ETH Zurich

Displaying 1 - 10 of 226 results

  • The Business Model Bank: Conceptualizing a Database Structure for Large-Sample Study of an Emerging Management Concept

    White Papers // Feb 2015 // provided by ETH Zurich

    The 'Business model' represents an increasingly important management concept. However, progress in research related to the concept is currently inhibited from inconsistencies in terms of formalizing and therewith also empirically measuring the 'business model' concept. Taking this as a starting point, this paper offers a conceptualization for building a scalable ...

    Download Now
  • Deterministic Leader Election in Multi-Hop Beeping Networks

    White Papers // Aug 2014 // provided by ETH Zurich

    The authors study deterministic leader election in multi-hop radio networks in the beeping model. More specifically, they address explicit leader election: one node is elected as the leader, the other nodes know its identifier, and the algorithm terminates at some point with the network being quiescent. No initial knowledge of ...

    Download Now
  • Securing Cloud Data in the New Attacker Model

    White Papers // Jul 2014 // provided by ETH Zurich

    "The world just witnessed the surge of a new and powerful attacker, which was able to coerce operators and acquire the necessary keys to break the privacy of users. Once the encryption key is exposed, the only viable measure to preserve data confidentiality is to limit the adversary's access to ...

    Download Now
  • Computability in Anonymous Networks: Revocable vs. Irrecovable Outputs

    White Papers // Jun 2014 // provided by ETH Zurich

    The authors study computability in networks, referred to hereafter as distributed computability. Distributed computability is equivalent to classic centralized (turing machine) computability when the nodes are equipped with unique (comparable) identifiers. However, as the researcher noticed in seminal work, distributed computability becomes fascinating in anonymous networks, where nodes do not ...

    Download Now
  • BlueWallet: The Secure Bitcoin Wallet

    White Papers // Jun 2014 // provided by ETH Zurich

    With the increasing popularity of Bitcoin, a digital decentralized currency and payment system, the number of malicious third parties attempting to steal bitcoins has grown substantially. Attackers have stolen bitcoins worth millions of dollars from victims by using mal-ware to gain access to the private keys stored on the victims' ...

    Download Now
  • Distributed Storage for Data Security

    White Papers // May 2014 // provided by ETH Zurich

    The authors study the secrecy of a distributed storage system for passwords. The encoder, Alice, observes a length-n password and describes it using two hints, which she then stores in different locations. The legitimate receiver, Bob, observes both hints. The eavesdropper, Eve, sees only one of the hints; Alice cannot ...

    Download Now
  • Isolated Execution in Many-core Architectures

    White Papers // Feb 2014 // provided by ETH Zurich

    The authors explore how many-core platforms can be used to enhance the security of future systems and to support important security properties such as runtime isolation using a small Trusted Computing Base (TCB). They focus on the Intel Single-chip Cloud Computer (SCC) to show that such properties can be implemented ...

    Download Now
  • Parallel Computing Patterns for Grid Workflows

    White Papers // Jan 2014 // provided by ETH Zurich

    Whereas a consensus has been reached on defining the set of workflow patterns for business process modeling languages, no such patterns exists for workflows applied to scientific computing on the grid. By looking at different kinds of parallelism, in this paper, the authors identify a set of workflow patterns related ...

    Download Now
  • Time Criticality Challenge in the Presence of Parallelised Execution

    White Papers // Dec 2013 // provided by ETH Zurich

    The recent technological advancements and market trends are causing an interesting phenomenon towards the convergence of High-Performance Computing (HPC) and Embedded Computing (EC) domains. On one side, new kinds of HPC applications are being required by markets needing huge amounts of information to be processed within a bounded amount of ...

    Download Now
  • Multi-Core, Main-Memory Joins: Sort vs. Hash Revisited

    White Papers // Sep 2013 // provided by ETH Zurich

    In this paper, the authors experimentally study the performance of main-memory, parallel, multi-core join algorithms, focusing on sort-merge and (radix-)hash join. The relative performance of these two join approaches have been a topic of discussion for a long time. With the advent of modern multi-core architectures, it has been argued ...

    Download Now