authors consider nonlinear MIMO systems that use amplitude-only (envelope) receivers. Such systems are interesting for low-power, low-complexity applications like sensor networks. They study different modulation schemes and the respective diversity order obtained by the maximum likelihood detector in an uncoded system with perfect channel state information. They show that...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    On the Diversity-Multiplexing Tradeoff of Multiuser Amplify & Forward Multihop Networks

    The understanding of fundamental performance limits in wireless networks is one of the main foci of current wireless research. Insightful and popular performance measures in this context are degrees of freedom. This measure is particularly meaningful in the regime of high signal-to-noise ratio, where it is the key indicator for...

    Provided By ETH Zurich

  • White Papers // Nov 2009

    Distributed Gain Matrix Optimization in Non-Regenerative MIMO Relay Networks

    The authors consider a half-duplex multiple-input multiple-output relay network with multiple source and relay nodes and a set of collocated destination antennas. Each relay is equipped with multiple antennas and is constrained to map it's receive signal linearly to its transmit signal. They devise a gradient based scheme that enables...

    Provided By ETH Zurich

  • White Papers // Apr 2010

    Performance of a Cluster-Based MAC Protocol in Multiuser MIMO Wireless LANs

    The IEEE 802.11n specifies MIMO techniques to enhance data rate in WLANs. However, using Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA), it can support only point-to-point links. On the other hand, it is known that multiuser MIMO techniques significantly increase the spectral efficiency of a network. There are already...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    Low Complexity Positioning System for Indoor Multipath Environments

    In this paper, the authors consider localization based on the Time-of-Arrival (ToA) of Ultra-WideBand (UWB) impulse radio pulses. They present a receiver structure for ToA estimation, which can be implemented with very low complexity and low power consumption. Standard approaches for ToA estimation of UWB pulses require very high speed...

    Provided By ETH Zurich

  • White Papers // Jan 2010

    Channel Estimation for Very Low Power MIMO Envelope Detectors

    The authors consider a MIMO system for very low-power applications, e.g., sensor networks, where the receiver employs an envelope detector at each receive antenna. Properties of such systems have been studied, where the channel was considered to be perfectly known at the receiver, or a linear channel estimation model was...

    Provided By ETH Zurich