1,481 Works

A framework for non-asymptotic quantum information theory

Marco Tomamichel

Comparison of Scatter Correction Methods for CBCT

Roland E. Suri, Gary Virshup, Wolfgang Kaissl & Luis Zurkirchen
In contrast to the narrow fan of clinical Computed Tomography (CT) scanners, Cone Beam scanners irradiate a much larger proportion of the object, which causes several times more X-rays scattering. If this scatter is not corrected, the reconstructed images exhibit artifacts: The middle area of the object becomes darker than the outer area, as the density in the middle of the object is underestimated. We compared three methods of correcting for scatter artifacts. 1) A...

New frontiers in frequency combs from diode-pumped solid state lasers

Selina Pekarek
Series in quantum electronics, 54

Analyzing Covert Channels on Mobile Devices

Hubert Ritzdorf

Functionalization of polymer surfaces with polyelectrolyte brushes

Sonja Neuhaus

Nonlinear dynamic analysis of Earthquake-resistant multi-storey reinforced concrete walls

Peter Linde & Thomas Wenk
Festschrift zum 60. Geburtstag von Prof. Dr. Hugo Bachmann

Objects in context: An empirical study of object relationships

Stephanie Balzer, Alexandra Burns & Thomas Gross
Technical Report / ETH Zurich, Department of Computer Science, 594

Numerical option pricing beyond Lévy

Oleg Reichmann
ISBN:978-3-906031-01-9

E-Cast: Elastic Multicast

Philipp Unterbrunner, Gustavo Alonso & Donald Kossmann
This technical report describes E-Cast: a uniform causal-total-order multicast protocol designed to implement fault tolerant, highly elastic, yet strongly consistent database engines in the cloud. In contrast to traditional group communication, the model underlying E-Cast defines multicast as a stateful routing problem. In this document, we provide a rigorous formalization of the routing problem, show how partial replication with strong consistency guarantees can be reduced to said routing problem, and present its efficient algorithmic solution,...

Information theoretic authentication and secrecy codes in the splitting model

Michael Huber

The Foreign Policy of Azerbaijan and Georgia

Rashad Shirinov, Kornely Kakachia & George Khelashvili
Caucasus Analytical Digest (CAD), 37

Optimization of concurrent queries in wireless sensor networks

René Müller & Gustavo Alonso
Technical Report / ETH Zurich, Department of Computer Science, 589

Building Data Flows Using Distributed Key-Value Stores

Martin Hentschel, Maxim Grinev & Donald Kossmann
Social communication features on most of today’s largest websites require propagating the data inside the database/key-value store leading to massive data flows. In this paper we study alternative architectures to build data flows using distributed key-value stores. We compare programming model, execution model, failure model, and scalability highlighting a problem of the state-of-the-art architecture based on an external queue: non-optimal resource utilization. As part of this study, we propose an optimization of this approach by...

Advice Complexity of the Online Vertex Coloring Problem

Sebastian Seibert, Andreas Sprock & Walter Unger
Technical report, 765

Essays in economic valuation of the environment with special focus on electrosmog

Andrea Horehájová

Polar codes for coordination in cascade networks

Ricardo Blasco-Serrano, Ragnar Thobaben & Mikael Skoglund

A bus-based on-chip message passing network

Lisa Ling Liu
Technical Report / ETH Zurich, Department of Computer Science, 645

Strategic approaches towards climate change: an in-depth case study of the automotive industry

Julia Iris Britta Schwarzkopf

Rules vs. targets: Climate treaties under uncertainty

Hans Gersbach & Quirin Oberpriller
We demonstrate the advantages of a climate treaty based solely on rules for international permit markets when there is uncertainty about abatement costs and environmental damages. Such a ‘Rules Treaty’ comprises a scaling factor and a refunding rule. Each signatory can freely choose the number of permits it allocates to domestic firms. For every permit so issued, an international agency is allowed to issue additional permits in accordance with the scaling factor. The agency auctions...

Activity identification and primary location modelling based on smart card payment data for public transport

Artem Chakirov & Alexander Erath
The introduction of electronic payment systems for public transport in many cities all over the world enabled collection of detailed and comprehensive data records of public transport journeys. Processing and mining of these data opens new opportunities in transport modelling and travel behaviour research. In particular its potential for identification and analysis of activities, which cause regular travels, represents a highly interesting research question. In this paper, opportunities for detection of primary activities, as home...

Registration Year

  • 2012
    1,481

Resource Types

  • Text
    1,471
  • Event
    8