457,607 Works

Exploiting Task-Order Information in Compilers for Shared-Memory Parallel Programs

Thomas Gross & Christoph Angerer

Counting targets with mobile sensors in an unknown environment

Subhash Suri, Beat Gfeller, Matúš Mihalák, Elias Vicari & Peter Widmayer
Technical Report / ETH Zurich, Department of Computer Science, 571

Event-B Decomposition for Parallel Programs

Thai Son Hoang & Jean-Raymond Abrial

Finding faults: Manual testing vs. random testing+ vs. user reports

Ilinca Ciupa, Manuel Oriol, Alexander Pretschner & Bertrand Meyer
Technical Report / ETH Zurich, Department of Computer Science, 595

Boron interactions with poplars in deficient and contaminated soil

Rainer Rees Mertins

Distance hijacking attacks on distance bounding protocols

Cas Cremers, Kasper Bonne Rasmussen & Srdjan Capkun
Distance bounding protocols are typically analyzed with respect to three types of attacks: Distance Fraud, Mafia Fraud, and Terrorist Fraud. We define a fourth main type of attacks on distance bounding protocols, called Distance Hijacking attacks. We show that many proposed distance bounding protocols are vulnerable to these attacks, and we propose solutions to make these protocols resilient to Distance Hijacking. Additionally, we generalize Distance Hijacking to Location Hijacking, to which location verification protocols may...

Harmonic Ritz values and their reciprocals

Christof Vömel
Technical Report / ETH Zurich, Department of Computer Science, 610

iPhone and iPod Location Spoofing: Attacks on Public WLAN-based Positioning Systems

Nils O. Tippenhauer, Kasper B. Rasmussen, Christina Pöpper & Srdjan Capkun
In this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system [41], available on PCs and used on a number of mobile platforms, including Apple’s iPod touch and iPhone [1]. We demonstrate that this system is vulnerable to location spoofing and location database manipulation attacks. We further discuss approaches for securing Skyhook and similar WLAN-based positioning systems.

Discovery of Network Properties with All-Shortest-Paths Queries

Davide Bilò, Thomas Erlebach, Matúš Mihalák & Peter Widmayer
We consider the problem of discovering properties (such as the diameter) of an unknown network G(V,E) with a minimum number of queries. Initially, only the vertex set V of the network is known. Information about the edges and non-edges of the network can be obtained by querying nodes of the network. A query at a node q ∈ V returns the union of all shortest paths from q to all other nodes in V ....

Analysis of approximation algorithms for the traveling salesman problem in near-metric graphs

Sacha Krug
We consider the beta-metric traveling salesman problem (Delta-beta-TSP), i.e., the TSP restricted to input instances satisfying the beta-triangle inequality c({v,w}) <= beta * (c{v,u} + c{u,w}), for any three vertices u,v,w. The well-known path matching Christofides algorithm (PMCA) provides an approximation ratio of 3/2 * beta^2 and is the best known algorithm in the range 1 <= beta <= 2. We show that this upper bound is tight by providing a worst-case example. This example...

How to talk new computers into working harder

Christof Vömel
In their 2008 Swiss Computer Science Challenge Award competition, the Hasler Foundation asks applicants to identify current grand challenges in computer science. In this current submission, we discuss how novel hybrid, heterogeneous high performance computing architectures as exemplified by IBM’s Roadrunner pose enormous usability and productivity problems to programmers and users. We argue that addressing these difficulties is important as this kind of architectures will become more popular not only in high-end supercomputing but also...

Interpolant strength

Vijay D'Silva, Daniel Kröning, Mitra Purandare & Georg Weissenbacher
Technical report, 652

Faultless systems: Yes we can!

Jean-Raymond Abrial
Technical Report / ETH Zurich, Department of Computer Science, 629

Development of new electroactive materials for Li-secondary batteries

Dipan Kundu

Applying Morphology to English-Arabic Statistical Machine Translation

Soha Sultan

Thermo-evaporative fluxes from porous media from pore to continuum scale

Ebrahim Shahraeeni

On shunting over a hump

Riko Jacob
Technical Report / ETH Zurich, Department of Computer Science, 576

A Token-Ring for the TRM

Niklaus Wirth
With the design of the Token-Ring for the TRM (Tiny Register Machine) I pursued mainly two aims. The first is to design a network connecting several TRM cores. The second is to go for a design that is as simple as possible, considering that the TRM project is oriented towards educational hard- and software. Featuring a ring architecture, it provides a welcome alternative to the already existing bus architecture implemented by Ling Liu, allowing to...

Objects in context: An empirical study of object relationships

Stephanie Balzer, Alexandra Burns & Thomas Gross
Technical Report / ETH Zurich, Department of Computer Science, 594

Einsatz von ETH-Lernmaterialien im gymnasialen ICT-Unterricht im Rahmen der informatischen Grundbildung

Lukas Fässler
An den meisten Gymnasien erhalten die Schülerinnen und Schüler zu Beginn ihrer Ausbildung eine Einführung im Umgang mit Informations- und Kommunikationstechnologien (ICT). Diese sind meist auf Initiative der Schulen entstanden, weil der in den 80er Jahren propagierte integrative Ansatz (bei dem Informatikanwendungen in andere Fächer integriert wurden) gescheitert ist und das Fach Informatik sich aus historischen Gründen davor distanziert. Noch sind wenig effektive didaktische Szenarien für einen solchen ICT-Grundlagenunterricht bekannt. Reine Anwenderschulungen führen nicht zu...

A multimedia framework for effective language training

Markus H. Gross & Christian Voegeli
We present a novel framework for the multimodal display of words using topological, appearance, and auditory representations. The methods are designed for effective language training and serve as a learning aid for individuals with dyslexia. Our topological code decomposes the word into its syllables and displays it graphically as a tree structure. The appearance code assigns color attributes and shape primitives to each letter and takes into account conditional symbol probabilities, code ambiguities, and phonologically...

Probleme als Schubkraft für die Raumplanung

Martin Lendi

Event model decomposition

Jean-Raymond Abrial
Technical report / [ETH, Department of Computer Science, 626

WebParFE: A web interface for the high performance parallel finite element solver ParFE

Sumit Paranjape, Martin Kaufmann & Peter Arbenz
ParFE is a fully-parallel micro nite element (FE) solver for the modeling of human bone microstructures. We have developed an interface that will make available ParFE on the High Performance Computing (HPC) facility at the Swiss National Supercomputer Centre (CSCS) to a dedicated group of people. The interface has the form of a portal that can be accessed through a web browser. The portal provides a simple and secure means to submit and manage ParFE...

Registration Year

  • 2012

Resource Types

  • Text
  • Dataset
  • Image
  • Collection
  • Audiovisual
  • Other
  • Event
  • Workflow
  • InteractiveResource
  • Software
  • Film


  • University of British Columbia
  • Duke University
  • University of California System
  • University of Exeter
  • University of Cambridge
  • Australian National University
  • French National Institute for Agricultural Research
  • French National Centre for Scientific Research
  • University of Florida
  • Centre for Ecology and Hydrology
  • University of Helsinki
  • University of California, Davis
  • University of Washington
  • Stanford University
  • University of Georgia