![]() |
|
Available Theses for all TIK GroupsB = Bachelor, G = Group, M = Master, S = Semester |
||||||||
title | category | type | contact/supervisor | assigned | edit (new) | |||
---|---|---|---|---|---|---|---|---|
![]() |
21st century data visualization for enhancing student learning | B/S | Romain Jacob, Edgar Costa Molero |
available | ![]() |
|||
![]() |
A test framework to verify end point implementations | S | Tobias Bühler | available | ![]() |
|||
![]() |
Advanced Functionality in Network Hardware | M | Roland Schmid, Ege Cem Kirci |
available | ![]() |
|||
![]() |
Advancing packet-level traffic predictions with Transformers | M | Alexander Dietmüller, Romain Jacob |
available | ![]() |
|||
![]() |
Advent of Network | S | Tobias Bühler, Coralie Busse-Grawitz |
available | ![]() |
|||
![]() |
Analyzing and Comparing Defense Strategies in a Cyber Defense Exercise | M | Roland Meier, Vincent Lenders |
available | ![]() |
|||
![]() |
Automated Foosball Commentary | S | Till Aczel, Joël Mathys |
available | ![]() |
|||
![]() |
Bring Your Own Algorithm | M/S | Andrei Constantinescu | available | ![]() |
|||
![]() |
BTI Antidote | B | Johannes Wikner | available | ![]() |
|||
![]() |
Building an Accurate Model of the Internet | M/S | Rüdiger Birkner | available | ![]() |
|||
![]() |
Communication Complexity in Unreliable Networks | M/S | Marc Dufay, Mose Mizrahi Erbes |
available | ![]() |
|||
![]() |
ConfigsNet: A Network Configuration Database | S | Rüdiger Birkner, Coralie Busse-Grawitz |
available | ![]() |
|||
![]() |
Delay measurement and data correlation in Segment Routed networks | M | Tobias Bühler | available | ![]() |
|||
![]() |
Detecting Blood Vessel Networks from 3D Scans | S | Andreas Plesner, Joël Mathys |
available | ![]() |
|||
![]() |
Developing an Automated Defender for Cyber Security Exercises | M | Roland Meier, Vincent Lenders |
available | ![]() |
|||
![]() |
Distributed Graph Problems with Malicious Actors | M/S | Anton Paramonov, Andrei Constantinescu |
available | ![]() |
|||
![]() |
Eliciting Internal Reward Models in LLMs | M/S | Samuel Dauncey | available | ![]() |
|||
![]() |
Emergent Architectures: Neuro-symbolic AI | M | Giacomo Camposampiero | available | ![]() |
|||
![]() |
Ensuring Transport Fairness with Smart Networks | S | Alexander Dietmüller, Maria Apostolaki |
available | ![]() |
|||
![]() |
Exceptional Students for ML in Audio/Music | B/M/S | Luca Lanzendörfer, Florian Grötschla |
available | ![]() |
|||
![]() |
Exploit | B | Patrick Jattke | available | ![]() |
|||
![]() |
From programmable devices to programmable networks | S | Maria Apostolaki, Alexander Dietmüller |
available | ![]() |
|||
![]() |
Fuzzing applications | S | Flavien Solt | available | ![]() |
|||
![]() |
Generalized Turing Test for LLMs | S | Samuel Dauncey, Frédéric Berdoz |
available | ![]() |
|||
![]() |
Generalizing Passive Routing Attacks Against Overlay Networks | M | Laurent Vanbever | available | ![]() |
|||
![]() |
GPUs | S | Patrick Jattke | available | ![]() |
|||
![]() |
InSpectre Gadget | B | Johannes Wikner | available | ![]() |
|||
![]() |
JS | B | Patrick Jattke | available | ![]() |
|||
![]() |
Learning Domain-Invariant Feature Representations for Sensor Array Calibration | S | Yun Cheng, Matthias Meyer |
available | ![]() |
|||
![]() |
Microarchitectural Security | M | Kaveh Razavi | available | ![]() |
|||
![]() |
Modelling Air Pollution Transfer during Global Pandemic | M/S | Yun Cheng | available | ![]() |
|||
![]() |
Open source-based traffic traces | M | Tobias Bühler, Roland Schmid |
available | ![]() |
|||
![]() |
pboot | M | Finn de Ridder | available | ![]() |
|||
![]() |
PhantomOC | S | Johannes Wikner | available | ![]() |
|||
![]() |
Rowhammer | B | Patrick Jattke | available | ![]() |
|||
![]() |
sboot | S | Finn de Ridder | available | ![]() |
|||
![]() |
Security of RDMA applications | S | Karl Aberer, Michele Marazzi |
available | ![]() |
|||
![]() |
Security of RDMA applications | S | Michele Marazzi | available | ![]() |
|||
![]() |
Speed it up | S | Flavien Solt | available | ![]() |
|||
![]() |
Topics in Computational Voting and Game Theory | M/S | Andrei Constantinescu | available | ![]() |
|||
![]() |
Vertical Test Time Compute in Transformers | M/S | Samuel Dauncey, Frédéric Berdoz |
available | ![]() |
|||
![]() |
View-Specific Video Compression | M/S | Till Aczel | available | ![]() |
|||
Fast Data Flush on Matterhorn | Ad-hoc-Networks | M/S | Jan Beutel, Tonio Gsell |
available | ![]() |
|||
![]() |
Assembling blocks | Embedded Systems | M | Flavien Solt, Kaveh Razavi |
available | ![]() |
||
![]() |
CPUs and Co | Embedded Systems | S | Flavien Solt | available | ![]() |
||
![]() |
Efficient on-device execution of Multi-task Zipping | Embedded Systems | M | Xiaoxi He, Yun Cheng |
available | ![]() |
||
![]() |
Orchestrate the Mixed-Criticality Melody (I) | Embedded Systems | M | Pengcheng Huang | available | ![]() |
||
![]() |
Homo Moralis Plays a Game | Game Theory | M/S | Damien Berriaud, Andrei Constantinescu |
available | ![]() |
||
![]() |
Building a MultiCloud-Based Serverless Web Ecosystem | Internet Architecture | M | Ege Cem Kirci, Rui Yang |
available | ![]() |
||
![]() |
Route Convergence Optimization in the SWITCH Network | Internet Architecture | M | Tibor Schneider | available | ![]() |
||
![]() |
Karma Economics | Internet Economics | M/S | Damien Berriaud | available | ![]() |
||
![]() |
Detecting Internet Events | Internet Measurement | M | Ege Cem Kirci | available | ![]() |
||
![]() |
BGP is Turing Complete!---Lets visualize it! | Network Coding | B | Tibor Schneider | available | ![]() |
||
![]() |
Enhancing Data Plane Signals for Network Monitoring Systems | Network Monitoring | M | Edgar Costa Molero | available | ![]() |
||
![]() |
Interactive Synthesis of Network Queries from Traffic Examples | Network Monitoring | M | Alberto Gran Alcoz, Tibor Schneider |
available | ![]() |
||
![]() |
Framework optimization | Systems Optimization | B | Flavien Solt, Kaveh Razavi |
available | ![]() |
||
Current Theses for all TIK GroupsB = Bachelor, G = Group, M = Master, S = Semester |
||||||||
title | category | type | contact/supervisor | assigned | student(s) | thesis number | edit | |
![]() |
Eigenvector-Masked Autoencoders | B | Till Aczel, Andreas Plesner |
FS 25 | BA-2025-15 | ![]() ![]() |
||
![]() |
Aggregation in Team Games | M | Andrei Constantinescu, Borna Simic |
FS 25 | MA-2025-06 | ![]() ![]() |
||
AlphaZero Meets ARC | M | Andreas Plesner, Benjamin Estermann |
FS 25 | MA-2025-07 | ![]() ![]() |
|||
![]() |
ARC Literature Review | S | Andreas Plesner | FS 25 | SA-2025-08 | ![]() ![]() |
||
![]() |
Asynchronous Graph Neural Network Models | B | Florian Grötschla | FS 25 | BA-2025-09 | ![]() ![]() |
||
![]() |
Audio Upmixing | M | Luca Lanzendörfer, Florian Grötschla |
FS 25 | MA-2025-08 | ![]() ![]() |
||
![]() |
Beatmaker | S | Luca Lanzendörfer, Florian Grötschla |
FS 25 | SA-2025-12 | ![]() ![]() |
||
![]() |
Bounds on the Coding Gap for Broadcast | S | Anton Paramonov, Andrei Constantinescu |
FS 25 | SA-2025-16 | ![]() ![]() |
||
![]() |
Context-Aware In- Car Recommender System: Predicting UI Interactions (User Needs) with Driving Context | M | Andreas Plesner | FS 25 | MA-2025-16 | ![]() ![]() |
||
![]() |
Contrastive Decoding | M | Luca Lanzendörfer, Frédéric Berdoz |
FS 25 | MA-2025-15 | ![]() ![]() |
||
![]() |
Creating the Next Decentralized Computer | B | Anton Paramonov, Yann Vonlanthen |
FS 25 | BA-2025-05 | ![]() ![]() |
||
![]() |
Data Attribution | B | Luca Lanzendörfer, Frédéric Berdoz |
FS 25 | BA-2025-04 | ![]() ![]() |
||
![]() |
Deep Differentiable Logic Gate Networks: Neuron Collapse Through a Neural Architecture Search Perspective | S | Andreas Plesner, Till Aczel |
FS 25 | SA-2025-11 | ![]() ![]() |
||
![]() |
Designing the Next ARC Challenge | M | Saku Peltonen, Andreas Plesner |
FS 25 | MA-2025-01 | ![]() ![]() |
||
![]() |
DiffLogic - Recurrent Networks | S | Till Aczel, Andreas Plesner |
FS 25 | SA-2025-15 | ![]() ![]() |
||
![]() |
Effectiveness of Multi-Scale Aggregation for Adversarial Robustness | B | Andreas Plesner, Till Aczel |
FS 25 | BA-2025-16 | ![]() ![]() |
||
![]() |
Empirical Analysis of Blockchain Payment Systems | B | Saku Peltonen, Lioba Heimbach |
FS 25 | BA-2025-02 | ![]() ![]() |
||
![]() |
Enhancing AlphaZero with Neural Message Passing | S | Samuel Dauncey, Saku Peltonen |
FS 25 | SA-2025-07 | ![]() ![]() |
||
![]() |
Evaluating AI-Generated Image Detection Across Resolution and Complexity | B | Till Aczel, Andreas Plesner |
FS 25 | BA-2025-12 | ![]() ![]() |
||
![]() |
Evaluating and Controlling the Political Bias of LLMs | M | Frédéric Berdoz | FS 25 | MA-2025-04 | ![]() ![]() |
||
![]() |
Exploring adversarial concepts | S | Andreas Plesner | FS 25 | SA-2025-03 | ![]() ![]() |
||
![]() |
Fake Singing Voice Detection | M | Luca Lanzendörfer, Florian Grötschla |
FS 25 | MA-2025-05 | ![]() ![]() |
||
![]() |
Faster DiffLogic | S | Andreas Plesner, Till Aczel |
FS 25 | SA-2025-10 | ![]() ![]() |
||
![]() |
Graph Autoencoder | M | Florian Grötschla, Saku Peltonen |
FS 25 | MA-2025-09 | ![]() ![]() |
||
![]() |
Image-to-Prompt | B | Frédéric Berdoz, Luca Lanzendörfer |
FS 25 | BA-2025-14 | ![]() ![]() |
||
![]() |
Impact of Training Data on Adversarial Examples | B | Andreas Plesner, Till Aczel |
FS 25 | BA-2025-13 | ![]() ![]() |
||
![]() |
Increasing Expressiveness of DiffLogic | S | Andreas Plesner, Till Aczel |
FS 25 | SA-2025-14 | ![]() ![]() |
||
![]() |
Interpreting the Reversal Curse of LLMs | M | Samuel Dauncey | FS 25 | MA-2025-12 | ![]() ![]() |
||
![]() |
IQ of VLMs – can they really reason? | B | Andreas Plesner, Frédéric Berdoz |
FS 25 | BA-2025-11 | ![]() ![]() |
||
![]() |
LLM Sampling Methods | B | Frédéric Berdoz, Andreas Plesner |
FS 25 | BA-2025-10 | ![]() ![]() |
||
![]() |
Mesh Optimization and Neural Closure Modeling Using Graph Neural Networks | M | Florian Grötschla, Joël Mathys |
FS 25 | MA-2025-10 | ![]() ![]() |
||
![]() |
MEV on Solana | M | Lioba Heimbach | FS 25 | MA-2025-11 | ![]() ![]() |
||
![]() |
ML for Fashion | M | Luca Lanzendörfer, Till Aczel |
FS 25 | MA-2025-03 | ![]() ![]() |
||
![]() |
More Efficient Transformers with high-level multi-token prediction | B | Frédéric Berdoz, Benjamin Estermann |
FS 25 | BA-2025-06 | ![]() ![]() |
||
![]() |
Multi-Lingual Text-to-Speech Dataset | B | Luca Lanzendörfer, Florian Grötschla |
FS 25 | BA-2025-08 | ![]() ![]() |
||
![]() |
Multimodal Graph-Language Models | S | Florian Grötschla, Saku Peltonen |
FS 25 | SA-2025-04 | ![]() ![]() |
||
![]() |
NeRF to evaluate Robustness | M | Andreas Plesner, Till Aczel |
FS 25 | MA-2025-14 | ![]() ![]() |
||
![]() |
Neural Amp modelling | S | Florian Grötschla, Luca Lanzendörfer |
FS 25 | SA-2025-13 | ![]() ![]() |
||
![]() |
Ranking Movies with LLMs | B | Luca Lanzendörfer, Frédéric Berdoz |
FS 25 | BA-2025-07 | ![]() ![]() |
||
![]() |
Reasoning Benchmark for LLMs | B | Benjamin Estermann, Luca Lanzendörfer |
FS 25 | BA-2025-03 | ![]() ![]() |
||
![]() |
Recopmression | B | Till Aczel | FS 25 | BA-2025-01 | ![]() ![]() |
||
![]() |
Robust Multi-lingual Speaker Diarization | S | Luca Lanzendörfer, Florian Grötschla |
FS 25 | SA-2025-05 | ![]() ![]() |
||
![]() |
RSTAR Meets ARC | B | Andreas Plesner, Benjamin Estermann |
FS 25 | BA-2025-17 | ![]() ![]() |
||
![]() |
Sample Efficiency in Text Diffusion Pretraining | S | Samuel Dauncey | FS 25 | SA-2025-09 | ![]() ![]() |
||
![]() |
Scalable Proof-of-Personhood | B | Yann Vonlanthen | FS 25 | BA-2025-19 | ![]() ![]() |
||
![]() |
Scalar Quantization for Audio Compression | S | Till Aczel, Luca Lanzendörfer |
FS 25 | SA-2025-01 | ![]() ![]() |
||
![]() |
Scaling laws for test-time compute with SID.ai | M | Samuel Dauncey | FS 25 | MA-2025-17 | ![]() ![]() |
||
![]() |
Simulating Democracy through LLM Agents | M | Frédéric Berdoz, Yann Vonlanthen |
FS 25 | MA-2025-13 | ![]() ![]() |
||
![]() |
Speech Dataset Pipeline | B | Luca Lanzendörfer, Florian Grötschla |
FS 25 | BA-2025-20 | ![]() ![]() |
||
![]() |
Synthetic Data as a Data Augmentation | B | Andreas Plesner, Till Aczel |
FS 25 | BA-2025-18 | ![]() ![]() |
||
![]() |
Text-to-Scene | S | Luca Lanzendörfer, Frédéric Berdoz |
FS 25 | SA-2025-06 | ![]() ![]() |
||
![]() |
Video-to-Audio Generation | M | Luca Lanzendörfer, Florian Grötschla |
FS 25 | MA-2025-02 | ![]() ![]() |
||
![]() |
Audio Editing | M | Luca Lanzendörfer, Florian Grötschla |
HS 24 | MA-2024-35 | ![]() ![]() |
||
![]() |
Audio Watermarking | M | Luca Lanzendörfer, Florian Grötschla |
HS 24 | MA-2024-37 | ![]() ![]() |
||
![]() |
Chaos Testing Blockchain Networks: Simulating Real-World Failures | M | Yann Vonlanthen | HS 24 | MA-2024-32 | ![]() ![]() |
||
![]() |
DAO Governance Aggregation | B | Arthur Gervais | HS 24 | BA-2024-11 | ![]() ![]() |
||
![]() |
DeepEye: Benchmarking & Generalization | B | Ard Kastrati | HS 24 | BA-2024-20 | ![]() ![]() |
||
![]() |
DeepEye: Benchmarking Platform | B | Ard Kastrati | HS 24 | BA-2024-19 | ![]() ![]() |
||
![]() |
Egocentric Action Recognition | M | Ard Kastrati | HS 24 | MA-2024-21 | ![]() ![]() |
||
![]() |
Foundation Models for Decoding Brain Activity - Benchmarking | B | Ard Kastrati | HS 24 | BA-2024-24 | ![]() ![]() |
||
![]() |
Foundation Models for Decoding Brain Activity - Models | M | Ard Kastrati | HS 24 | MA-2024-33 | ![]() ![]() |
||
![]() |
Giving ChatGPT a Virtual Body | S | Ard Kastrati | HS 24 | SA-2024-26 | ![]() ![]() |
||
![]() |
Layer-2s and MEV | B | Lioba Heimbach, Yann Vonlanthen |
HS 24 | BA-2024-29 | ![]() ![]() |
||
![]() |
Multi-modal Contrastive Learning for Emotion Recognition | M | Ard Kastrati | HS 24 | MA-2024-31 | ![]() ![]() |
||
![]() |
Neural Fluid Simulation with GNNs | S | Joël Mathys, Florian Grötschla |
HS 24 | SA-2024-23 | ![]() ![]() |
||
![]() |
Optimizing Encoding Speed for Image Compression | M | Till Aczel | HS 24 | MA-2024-36 | ![]() ![]() |
||
![]() |
Optimizing Inventory Management | M | Andreas Plesner, Benjamin Estermann |
HS 24 | MA-2024-38 | ![]() ![]() |
||
![]() |
SAT Solving with Graph Neural Networks | S | Saku Peltonen, Joël Mathys |
HS 24 | SA-2024-30 | ![]() ![]() |
||
![]() |
Stability of Adversarial Examples | B | Andreas Plesner | HS 24 | BA-2024-27 | ![]() ![]() |
||
![]() |
View-Specific Video Compression | B | Till Aczel | HS 24 | BA-2024-25 | ![]() ![]() |
||
![]() |
Volatility Forecasting and Regime Detection for Options Trading | M | Frédéric Berdoz, Ruedi Delacour |
HS 24 | MA-2024-29 | ![]() ![]() |
||
![]() |
Game Theory for Games: Algorithms and Axioms | G | Andrei Constantinescu | FS 24 | GA-2024-03 | ![]() ![]() |
||
![]() |
Karma Economics | S | Damien Berriaud | FS 24 | SA-2024-29 | ![]() ![]() |
||
![]() |
Learning from Demonstrations | G | Benjamin Estermann | FS 24 | GA-2024-01 | ![]() ![]() |
||
![]() |
Puzzle solving with Graph Neural Networks | S | Joël Mathys, Benjamin Estermann |
FS 24 | SA-2024-17 | ![]() ![]() |
||
![]() |
The Emergence of Two-Party Systems | G | Andrei Constantinescu | FS 24 | GA-2024-02 | ![]() ![]() |
||
Past Theses for all TIK Groups |
||||||||
title | category | type | contact/supervisor | assigned | student(s) | thesis number | ||
![]() |
CAST: Conditional Adaption with Soft Tokens [confidential] | M | Frédéric Berdoz | HS 24 | MA-2024-30 | |||
![]() |
Rethinking Adversarial Examples [confidential] | M | Andreas Plesner | HS 24 | MA-2024-27 | |||
![]() |
Yield Curve Approximation and Prediction with Recurrent Neural Networks [confidential] | B | Daniela Brauckhoff, Andreas Plesner |
HS 24 | BA-2024-30 | |||
![]() |
Anomaly Detection for Automated Visual Inspection [confidential] | M | Ioana Giurgiu | HS 24 | MA-2024-23 | |||
![]() |
Computing with Asynchronous Cellular Automata [confidential] | M | Florian Grötschla, Andreas Plesner |
HS 24 | MA-2024-22 | |||
![]() |
Automated Visual Foosball Tracking | B | Joël Mathys, Till Aczel |
HS 24 | BA-2024-12 | |||
![]() |
Breaking Image CAPTCHAs and designing a new CAPTCHA [confidential] | M | Andreas Plesner | HS 24 | MA-2024-24 | |||
![]() |
Leveraging Pre-Trained LMs for Rapid and Accurate Structure Elucidation from 2D NMR Data [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
HS 24 | SA-2024-20 | |||
![]() |
An Empirical Analysis of Polymarket [confidential] | B | Lioba Heimbach, Quentin Kniep |
HS 24 | BA-2024-14 | |||
![]() |
FastFeedForward Networks in Vision Transformers [confidential] | S | Andreas Plesner | HS 24 | SA-2024-28 | |||
![]() |
Symbolic Music Generation with Autoregressive Graph Autoencoder [confidential] | S | Florian Grötschla, Luca Lanzendörfer |
HS 24 | SA-2024-21 | |||
![]() |
Human-aligned Compression for Robust Models [confidential] | S | Andreas Plesner, Till Aczel |
HS 24 | SA-2024-27 | |||
ACORD: An Expert-Annotated Dataset for Contract Clause Retrieval [confidential] | M | Andreas Plesner | HS 24 | MA-2024-20 | ||||
![]() |
Homo Moralis Plays the Centipede Game [confidential] | B | Damien Berriaud, Andrei Constantinescu |
HS 24 | BA-2024-13 | |||
![]() |
Neural Networks for EEG Data: Compression and Reconstruction Validation [confidential] | S | Ard Kastrati, Luca Lanzendörfer |
HS 24 | SA-2024-25 | |||
![]() |
Self-Supervised Overlap Removal with Graph Neural Networks [confidential] | B | Florian Grötschla | HS 24 | BA-2024-28 | |||
![]() |
High-Frequency Cryptocurrency Market Data Analysis for Centralized and Decentralized Exchanges [confidential] | M | Luca Lanzendörfer | HS 24 | MA-2024-26 | |||
![]() |
Recommender Systems for Politics [confidential] | G | Frédéric Berdoz, Yann Vonlanthen |
HS 24 | GA-2024-06 | |||
![]() |
FinGNN: Financial Graph Neural Networks [confidential] | M | Joël Mathys, Ruedi Delacour |
HS 24 | MA-2024-34 | |||
![]() |
Text-to-Mel: Learning Mel Spectrograms [confidential] | B | Luca Lanzendörfer, Florian Grötschla |
HS 24 | BA-2024-15 | |||
![]() |
Transfer Learning for Graph-Based Recommendation Systems [confidential] | B | Florian Grötschla, Luca Lanzendörfer |
HS 24 | BA-2024-16 | |||
![]() |
Unified Model for EEG-based Eye Tracking [confidential] | B | Ard Kastrati | HS 24 | BA-2024-18 | |||
![]() |
An Axiomatic Analysis of Partition Elections [confidential] | B | Andrei Constantinescu | HS 24 | BA-2024-17 | |||
![]() |
Wave Function Collapse for Graph Generation [confidential] | S | Till Aczel, Joël Mathys |
HS 24 | SA-2024-22 | |||
![]() |
Kantian Moralists and Altruists [confidential] | Game Theory | M | Damien Berriaud, Andrei Constantinescu |
HS 24 | MA-2024-28 | ||
![]() |
Exploit Detection in the Evolution of DApps | M | Benjamin Estermann, Ye Wang |
FS 24 | MA-2024-13 | |||
![]() |
Breaking Google’s reCAPTCHAv3 [confidential] | S | Andreas Plesner | FS 24 | SA-2024-09 | |||
![]() |
Breaking Google’s reCAPTCHAv3 - Getting good cookies [confidential] | S | Andreas Plesner | FS 24 | SA-2024-11 | |||
![]() |
Breaking Google’s reCAPTCHAv3 - How are humans classified [confidential] | S | Andreas Plesner | FS 24 | SA-2024-10 | |||
![]() |
CLLAP: Contrastive Language-Lyrics-Audio Pretraining [confidential] | M | Luca Lanzendörfer, Florian Grötschla |
FS 24 | MA-2024-12 | |||
![]() |
Compute-Efficient Pretraining of Large EEG Models [confidential] | B | Ard Kastrati | FS 24 | BA-2024-09 | |||
![]() |
Conditional Generation of Wavetables | B | Luca Lanzendörfer, Florian Grötschla |
FS 24 | BA-2024-07 | |||
![]() |
Improving the Data Quality of ConfSearch using LLMs | S | Andreas Plesner | FS 24 | SA-2024-18 | |||
Data Driven Anomaly Detection for Rails using In-service Railway Vehicles | B | Andreas Plesner | FS 24 | BA-2024-02 | ||||
![]() |
Data Driven Anomaly Detection of Springs in In-service Railway Vehicles [confidential] | B | Andreas Plesner | FS 24 | BA-2024-06 | |||
![]() |
Hidden State Aggregation Models with GNN Convolutions Applied to Multivariate Time-Series Forecasting in Energy Markets [confidential] | M | Benjamin Estermann | FS 24 | MA-2024-01 | |||
![]() |
Byzantine Distributed Stable Matching [confidential] | M | Diana Ghinea, Andrei Constantinescu |
FS 24 | MA-2024-11 | |||
![]() |
Deep Learning-Based Compression of EEG Data Using Neural Codecs [confidential] | S | Ard Kastrati, Luca Lanzendörfer |
FS 24 | SA-2024-19 | |||
![]() |
Benchmarking Music Generation Models and Metrics via Human Preference Studies [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-06 | |||
![]() |
Benchmarking Positional Encodings for GNNs [confidential] | S | Florian Grötschla | FS 24 | SA-2024-02 | |||
Sybil Detection using Graph Neural Networks [confidential] | M | Andreas Plesner | FS 24 | MA-2024-08 | ||||
![]() |
Improving Investment Strategies with GNNs [confidential] | S | Florian Grötschla, Joël Mathys |
FS 24 | SA-2024-16 | |||
![]() |
Graph Algorithms for Dynamic Directories [confidential] | M | Andrei Constantinescu, Pankaj Khanchandani |
FS 24 | MA-2024-15 | |||
![]() |
CLAP Embeddings for Artist Similarity with Graph Neural Networks [confidential] | G | Florian Grötschla, Luca Lanzendörfer |
FS 24 | GA-2024-04 | |||
Automated Vascular Graph Extraction [confidential] | M | Joël Mathys, Andreas Plesner |
FS 24 | MA-2024-25 | ||||
![]() |
Next Level Message-Passing with Hierarchical Support Graphs [confidential] | S | Florian Grötschla | FS 24 | SA-2024-03 | |||
![]() |
Hierarchical Representations for Transformers [confidential] | M | Benjamin Estermann | FS 24 | MA-2024-18 | |||
![]() |
FuzzNet: Imitating Byzantine Behavior in Distributed Systems [confidential] | M | Yann Vonlanthen | FS 24 | MA-2024-16 | |||
![]() |
Incentivizing Simple Transactions [confidential] | B | Lioba Heimbach, Andrei Constantinescu |
FS 24 | BA-2024-01 | |||
![]() |
Jigsaw Puzzle Solver using Machine Learning [confidential] | S | Andreas Plesner, Till Aczel |
FS 24 | SA-2024-04 | |||
![]() |
Reinforcement Learning for State-Based Algorithms on Graphs [confidential] | M | Florian Grötschla, Joël Mathys |
FS 24 | MA-2024-04 | |||
![]() |
LightningBench: A Real-World Payment Network Benchmark for Graph Neural Networks [confidential] | M | Florian Grötschla, Lioba Heimbach |
FS 24 | MA-2024-07 | |||
![]() |
Leverage Staking using Liquid Staking Tokens [confidential] | B | Lioba Heimbach, Robin Fritsch |
FS 24 | BA-2024-08 | |||
![]() |
Contrastive Lyrics Alignment with a Timestamp-Informed Loss [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-12 | |||
![]() |
Lyrics to Vocals Generation [confidential] | M | Luca Lanzendörfer, Florian Grötschla |
FS 24 | MA-2024-06 | |||
![]() |
High-Fidelity Music Vocoder Using Neural Audio Codecs [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-07 | |||
![]() |
FunctaFormer: Domain Agnostic Super Resolution [confidential] | M | Luca Lanzendörfer, Benjamin Estermann |
FS 24 | MA-2024-05 | |||
![]() |
Solving Poisson Equations using Neural Walk-on-Spheres [confidential] | M | Anima Anandkumar | FS 24 | MA-2024-10 | |||
![]() |
Open-LLark: Open-Sourcing And Extending LLark [confidential] | B | Luca Lanzendörfer, Florian Grötschla |
FS 24 | BA-2024-05 | |||
![]() |
A Contention Aware Routing Algorithm for Analog-In-Memory-Computing Based DNN Accelerators [confidential] | M | William Simon | FS 24 | MA-2024-09 | |||
![]() |
Toward Robust Voting Advice Applications: Lessons from Smartvote [confidential] | M | Yann Vonlanthen, Frédéric Berdoz |
FS 24 | MA-2024-03 | |||
![]() |
Reconstructing ODEs for Railway Vehicles Using Machine Learning [confidential] | B | Andreas Plesner | FS 24 | BA-2024-04 | |||
![]() |
Mangrove: Fast and Parallelizable Smart Contract Agreement [confidential] | M | Yann Vonlanthen, Quentin Kniep |
FS 24 | MA-2024-02 | |||
![]() |
Analyzing Deep Learning Architectures on Stock Prediction [confidential] | G | Florian Grötschla, Joël Mathys |
FS 24 |
, |
GA-2024-05 | ||
![]() |
Structured Sparsity for Efficiency in Model Inference | S | Peter Belcák | FS 24 | SA-2024-14 | |||
![]() |
Text-to-Speech Arena [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-05 | |||
![]() |
Using Physics-Informed Neural Networks to Predict Railway Irregularities | M | Andreas Plesner | FS 24 | MA-2024-14 | |||
![]() |
Building a Multi-Cryptocurrency Node Explorer | Peer-to-Peer Networks | S | Lucianna Kiffer | FS 24 | SA-2024-08 | ||
![]() |
Uncovering Discovery: A Deep Dive Into Ethereum’s Discovery Protocols [confidential] | Peer-to-Peer Networks | M | Lucianna Kiffer, Yann Vonlanthen |
FS 24 | MA-2024-17 | ||
![]() |
Infrastructure Impact on Cryptocurrency Networks | Peer-to-Peer Networks | S | Lucianna Kiffer | FS 24 | SA-2024-15 | ||
![]() |
Exploring Typical and Uncertainty-Driven Active Learning on DINO Embeddings to Enhance Versatility [confidential] | S | Till Aczel, Benjamin Estermann |
HS 23 | SA-2023-20 | |||
![]() |
AEye: A Visualization Tool for Image Datasets [confidential] | G | Florian Grötschla, Luca Lanzendörfer |
HS 23 | GA-2023-19 | |||
![]() |
Airdrop Mechanisms and Their Sybil Resistance [confidential] | B | Lioba Heimbach, Yann Vonlanthen |
HS 23 | BA-2023-19 | |||
![]() |
Object-Centric Reasoning with Language and Code [confidential] | G | Benjamin Estermann, Joël Mathys |
HS 23 | GA-2023-18 | |||
![]() |
Attacks on DAOs [confidential] | S | Lioba Heimbach, Yann Vonlanthen |
HS 23 | SA-2023-17 | |||
![]() |
Generative Musical Source Separation Based on Neural Audio Codecs [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
HS 23 | SA-2023-24 | |||
![]() |
Best Pokémon Team | B | Andreas Plesner | HS 23 | BA-2023-23 | |||
![]() |
I’m a Robot. Solving CAPTCHAs with Advanced Machine Learning Techniques [confidential] | S | Andreas Plesner | HS 23 | SA-2023-33 | |||
![]() |
Audio Data Visualization Using Text-Audio Embeddings [confidential] | B | Luca Lanzendörfer, Florian Grötschla |
HS 23 | BA-2023-20 | |||
![]() |
Building Practical Distributed Algorithms | G | Yann Vonlanthen | HS 23 |
, |
GA-2023-12 | ||
![]() |
Building Practical Longest Chain Protocols | G | Yann Vonlanthen | HS 23 | GA-2023-13 | |||
![]() |
WikiGame: Graph-Exploration, Fun included | G | Luca Lanzendörfer | HS 23 |
, , , |
GA-2023-10 | ||
![]() |
Dawn of an Era: How Layer 2 Solutions Change the Workload on Ethereum Blockchains [confidential] | M | Lioba Heimbach, Quentin Kniep |
HS 23 | MA-2023-23 | |||
![]() |
Improving Non-Linear Redundancy Reduction in Self-Supervised Contrastive Learning [confidential] | G | Béni Egressy | HS 23 | GA-2023-20 | |||
![]() |
Cue and Mix-Point Estimation for Automated DJ Systems [confidential] | M | Luca Lanzendörfer | HS 23 | MA-2023-09 | |||
![]() |
DataComp Challenge | G | Till Aczel, Benjamin Estermann |
HS 23 | GA-2023-09 | |||
![]() |
Personalized Federated Learning with Pre-Trained GNNs [confidential] | M | Béni Egressy | HS 23 | MA-2023-24 | |||
![]() |
Pre-training a Deep Learning Model for Decoding Brain Activity [confidential] | B | Ard Kastrati | HS 23 | BA-2023-21 | |||
![]() |
Diverse Datasets for BCI [confidential] | S | Ard Kastrati | HS 23 | SA-2023-34 | |||
![]() |
Leveraging Dense Text Representations for Efficient Language Modeling | M | Peter Belcák | HS 23 | MA-2023-20 | |||
![]() |
SUPClust: Active Learning at the Boundaries | S | Benjamin Estermann, Till Aczel |
HS 23 | SA-2023-16 | |||
![]() |
Exploring Activation Ensembles for Feed-Forward Neural Networks | B | Florian Grötschla, Joël Mathys |
HS 23 | BA-2023-17 | |||
![]() |
Fair Transaction Ordering Website | B | Lioba Heimbach | HS 23 | BA-2023-18 | |||
![]() |
Logarithmic Approximation for Road Pricing on Grids [confidential] | M | Andrei Constantinescu | HS 23 | MA-2023-03 | |||
![]() |
GNN Pretraining | M | Béni Egressy | HS 23 | MA-2023-21 | |||
![]() |
GNNs for TPU Graphs | S | Joël Mathys, Florian Grötschla |
HS 23 | SA-2023-22 | |||
![]() |
Bridging Image and Audio Compression: A Spectrogram-based Neural Approach | M | Luca Lanzendörfer | HS 23 | MA-2023-22 | |||
![]() |
Machine Unlearning Challenge | S | Luca Lanzendörfer, Benjamin Estermann |
HS 23 | SA-2023-21 | |||
![]() |
Evaluating Generative Models on Musical Mel Spectrogram Inversion [confidential] | G | Luca Lanzendörfer | HS 23 | GA-2023-11 | |||
![]() |
Adding Music Modality to LLMs by Leveraging Contrastive Pretraining [confidential] | B | Luca Lanzendörfer | HS 23 | BA-2023-13 | |||
![]() |
Network-level Attacks Against Ethereum PoS | B | Lioba Heimbach | HS 23 | BA-2023-16 | |||
![]() |
In-Depth Analysis of Bidding Strategies in MEV Auctions [confidential] | G | Benjamin Estermann, Ye Wang |
HS 23 | GA-2023-17 | |||
![]() |
Train Small - Solve Big: Reinforcement Learning on Logic Puzzles using Graph Neural Networks [confidential] | M | Benjamin Estermann, Joël Mathys |
HS 23 | MA-2023-16 | |||
![]() |
Understanding the Effects of Improved Representations on Downstream Reinforcement Learning Tasks [confidential] | S | Benjamin Estermann | HS 23 | SA-2023-13 | |||
![]() |
Automated Positioning for Smart Lighting [confidential] | M | Judith Beestermöller, Andreas Plesner |
HS 23 | MA-2023-10 | |||
![]() |
Scaling MARL with Graph Neural Networks | M | Benjamin Estermann, Florian Grötschla |
HS 23 | MA-2023-15 | |||
![]() |
Text Compression for Efficient Language Generation | M | Peter Belcák | HS 23 | MA-2023-19 | |||
![]() |
Coarse-to-Fine Unsupervised Text-to-Music Latent Diffusion [confidential] | M | Luca Lanzendörfer | HS 23 | MA-2023-12 | |||
![]() |
The Price of Weighted Majority Support [confidential] | G | Andrei Constantinescu | HS 23 | GA-2023-15 | |||
![]() |
Distributed Reinforcement Learning for Autonomous Driving in TrackMania [confidential] | G | Benjamin Estermann, Luca Lanzendörfer |
HS 23 | GA-2023-08 | |||
![]() |
Validity Properties of Byzantine Agreement [confidential] | G | Andrei Constantinescu, Diana Ghinea |
HS 23 | GA-2023-16 | |||
![]() |
Tokenization of Ethereum Stake [confidential] | Internet Measurement | S | Lucianna Kiffer, Lioba Heimbach |
HS 23 | SA-2023-28 | ||
![]() |
Crawling the Bitcoin Client Ecosystem | Internet Measurement | S | Lucianna Kiffer, Lioba Heimbach |
HS 23 | SA-2023-25 | ||
![]() |
Locating and Hiding Validators in the Ethereum Consensus Network [confidential] | Peer-to-Peer Networks | M | Lucianna Kiffer, Yann Vonlanthen |
HS 23 | MA-2023-13 | ||
![]() |
Peer-to-peer Networks under Churn | Peer-to-Peer Networks | S | Lucianna Kiffer | HS 23 | SA-2023-15 | ||
![]() |
The Peer Discovery Layer of the Ethereum Network | Peer-to-Peer Networks | S | Lucianna Kiffer | HS 23 | SA-2023-14 | ||
![]() |
Enhancing GNNs: An Exploration of Iterative Solving and Augmentation Techniques | B | Joël Mathys, Florian Grötschla |
FS 23 | BA-2023-05 | |||
![]() |
Enhancing the Building Blocks of Language-Based Visual Reasoning for ARC | M | Joël Mathys, Benjamin Estermann |
FS 23 | MA-2023-11 | |||
![]() |
Asynchronous GNNs [confidential] | G | Joël Mathys, Florian Grötschla |
FS 23 | GA-2023-04 | |||
![]() |
Audit for Digital Assets [confidential] | B | Jakub Sliwinski | FS 23 | BA-2023-14 | |||
![]() |
DISCO-10M Creation and Data Exploration [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 23 | SA-2023-11 | |||
![]() |
Finite State Algorithm Learning on Graphs [confidential] | M | Joël Mathys, Florian Grötschla |
FS 23 | MA-2023-02 | |||
![]() |
Comparison of Electoral Systems and Optimization of Voting Advice Questionnaires | B | Andrei Constantinescu, Judith Beestermöller |
FS 23 | BA-2023-08 | |||
![]() |
Contrastive Pre-Training for Integer Sequence Understanding [confidential] | S | Peter Belcák | FS 23 | SA-2023-09 | |||
![]() |
Post Merge Cryptocurrencies | B | Lucianna Kiffer, Yann Vonlanthen |
FS 23 | BA-2023-04 | |||
![]() |
Large Language Model Augmented Contrastive Sentence Representation Learning | B | Zhao Meng | FS 23 | BA-2023-09 | |||
![]() |
Federated Reinforcement Learning with Heterogeneous Environments [confidential] | S | Xiaofeng Flint Fan, Luca Lanzendörfer |
FS 23 | SA-2023-04 | |||
![]() |
SUBER: An RL Environment with Simulated Human Behavior for Recommender Systems [confidential] | G | Xiaofeng Flint Fan, Luca Lanzendörfer |
FS 23 |
, |
GA-2023-05 | ||
![]() |
Enabling Interactions Between Encointer Local Communities | G | Yann Vonlanthen | FS 23 | GA-2023-14 | |||
![]() |
Evaluating the Robustness of Large Language Models against Adversarial Attacks [confidential] | M | Zhao Meng | FS 23 | MA-2023-04 | |||
![]() |
Expressions and Emotion Detection from HMD Sensors | M | Ard Kastrati | FS 23 | MA-2023-08 | |||
![]() |
Generative Models for Financial Data: Applications to Initial Margin and its Backtesting [confidential] | M | Andreas Plesner | FS 23 | MA-2023-06 | |||
![]() |
From Pixels to Nodes: A Segmentation-Driven Approach to Image Classification | G | Karolis Martinkus, Ard Kastrati |
FS 23 |
, , |
GA-2023-06 | ||
![]() |
Adversarial Robustness of Expressive Graph Neural Networks | B | Karolis Martinkus | FS 23 | BA-2023-06 | |||
![]() |
Abstract Approximate Agreement with Asynchronous Fallback [confidential] | S | Diana Ghinea, Andrei Constantinescu |
FS 23 | SA-2023-03 | |||
![]() |
Improving the Interface of the Jass AI | G | Benjamin Estermann | FS 23 | GA-2023-02 | |||
![]() |
Efficient Neural Representation Learning for Star-Convex Boundaries [confidential] | S | Karolis Martinkus | FS 23 | SA-2023-12 | |||
![]() |
Make Blockchain Public Again [confidential] | B | Benjamin Estermann, Ye Wang |
FS 23 | BA-2023-01 | |||
![]() |
From Searchers to Proposers: User Behaviour in Ethereum’s Proposer-Builder Separation | B | Ye Wang, Robin Fritsch |
FS 23 | BA-2023-12 | |||
![]() |
Mel Spectrogram Inversion [confidential] | B | Luca Lanzendörfer | FS 23 | BA-2023-11 | |||
![]() |
Analyzing the Use and Potential of Transaction Access Lists in Ethereum [confidential] | S | Yann Vonlanthen, Quentin Kniep |
FS 23 | SA-2023-08 | |||
![]() |
Popularity for Approval Ballots [confidential] | B | Andrei Constantinescu | FS 23 | BA-2023-15 | |||
![]() |
SALSA-CLRS: A Sparse and Scalable Benchmark for Algorithmic Reasoning [confidential] | S | Florian Grötschla, Joël Mathys |
FS 23 | SA-2023-01 | |||
![]() |
Reinforcement Learning Benchmark for Logic Puzzles [confidential] | M | Luca Lanzendörfer, Benjamin Estermann |
FS 23 | MA-2023-01 | |||
![]() |
Reinforcement Learning of TSP Heuristics with Message Passing Neural Networks | G | Xiaofeng Flint Fan, Joël Mathys |
FS 23 |
, |
GA-2023-01 | ||
![]() |
Representation Learning for Reinforcement Learning [confidential] | B | Benjamin Estermann | FS 23 | BA-2023-10 | |||
![]() |
A Generalisation Benchmark for Machine Learning Methods Predicting Fluid Flows [confidential] | B | Florian Grötschla, Joël Mathys |
FS 23 | BA-2023-02 | |||
![]() |
Text-based Model on Voting Advice Application | S | Zhao Meng | FS 23 | SA-2023-10 | |||
![]() |
Efficient and Scalable Graph Generation by Spectrum Preserving Local Expansion [confidential] | M | Karolis Martinkus | FS 23 | MA-2023-05 | |||
![]() |
Swarm Intelligence Cup [confidential] | G | Benjamin Estermann, Florian Grötschla |
FS 23 | GA-2023-07 | |||
![]() |
Graph-based Metrics and Approaches for Sketch Generation [confidential] | M | Karolis Martinkus | FS 23 | MA-2023-07 | |||
![]() |
Distributed Setup for Trackmania Reinforcement Learning | G | Luca Lanzendörfer, Benjamin Estermann |
FS 23 | GA-2023-03 | |||
![]() |
Exploring Community Influence on DAOs [confidential] | B | Robin Fritsch, Ye Wang |
FS 23 | BA-2023-03 | |||
![]() |
Wikipedia Walker | B | Luca Lanzendörfer, Judith Beestermöller |
FS 23 | BA-2023-07 | |||
![]() |
Bitcoin Lightning Network Statistics and On-Chain Analysis [confidential] | B | Florian Grötschla, Lioba Heimbach |
HS 22 | BA-2022-39 | |||
![]() |
Analyzing the Solana Blockchain [confidential] | B | Quentin Kniep, Jakub Sliwinski |
HS 22 | BA-2022-33 | |||
![]() |
A Neural-Guided Program Synthesis Approach to the Abstraction and Reasoning Challenge [confidential] | G | Joël Mathys, Benjamin Estermann |
HS 22 | GA-2022-06 | |||
![]() |
Abstraction and Reasoning Challenge - Reasoning with Language [confidential] | G | Joël Mathys, Benjamin Estermann |
HS 22 |
, |
GA-2022-05 | ||
![]() |
Challenging Code Search Models through Semantic Attacks [confidential] | S | Peter Belcák, Florian Grötschla |
HS 22 | SA-2022-31 | |||
![]() |
Challenging the Lexical Focus of Code Search | S | Peter Belcák, Florian Grötschla |
HS 22 | SA-2022-29 | |||
![]() |
Canonical Identifier Naming on Code Search Models | G | Peter Belcák, Florian Grötschla |
HS 22 | GA-2022-07 | |||
![]() |
Contrastive Learning using SPECTRE for Generating Graph Augmentations | S | Karolis Martinkus, Zhao Meng |
HS 22 | SA-2022-43 | |||
![]() |
Cascaded BeamSearch: Plug-and-Play Terminology-Forcing For Neural Machine Translation [confidential] | S | Béni Egressy | HS 22 | SA-2022-21 | |||
![]() |
Dangers of Voting Advice Applications in Swiss Politics [confidential] | M | Judith Beestermöller, Yann Vonlanthen |
HS 22 | MA-2022-22 | |||
![]() |
Deep Learning Sensor Fusion Models in the domain of Electroencephalogram-based Eye Tracking [confidential] | M | Ard Kastrati | HS 22 | MA-2022-30 | |||
![]() |
Towards Multi-Hop Open-Domain Question Answering by Dense Retrieval | B | Zhao Meng | HS 22 | BA-2022-35 | |||
![]() |
Detecting DDoS Attacks on Ethereum Validators [confidential] | M | Lioba Heimbach | HS 22 | MA-2022-31 | |||
![]() |
Decentralized Federated Policy Gradient with Provably Fast Convergence and Byzantine Fault Tolerance [confidential] | S | Xiaofeng Flint Fan, Florian Grötschla |
HS 22 | SA-2022-33 | |||
![]() |
EEG - Eye Tracking: A Wavelet Packets Approach | S | Ard Kastrati | HS 22 | SA-2022-44 | |||
Fair Transaction Ordering [confidential] | M | Lioba Heimbach, Andrei Constantinescu |
HS 22 | MA-2022-26 | ||||
![]() |
Fast Internet Computer Consensus [confidential] | M | Jakub Sliwinski, Yann Vonlanthen |
HS 22 | MA-2022-23 | |||
![]() |
Efficient Graph Drawing with GNNs using Overlay Graphs [confidential] | B | Florian Grötschla, Joël Mathys |
HS 22 | BA-2022-38 | |||
![]() |
Graph Neural Networks for Financial Fraud Detection [confidential] | M | Béni Egressy | HS 22 | MA-2022-19 | |||
![]() |
Developing Interpretable Graph Neural Networks for High Dimensional Feature Spaces | B | Karolis Martinkus, Lukas Faber |
HS 22 | BA-2022-43 | |||
Incentivizing Simple Transactions [confidential] | S | Lioba Heimbach, Andrei Constantinescu |
HS 22 | SA-2022-36 | ||||
![]() |
Learning Representations for Integer Sequences [confidential] | S | Peter Belcák | HS 22 | SA-2022-28 | |||
![]() |
Investigating `Grokking` – Late Generalisation in Deep Learning | B | Peter Belcák | HS 22 | BA-2022-45 | |||
![]() |
Benchmarking The Algorithmic Reasoning Of Neural Models | B | Peter Belcák | HS 22 | BA-2022-42 | |||
![]() |
Node-level Prediction Tasks with Agent-based Graph Neural Networks | B | Karolis Martinkus | HS 22 | BA-2022-41 | |||
![]() |
On the Mental State Classification in the VSS Paradigm [confidential] | M | Ard Kastrati | HS 22 | MA-2022-29 | |||
![]() |
Organizational Roles for Low-Power Multi-Agent Systems [confidential] | M | Naomi Stricker | HS 22 | MA-2022-25 | |||
![]() |
Performing Better Trading Strategies in DeFi with the Help of Machine Learning [confidential] | S | Benjamin Estermann, Ye Wang |
HS 22 | SA-2022-35 | |||
![]() |
Exploring Trading on Decentralized Exchanges using Reinforcement Learning | M | Benjamin Estermann, Ye Wang |
HS 22 | MA-2022-28 | |||
![]() |
Understanding Peer-Discovery in ETH 2.0 | M | Lucianna Kiffer, Yann Vonlanthen |
HS 22 | MA-2022-32 | |||
![]() |
Predicting Future Events via Markets | S | Robin Fritsch, Quentin Kniep |
HS 22 | SA-2022-42 | |||
![]() |
Predicting Horizontal Direction of Eye Movement using Electroencephalography Data from EEGEyeNet’s Visual Symbol Search Dataset | S | Ard Kastrati | HS 22 | SA-2022-38 | |||
![]() |
Reinforcement Learning for the Jass AI [confidential] | S | Benjamin Estermann, Xiaofeng Flint Fan |
HS 22 | SA-2022-37 | |||
![]() |
Restricted Domains in Computational Social Choice [confidential] | M | Andrei Constantinescu | HS 22 | MA-2022-27 | |||
![]() |
Snapshot Processing Pipeline & Positioning Algorithm for a Non-recovered GNSS Receiver [confidential] | M | Peter Belcák | HS 22 | MA-2022-21 | |||
![]() |
Spectral Denoising Diffusion Probabilistic Models for Graphs [confidential] | S | Karolis Martinkus | HS 22 | SA-2022-27 | |||
![]() |
Stability in Seating Arrangements [confidential] | S | Andrei Constantinescu | HS 22 | SA-2022-32 | |||
![]() |
Topological Methods in Distributed Systems: Approximate Agreement in Various Input Spaces [confidential] | M | Diana Ghinea | HS 22 | MA-2022-33 | |||
![]() |
Towards Semi-Supervised Region-Learning for Electroencephalography Models | S | Ard Kastrati | HS 22 |
, Jieming Li, |
SA-2022-45 | ||
![]() |
Exploring Graph Neural Networks and Hierarchical Structures for Traffic Forecasting | B | Joël Mathys, Florian Grötschla |
HS 22 | BA-2022-44 | |||
![]() |
Measuring Cryptocurrency Networks | Internet Measurement | B | Lucianna Kiffer, Lioba Heimbach |
HS 22 | BA-2022-46 | ||
![]() |
Dynamic Scheduling of Harvesting-Based Gas Sensing [confidential] | S | Naomi Stricker, Yun Cheng |
FS 22 | SA-2022-14 | |||
![]() |
SSA Data Flow Information for Semantic Code Tasks | B | Peter Belcák, Florian Grötschla |
FS 22 | BA-2022-21 | |||
![]() |
Algorithm Learning on OEIS | B | Peter Belcák, Ard Kastrati |
FS 22 | BA-2022-17 | |||
![]() |
A Practical Study on Anomaly Detection for a Hydro-Power Plant [confidential] | M | Béni Egressy | FS 22 | MA-2022-14 | |||
![]() |
Implementation of Self-triggered Model Predictive Control with Energy Harvesting Sensors for Building Control [confidential] | S | Naomi Stricker | FS 22 | SA-2022-15 | |||
![]() |
Inconvenient Data Sets for Graph Neural Networks [confidential] | B | Béni Egressy, Florian Grötschla |
FS 22 | BA-2022-29 | |||
![]() |
Clustering Ethereum Addresses | S | Lioba Heimbach, Quentin Kniep |
FS 22 | SA-2022-11 | |||
![]() |
Code Search for Natural Querying [confidential] | B | Peter Belcák, Benjamin Estermann |
FS 22 | BA-2022-26 | |||
![]() |
Comparing Liquidity Pools of Decentralized Exchanges | B | Robin Fritsch | FS 22 | BA-2022-04 | |||
![]() |
Analysis of Protests in Nigeria using Social Media Data | M | Zhao Meng | FS 22 | MA-2022-03 | |||
![]() |
ConfSearch 2022 | B | Ye Wang | FS 22 | BA-2022-02 | |||
![]() |
Data Curation Mechanisms for Algorithm Learning | B | Peter Belcák, Benjamin Estermann |
FS 22 | BA-2022-27 | |||
![]() |
Data-driven Preprocessing of EEG Data | M | Ard Kastrati, Benjamin Estermann |
FS 22 | MA-2022-18 | |||
![]() |
Discrete Denoising Diffusion Probabilistic Models for Graphs [confidential] | B | Karolis Martinkus | FS 22 | BA-2022-20 | |||
![]() |
Understanding the Economies of Blockchain Games: An Empirical Analysis of Axie Infinity | B | Ye Wang | FS 22 | BA-2022-08 | |||
![]() |
Disentangling Representations of Graph Drawings [confidential] | B | Benjamin Estermann, Peter Belcák |
FS 22 | BA-2022-28 | |||
![]() |
Disentanglement for Reinforcement Learning | B | Benjamin Estermann | FS 22 | BA-2022-09 | |||
![]() |
DeepEye: Eye Tracking with Deep Learning | S | Ard Kastrati | FS 22 | SA-2022-22 | |||
![]() |
The Impact of General Data Protection Regulation on Social Media Research [confidential] | B | Ye Wang | FS 22 | BA-2022-01 | |||
![]() |
Exploring Game Engine Architecture and Building an Experimental Voxel Renderer with Rust and Vulkan | B | Quentin Kniep | FS 22 | BA-2022-34 | |||
![]() |
Vector-Quantized Generative Adversarial Networks for Graphs | M | Karolis Martinkus | FS 22 | MA-2022-11 | |||
![]() |
Unreasonable Effectiveness of Edge Features: Formalization and Applications of Edge Pre-coloring in Color Refinement [confidential] | S | Béni Egressy, Florian Grötschla |
FS 22 | SA-2022-18 | |||
![]() |
Hedging the Risks of Liquidity Providers | B | Lioba Heimbach, Robin Fritsch |
FS 22 | BA-2022-19 | |||
![]() |
Do Politicians Keep Their Election Campaign Position? [confidential] | M | Yann Vonlanthen | FS 22 | MA-2022-01 | |||
![]() |
Improving Multi-hop Retrieval with QA Generation [confidential] | M | Zhao Meng | FS 22 | MA-2022-08 | |||
![]() |
Discovering Graph Generation Algorithms [confidential] | M | Karolis Martinkus | FS 22 | MA-2022-12 | |||
![]() |
Algorithm Learning from Data | B | Peter Belcák, Florian Grötschla |
FS 22 | BA-2022-36 | |||
![]() |
Machine Learning vs. Swiss Politics | B | Yann Vonlanthen, Robin Fritsch |
FS 22 | BA-2022-05 | |||
![]() |
Improving Deep Learning-Powered Iterative Combinatorial Auctions [confidential] | B | Ye Wang, Benjamin Estermann |
FS 22 | BA-2022-22 | |||
![]() |
Arbitrage Opportunities on Decentralized Exchanges | B | Robin Fritsch, Lioba Heimbach |
FS 22 | BA-2022-03 | |||
![]() |
Benchmarking Graph Neural Network Models [confidential] | S | Béni Egressy, Florian Grötschla |
FS 22 | SA-2022-19 | |||
![]() |
More Democracy on the Blockchain [confidential] | B | Robin Fritsch, Yann Vonlanthen |
FS 22 | BA-2022-23 | |||
![]() |
Multi-Agent Systems on Ultra Low Power Platforms [confidential] | M | Naomi Stricker | FS 22 | MA-2022-17 | |||
![]() |
MMP: An Object-Oriented Multi-Machine Parser Generator | M | Peter Belcák | FS 22 | MA-2022-02 | |||
![]() |
CYK and Earley in Multi-Machine Parser Generator [confidential] | B | Peter Belcák | FS 22 | BA-2022-14 | |||
![]() |
Neural Grammatical Inference for Regular Grammars [confidential] | B | Peter Belcák | FS 22 | BA-2022-37 | |||
![]() |
On the Generalization of Saliency Models [confidential] | B | Ard Kastrati | FS 22 | BA-2022-30 | |||
Optimal Liquidity Pool Graphs [confidential] | M | Lioba Heimbach, Judith Beestermöller |
FS 22 | MA-2022-16 | ||||
![]() |
Optimizing Synchronous Networks for Harvesting-Based Operation [confidential] | S | Naomi Stricker, Reto Da Forno |
FS 22 | SA-2022-17 | |||
![]() |
Optimizing Swiss Politics [confidential] | B | Yann Vonlanthen, Judith Beestermöller |
FS 22 | BA-2022-07 | |||
![]() |
Analysis of Core Constraints and Core Selecting Payment Rules Breaking Non-Decreasing Property | S | Ye Wang, Robin Fritsch |
FS 22 | SA-2022-09 | |||
![]() |
Information Systems of People Who Use Drugs [confidential] | M | Ye Wang | FS 22 | MA-2022-15 | |||
![]() |
Pretrained Model for Understanding of Integer Sequences | B | Peter Belcák, Ard Kastrati |
FS 22 | BA-2022-16 | |||
![]() |
GitDAO - Blockchain Primitives for Trustless Open Source | M | Yann Vonlanthen | FS 22 | MA-2022-06 | |||
![]() |
Quantifying Effects of Design Decisions in VAE-based Unsupervised Disentanglement Learning [confidential] | B | Benjamin Estermann, Peter Belcák |
FS 22 | BA-2022-32 | |||
![]() |
Real Time Public Transport App | S | Joël Mathys | FS 22 | SA-2022-24 | |||
![]() |
Enabling new Applications for Control Systems with Energy Harvesting Sensors [confidential] | B | Naomi Stricker | FS 22 | BA-2022-24 | |||
![]() |
Replicating Liquidity Provision Strategies in Uniswap | B | Robin Fritsch | FS 22 | BA-2022-06 | |||
![]() |
Virtual Subnetworks for Energy Harvesting Systems [confidential] | M | Naomi Stricker, Reto Da Forno |
FS 22 | MA-2022-13 | |||
![]() |
What Can Neural Networks Learn? Set Functions [confidential] | B | Béni Egressy | FS 22 | BA-2022-31 | |||
![]() |
Simulating Liquidity Allocation in Decentralized Exchanges [confidential] | S | Robin Fritsch | FS 22 | SA-2022-03 | |||
![]() |
Taking an Electoral Photograph with Neural Networks | S | Andrei Constantinescu, Peter Belcák |
FS 22 | SA-2022-23 | |||
![]() |
Understanding Smart Contract Auditing in the DeFi Ecosystem [confidential] | B | Ye Wang | FS 22 | BA-2022-25 | |||
![]() |
What can Neural Networks learn? - Set Functions [confidential] | G | Béni Egressy | FS 22 |
, |
GA-2022-03 | ||
![]() |
Designing a Low-Power Autonomous Embedded System for Aircraft Collision Prevention | Embedded Systems | B | Peter Belcák | FS 22 | BA-2022-18 | ||
![]() |
Designing PACAS Pilot | Embedded Systems | B | Peter Belcák | FS 22 | BA-2022-15 | ||
![]() |
Agent-Based Simulation of Community Currencies with Basic Income | External Projects | S | Yann Vonlanthen | FS 22 | SA-2022-01 | ||
![]() |
Abstraction and Reasoning Challenge | B | Ard Kastrati | HS 21 | BA-2021-38 | |||
![]() |
Efficient Gas Sensing with a Harvesting-Based Platform [confidential] | S | Naomi Stricker, Yun Cheng |
HS 21 | SA-2021-50 | |||
![]() |
Agent-based Graph Neural Network [confidential] | S | Karolis Martinkus | HS 21 | SA-2021-41 | |||
![]() |
Deep Neural Network-based Voting Assistant | B | Zhao Meng | HS 21 | BA-2021-37 | |||
![]() |
Automated Formulaic Alpha Generation for Quantitative Investing using Evolutionary Algorithms | B | Zhao Meng | HS 21 | BA-2021-32 | |||
![]() |
Automated Exercise Generation [confidential] | M | Damian Pascual, Oliver Richter |
HS 21 | MA-2021-44 | |||
![]() |
Benchmarking Graph Neural Networks [confidential] | M | Béni Egressy, Ard Kastrati |
HS 21 | MA-2021-61 | |||
![]() |
Building an Application on ICP | B | Robin Fritsch | HS 21 | BA-2021-26 | |||
Selective Flooding Protocol for Harvesting-Based Networks [confidential] | S | Naomi Stricker, Reto Da Forno |
HS 21 | SA-2021-42 | ||||
![]() |
Applying Predictability Minimization onto Unsupervised Contrastive Representation Learning [confidential] | B | Béni Egressy | HS 21 | BA-2021-31 | |||
![]() |
Contrastive Learning for Programming Languages | B | Zhao Meng | HS 21 | BA-2021-25 | |||
![]() |
Deep Learning for Smartphone-based Cough Detection | M | Roger Wattenhofer | HS 21 | MA-2021-64 | |||
![]() |
Hierarchical Reinforcement Learning for Algorithmic Trading | S | Zhao Meng | HS 21 | SA-2021-48 | |||
![]() |
Democracy on the Blockchain | B | Robin Fritsch | HS 21 | BA-2021-28 | |||
![]() |
Distributed Asynchronous Policy (DAP) with RL [confidential] | M | Karolis Martinkus, Lukas Faber |
HS 21 | MA-2021-48 | |||
![]() |
CloudMLS: A Cloud-based E2EE scheme | M | Karolis Martinkus, Ard Kastrati |
HS 21 | MA-2021-53 | |||
![]() |
Interpretable Graph Neural Network [confidential] | M | Karolis Martinkus, Lukas Faber |
HS 21 | MA-2021-52 | |||
![]() |
Gauging Risk in Resource Optimizations on Stateful Packet-Processing Devices | M | Alexander Dietmüller | HS 21 | MA-2021-62 | |||
![]() |
Graph Pattern Mining In Code | B | Peter Belcák | HS 21 | BA-2021-35 | |||
![]() |
Harvesting-Based DPP for Indoor Environmental Monitoring [confidential] | S | Naomi Stricker, Reto Da Forno |
HS 21 | SA-2021-43 | |||
![]() |
Using Pattern Recognition and Imitation Learning to Improve the Jass AI [confidential] | S | Oliver Richter, Benjamin Estermann |
HS 21 | SA-2021-44 | |||
![]() |
Advancing Predictions for Video Streaming with Transformers | S | Alexander Dietmüller, Romain Jacob |
HS 21 | SA-2021-39 | |||
![]() |
Mining and Visualizing Ethereum [confidential] | B | Yann Vonlanthen, Lioba Heimbach |
HS 21 | BA-2021-33 | |||
![]() |
Networking Meets BFT - An Implementation of P4Auth [confidential] | B | Roland Schmid | HS 21 | BA-2021-20 | |||
![]() |
Using Affordances to Understand Fan-Idol Interaction on Social Media [confidential] | S | Ye Wang, Zhao Meng |
HS 21 | SA-2021-35 | |||
![]() |
PACKS: A Practical Abstraction for Programmable Packet Scheduling [confidential] | S | Alberto Gran Alcoz | HS 21 | SA-2021-36 | |||
![]() |
Collision Detection Algorithm for a Practical Airborne Collision Avoidance System | B | Peter Belcák | HS 21 | BA-2021-30 | |||
![]() |
Preprocessing of EEG Data for DL Models [confidential] | S | Ard Kastrati | HS 21 | SA-2021-49 | |||
![]() |
Scalability of Encointer - a Proof-Of-Personhood Cryptocurrency | M | Tejaswi Nadahalli | HS 21 | MA-2021-42 | |||
![]() |
Providing Liquidity in Uniswap V3 | B | Robin Fritsch | HS 21 | BA-2021-21 | |||
![]() |
Scaling Attention Using Binary Trees [confidential] | M | Karolis Martinkus | HS 21 | MA-2021-47 | |||
![]() |
Can Computer Understand Chinese Internet Slang? | S | Ye Wang, Zhao Meng |
HS 21 | SA-2021-34 | |||
Understanding PancakeSwap Through Data [confidential] | S | Lioba Heimbach, Ye Wang |
HS 21 | SA-2021-46 | ||||
![]() |
Understanding Reinforcement Learning with 6nimmt! | G | Béni Egressy | HS 21 |
, |
GA-2021-02 | ||
Understanding Uniswap V3 Through Data [confidential] | B | Lioba Heimbach, Ye Wang |
HS 21 | BA-2021-29 | ||||
![]() |
User Tailored Jass AI | S | Oliver Richter, Benjamin Estermann |
HS 21 | SA-2021-40 | |||
![]() |
Analysis of Convergence Processes in Internet Networks [confidential] | Systems Verification | M | Tibor Schneider, Roland Schmid |
HS 21 | MA-2021-51 | ||
![]() |
A Framework for Algorithmic Learning: How Does Complexity Arise in Evolution? | G | Ard Kastrati | FS 21 |
, |
GA-2021-01 | ||
![]() |
Title is confidential [confidential] | S | Patrick Jattke | FS 21 | SA-2021-04 | |||
![]() |
Operating System-Level Load Distribution for Network Telemetry Data Collection | M | Tobias Bühler, Laurent Vanbever |
FS 21 | MA-2021-02 | |||
![]() |
The Weak Snapshot Abstraction | B | Ye Wang | FS 21 | BA-2021-03 | |||
![]() |
Automated BGP Policy Analysis | S | Rüdiger Birkner, Rui Yang |
FS 21 | SA-2021-07 | |||
![]() |
OEIS Sequence Classification [confidential] | S | Ard Kastrati | FS 21 | SA-2021-32 | |||
![]() |
Beyond Left-Right Gaze Prediction with EEG Data [confidential] | B | Ard Kastrati, Damian Pascual |
FS 21 | BA-2021-13 | |||
![]() |
Bitcoin Privacy from Chain Analysis [confidential] | M | Tejaswi Nadahalli | FS 21 | MA-2021-45 | |||
![]() |
Title is confidential [confidential] | B | Finn de Ridder | FS 21 | BA-2021-11 | |||
![]() |
Budget Restricted Market Games with Continuous Spendings | B | Ye Wang, Yuyi Wang |
FS 21 | BA-2021-02 | |||
![]() |
Title is confidential [confidential] | B | Patrick Jattke | FS 21 | BA-2021-16 | |||
![]() |
Self-Supervised Contrastive Learning with Adversarial Perturbations for Robust Pretrained Language Models | M | Zhao Meng | FS 21 | MA-2021-38 | |||
![]() |
Improving Brain Decoding Methods and Evaluation | M | Béni Egressy, Damian Pascual |
FS 21 | MA-2021-09 | |||
![]() |
Reinforcement Learning for Blockchain-Based Trading | S | Ye Wang, Zhongnan Qu |
FS 21 | SA-2021-12 | |||
![]() |
A Batteryless Chemical Sensor [confidential] | S | Yun Cheng | FS 21 | SA-2021-24 | |||
![]() |
Distance Preserving Graph Embedding | B | Karolis Martinkus | FS 21 | BA-2021-17 | |||
![]() |
Evolutionary Methods for Sequences | B | Ard Kastrati | FS 21 | BA-2021-19 | |||
![]() |
Exploring Optimal Methods for Generating High-Precision Timestamps from Satellite Communication [confidential] | S | Vincent Lenders, Laurent Vanbever |
FS 21 | SA-2021-29 | |||
![]() |
Reliability Benefits of Upgrading Mobile Backhaul Networks from MPLS to SRv6 [confidential] | M | Coralie Busse-Grawitz, Laurent Vanbever |
FS 21 | MA-2021-43 | |||
![]() |
Title is confidential [confidential] | M | Finn de Ridder | FS 21 | MA-2021-05 | |||
![]() |
Graph Algorithms in Harsh Conditions | B | Diana Ghinea, Jakub Sliwinski |
FS 21 | BA-2021-34 | |||
![]() |
Graph Coloring with Deep Learning [confidential] | S | Karolis Martinkus | FS 21 | SA-2021-15 | |||
![]() |
Labeling Schemes for Reachability in Directed Graphs [confidential] | M | Robin Fritsch | FS 21 | MA-2021-07 | |||
![]() |
Enhancing Graph Neural Networks with Boosting | B | Lukas Faber, Karolis Martinkus |
FS 21 | BA-2021-22 | |||
![]() |
QPEP In the Real World [confidential] | M | Vincent Lenders, Roland Meier |
FS 21 | MA-2021-03 | |||
![]() |
Implementing Graph Algorithms for Dynamic Directories [confidential] | B | Robin Fritsch, Pál András Papp |
FS 21 | BA-2021-06 | |||
![]() |
Improving the Breathing-Phase Detection of an Interactive Breathing Training App [confidential] | S | Roger Wattenhofer | FS 21 | SA-2021-22 | |||
![]() |
In Search of Network Shifts | B | Alexander Dietmüller, Romain Jacob |
FS 21 | BA-2021-10 | |||
![]() |
Using Random Forest for Indoor Solar Energy Estimates on Embedded Systems | S | Naomi Stricker, Stefan Draskovic |
FS 21 | SA-2021-20 | |||
![]() |
Analytical Model for Indoor Solar Energy Harvesting | B | Naomi Stricker, Stefan Draskovic |
FS 21 | BA-2021-24 | |||
![]() |
Live Content Generation in Momentum-based Games | S | Oliver Richter | FS 21 | SA-2021-30 | |||
![]() |
RMCL : A Robust Multimodal Contrastive Learning Framework [confidential] | M | Zhao Meng | FS 21 | MA-2021-08 | |||
![]() |
KM-BART: Knowledge Enhanced Multimodal BART for Visual Commonsense Generation [confidential] | M | Zhao Meng | FS 21 | MA-2021-04 | |||
![]() |
NANOG Mailing List Analysis | S | Rüdiger Birkner, Alexander Dietmüller |
FS 21 | SA-2021-09 | |||
![]() |
Networking Meets BFT [confidential] | S | Roland Schmid | FS 21 | SA-2021-19 | |||
![]() |
Neural Distance Oracle for Road Graphs | B | Karolis Martinkus | FS 21 | BA-2021-08 | |||
![]() |
Analyzing and Preventing Sandwich Attacks in Ethereum | B | Tejaswi Nadahalli, Ye Wang |
FS 21 | BA-2021-07 | |||
![]() |
Optimal Trading and Arbitrage in a Network of Decentralized Exchanges [confidential] | B | Robin Fritsch, Lioba Heimbach |
FS 21 | BA-2021-05 | |||
![]() |
Quantifying TWAP Oracle Manipulation Attacks [confidential] | B | Tejaswi Nadahalli | FS 21 | BA-2021-27 | |||
![]() |
O4: A Higher-level Data-plane Programming Language [confidential] | M | Alberto Gran Alcoz, Coralie Busse-Grawitz |
FS 21 | MA-2021-40 | |||
![]() |
Preprocessing of EEG Data for Deep Learning Models [confidential] | S | Ard Kastrati, Damian Pascual |
FS 21 | SA-2021-38 | |||
![]() |
Reproduction and Behaviour of Local and Non-local Distribution | B | Yuyi Wang, Ye Wang |
FS 21 | BA-2021-01 | |||
![]() |
Region Based File Sharing | B | Robin Fritsch, Béni Egressy |
FS 21 | BA-2021-18 | |||
![]() |
Multi Agent Reinforcement Learning for Game Theory: Financial Graphs [confidential] | M | Béni Egressy, Pál András Papp |
FS 21 | MA-2021-41 | |||
![]() |
Understanding Permutations in Deep Neural Network [confidential] | S | Zhongnan Qu | FS 21 | SA-2021-26 | |||
![]() |
Stateful Tofino-based Traffic Generator [confidential] | M | Tobias Bühler | FS 21 | MA-2021-01 | |||
![]() |
Study About the Size and Quality of the EEG Dataset | S | Ard Kastrati, Damian Pascual |
FS 21 | SA-2021-37 | |||
![]() |
Title is confidential [confidential] | B | Kaveh Razavi | FS 21 | BA-2021-23 | |||
![]() |
Towards a Full Implementation of RPKI in the Mini-Internet | S | Thomas Holterbach, Tobias Bühler |
FS 21 | SA-2021-11 | |||
![]() |
Deploying a Mini-Internet Instance Across Multiple Servers | B | Thomas Holterbach, Tobias Bühler |
FS 21 | BA-2021-12 | |||
![]() |
BERT is Robust! A Case Against Synonym-Based Adversarial Examples in Text Classification | M | Zhao Meng, Damian Pascual |
FS 21 | MA-2021-06 | |||
![]() |
Website Fingerprinting in the Data Plane | S | Ege Cem Kirci, Roland Meier |
FS 21 | SA-2021-25 | |||
![]() |
Proving Ownership of Bitcoin-like UTXO’s Using a zk-SNARK Scheme | S | Tejaswi Nadahalli | FS 21 | SA-2021-02 | |||
![]() |
End to End Encryption in a Cloud-Based Messenger [confidential] | End-point Security | S | Ard Kastrati, Karolis Martinkus |
FS 21 | SA-2021-23 | ||
![]() |
Air Quality Map Prediction with Fine-grained Weather Data [confidential] | Environmental Sensing | S | Yun Cheng, Xiaoxi He |
FS 21 | SA-2021-17 | ||
![]() |
Route Convergence Optimization in the SWITCH Network | Internet Architecture | M | Tibor Schneider | FS 21 | MA-2021-39 | ||
![]() |
An Auto-grading Framework for the Mini-Internet Project | Network Coding | S | Thomas Holterbach, Laurent Vanbever |
FS 21 | SA-2021-13 | ||
![]() |
Process Mining for Networking | Network Monitoring | S | Romain Jacob | FS 21 | SA-2021-27 | ||
![]() |
Towards a New Framework for Integration of Network Planes | Software Defined Networking | S | Edgar Costa Molero | FS 21 | SA-2021-16 | ||
![]() |
Improving Current P4 Prototyping Tools | Software Defined Networking | S | Edgar Costa Molero | FS 21 | SA-2021-10 | ||
![]() |
Towards Robust Graph Contrastive Learning [confidential] | S | Lukas Faber, Zhao Meng |
HS 20 | SA-2020-61 | |||
![]() |
AI in Financial Markets | S | Ye Wang, Zhongnan Qu |
HS 20 | SA-2020-28 | |||
![]() |
Automated Exercise Coach [confidential] | S | Oliver Richter, Damian Pascual |
HS 20 | SA-2020-51 | |||
![]() |
Title is confidential [confidential] | B | Kaveh Razavi | HS 20 | BA-2020-48 | |||
![]() |
Make Your Own Internet - Setting up a Brand New P&S Project | G | Laurent Vanbever, Edgar Costa Molero |
HS 20 | GA-2020-03 | |||
![]() |
Exploring Blockchain Peer-to-Peer Networks | B | Ye Wang, Zeta Avarikioti |
HS 20 | BA-2020-46 | |||
![]() |
Classifying Medical Text using State-of-the-art Natural Language Processing Techniques | M | Damian Pascual | HS 20 | MA-2020-17 | |||
![]() |
Conditional Language Generation [confidential] | S | Damian Pascual, Béni Egressy |
HS 20 | SA-2020-65 | |||
![]() |
Control Theory Meets Programmable Data-Plane | S | Maria Apostolaki, Alexander Dietmüller |
HS 20 | SA-2020-55 | |||
![]() |
Web App Design for Cryptocurrency Transaction System | S | Ye Wang | HS 20 | SA-2020-33 | |||
![]() |
Server Design for Digital Payment System | S | Ye Wang | HS 20 | SA-2020-32 | |||
![]() |
Cryptomoney In Real Life | S | Ye Wang | HS 20 | SA-2020-31 | |||
![]() |
DAB+ Positioning | S | Simon Tanner, Damian Pascual |
HS 20 | SA-2020-58 | |||
![]() |
Variance Reduction in Decentralized Training over Heterogeneous Data | M | Roger Wattenhofer | HS 20 | MA-2020-32 | |||
![]() |
DyR-MLP: a Dynamic Routing MLP Model for Temporal Knowledge Graph [confidential] | M | Zhao Meng | HS 20 | MA-2020-34 | |||
![]() |
Deep Learning for Text Attribute Transfer on Auto Encoder Models | B | Zhao Meng, Damian Pascual |
HS 20 | BA-2020-45 | |||
![]() |
Event-centric Forecasting on Temporal Knowledge Graph with Transformer | S | Zhao Meng | HS 20 | SA-2020-67 | |||
![]() |
On Isotropy Calibration of Transformer Models [confidential] | M | Damian Pascual, Karolis Martinkus |
HS 20 | MA-2020-36 | |||
![]() |
Deep Sensor Calibration Method with Multi-Level Sequence Modeling [confidential] | S | Yun Cheng, Xiaoxi He |
HS 20 | SA-2020-57 | |||
![]() |
Developing a Jass AI Server | B | Oliver Richter | HS 20 | BA-2020-47 | |||
![]() |
Development of a Decentralised Communication Framework for an Online Tichu Game | S | Lukas Faber, Oliver Richter |
HS 20 | SA-2020-37 | |||
![]() |
Electromagnetic Tracking via Deep Learning [confidential] | M | Lothar Thiele | HS 20 | MA-2020-33 | |||
![]() |
Emoji for Natural Language Processing | M | Ye Wang, Zhao Meng |
HS 20 | MA-2020-31 | |||
![]() |
Evaluating Performance Limits of BFT Protocols [confidential] | S | Zeta Avarikioti, Roland Schmid |
HS 20 | SA-2020-30 | |||
![]() |
Cloud Causality Analyzer for Anomaly Detection [confidential] | M | Lothar Thiele | HS 20 | MA-2020-20 | |||
![]() |
Explaining and Visualizing Graph Neural Networks [confidential] | M | Lukas Faber | HS 20 | MA-2020-22 | |||
![]() |
Title is confidential [confidential] | S | Kaveh Razavi | HS 20 | SA-2020-54 | |||
![]() |
Generating Flashcards From Wikipedia Articles [confidential] | G | Damian Pascual, Oliver Richter |
HS 20 |
, |
GA-2020-02 | ||
![]() |
Graph Neural Networks in Finance | S | Lukas Faber, Béni Egressy |
HS 20 | SA-2020-69 | |||
![]() |
HomeDetective: Improved Area Subdivision and Support for Areas of Interest [confidential] | B | Simon Tanner | HS 20 | BA-2020-50 | |||
![]() |
Implementing the Resource Public Key Infrastructure (RPKI) in a Virtual Mini-Internet [confidential] | S | Tobias Bühler, Thomas Holterbach |
HS 20 | SA-2020-29 | |||
![]() |
Infection Spreading in Graphs | S | Pál András Papp, Béni Egressy |
HS 20 | SA-2020-60 | |||
![]() |
LTE Positioning [confidential] | S | Simon Tanner | HS 20 | SA-2020-70 | |||
![]() |
Multiagent Reinforcement Learning in Financial Networks | S | Lukas Faber, Pál András Papp |
HS 20 | SA-2020-68 | |||
![]() |
Normalized Attention Reinforcement Learning [confidential] | S | Oliver Richter, Damian Pascual |
HS 20 | SA-2020-36 | |||
![]() |
Collusion Resistance in Peer Grading | S | Jakub Sliwinski, Diana Ghinea |
HS 20 | SA-2020-64 | |||
![]() |
Strategyproof Cardinal Peer Grading | S | Jakub Sliwinski, Diana Ghinea |
HS 20 | SA-2020-66 | |||
![]() |
Predicting COVID-19 Spread from Large-Scale Mobility Data [confidential] | M | Roger Wattenhofer | HS 20 | MA-2020-37 | |||
![]() |
Prediction of Sleep Quality from Smartphone Sound Recordings | S | Roger Wattenhofer | HS 20 | SA-2020-59 | |||
![]() |
Receiving ADS-B Messages with Deep Learning using Past-Message Information [confidential] | M | Simon Tanner, Damian Pascual |
HS 20 | MA-2020-23 | |||
![]() |
A Rigid Origami Environment for Reinforcement Learning [confidential] | M | Oliver Richter, Karolis Martinkus |
HS 20 | MA-2020-35 | |||
![]() |
Transparent Field Device Management for Complex Cyber-Physical Industrial Automation Systems | S | Roger Wattenhofer | HS 20 | SA-2020-53 | |||
![]() |
Smart Vote [confidential] | B | Béni Egressy, Robin Fritsch |
HS 20 | BA-2020-49 | |||
![]() |
Snowcap: Synthesizing Network-Wide Configuration Updates [confidential] | M | Laurent Vanbever, Rüdiger Birkner |
HS 20 | MA-2020-19 | |||
![]() |
Plasticine: A Flexible Buffer Management Scheme for Data Center Networks [confidential] | M | Laurent Vanbever, Maria Apostolaki |
HS 20 | MA-2020-06 | |||
![]() |
Indoor WSN with On-Board PV Energy Harvesting - Making Sense of People Detection Data | Embedded Systems | S | Stefan Draskovic, Naomi Stricker |
HS 20 | SA-2020-52 | ||
![]() |
Primus Inter Pares No More: Increasing The Fault Tolerance of Wireless Sensor Networks [confidential] | Embedded Systems | M | Andreas Biri, Reto Da Forno |
HS 20 | MA-2020-18 | ||
![]() |
De-anonymizing Users of Cryptocurrencies | Peer-to-Peer Networks | S | Laurent Vanbever, Maria Apostolaki |
HS 20 | SA-2020-07 | ||
![]() |
Network Configuration Synthesis with Fuzzing [confidential] | S | Rüdiger Birkner, Coralie Busse-Grawitz |
FS 20 | SA-2020-23 | |||
![]() |
Ambient Noise Audio Communication [confidential] | S | Simon Tanner | FS 20 | SA-2020-04 | |||
![]() |
Anonymized Traffic Trace Collection in the Data Plane [confidential] | M | Tobias Bühler, Thomas Holterbach |
FS 20 | MA-2020-08 | |||
![]() |
Are You Human? | S | Tejaswi Nadahalli, Darya Melnyk |
FS 20 | SA-2020-24 | |||
![]() |
Asynchronous Consensus-Free Transaction Systems [confidential] | B | Roland Schmid, Jakub Sliwinski |
FS 20 | BA-2020-01 | |||
![]() |
Attribution Methods for Understanding and Visualizing Graph Neural Networks [confidential] | S | Lukas Faber | FS 20 | SA-2020-17 | |||
![]() |
Data Hiding in Speech Files and Data Compression of Cepstral Coefficients [confidential] | M | Simon Tanner | FS 20 | MA-2020-03 | |||
![]() |
BGP Verification without Specification | S | Rüdiger Birkner | FS 20 | SA-2020-21 | |||
![]() |
Bitcoin on Tendermint | S | Tejaswi Nadahalli | FS 20 | SA-2020-13 | |||
![]() |
Bubble-Tea Market Games [confidential] | S | Ye Wang, Yuyi Wang |
FS 20 | SA-2020-16 | |||
![]() |
Implementation and Simulation of the PermitBFT Algorithm [confidential] | S | Roland Schmid | FS 20 | SA-2020-18 | |||
![]() |
FnF-BFT: Exploring Performance Limits of BFT Protocols [confidential] | M | Roland Schmid, Zeta Avarikioti |
FS 20 | MA-2020-02 | |||
![]() |
Byzantine Reinforcement Learning | M | Darya Melnyk, Oliver Richter |
FS 20 | MA-2020-10 | |||
![]() |
How Faithful Are Current Vision Language Navigation Models: A Study on R2R and R4R Datasets | S | Zhao Meng | FS 20 | SA-2020-25 | |||
![]() |
Ensuring Transport Fairness with Smart Networks | S | Alexander Dietmüller, Maria Apostolaki |
FS 20 | SA-2020-26 | |||
![]() |
Consensus Number of Objects in Distributed Systems [confidential] | S | Ye Wang, Pankaj Khanchandani |
FS 20 | SA-2020-27 | |||
![]() |
Developing a Jass AI [confidential] | M | Oliver Richter | FS 20 | MA-2020-05 | |||
![]() |
Distributed Debugging for FlockLab 2 | S | Roman Trüb, Reto Da Forno |
FS 20 | SA-2020-05 | |||
![]() |
Value Convergence in Actor-Critic Reinforcement Learning [confidential] | S | Oliver Richter | FS 20 | SA-2020-22 | |||
![]() |
Brain2Word: Decoding Brain Activity for Language Generation | M | Damian Pascual, Béni Egressy |
FS 20 | MA-2020-11 | |||
![]() |
Extending NetComplete | M | Rüdiger Birkner, Coralie Busse-Grawitz |
FS 20 | MA-2020-13 | |||
![]() |
Traffic-Aware Compilation | S | Maria Apostolaki, Alexander Dietmüller |
FS 20 | SA-2020-15 | |||
![]() |
An Algorithm For Tree Evacuation [confidential] | B | Béni Egressy, Henri Devillez |
FS 20 | BA-2020-43 | |||
![]() |
High-speed Traffic Generation | S | Tobias Bühler | FS 20 | SA-2020-06 | |||
![]() |
HomeDetective: Advanced Features [confidential] | S | Simon Tanner | FS 20 | SA-2020-02 | |||
![]() |
Dynamic Taint Analysis on Android for ART and Native Code [confidential] | M | Simon Tanner | FS 20 | MA-2020-01 | |||
![]() |
Meta Congestion Control | S | Maria Apostolaki, Alexander Dietmüller |
FS 20 | SA-2020-14 | |||
![]() |
Mobile Resource Sharing [confidential] | B | Pankaj Khanchandani, Pál András Papp |
FS 20 | BA-2020-41 | |||
![]() |
Network Surveillance in an IoT Environment [confidential] | M | Simon Tanner | FS 20 | MA-2020-07 | |||
![]() |
Online Alpine Laboratory [confidential] | M | Matthias Meyer, Jan Beutel |
FS 20 | MA-2020-14 | |||
![]() |
Online Matching [confidential] | B | Yuyi Wang, Darya Melnyk |
FS 20 | BA-2020-36 | |||
![]() |
Over-bidding Strategies in Combinatorial Auctions | M | Ye Wang | FS 20 | MA-2020-15 | |||
![]() |
PTP Time Synchronization for FlockLab 2 | S | Roman Trüb, Reto Da Forno |
FS 20 | SA-2020-01 | |||
![]() |
Reinforcement Learning in Graph Theory [confidential] | B | Pankaj Khanchandani, Lukas Faber |
FS 20 | BA-2020-02 | |||
![]() |
Identifying and Using Task Relations in Multi-Task Reinforcement Learning [confidential] | M | Oliver Richter | FS 20 | MA-2020-09 | |||
![]() |
Emulations on Energy Harvesting Embedded Systems | S | Naomi Stricker, Stefan Draskovic |
FS 20 | SA-2020-11 | |||
![]() |
Using ElectionGuard for Secure Remote Voting on Untrusted Devices | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-37 | |||
![]() |
Secure E-Voting with ETHVote | M | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | MA-2020-12 | |||
![]() |
Adding Ranked Voting to Artemis and Implementing a Registrar [confidential] | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-42 | |||
![]() |
Artemis: Solving the Secure Platform Problem for the Helios E-Voting System [confidential] | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-34 | |||
![]() |
A Machine Learning Analysis of the Swiss Political Spectrum and Candidate Recommendation Process | G | Henri Devillez, Darya Melnyk |
FS 20 |
, , |
GA-2020-01 | ||
![]() |
SwitP: Mobile Application for Real-Time Swimming Analysis | S | Darya Melnyk, Simon Tanner |
FS 20 | SA-2020-09 | |||
![]() |
A Debatable Way to Gain Participation in Voting | B | Darya Melnyk, Pál András Papp |
FS 20 | BA-2020-35 | |||
![]() |
Tichu Bot | S | Lukas Faber, Zeta Avarikioti |
FS 20 | SA-2020-19 | |||
![]() |
Understanding and Visualizing Graph Neural Networks | S | Lukas Faber | FS 20 | SA-2020-20 | |||
![]() |
Visualizing BGP RIB Changes into Forwarding Plane by Leveraging BMP and IPFIX [confidential] | M | Tobias Bühler | FS 20 | MA-2020-16 | |||
![]() |
Graph Evacuation [confidential] | S | Béni Egressy | FS 20 | SA-2020-62 | |||
![]() |
Benchmarking Estimators of Harvestable Energy on a Low-Power System | Embedded Systems | S | Stefan Draskovic, Reto Da Forno |
FS 20 | SA-2020-10 | ||
![]() |
People Counting System Using Wireless Sensor Nodes | Embedded Systems | S | Stefan Draskovic, Andreas Biri |
FS 20 | SA-2020-03 | ||
![]() |
Evaluating and Defeating Network Flow Classifiers Through Adversarial Machine Learning [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
FS 20 | SA-2020-12 | ||
![]() |
Evaluation and Deployment of Resource-Constrained Machine Learning on Embedded Devices [confidential] | Performance Evaluation | M | Zhongnan Qu, Andreas Biri |
FS 20 | MA-2020-04 | ||
![]() |
A Framework for Collecting Data Traffic from Real Networks [confidential] | S | Thomas Holterbach, Tobias Bühler |
HS 19 | SA-2019-23 | |||
![]() |
Aircraft Positioning System: Reliable Data Storage & Website Revision [confidential] | B | Simon Tanner | HS 19 | BA-2019-36 | |||
![]() |
Anomaly Detection on High-Dimensional Time Series [confidential] | M | Lothar Thiele | HS 19 | MA-2019-25 | |||
![]() |
Asynchronous Consensus-Free Transaction Systems [confidential] | S | Roland Schmid, Jakub Sliwinski |
HS 19 | SA-2019-27 | |||
![]() |
Deep Reinforcement Learning Applied to Byzantine Agreement | S | Darya Melnyk, Oliver Richter |
HS 19 | SA-2019-22 | |||
![]() |
Rethinking Aircraft Localization - A Novel Likelihood Approach and a Combined Satellite and Aircraft Method [confidential] | M | Simon Tanner | HS 19 | MA-2019-23 | |||
![]() |
ConfSearch 2020 | B | Roland Schmid, Pankaj Khanchandani |
HS 19 | BA-2019-38 | |||
![]() |
Convenient Password Manager | B | Simon Tanner, Roland Schmid |
HS 19 | BA-2019-39 | |||
![]() |
Developing a Semi-Automated Framework to Label Network Traffic Datasets [confidential] | M | Roland Meier, Laurent Vanbever |
HS 19 | MA-2019-24 | |||
![]() |
Dynamic Directories using Reinforcement Learning [confidential] | M | Pankaj Khanchandani, Oliver Richter |
HS 19 | MA-2019-20 | |||
![]() |
Exploration of Neural Architectures for Generation of Synthetic Epileptic Seizures [confidential] | S | Damian Pascual | HS 19 | SA-2019-26 | |||
![]() |
Fast Route Finding | S | Aryaz Eghbali | HS 19 | SA-2019-20 | |||
![]() |
HomeDetective: UX Study and Development [confidential] | S | Simon Tanner | HS 19 | SA-2019-19 | |||
![]() |
Hyperloop Network Design | G | Roland Schmid | HS 19 |
, |
GA-2019-01 | ||
![]() |
Two-Choice Consensus Dynamics with Rankings [confidential] | B | Darya Melnyk, Yuyi Wang |
HS 19 | BA-2019-33 | |||
![]() |
Improving Performance with Network-aware Scheduling Algorithms | S | Alberto Gran Alcoz, Alexander Dietmüller |
HS 19 | SA-2019-24 | |||
![]() |
Investigating Reinforcement Learning Algorithms [confidential] | S | Oliver Richter, Damian Pascual |
HS 19 | SA-2019-25 | |||
![]() |
Investigating Transformers [confidential] | M | Gino Brunner, Damian Pascual |
HS 19 | MA-2019-29 | |||
![]() |
Developing a Jass AI Platform [confidential] | G | Oliver Richter | HS 19 |
, |
GA-2019-03 | ||
![]() |
Learning Tumors from OCT Imagery with Generative Deep Learning Models | B | Lothar Thiele | HS 19 | BA-2019-37 | |||
![]() |
Time Synchronization For Linear Motors [confidential] | S | Simon Tanner | HS 19 | SA-2019-29 | |||
![]() |
Music Medley Generation [confidential] | G | Damian Pascual, Lukas Faber |
HS 19 |
, |
GA-2019-04 | ||
![]() |
Network Behavior Monitoring in the Data Plane [confidential] | S | Roland Meier | HS 19 | SA-2019-28 | |||
![]() |
Scalable Byzantine Agreement with Epoch-Adaptive Adversaries [confidential] | M | Zeta Avarikioti, Roland Schmid |
HS 19 | MA-2019-26 | |||
![]() |
Visual Analysis and Comparison of Seismic Events | S | Matthias Meyer, Andreas Biri |
HS 19 | SA-2019-18 | |||
![]() |
Event-triggered Multi-hop Communication for Wireless Sensor Networks | Ad-hoc-Networks | M | Andreas Biri | HS 19 | MA-2019-28 | ||
![]() |
Multi-sensor Wireless Sensor Network Nodes for Alpine Environment Monitoring | Environmental Sensing | S | Andreas Biri, Jan Beutel |
HS 19 | SA-2019-17 | ||
![]() |
Network Visualization for the Routing Project | Network Monitoring | G | Alexander Dietmüller | HS 19 |
, , |
GA-2019-02 | |
![]() |
On Combining SWIFT and Blink to Improve Internet Convergence [confidential] | Network Monitoring | M | Laurent Vanbever, Thomas Holterbach |
HS 19 | MA-2019-22 | ||
![]() |
Mass Surveillance of VoIP Calls Does Not Require a Nation-state Budget [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
HS 19 | MA-2019-30 | ||
![]() |
Self-protecting Networks from IoT-based Attacks [confidential] | Network Security | M | Alberto Gran Alcoz, Roland Meier |
HS 19 | MA-2019-27 | ||
![]() |
Pushing the Internet to the Edge | Wireless Mesh Networks | M | Andreas Biri, Romain Jacob |
HS 19 | MA-2019-21 | ||
![]() |
A Test Framework to Verify End Point Implementations [confidential] | S | Tobias Bühler | FS 19 | SA-2019-06 | |||
![]() |
Accurate Aircraft Positioning [confidential] | M | Simon Tanner, Manuel Eichelberger |
FS 19 | MA-2019-16 | |||
![]() |
Advanced Housing Search [confidential] | S | Simon Tanner | FS 19 | SA-2019-12 | |||
![]() |
Improving Robustness of an Aircraft Signal Positioning System [confidential] | B | Simon Tanner, Manuel Eichelberger |
FS 19 | BA-2019-07 | |||
![]() |
Aircraft Signal Fingerprinting [confidential] | M | Simon Tanner | FS 19 | MA-2019-12 | |||
![]() |
Soteroid: Android Runtime Application Self-Protection (RASP) Against Repackaging [confidential] | M | Simon Tanner | FS 19 | MA-2019-11 | |||
![]() |
Attentive Multi-tasking [confidential] | B | Oliver Richter, Gino Brunner |
FS 19 | BA-2019-04 | |||
![]() |
Deep Monaural Music Source Separation [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-11 | |||
![]() |
Automatic Generation of Adversarial Workload for Programmable Switches [confidential] | S | Edgar Costa Molero, Roland Meier |
FS 19 | SA-2019-05 | |||
![]() |
Benchmarking of Distributed Ledger Technology | B | Roger Wattenhofer | FS 19 | BA-2019-32 | |||
![]() |
EEG Data Generation with Generative Adversarial Networks [confidential] | B | Damian Pascual | FS 19 | BA-2019-30 | |||
![]() |
Network Creation Game on Blockchain Payment Channels | S | Zeta Avarikioti, Yuyi Wang |
FS 19 | SA-2019-15 | |||
![]() |
Evaluation of Network Connection Strategies in Cryptocurrencies [confidential] | B | Zeta Avarikioti, Yuyi Wang |
FS 19 | BA-2019-06 | |||
![]() |
The k-Server Problem with Delay [confidential] | B | Yuyi Wang, Darya Melnyk |
FS 19 | BA-2019-03 | |||
![]() |
PolyPass - A Convenient Password Manager | M | Simon Tanner, Roland Schmid |
FS 19 | MA-2019-04 | |||
![]() |
Privacy-Preserving Smart Contracts for Industrial Services | M | Roger Wattenhofer | FS 19 | MA-2019-18 | |||
![]() |
FlockLab 2.0: Hardware Design | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-10 | |||
![]() |
FlockLab 2.0: Linux Platform | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-09 | |||
![]() |
Flower Mapping in Grasslands with Drones and Deep Learning | M | Roger Wattenhofer | FS 19 | MA-2019-06 | |||
![]() |
Frequency Spectrum Monitoring for FlockLab | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-08 | |||
![]() |
The Future of Jobs [confidential] | B | Aryaz Eghbali | FS 19 | BA-2019-05 | |||
![]() |
Generalizing Audio Source Separation [confidential] | M | Oliver Richter, Gino Brunner |
FS 19 | MA-2019-07 | |||
![]() |
Robustness In Reinforcement Learning [confidential] | M | Gino Brunner, Oliver Richter |
FS 19 | MA-2019-05 | |||
![]() |
High speed NAT64 with P4 | M | Tobias Bühler | FS 19 | MA-2019-19 | |||
![]() |
Hyperloop Pod Scheduling [confidential] | M | Manuel Eichelberger, Roland Schmid |
FS 19 | MA-2019-02 | |||
![]() |
Imperceptible Audio Communication App [confidential] | B | Simon Tanner, Manuel Eichelberger |
FS 19 | BA-2019-01 | |||
![]() |
Deep Transformer Models in Natural Language Processing [confidential] | M | Gino Brunner, Oliver Richter |
FS 19 | MA-2019-08 | |||
![]() |
Mode-S Physical Layer Deep Learning [confidential] | M | Simon Tanner, Damian Pascual |
FS 19 | MA-2019-15 | |||
![]() |
Analysis and Modeling of Urban Shared-Mobility Systems through Data Mining | M | Manuel Eichelberger, Roland Schmid |
FS 19 | MA-2019-03 | |||
![]() |
Music Genre Transfer [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-03 | |||
![]() |
Music Genre Transfer with Deep Learning [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-14 | |||
![]() |
Network Virtualization - Creating Arbitrary Networks with one Click [confidential] | S | Tobias Bühler, Thomas Holterbach |
FS 19 | SA-2019-07 | |||
![]() |
Online Graph Coloring [confidential] | B | Darya Melnyk, Pál András Papp |
FS 19 | BA-2019-29 | |||
![]() |
P4-Programming on an FPGA [confidential] | S | Tobias Bühler | FS 19 | SA-2019-02 | |||
![]() |
Peer Grading and Byzantine Sorting [confidential] | B | Darya Melnyk, Jakub Sliwinski |
FS 19 | BA-2019-40 | |||
![]() |
Arvy Heuristics for Distributed Mutual Exclusion | B | Pankaj Khanchandani, Pál András Papp |
FS 19 | BA-2019-31 | |||
![]() |
Swimming Activity Recognition with Smartwatches and Deep Learning [confidential] | M | Gino Brunner, Darya Melnyk |
FS 19 | MA-2019-17 | |||
![]() |
Seismic Event Detection using MEMS Accelerometers | S | Andreas Biri, Jan Beutel |
FS 19 | SA-2019-13 | |||
![]() |
Detecting Ambient Vibration Patterns using Multiple Sensors [confidential] | Embedded Systems | S | Jan Beutel, Matthias Meyer |
FS 19 | SA-2019-16 | ||
![]() |
Truth be told: Benchmarking BLE and IEEE 802.15.4 | Embedded Systems | M | Romain Jacob, Reto Da Forno |
FS 19 | MA-2019-10 | ||
![]() |
On Making Blink Deployable in Practice [confidential] | Internet Architecture | M | Thomas Holterbach | FS 19 | MA-2019-09 | ||
![]() |
Developing a Dataset with Coordinated Network Attacks [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
FS 19 | MA-2019-13 | ||
![]() |
Network Performance Obfuscation [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
FS 19 | SA-2019-04 | ||
![]() |
Traffic-analysis Attacks over Encrypted HTTP [confidential] | Network Security | M | Alberto Gran Alcoz, Roland Meier |
FS 19 | MA-2019-14 | ||
![]() |
Aircraft Signal Antispoofing [confidential] | S | Manuel Eichelberger, Simon Tanner |
HS 18 | SA-2018-38 | |||
![]() |
Automatic BGP Configuration Analysis [confidential] | S | Rüdiger Birkner, Laurent Vanbever |
HS 18 | SA-2018-43 | |||
![]() |
Micropayment Channels Game | M | Zeta Avarikioti | HS 18 | MA-2018-33 | |||
![]() |
The k-Server Problem with Delay on the Uniform Metric [confidential] | B | Yuyi Wang, Darya Melnyk |
HS 18 | BA-2018-17 | |||
![]() |
Creative Robot Composer | S | Manuel Eichelberger | HS 18 | SA-2018-39 | |||
![]() |
Deep Preference Learning for Advanced Home Search [confidential] | S | Oliver Richter, Simon Tanner |
HS 18 | SA-2018-44 | |||
![]() |
Democracy in Deep Reinforcement Learning [confidential] | S | Oliver Richter, Gino Brunner |
HS 18 | SA-2018-49 | |||
![]() |
Efficient Train Scheduling [confidential] | S | Manuel Eichelberger | HS 18 | SA-2018-37 | |||
![]() |
Exploring Centralized Payment Network Topology | S | Zeta Avarikioti, Tejaswi Nadahalli |
HS 18 | SA-2018-34 | |||
![]() |
Exploring Datacenter Topology Structures For Low Overhead Active Monitoring [confidential] | M | Laurent Vanbever | HS 18 | MA-2018-35 | |||
![]() |
GPS Tracking over LTE [confidential] | S | Manuel Eichelberger | HS 18 | SA-2018-27 | |||
![]() |
Coloring with Conflicts [confidential] | B | Pál András Papp, Roland Schmid |
HS 18 | BA-2018-24 | |||
![]() |
HomeDetective: Housing Ad Incorporation and Performance Optimization [confidential] | B | Simon Tanner, Gino Brunner |
HS 18 | BA-2018-25 | |||
![]() |
Hyperloop Network Design | M | Manuel Eichelberger, Roland Schmid |
HS 18 | MA-2018-27 | |||
![]() |
In-Network Inference with Random Forests [confidential] | M | Roland Meier, Laurent Vanbever |
HS 18 | MA-2018-30 | |||
![]() |
Low-power Network Design: Work Hard, Play Hard | S | Romain Jacob, Reto Da Forno |
HS 18 | SA-2018-50 | |||
![]() |
LWB with Long-Range Modulation | M | Jan Beutel, Roman Trüb |
HS 18 | MA-2018-29 | |||
![]() |
Prediction Models for Indoor Solar Energy Harvesting | S | Stefan Draskovic, Lukas Sigrist |
HS 18 | SA-2018-42 | |||
![]() |
Multi-path Routing | S | Maria Apostolaki, Laurent Vanbever |
HS 18 | SA-2018-41 | |||
![]() |
On-Device Classification for the Geophone Dual Processor Platform | S | Matthias Meyer, Jan Beutel |
HS 18 | SA-2018-35 | |||
![]() |
Online Algorithmic Channel Design [confidential] | B | Zeta Avarikioti, Yuyi Wang |
HS 18 | BA-2018-27 | |||
![]() |
Hat Hunters Online | B | Manuel Eichelberger | HS 18 | BA-2018-22 | |||
![]() |
Meta-Learning an Image Editing Style | B | Oliver Richter, Gino Brunner |
HS 18 | BA-2018-23 | |||
![]() |
Reinforcement Learning in Graph Theory [confidential] | M | Yuyi Wang, Pankaj Khanchandani |
HS 18 | MA-2018-25 | |||
![]() |
Reliable ADS-B Signal Reception [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-16 | |||
![]() |
Reliable ADS-B Signal Reception [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-28 | |||
![]() |
Restaurant Swiper | B | Roland Schmid, Simon Tanner |
HS 18 | BA-2018-18 | |||
![]() |
Self-Sovereign Identities in Cardossier | M | Roger Wattenhofer, Remo Meier |
HS 18 | MA-2018-34 | |||
![]() |
Simulating Bitcoins Network Topology | S | Zeta Avarikioti, Roland Schmid |
HS 18 | SA-2018-32 | |||
![]() |
Smartphone Aircraft Localization [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-21 | |||
![]() |
Student Democracy with Blockchain | B | Darya Melnyk, Tejaswi Nadahalli |
HS 18 | BA-2018-20 | |||
![]() |
ETHVote - A Distributed E-Voting Application [confidential] | M | Darya Melnyk, Tejaswi Nadahalli |
HS 18 | MA-2018-31 | |||
![]() |
Style Change Detection | B | Roland Schmid, Gino Brunner |
HS 18 | BA-2018-19 | |||
![]() |
TotTernary: A Wearable Platform for Social Interaction Tracking | M | Lothar Thiele | HS 18 | MA-2018-36 | |||
![]() |
Last Mile Urban Drone Delivery to Mobile Outdoor Clients | S | Gino Brunner, Simon Tanner |
HS 18 | SA-2018-47 | |||
![]() |
Is Low-power Wireless Networking a Reproducible Science? | Embedded Systems | S | Romain Jacob | HS 18 | SA-2018-40 | ||
![]() |
Low-Power Network Design: Work Hard, Play Hard - Data Collection | Embedded Systems | S | Romain Jacob, Reto Da Forno |
HS 18 | SA-2018-31 | ||
![]() |
A Communication Policy for Transient Sensor Nodes [confidential] | Embedded Systems | M | Lukas Sigrist, Rehan Ahmed |
HS 18 | MA-2018-32 | ||
![]() |
Design of a Low-Cost Sensor Calibration Testbed | Environmental Sensing | S | Balz Maag | HS 18 | SA-2018-30 | ||
![]() |
Dynamic Visualization of Geophysical Data | Environmental Sensing | S | Matthias Meyer, Samuel Weber |
HS 18 | SA-2018-36 | ||
![]() |
Automatization of Internet Path Transparency Measurements | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
HS 18 | SA-2018-28 | ||
![]() |
Representation of Internet Path Transparency | Internet Measurement | S | Mirja Kühlewind, Brian Trammell |
HS 18 | SA-2018-25 | ||
![]() |
Towards Task Inference on Mobile Systems based on Thermal Traces [confidential] | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
HS 18 | SA-2018-48 | ||
![]() |
How Bad Are Data Leaks Really? [confidential] | Multicore Architecture | M | Philipp Miedl | HS 18 | MA-2018-28 | ||
![]() |
Monitoring and Controlling Network Reconnaissance using Programmable Networks [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 18 | SA-2018-45 | ||
![]() |
AtDEPH: Anonymity Through Data-Plane Encryption of Packet Headers [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 18 | SA-2018-33 | ||
![]() |
Securing Data-plane Driven Fast-reroute Systems | Network Security | S | Thomas Holterbach | HS 18 | SA-2018-46 | ||
![]() |
3G Datalink for Wireless GPS Sensors | S | Jan Beutel, Tonio Gsell |
FS 18 | SA-2018-10 | |||
![]() |
A Framework for Energy-Aware Scheduling | S | Stefan Draskovic, Rehan Ahmed |
FS 18 | SA-2018-02 | |||
![]() |
Adaptive Hierarchical Deep Reinforcement Learning [confidential] | M | Oliver Richter, Gino Brunner |
FS 18 | MA-2018-05 | |||
![]() |
Advanced Aircraft Positioning [confidential] | S | Manuel Eichelberger, Simon Tanner |
FS 18 | SA-2018-06 | |||
![]() |
HomeDetective++ Enhancements in Functionality and User Experience [confidential] | S | Simon Tanner | FS 18 |
, , |
SA-2018-22 | ||
![]() |
Analytics System for Internet Security Dataset [confidential] | M | Laurent Vanbever | FS 18 | MA-2018-21 | |||
![]() |
Robust Android App Repackaging Protection Using Native Code [confidential] | B | Simon Tanner | FS 18 | BA-2018-08 | |||
![]() |
Attractive Sports Route Generation | S | Manuel Eichelberger | FS 18 | SA-2018-04 | |||
![]() |
NOCUST - A Non-Custodial 2nd-Layer Blockchain Payment Hub | M | Roger Wattenhofer | FS 18 | Rami Khalil | MA-2018-24 | ||
![]() |
Bitcoin Security under Temporary Dishonest Majority | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-09 | |||
![]() |
Chord Analysis App | B | Manuel Eichelberger | FS 18 | BA-2018-14 | |||
![]() |
Contention Management [confidential] | S | Pankaj Khanchandani | FS 18 | SA-2018-07 | |||
![]() |
Data-Driven Performance Correlation | S | Maria Apostolaki | FS 18 | SA-2018-16 | |||
![]() |
Deep Learning for Natural Language Processing (NLP) using Variational Autoencoders (VAE) | M | Gino Brunner, Oliver Richter |
FS 18 | MA-2018-22 | |||
![]() |
Design of a Payment Network with Fees | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-06 | |||
![]() |
Developing a Capsule Network [confidential] | S | Oliver Richter, Gino Brunner |
FS 18 | SA-2018-19 | |||
![]() |
The Urban Last Mile Problem: Autonomous Drone Delivery to Your Balcony [confidential] | M | Gino Brunner, Simon Tanner |
FS 18 | MA-2018-06 | |||
![]() |
E-Voting Under the Hood [confidential] | S | Darya Melnyk, Julian Steger |
FS 18 | SA-2018-24 | |||
![]() |
Efficient Load Balancing [confidential] | S | Pankaj Khanchandani | FS 18 | SA-2018-08 | |||
![]() |
Exploration-Exploitation Trade-off in Deep Reinforcement Learning | B | Oliver Richter, Gino Brunner |
FS 18 | BA-2018-15 | |||
![]() |
LORA-based Data Collection on DPP | S | Jan Beutel, Roman Trüb |
FS 18 | SA-2018-26 | |||
![]() |
Music Style Translation based on CycleGAN [confidential] | S | Gino Brunner, Yuyi Wang |
FS 18 | SA-2018-20 | |||
![]() |
GPS Spoofing [confidential] | M | Manuel Eichelberger | FS 18 | MA-2018-17 | |||
![]() |
Grigori: Does the network work as I expected? | S | Ahmed Elhassany | FS 18 | SA-2018-11 | |||
![]() |
Mercenary Space Battle | B | Manuel Eichelberger | FS 18 | BA-2018-01 | |||
![]() |
Hat Hunters | B | Manuel Eichelberger | FS 18 | BA-2018-02 | |||
![]() |
High Dimensional Clustering | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-13 | |||
![]() |
Hip Hop Robot | S | Manuel Eichelberger | FS 18 | SA-2018-23 | |||
![]() |
Imperceptible Audio Communication [confidential] | M | Simon Tanner, Manuel Eichelberger |
FS 18 | MA-2018-12 | |||
![]() |
Generalized Metrics in Online Matching [confidential] | G | Yuyi Wang, Darya Melnyk |
FS 18 |
, |
GA-2018-01 | ||
![]() |
Structure and Content of the Visible Darknet [confidential] | B | Zeta Avarikioti | FS 18 | BA-2018-05 | |||
![]() |
Mobile Smartphone Speed Test | B | Gino Brunner, Simon Tanner |
FS 18 | BA-2018-11 | |||
![]() |
Net2Text Over Time [confidential] | M | Rüdiger Birkner | FS 18 | MA-2018-07 | |||
![]() |
Network Monitoring and Attack Detection [confidential] | M | Roland Meier, Vincent Lenders |
FS 18 | MA-2018-02 | |||
![]() |
On the Advice Complexity for Min-cost Perfect Matching and the K-Server Problem with Delays [confidential] | G | Yuyi Wang, Darya Melnyk |
FS 18 |
, |
GA-2018-02 | ||
![]() |
One Intelligent Agent to Rule Them All | B | Manuel Eichelberger | FS 18 | BA-2018-04 | |||
![]() |
Lower Bounds on Local Distributed Deterministic Coloring Algorithms [confidential] | S | Darya Melnyk, Pál András Papp |
FS 18 | SA-2018-14 | |||
![]() |
Randomized Algorithms for Online Matching with Delay for Two Sources [confidential] | M | Yuyi Wang, Darya Melnyk |
FS 18 | MA-2018-23 | |||
![]() |
Protecting Blockchain Applications with Programmable Networks [confidential] | S | Maria Apostolaki | FS 18 | SA-2018-15 | |||
![]() |
Radio Signal Fingerprinting [confidential] | S | Simon Tanner | FS 18 | SA-2018-05 | |||
![]() |
ResNet Autoencoder for Monaural Music Source Separation [confidential] | M | Gino Brunner, Oliver Richter |
FS 18 | MA-2018-04 | |||
![]() |
Creative Robot Composer | B | Manuel Eichelberger | FS 18 | BA-2018-10 | |||
![]() |
Robust Scaling of Blockchain Protocols [confidential] | M | Zeta Avarikioti, Yuyi Wang |
FS 18 | MA-2018-16 | |||
![]() |
Drone Precision Landing using Computer Vision | S | Simon Tanner, Manuel Eichelberger |
FS 18 | SA-2018-21 | |||
![]() |
Seamless Drone Replacement | S | Manuel Eichelberger, Simon Tanner |
FS 18 | SA-2018-29 | |||
![]() |
Smart Conference Call [confidential] | M | Simon Tanner | FS 18 | MA-2018-11 | |||
![]() |
Swimming Style Recognition and Lane Counting Using a Smartwatch [confidential] | M | Darya Melnyk, Gino Brunner |
FS 18 | MA-2018-18 | |||
![]() |
Sport Analysis using Smartwatches [confidential] | M | Gino Brunner, Simon Tanner |
FS 18 | MA-2018-19 | |||
![]() |
Teaching Machines Curiosity [confidential] | S | Oliver Richter, Gino Brunner |
FS 18 | SA-2018-03 | |||
![]() |
Transferring Knowledge Between Games [confidential] | M | Oliver Richter, Gino Brunner |
FS 18 | MA-2018-10 | |||
![]() |
Transient Bluetooth Low Energy Node [confidential] | S | Lukas Sigrist, Andres Gomez |
FS 18 | SA-2018-18 | |||
![]() |
Unobtrusive Android Audio Synchronization [confidential] | B | Simon Tanner | FS 18 | BA-2018-03 | |||
![]() |
Towards Usable Off-Chain Payments | M | Roger Wattenhofer | FS 18 | Guillaume Felley | MA-2018-20 | ||
![]() |
Undercover Construction: A Multiplayer Game with Hidden Aspects | S | Manuel Eichelberger | FS 18 | SA-2018-12 | |||
![]() |
Dynamic Range Low-power Wireless Protocols for Environmental Monitoring | Embedded Systems | M | Romain Jacob, Jan Beutel |
FS 18 | MA-2018-01 | ||
![]() |
Feature Extraction from Thermal Traces for the Thermal Fingerprinting Attack [confidential] | Embedded Systems | S | Philipp Miedl, Rehan Ahmed |
FS 18 | SA-2018-01 | ||
![]() |
Reliable 3rd Generation Data Collection | Embedded Systems | M | Jan Beutel, Roman Trüb |
FS 18 | MA-2018-08 | ||
![]() |
Urban Air Pollution Inference: A Neural Network Ensemble Approach | Environmental Sensing | M | Balz Maag, Zimu Zhou |
FS 18 | MA-2018-03 | ||
![]() |
Come again? Towards repeatable security experiments [confidential] | Multicore Architecture | S | Philipp Miedl | FS 18 | SA-2018-13 | ||
![]() |
You also want to explore other security leaks? Building an easily extendable application library for security leak research. [confidential] | Multicore Architecture | S | Philipp Miedl | FS 18 | SA-2018-17 | ||
![]() |
Next-Generation Monitoring Using Programmable Network Devices [confidential] | Network Monitoring | M | Tobias Bühler | FS 18 | MA-2018-09 | ||
![]() |
Traffix Matrix Obfuscation [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
FS 18 | MA-2018-15 | ||
![]() |
On Offloading Control Plane Applications to the Data Plane [confidential] | Software Defined Networking | M | Edgar Costa Molero | FS 18 | MA-2018-14 | ||
![]() |
Accurate Aircraft Positioning [confidential] | S | Manuel Eichelberger, Simon Tanner |
HS 17 | SA-2017-88 | |||
![]() |
Aircraft Positioning Service [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 17 | BA-2017-30 | |||
![]() |
Enhancement of System Design and User Experience in HomeDetective [confidential] | B | Gino Brunner, Simon Tanner |
HS 17 | BA-2017-37 | |||
![]() |
Android Audio Synchronization [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-35 | |||
![]() |
Finding Sources and Sinks in Android by Observation of System Calls [confidential] | S | Simon Tanner, Gino Brunner |
HS 17 | SA-2017-93 | |||
![]() |
Anonymous and Transparent E-Voting System | B | Conrad Burchert | HS 17 | BA-2017-40 | |||
![]() |
On the Benefits of Making your Clients Wait [confidential] | B | Yuyi Wang, Darya Melnyk |
HS 17 | BA-2017-34 | |||
![]() |
NoKey - A Distributed Password Manager | M | Gino Brunner, Simon Tanner |
HS 17 | MA-2017-24 | |||
![]() |
Fine-grained Image Classification of Dog Breeds [confidential] | S | Gino Brunner, Yuyi Wang |
HS 17 | SA-2017-97 | |||
![]() |
DCF77 Based Long-Term Timer | S | Roman Trüb | HS 17 | SA-2017-96 | |||
![]() |
Event-based Geophone Platform with Co-detection | M | Jan Beutel, Matthias Meyer |
HS 17 | MA-2017-25 | |||
![]() |
Implementation of an Intuitive Android Application for HomeDetective [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-41 | |||
![]() |
XGBoost and LGBM for Porto Seguro`s Kaggle challenge: A Comparison | S | Gino Brunner, Yuyi Wang |
HS 17 | SA-2017-98 | |||
![]() |
Implementation of a Blockchain Micropayment Channel Network [confidential] | M | Conrad Burchert | HS 17 | MA-2017-13 | |||
![]() |
Implementation of a Fast Cryptocurrency for Micropayment Channels [confidential] | B | Conrad Burchert | HS 17 | BA-2017-38 | |||
![]() |
Implementing a Distributed Reliable Database | B | Conrad Burchert | HS 17 | BA-2017-36 | |||
![]() |
Multi-Agent Path Planning on Cyclic Routes [confidential] | M | Manuel Eichelberger | HS 17 | MA-2017-14 | |||
![]() |
Unaligned Neural Transfer of Musical Style [confidential] | M | Gino Brunner, Yuyi Wang |
HS 17 | MA-2017-19 | |||
![]() |
Havanews [confidential] | M | Manuel Eichelberger, Simon Tanner |
HS 17 | MA-2017-20 | |||
![]() |
Quantized Convolutional Neural Networks for Embedded Platforms | M | Matthias Meyer | HS 17 | MA-2017-15 | |||
![]() |
Robot Composer Framework | S | Manuel Eichelberger | HS 17 | SA-2017-95 | |||
![]() |
Balanced Routing in Micropayment Channel Networks | M | Conrad Burchert | HS 17 | MA-2017-11 | |||
![]() |
Smart Lighting [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-31 | |||
![]() |
Tesselating Switzerland of the Past | B | Manuel Eichelberger | HS 17 | BA-2017-32 | |||
![]() |
Ultrasonic Smartphone Communication | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-39 | |||
![]() |
Using Deep Learning to Annotate Karaoke Songs | S | Yuyi Wang, Gino Brunner |
HS 17 | SA-2017-92 | |||
![]() |
Worldwide Sports Route Generation | S | Manuel Eichelberger | HS 17 | SA-2017-94 | |||
![]() |
Automated Program Analysis for Predicting Memory Access Collisions | Embedded Systems | S | Andreas Tretter, Stefan Draskovic |
HS 17 | SA-2017-89 | ||
![]() |
Creating a Flexible Middleware for Low-Power Flooding Protocols [confidential] | Embedded Systems | M | Romain Jacob, Reto Da Forno |
HS 17 | MA-2017-23 | ||
![]() |
Emulation of Distributed Energy Harvesting Systems [confidential] | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
HS 17 | SA-2017-85 | ||
![]() |
Towards Autonomous Navigation for Nano-Blimps [confidential] | Embedded Systems | S | Stefan Draskovic, Andres Gomez |
HS 17 | SA-2017-86 | ||
![]() |
Unleashing the Potential of Real-time Internet of Things | Embedded Systems | S | Romain Jacob | HS 17 | SA-2017-84 | ||
![]() |
Digital Signal Processing for Micro-Seismic Event Detection on Embedded Platforms | Environmental Sensing | M | Matthias Meyer | HS 17 | MA-2017-22 | ||
![]() |
Towards High Data Quality in Mobile Crowdsensing | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 17 | SA-2017-91 | ||
![]() |
Analysis of Sleep-related Symptoms of Parkinson`s Patients based on a System of Ambient Sensors | External Projects | M | Lothar Thiele, Zimu Zhou |
HS 17 | MA-2017-10 | ||
![]() |
Detection of Malicious Remote Shell Sessions [confidential] | External Projects | S | Vincent Lenders, Roland Meier |
HS 17 | SA-2017-87 | ||
![]() |
Verifying ADS-B Position Claims with Passive Radar [confidential] | External Projects | M | Vincent Lenders | HS 17 | MA-2017-18 | ||
![]() |
Designing a Dynamic Micropayment Channel Network | Internet Economics | B | Conrad Burchert | HS 17 | BA-2017-29 | ||
![]() |
Adding Passive Measurability to QUIC | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
HS 17 | MA-2017-16 | ||
![]() |
Analysis and Optimization of Frequency Governors [confidential] | Mechanism Design | M | Rehan Ahmed, Philipp Miedl |
HS 17 | MA-2017-17 | ||
![]() |
Data-driven Classification and Isolation of Network Devices [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 17 | SA-2017-90 | ||
![]() |
Safeguarding Bitcoin Against Active Routing Attacks [confidential] | Network Security | S | Maria Apostolaki | HS 17 | Gian Marti | SA-2017-99 | |
![]() |
Data-Driven Network Convergence [confidential] | Software Defined Networking | M | Thomas Holterbach, Edgar Costa Molero |
HS 17 | MA-2017-21 | ||
![]() |
A Flarm Receiver for the OpenSky Network | S | Vincent Lenders | FS 17 | SA-2017-05 | |||
![]() |
Advanced State Retention for Transient Computing Systems [confidential] | M | Andres Gomez, Andreas Tretter |
FS 17 | MA-2017-01 | |||
![]() |
Android App Private Data Usage [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-02 | |||
![]() |
CARP: Cryptographic Android Repackaging Protection [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-22 | |||
![]() |
Android Audio Beamforming [confidential] | G | Simon Tanner, Gino Brunner |
FS 17 |
, |
GA-2017-08 | ||
![]() |
Android Audio Synchronization [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 | SA-2017-75 | |||
![]() |
Android Smart Cloud Storage | S | Gino Brunner, Simon Tanner |
FS 17 | SA-2017-82 | |||
![]() |
Audio Compression for Acoustic Sensing | S | Matthias Meyer, Jan Beutel |
FS 17 | SA-2017-16 | |||
![]() |
BitThief QoL | B | Michael König, Georg Bachmeier |
FS 17 | BA-2017-21 | |||
![]() |
Building a 3D Object Scanner | B | Manuel Eichelberger, Gino Brunner |
FS 17 | BA-2017-01 | |||
![]() |
Building a 3D Indoor Scanner | S | Manuel Eichelberger, Simon Tanner |
FS 17 | SA-2017-06 | |||
![]() |
Chronos: Finding the configurations recipe for fast convergence | S | Ahmed Elhassany | FS 17 | SA-2017-13 | |||
![]() |
Convenient Apartment Search [confidential] | B | Gino Brunner, Simon Tanner |
FS 17 | BA-2017-07 | |||
![]() |
DJ Roboto | B | Yuyi Wang, Gino Brunner |
FS 17 | BA-2017-28 | |||
![]() |
DVB-T Positioning [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 | SA-2017-01 | |||
![]() |
Exploring the Unknown: An Agent in Graphland [confidential] | B | Sebastian Brandt | FS 17 | BA-2017-23 | |||
![]() |
Fictional Language Generation [confidential] | M | Gino Brunner, Yuyi Wang |
FS 17 | MA-2017-04 | |||
![]() |
Finding Advanced Features for Housing Price Prediction | B | Gino Brunner, Yuyi Wang |
FS 17 | BA-2017-06 | |||
![]() |
Invisibee: Multiplayer Game with Secret Strategies on a Shared Screen | S | Michael König, Manuel Eichelberger |
FS 17 |
, |
SA-2017-77 | ||
![]() |
HomeDetective [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-08 | |||
![]() |
Improving RAFT | S | Darya Melnyk, Georg Bachmeier |
FS 17 | SA-2017-80 | |||
![]() |
Towards Accurate Simulations of Programmable Dataplanes | M | Laurent Vanbever, Maria Apostolaki |
FS 17 | MA-2017-03 | |||
![]() |
Low-Power GPS Tracking Hardware [confidential] | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-76 | |||
![]() |
Low-Power GPS Tracking Software [confidential] | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-78 | |||
![]() |
Multi-System GNSS Receiver Software | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-79 | |||
![]() |
JamBot: Music Theory Aware Chord Based Generation of Polyphonic Music with LSTMs [confidential] | S | Gino Brunner, Yuyi Wang |
FS 17 | SA-2017-83 | |||
![]() |
Online Graph Construction with Reinforcement Learning [confidential] | S | Sebastian Brandt, Yuyi Wang |
FS 17 | SA-2017-81 | |||
![]() |
Online k-Taxi Problem | B | Georg Bachmeier, Yuyi Wang |
FS 17 | BA-2017-27 | |||
![]() |
Randomized Algorithms for Online Matching with Two Sources | B | Yuyi Wang | FS 17 | BA-2017-24 | |||
![]() |
Outdoor Sports Route Generation | B | Manuel Eichelberger | FS 17 | BA-2017-05 | |||
![]() |
Accessibility Evaluation for Public Transport Systems [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 |
, |
SA-2017-14 | ||
![]() |
Reinforcement Learning Playground [confidential] | M | Gino Brunner, Yuyi Wang |
FS 17 | MA-2017-09 | |||
![]() |
SmartCanvas: a Drawing Assistance Application for Android Devices | G | Pankaj Khanchandani | FS 17 |
, |
GA-2017-09 | ||
![]() |
Automated Energy Harvesting Source Characterization [confidential] | Embedded Systems | M | Lukas Sigrist, Andres Gomez |
FS 17 | MA-2017-02 | ||
![]() |
Batteryless Bluetooth Communication | Embedded Systems | B | Lukas Sigrist, Andres Gomez |
FS 17 | BA-2017-03 | ||
![]() |
A Robust Sensing Platform for High Alpine Sensor Networks | Embedded Systems | S | Jan Beutel, Tonio Gsell |
FS 17 | SA-2017-15 | ||
![]() |
Fault-Tolerance Mechanisms for Glossy-based Wireless Communication Networks | Embedded Systems | S | Romain Jacob | FS 17 | SA-2017-12 | ||
![]() |
Harvesting Driven Long-Range Communication [confidential] | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
FS 17 | SA-2017-11 | ||
![]() |
Framework for Stochastic Analysis of Mixed-Criticality Scheduling | Embedded Systems | B | Stefan Draskovic, Rehan Ahmed |
FS 17 | BA-2017-26 | ||
![]() |
Prediction Strategies for Energy Harvesting Systems [confidential] | Embedded Systems | S | Rehan Ahmed, Stefan Draskovic |
FS 17 | SA-2017-10 | ||
![]() |
Real-time Network Functions for the Internet of Things | Embedded Systems | S | Romain Jacob | FS 17 | SA-2017-07 | ||
![]() |
Exploiting Correlations between Pollutants for Fine-Grained Air Quality Assessment [confidential] | Environmental Sensing | B | Balz Maag, Zimu Zhou |
FS 17 | BA-2017-25 | ||
![]() |
Visualize Volumes of Air Quality Data | Environmental Sensing | M | Balz Maag, Zimu Zhou |
FS 17 | MA-2017-06 | ||
![]() |
Tracing Internet Path Transparency | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
FS 17 | MA-2017-12 | ||
![]() |
A Smart Attack using the Frequency Covert Channel [confidential] | Multicore Architecture | M | Philipp Miedl, Matthias Meyer |
FS 17 | MA-2017-05 | ||
![]() |
UnCovert 4: The Power Covert Channel [confidential] | Multicore Architecture | S | Philipp Miedl | FS 17 | SA-2017-02 | ||
![]() |
What is my Thermal Fingerprint? [confidential] | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
FS 17 | SA-2017-03 | ||
![]() |
Methods to Evaluate Cyber Threat Intelligence Feeds [confidential] | Network Security | M | Laurent Vanbever, Roland Meier |
FS 17 | MA-2017-08 | ||
![]() |
In-network Anomaly Detection with Programmable Switches [confidential] | Network Security | S | Laurent Vanbever, Roland Meier |
FS 17 | SA-2017-09 | ||
![]() |
Battle of the Smartphones | Performance Evaluation | B | Gino Brunner, Pascal Bissig |
FS 17 | BA-2017-04 | ||
![]() |
Evaluation of AQM Schemes to Support Low Latency in the Internet | Performance Evaluation | M | Mirja Kühlewind, Brian Trammell |
FS 17 | MA-2017-07 | ||
![]() |
Accurate Temporal Map of Switzerland | B | Manuel Eichelberger | HS 16 | BA-2016-19 | |||
![]() |
Frequency-Accuracy Measurement of Oscillators [confidential] | G | Manuel Eichelberger, Simon Tanner |
HS 16 |
, |
GA-2016-06 | ||
![]() |
Advancing Cryptocurrencies and Blockchain Technology [confidential] | M | Roger Wattenhofer | HS 16 | MA-2016-57 | |||
![]() |
Aircraft Positioning [confidential] | M | Manuel Eichelberger, Simon Tanner |
HS 16 | MA-2016-56 | |||
![]() |
Android GPS Revisited [confidential] | G | Manuel Eichelberger, Pascal Bissig |
HS 16 |
, , |
GA-2016-05 | ||
![]() |
Android Smart Cloud Storage [confidential] | S | Gino Brunner, Pascal Bissig |
HS 16 | SA-2016-57 | |||
![]() |
Boosting the Convergence Performance of SDX Platforms [confidential] | S | Rüdiger Birkner, Thomas Holterbach |
HS 16 | SA-2016-69 | |||
![]() |
Practical Concurrency Analysis for SDN | M | Ahmed Elhassany | HS 16 | MA-2016-60 | |||
![]() |
Cops and Robbers | B | Sebastian Brandt, Georg Bachmeier |
HS 16 | BA-2016-20 | |||
![]() |
Detecting and Mitigating Network Attacks on Bitcoin [confidential] | S | Maria Apostolaki | HS 16 | SA-2016-72 | |||
![]() |
Distributed Cryptography for Blockchains [confidential] | M | Roger Wattenhofer | HS 16 | MA-2016-58 | |||
![]() |
Fictional Language Generator [confidential] | S | Gino Brunner, Yuyi Wang |
HS 16 | SA-2016-60 | |||
![]() |
GPS on a GPU [confidential] | B | Manuel Eichelberger, Pascal Bissig |
HS 16 | BA-2016-14 | |||
![]() |
A Perfect Strategy to Play the Graph Connection Game, Starting from a Specific Stage of the Game [confidential] | S | Pankaj Khanchandani | HS 16 | SA-2016-73 | |||
![]() |
Headphone Assistant [confidential] | B | Gino Brunner, Simon Tanner |
HS 16 | BA-2016-17 | |||
![]() |
Hidden in Plain Sight | S | Manuel Eichelberger, Michael König |
HS 16 | SA-2016-74 | |||
![]() |
Housing Price Predictor [confidential] | B | Gino Brunner, Yuyi Wang |
HS 16 | BA-2016-16 | |||
![]() |
Learning Crowd Behaviour with Neuroevolution | M | Manuel Eichelberger, Michael König |
HS 16 | MA-2016-62 | |||
![]() |
Building the Next Generation of GPS Receivers 2.0 | G | Manuel Eichelberger, Pascal Bissig |
HS 16 |
, |
GA-2016-04 | ||
![]() |
Metric Approximations and Clustering | M | Yuyi Wang | HS 16 | MA-2016-59 | |||
![]() |
Online Graph Exploration | S | Sebastian Brandt | HS 16 | SA-2016-70 | |||
![]() |
Plan My Vacation | G | Georg Bachmeier, Gino Brunner |
HS 16 |
, |
GA-2016-07 | ||
![]() |
Professional Android Phone Benchmarker [confidential] | S | Gino Brunner, Pascal Bissig |
HS 16 | SA-2016-62 | |||
![]() |
Ranking Review Sites [confidential] | M | Gino Brunner, Pascal Bissig |
HS 16 | MA-2016-55 | |||
![]() |
Robot Composer | S | Manuel Eichelberger, Michael König |
HS 16 | SA-2016-63 | |||
![]() |
SSD Stress Relief | S | Georg Bachmeier | HS 16 | SA-2016-65 | |||
![]() |
The Recommendation Problem | M | Darya Melnyk, Thomas Ulrich |
HS 16 | MA-2016-61 | |||
![]() |
Weather Forecast for the Lazy [confidential] | B | Pascal Bissig, Gino Brunner |
HS 16 | BA-2016-18 | |||
![]() |
Ultra-Low Power Convolutional Neural Networks for People Recognition [confidential] | Embedded Systems | S | Andres Gomez, Andreas Tretter |
HS 16 | SA-2016-56 | ||
![]() |
Neural Network System-on-a-Chip for Acoustic Sensing [confidential] | Embedded Systems | S | Matthias Meyer | HS 16 | SA-2016-55 | ||
![]() |
Orchestrate the Mixed-Criticality Melody: Reconcile Temperature and Safety | Embedded Systems | S | Rehan Ahmed, Pengcheng Huang |
HS 16 | SA-2016-66 | ||
![]() |
Parallelization of Compressed Sensing Based Ultrasound Imaging [confidential] | Embedded Systems | M | Andreas Tretter | HS 16 | MA-2016-53 | ||
![]() |
Towards Self-Sustainable Unmanned Aerial Vehicles [confidential] | Embedded Systems | S | Andres Gomez, Stefan Draskovic |
HS 16 | SA-2016-61 | ||
![]() |
Accurate Air Pollution Monitoring with a Smartwatch [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-59 | ||
![]() |
Anomaly Detection in Mobile Sensor Networks for Environmental Monitoring [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-58 | ||
![]() |
What Is My Smart-Watch Measuring? [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-64 | ||
![]() |
Continuous Measurement of Internet Path Transparency | Internet Measurement | S | Mirja Kühlewind, Brian Trammell |
HS 16 | SA-2016-68 | ||
![]() |
UnCovert3: Covert Channel Attacks on Commercial Multicore Systems | Multicore Architecture | M | Philipp Miedl | HS 16 | MA-2016-54 | ||
![]() |
Automated Ground-Truth Measurements for App Launches on Android [confidential] | Performance Evaluation | B | Gino Brunner, Pascal Bissig |
HS 16 | BA-2016-15 | ||
![]() |
Live Android Performance Monitor [confidential] | Performance Evaluation | M | Gino Brunner, Pascal Bissig |
HS 16 | MA-2016-52 | ||
![]() |
A Fast and Loop-Free Convergence upon Remote BGP Disruptions in Large IP Networks [confidential] | Software Defined Networking | S | Thomas Holterbach | HS 16 | SA-2016-71 | ||
![]() |
Debugging Software-Defined Networks Through Systematic Destruction [confidential] | S | Laurent Vanbever | FS 16 | SA-2016-67 | |||
![]() |
BitThief New UX | B | Michael König | FS 16 | BA-2016-13 | |||
![]() |
Classifying Usage of LAN Ports [confidential] | S | Laura Peer, Manuel Eichelberger |
FS 16 | SA-2016-52 | |||
![]() |
Collaborative Graph Evacuation [confidential] | B | Klaus-Tycho Förster, Sebastian Brandt |
FS 16 | BA-2016-06 | |||
![]() |
Communication and Feature Enhancement of CPM [confidential] | G | Philipp Brandes, Pascal Bissig |
FS 16 |
, |
GA-2016-02 | ||
![]() |
Crowd Simulation - A Python Framework for the Simulation of Human Actors in Miarmy | B | Michael König, Klaus-Tycho Förster |
FS 16 | BA-2016-10 | |||
![]() |
Discussion Dynamics [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
FS 16 | MA-2016-45 | |||
![]() |
Distributed Graph Languages [confidential] | S | Klaus-Tycho Förster, Jochen Seidel |
FS 16 | SA-2016-50 | |||
![]() |
Drawing Questions from Wikidata | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-03 | |||
![]() |
Flexible Traffic Engineering in existing networks with Fibbing [confidential] | S | Laurent Vanbever | FS 16 | SA-2016-44 | |||
![]() |
Improving Load-Balancing Decisions in Data Center Networks Using Software-Defined Networking [confidential] | M | Laurent Vanbever | FS 16 | MA-2016-49 | |||
![]() |
iOS Swipe | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-05 | |||
![]() |
Karaoke Song Generator [confidential] | M | Laura Peer, Pascal Bissig |
FS 16 | MA-2016-46 | |||
![]() |
Multi-Agent Pathfinding on Graphs [confidential] | B | Michael König, Klaus-Tycho Förster |
FS 16 | BA-2016-12 | |||
![]() |
Opportunistic Trip Planner [confidential] | S | Pascal Bissig, Philipp Brandes |
FS 16 | SA-2016-39 | |||
![]() |
Permasense GPS Postprocessing | S | Jan Beutel, Tonio Gsell |
FS 16 | SA-2016-51 | |||
![]() |
Mobilescan: A Usage-based Contract Recommendation Application [confidential] | S | Laura Peer, Pascal Bissig |
FS 16 | SA-2016-46 | |||
![]() |
Kännsch - Adaptive Keyboard for iOS | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-01 | |||
![]() |
Quaternion based Estimation and Control for Attitude Tracking of a Quadcopter using IMU Sensors [confidential] | M | Lothar Thiele | FS 16 | Matthias Grob | MA-2016-64 | ||
![]() |
Ranking Alternatives Offline | B | Georg Bachmeier | FS 16 | BA-2016-11 | |||
![]() |
Ranking Alternatives Online | B | Georg Bachmeier | FS 16 | BA-2016-07 | |||
![]() |
Robust Relative Position Estimation in a UAV Swarm using UWB Time of Flight Ranging [confidential] | M | Lothar Thiele | FS 16 | MA-2016-63 | |||
![]() |
Smart Real Estate Value Estimation | B | Philipp Brandes, Pascal Bissig |
FS 16 | BA-2016-04 | |||
![]() |
Smart Running Route Generation | M | Manuel Eichelberger | FS 16 | MA-2016-51 | |||
![]() |
Smart Watch Actigraphy | B | Manuel Eichelberger, Philipp Brandes |
FS 16 | BA-2016-02 | |||
![]() |
Smart Web Filtering | B | Pascal Bissig, Philipp Brandes |
FS 16 | BA-2016-09 | |||
![]() |
Distributed Speaker Synchronization | S | Pascal Bissig, Laura Peer |
FS 16 | SA-2016-36 | |||
![]() |
Kännsch - Updates and Improvements to the Swiss German Keyboard | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-08 | |||
TEG-based Energy Scavenging Platform [confidential] | M | Jan Beutel, Lukas Sigrist |
FS 16 | MA-2016-50 | ||||
![]() |
Temporal Map of Switzerland | S | Manuel Eichelberger | FS 16 | SA-2016-41 | |||
![]() |
Advanced Testbed Resource Allocation | Ad-hoc-Networks | S | Roman Lim | FS 16 | SA-2016-53 | ||
![]() |
A Protocol Gateway for the Internet of Things | Embedded Systems | S | Felix Sutton, Romain Jacob |
FS 16 | SA-2016-03 | ||
![]() |
Energy Management for Low Power Harvesting Scenarios [confidential] | Embedded Systems | S | Andres Gomez, Lukas Sigrist |
FS 16 |
, |
SA-2016-47 | |
![]() |
RocketLogger: Mobile Data-Logger for Ultra-Low Current and Power Measurements | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
FS 16 |
, |
SA-2016-40 | |
![]() |
Platform Micro-benchmarking for Real-time Applications [confidential] | Embedded Systems | S | Georgia Giannopoulou, Andreas Tretter |
FS 16 | SA-2016-38 | ||
![]() |
Power-Aware Scheduling for Transient Systems [confidential] | Embedded Systems | S | Andres Gomez, Rehan Ahmed |
FS 16 | SA-2016-37 | ||
![]() |
Scheduling Strategies for Energy Harvesting Systems [confidential] | Embedded Systems | S | Rehan Ahmed, Lukas Sigrist |
FS 16 | SA-2016-48 | ||
![]() |
Transiently Powered and Wearable Device for Ultra-Low-Power Vision Sensing [confidential] | Embedded Systems | M | Lukas Sigrist, Andres Gomez |
FS 16 | MA-2016-43 | ||
![]() |
Enabling Environmental Sensing with a Smart-Watch [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
FS 16 | SA-2016-54 | ||
![]() |
Cooperating with Middleboxes in the Internet | Internet Architecture | S | Mirja Kühlewind, Brian Trammell |
FS 16 | SA-2016-45 | ||
![]() |
Building a Path Transparency Observatory | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
FS 16 | MA-2016-44 | ||
![]() |
Does Your Phone Spy on You? | Internet Measurement | M | Mirja Kühlewind, David Gugelmann |
FS 16 | MA-2016-47 | ||
![]() |
Measuring Internet Path Transparency for Transport Protocol Extensions | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
FS 16 | SA-2016-49 | ||
![]() |
UnCovert: Evaluating Thermal Covert Channels on Android Systems | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
FS 16 | SA-2016-35 | ||
![]() |
Accurate Classification of Web Requests [confidential] | Network Security | S | David Gugelmann | FS 16 | SA-2016-43 | ||
![]() |
Human or Malware? Detection of Malicious Web Requests | Network Security | M | David Gugelmann, Markus Happe |
FS 16 | MA-2016-48 | ||
![]() |
Android Benchmark | M | Pascal Bissig, Philipp Brandes |
HS 15 | MA-2015-38 | |||
![]() |
Army of Two [confidential] | B | Sebastian Brandt, David Stolz |
HS 15 | BA-2015-20 | |||
![]() |
On the Fly! Automatic Running Route Generation | B | David Stolz | HS 15 | BA-2015-18 | |||
![]() |
Building the Next Generation of GPS Receivers [confidential] | S | Pascal Bissig, Laura Peer |
HS 15 | SA-2015-22 | |||
![]() |
Classify the News | B | Philipp Brandes, Klaus-Tycho Förster |
HS 15 | BA-2015-16 | |||
![]() |
Convenient Password Manager | G | Pascal Bissig, Philipp Brandes |
HS 15 |
, |
GA-2015-06 | ||
![]() |
Crowd Simulation | S | Michael König, Klaus-Tycho Förster |
HS 15 | SA-2015-37 | |||
![]() |
Distributed Speaker Synchronization [confidential] | S | Laura Peer, Pascal Bissig |
HS 15 | SA-2015-18 | |||
![]() |
Kinect 3D Editor | S | Philipp Brandes, Laura Peer |
HS 15 | SA-2015-24 | |||
![]() |
Emergency Localization [confidential] | M | Pascal Bissig, Laura Peer |
HS 15 | MA-2015-42 | |||
![]() |
Fitness Tracking 2.0 [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
HS 15 | SA-2015-33 | |||
![]() |
Help the Bitcoin Community Reach Consensus | S | Christian Decker | HS 15 | SA-2015-30 | |||
![]() |
Improve Your Vacation | S | Philipp Brandes, Pascal Bissig |
HS 15 | SA-2015-32 | |||
![]() |
Internet-Technologien für die Erhaltung und Verbesserung der Lebensqualität und der Selbständigkeit von älteren Menschen [confidential] | S | Bernhard Plattner | HS 15 | SA-2015-72 | |||
![]() |
Is the Price Right | B | Laura Peer, Philipp Brandes |
HS 15 | BA-2015-14 | |||
![]() |
Multi-Agent Pathfinding [confidential] | B | Michael König, Klaus-Tycho Förster |
HS 15 | BA-2015-19 | |||
![]() |
On the Correctness of Inter-Domain Deflections [confidential] | M | Laurent Vanbever | HS 15 | MA-2015-47 | |||
![]() |
Opportunistic Trip Planner | S | Pascal Bissig, Philipp Brandes |
HS 15 | SA-2015-23 | |||
![]() |
Real Life Piano Hero [confidential] | S | Philipp Brandes, Pascal Bissig |
HS 15 | SA-2015-25 | |||
![]() |
Sequential Proximity - Capturing Scalable Concurrent Search Data Structures [confidential] | M | Roger Wattenhofer | HS 15 | MA-2015-43 | |||
![]() |
Swiss FoodQuiz: Education Effects on Nutritional Knowledge Through a Personalized Mobile Game [confidential] | M | Roger Wattenhofer | HS 15 | MA-2015-48 | |||
![]() |
ATP: Improving the Speed of Small Flows in Data Centers with a New Transport Layer Protocol [confidential] | M | David Stolz | HS 15 | MA-2015-41 | |||
![]() |
Unleashing The Dragon | M | Laurent Vanbever | HS 15 | MA-2015-46 | |||
![]() |
Low-Error Multi-Hop Clock Synchronization | Ad-hoc-Networks | S | Roman Lim, Olga Saukh |
HS 15 | SA-2015-20 | ||
![]() |
Towards Low-Power, Timing-Predictable Medical Monitoring | Embedded Systems | S | Georgia Giannopoulou, Felix Sutton |
HS 15 | SA-2015-27 | ||
![]() |
Code Generation and Optimisation on Asymmetric Multi-Core Platforms [confidential] | Embedded Systems | S | Andreas Tretter, Andres Gomez |
HS 15 |
, |
SA-2015-26 | |
![]() |
Optimization of Data Intensive Inter-core Communication on Many-core Platforms [confidential] | Embedded Systems | M | Andreas Tretter, Georgia Giannopoulou |
HS 15 | MA-2015-39 | ||
![]() |
Real-Time Field Bus Systems with Linux | Embedded Systems | S | Pengcheng Huang, Georgia Giannopoulou |
HS 15 | SA-2015-21 | ||
![]() |
An Ultra-low Power Wake-up Circuit for Acoustic Emission Sensing [confidential] | Embedded Systems | S | Felix Sutton | HS 15 | SA-2015-19 | ||
![]() |
Context-awareness of Opportunistic radio contacts [confidential] | External Projects | S | Laurent Vanbever, Bernhard Plattner |
HS 15 | SA-2015-29 | ||
Integration of Measurement Probes into a Distributed Measurement Plane | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
HS 15 | SA-2015-28 | |||
![]() |
UnCovert: Operating Frequency, a Security Leak? [confidential] | Multicore Architecture | S | Philipp Miedl | HS 15 | SA-2015-31 | ||
![]() |
Mesh networking with Bitcoin | Peer-to-Peer Networks | S | Christian Decker | HS 15 | SA-2015-34 | ||
![]() |
Design and Implementation of an ECN Proxy for Performance Improvements in the Internet | Performance Evaluation | S | Mirja Kühlewind, Brian Trammell |
HS 15 | SA-2015-36 | ||
![]() |
Speaker-Adaptive ANN-Based Feature Extractor for Speaker Diarisation [confidential] | Speech Processing | S | Hui Liang | HS 15 | SA-2015-17 | ||
![]() |
RouMim: Self-learned Automation on Smartphones [confidential] | M | Philipp Brandes, Pascal Bissig |
FS 15 | MA-2015-02 | |||
![]() |
Airfare Prediction - Are You Paying Too Much? [confidential] | S | Philipp Brandes, Pascal Bissig |
FS 15 | SA-2015-04 | |||
![]() |
Content Sharing using Cooperative Playlists and Social Quizz Games | B | Laura Peer, Pascal Bissig |
FS 15 | BA-2015-09 | |||
![]() |
Data-Driven De-Anonymization in Bitcoin [confidential] | M | Christian Decker | FS 15 | MA-2015-26 | |||
![]() |
Distributed Discussion Statistics [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
FS 15 | SA-2015-01 | |||
![]() |
Distributed Speaker Synchronization | S | Laura Peer, Pascal Bissig |
FS 15 | SA-2015-02 | |||
![]() |
Dominating the Stone Age [confidential] | M | Sebastian Brandt, Jara Uitto |
FS 15 | MA-2015-34 | |||
![]() |
Exploiting Bitcoin`s Topology for Double-spend Attacks | B | Christian Decker | FS 15 | BA-2015-10 | |||
![]() |
Drawing Questions from Wikidata | B | Philipp Brandes, Laura Peer |
FS 15 | BA-2015-13 | |||
![]() |
Exploiting the Heterogeneity of the Parallella Platform for an Ultrasound Imaging Algorithm [confidential] | S | Andreas Tretter | FS 15 | SA-2015-11 | |||
![]() |
Graph Exploration [confidential] | B | Klaus-Tycho Förster, Sebastian Brandt |
FS 15 | BA-2015-07 | |||
![]() |
Improving Network-Wide Troubleshooting with Few SDN Devices [confidential] | M | Laurent Vanbever | FS 15 | MA-2015-45 | |||
![]() |
New Bounds for Distributed Problems [confidential] | M | Jochen Seidel, Sebastian Brandt |
FS 15 | MA-2015-35 | |||
![]() |
Parallel Computing with DNA | S | Jochen Seidel, Sebastian Brandt |
FS 15 | SA-2015-10 | |||
![]() |
Personalized Provider Selection [confidential] | B | Laura Peer, Pascal Bissig |
FS 15 | BA-2015-11 | |||
![]() |
Real Life Piano Hero [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-04 | |||
![]() |
Rethinking GPS Localization [confidential] | M | Pascal Bissig, Laura Peer |
FS 15 | MA-2015-30 | |||
![]() |
Security and Privacy in Opportunistic Networks [confidential] | M | Bernhard Plattner | FS 15 | MA-2015-40 | |||
![]() |
Selfish Strategies to Increase Your Throughput in 802.11 Networks | B | David Stolz | FS 15 | BA-2015-06 | |||
![]() |
Shopping 2.0 - Automated Shopping Lists | B | Jochen Seidel, Philipp Brandes |
FS 15 | BA-2015-03 | |||
![]() |
Smart Real Estate Value Estimation [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-01 | |||
![]() |
Smart Recipes | B | Laura Peer | FS 15 | BA-2015-15 | |||
![]() |
Streaming Applications on Parallella: Architecture Bottlenecks and Optimization [confidential] | N | Andreas Tretter, Georgia Giannopoulou |
FS 15 | NA-2015-01 | |||
![]() |
Supercharging IP router memory with SDN | S | Laurent Vanbever | FS 15 | SA-2015-14 | |||
![]() |
Kännsch - Improving Swiss German Keyboard [confidential] | M | Laura Peer, Philipp Brandes |
FS 15 | MA-2015-23 | |||
![]() |
Kännsch - Swiss German Keyboard for iOS | B | Laura Peer, Philipp Brandes |
FS 15 | BA-2015-08 | |||
![]() |
What is in the yelp data? | G | Barbara Keller, Jochen Seidel |
FS 15 |
, |
GA-2015-05 | ||
![]() |
Towards Datamarkets with Bitcoin [confidential] | M | Christian Decker, Laura Peer |
FS 15 | MA-2015-33 | |||
![]() |
Towards Probabilistic Scheduling of Mixed-Criticality Systems [confidential] | M | Pengcheng Huang | FS 15 | MA-2015-37 | |||
![]() |
Towards the Design of Real-Time Mixed-Safety-Critical Systems on Multicores [confidential] | S | Pengcheng Huang | FS 15 | SA-2015-16 | |||
![]() |
Owner Recognition for Smartwatch [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-05 | |||
![]() |
Using Smartwatches to Recognize Handwritten Text and Letters [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-02 | |||
![]() |
Smart Prices for the Smart Grid | M | Lothar Thiele | FS 15 | MA-2015-29 | |||
![]() |
Thermal Energy Scavenging for WSNs | Ad-hoc-Networks | M | Jan Beutel, Reto Da Forno |
FS 15 | MA-2015-31 | ||
![]() |
Orchestrating Mixed-Criticality Melody [confidential] | Embedded Systems | M | Pengcheng Huang, Georgia Giannopoulou |
FS 15 | MA-2015-24 | ||
Performance/Energy Tradeoffs in Novel Microcontroller Platforms [confidential] | Embedded Systems | S | Andres Gomez, Rehan Ahmed |
FS 15 | SA-2015-15 | |||
![]() |
TimeGenie [confidential] | Embedded Systems | G | Bernhard Buchli | FS 15 |
, , , |
GA-2015-01 | |
![]() |
Transiently Powered Systems: Theory and Design [confidential] | Embedded Systems | G | Andres Gomez, Lukas Sigrist |
FS 15 |
, |
GA-2015-02 | |
![]() |
Multipath bonding at Layer 3 [confidential] | External Projects | M | Mirja Kühlewind, Brian Trammell |
FS 15 | MA-2015-44 | ||
![]() |
Measuring Explicit Congestion Negotiation (ECN) support based on P2P networks | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
FS 15 | SA-2015-05 | ||
![]() |
A Mission-Aware Routing Algorithm for Micro Aerial Vehicle Networks | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 15 |
, |
SA-2015-03 | |
![]() |
Performance Evaluation and Optimization of p2pkit-based Opportunistic Networking [confidential] | Peer-to-Peer Networks | M | Franck Legendre, Bernhard Plattner |
FS 15 | MA-2015-36 | ||
![]() |
Routing Scalable Bitcoin Payments | Peer-to-Peer Networks | B | Christian Decker | FS 15 | BA-2015-12 | ||
![]() |
An Adaptive Hardware/Software Interface for EmbedNet | Reconfigurable Computing | S | Markus Happe | FS 15 | SA-2015-09 | ||
![]() |
Generic Functional Blocks for FPGA-based Network Nodes | Reconfigurable Computing | S | Markus Happe | FS 15 | SA-2015-08 | ||
![]() |
Flexible SDN Testing in Production with Shadow Policies | Software Defined Networking | M | Laurent Vanbever | FS 15 | MA-2015-27 | ||
![]() |
Improving the Scalability of Software-Defined Internet Exchange Points | Software Defined Networking | S | Laurent Vanbever, Vasileios Kotronis |
FS 15 | SA-2015-07 | ||
![]() |
Self-Learning Enterprise Networks Via Software Defined Networking [confidential] | Software Defined Networking | M | Panagiotis Georgopoulos, Laurent Vanbever |
FS 15 | MA-2015-25 | ||
![]() |
SDN-based Network Obfuscation [confidential] | Software Defined Networking | M | Laurent Vanbever | FS 15 | MA-2015-32 | ||
![]() |
Automatic Pronunciation Checker | Speech Processing | M | Beat Pfister, Tofigh Naghibi |
FS 15 | MA-2015-28 | ||
![]() |
Detecting Strong Prosodic Events | Speech Processing | S | Beat Pfister, Hui Liang |
FS 15 |
, |
SA-2015-06 | |
![]() |
DNN-based Phoneme Models for Speech Recognition | Speech Processing | M | Beat Pfister | FS 15 | MA-2015-01 | ||
![]() |
Accurate Weather Forecast | B | Barbara Keller, Jochen Seidel |
HS 14 | BA-2014-12 | |||
![]() |
Algorithmically Balancing a Collectible Card Game | B | Michael König | HS 14 | BA-2014-11 | |||
![]() |
Automated Resistor Classification | G | Tobias Langner, Jochen Seidel |
HS 14 |
, |
GA-2014-02 | ||
![]() |
Distributed Graph Languages [confidential] | S | Jochen Seidel, Klaus-Tycho Förster |
HS 14 | SA-2014-34 | |||
![]() |
Using Document Categorization to Identify Similar Start-ups [confidential] | M | Philipp Brandes | HS 14 | MA-2014-17 | |||
![]() |
Fitness 2.0 - Modeling Fitness and Heart Rate | M | Pascal Bissig, Klaus-Tycho Förster |
HS 14 | MA-2014-19 | |||
![]() |
Fooling the Android Permission System [confidential] | B | Pascal Bissig, Philipp Brandes |
HS 14 | BA-2014-13 | |||
![]() |
Magic Public Transport Information [confidential] | S | Barbara Keller, Pascal Bissig |
HS 14 | SA-2014-29 | |||
![]() |
Making Bitcoin Exchanges Truly Transparent [confidential] | S | Christian Decker, Jochen Seidel |
HS 14 | SA-2014-41 | |||
![]() |
Mapping the Past | S | Christian Decker, Barbara Keller |
HS 14 | SA-2014-35 | |||
![]() |
Newspaper 2.0 | M | Jochen Seidel, Jara Uitto |
HS 14 | MA-2014-22 | |||
![]() |
Parallel Computing with DNA [confidential] | S | Jochen Seidel, Sebastian Brandt |
HS 14 | SA-2014-40 | |||
![]() |
A RESTful API for the AMIV | G | Jochen Seidel, Barbara Keller |
HS 14 |
, , |
GA-2014-04 | ||
![]() |
Hide Spoiler [confidential] | B | Philipp Brandes, Pascal Bissig |
HS 14 | BA-2014-10 | |||
![]() |
Haptic, Acoustic, and Visual Short Range Communication on Smartphones | G | Pascal Bissig, Philipp Brandes |
HS 14 |
, |
GA-2014-03 | ||
![]() |
Lower Bound for The Capture Time with Multiple Robbers [confidential] | B | Jara Uitto | HS 14 | BA-2014-17 | |||
![]() |
The Meta Data Troll Detector | S | Tobias Langner, Jochen Seidel |
HS 14 | SA-2014-32 | |||
![]() |
CONTACT: Information Sharing Between Strangers With Hyperlocal Community Wireless Networks [confidential] | Ad-hoc-Networks | S | Panayotis Antoniadis | HS 14 | SA-2014-44 | ||
![]() |
Flooja: Visualisierung von FlockLab-Testbed-Daten | Ad-hoc-Networks | S | Roman Lim, Marco Zimmerling |
HS 14 | SA-2014-31 | ||
![]() |
Framework for End-to-End Thermal Modeling and Control [confidential] | Embedded Systems | M | Devendra Rai | HS 14 | MA-2014-13 | ||
![]() |
Easy Breathe: Health-Optimal Routing in Urban Areas | Embedded Systems | S | David Hasenfratz, Olga Saukh |
HS 14 | SA-2014-28 | ||
![]() |
A DAL Backend for the Parallella Platform | Embedded Systems | S | Andreas Tretter, Lars Schor |
HS 14 | SA-2014-33 | ||
![]() |
Analyzing the Time Dynamics in IXP Datasets | Internet Measurement | S | , Vasileios Kotronis |
HS 14 | SA-2014-43 | ||
![]() |
Early Detection of Real-World Events with Twitter | Internet Measurement | M | Vincent Lenders, David Gugelmann |
HS 14 | MA-2014-18 | ||
![]() |
A Faster Bitcoin Network | Internet Measurement | S | Christian Decker | HS 14 | SA-2014-42 | ||
![]() |
Quantifying Web Personalization | Internet Measurement | S | David Gugelmann | HS 14 | SA-2014-37 | ||
![]() |
A Smart Situational Reminder | Localization | S | Barbara Keller, Jara Uitto |
HS 14 | SA-2014-39 | ||
![]() |
WiFi Based Time-of-Flight Indoor Localization [confidential] | Localization | M | Domenico Giustiniano, Vincent Lenders |
HS 14 | MA-2014-15 | ||
![]() |
Smartphone App for Fused Indoor Localization | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 14 | MA-2014-20 | ||
![]() |
Reconstructing HTTPS Activity from Traffic Metadata [confidential] | Network Security | S | David Gugelmann | HS 14 | SA-2014-38 | ||
![]() |
Torrent Recommendation System Based on Data Gathered from the Mainline DHT | Peer-to-Peer Networks | B | Christian Decker | HS 14 | BA-2014-16 | ||
![]() |
A Torrent Recommender based on DHT Crawling | Peer-to-Peer Networks | B | Christian Decker | HS 14 | BA-2014-15 | ||
![]() |
Flow Embedding Algorithms for Software Defined Audio Networks | Software Defined Networking | M | Panagiotis Georgopoulos, Vasileios Kotronis |
HS 14 | MA-2014-14 | ||
![]() |
SDN-assisted IP Multicast | Software Defined Networking | S | Panagiotis Georgopoulos | HS 14 | SA-2014-30 | ||
![]() |
SDN-based Source Address Dilution Service [confidential] | Software Defined Networking | M | Vincent Lenders | HS 14 | MA-2014-12 | ||
![]() |
Theoretical and Empirical Evaluation of UepaaNet`s Scalability [confidential] | Wireless Mesh Networks | S | Bernhard Distl | HS 14 | SA-2014-27 | ||
![]() |
Jamming Mitigation in Bandwidth Hopping Spread Spectrum Communications [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
HS 14 | MA-2014-21 | ||
![]() |
Low-cost UV Sensor for Smartphones [confidential] | S | Pascal Bissig | FS 14 | SA-2014-02 | |||
![]() |
BLEPS: Security Based on Proximity [confidential] | B | Pascal Bissig | FS 14 | BA-2014-08 | |||
![]() |
Kännsch - a Swiss German Keyboard for Android [confidential] | M | Philipp Brandes, Pascal Bissig |
FS 14 | MA-2014-11 | |||
![]() |
Android Workout | S | Klaus-Tycho Förster, Jara Uitto |
FS 14 | SA-2014-09 | |||
![]() |
Collaborative Spectrum Monitoring [confidential] | M | Vincent Lenders, Domenico Giustiniano |
FS 14 | MA-2014-07 | |||
![]() |
BeatRunner - An Android Application to Enhance a Workout through Music [confidential] | S | Klaus-Tycho Förster, Pascal Bissig |
FS 14 | SA-2014-04 | |||
![]() |
Distributed Multiplayer Scenario | B | Michael König | FS 14 | BA-2014-05 | |||
![]() |
Beeping the Multi-Algorithm [confidential] | S | Jochen Seidel, Klaus-Tycho Förster |
FS 14 | SA-2014-11 | |||
![]() |
FIFA World Ranking | S | Tobias Langner, Philipp Brandes |
FS 14 | SA-2014-20 | |||
![]() |
Get Rhythm | S | Philipp Brandes, Pascal Bissig |
FS 14 | SA-2014-26 | |||
![]() |
Listening to Music in Groups | S | Jara Uitto, Barbara Keller |
FS 14 | SA-2014-25 | |||
![]() |
Low Power Gesture Recognition | S | Pascal Bissig | FS 14 | SA-2014-21 | |||
![]() |
Obstacle Warning for Texting | B | Jara Uitto, Klaus-Tycho Förster |
FS 14 | BA-2014-07 | |||
![]() |
Optimized Distributed Network Traffic Monitoring in Global Networks [confidential] | M | Christian Decker | FS 14 | MA-2014-16 | |||
![]() |
PaperRank for Literature Research | G | Jochen Seidel, Tobias Langner |
FS 14 |
, , |
GA-2014-01 | ||
![]() |
Secure P2P-Messenger | S | Philipp Brandes, Tobias Langner |
FS 14 |
, |
SA-2014-16 | ||
![]() |
Extensions to a Peer-to-Peer Instant Messenger | B | Tobias Langner, Philipp Brandes |
FS 14 | BA-2014-06 | |||
![]() |
Walking with your Smartphone: Stabilizing Screen Content | S | Tobias Langner, Pascal Bissig |
FS 14 | SA-2014-22 | |||
![]() |
A Particle Filter Approach to GPS Signals [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
FS 14 | MA-2014-08 | |||
![]() |
Smart Mobile Imaging | S | Pascal Bissig, Jara Uitto |
FS 14 | SA-2014-24 | |||
![]() |
Smartphone App Profiling | B | Tobias Langner | FS 14 | BA-2014-04 | |||
![]() |
Smartphone Audio Processing [confidential] | B | Pascal Bissig, Klaus-Tycho Förster |
FS 14 | BA-2014-02 | |||
![]() |
Zero-Effort Procrastination | S | Jochen Seidel, Jara Uitto |
FS 14 | SA-2014-10 | |||
![]() |
Avalanche Rescue Beacon with Smartphones [confidential] | Ad-hoc-Networks | M | Franck Legendre, Bernhard Distl |
FS 14 | MA-2014-05 | ||
![]() |
Bringing Network Access to Disconnected Regions using DTN Throwboxes | Ad-hoc-Networks | M | Abdullah Alhussainy, Karin Anna Hummel |
FS 14 | MA-2014-04 | ||
![]() |
Distributed Time Pulse for FlockLab | Ad-hoc-Networks | M | Roman Lim | FS 14 | MA-2014-06 | ||
![]() |
Wind Energy Harvester Power Subsystem [confidential] | Ad-hoc-Networks | S | Felix Sutton, Bernhard Buchli |
FS 14 | SA-2014-18 | ||
![]() |
OppNet: An Energy Optimized Service Platform for Opportunistic Networking on Android | Ad-hoc-Networks | M | Sacha Trifunovic | FS 14 | MA-2014-01 | ||
![]() |
Mapping Optimisation of Streaming Applications on Heterogeneous Platforms | Embedded Systems | M | Andreas Tretter, Lars Schor |
FS 14 | MA-2014-02 | ||
![]() |
High-Level Programming Framework for Executing Streaming Applications on Heterogeneous OpenCL Platforms | Embedded Systems | S | Lars Schor, Andreas Tretter |
FS 14 | SA-2014-07 | ||
![]() |
Automated Transformation of CAL Dataflow Actors to Kahn Processes [confidential] | Embedded Systems | S | Lars Schor, Andreas Tretter |
FS 14 | SA-2014-01 | ||
![]() |
Ultrasound “To Go” [confidential] | Embedded Systems | B | Andreas Tretter, Devendra Rai |
FS 14 | BA-2014-01 | ||
![]() |
Path Transparency for Explicit Congestion Notification | Internet Measurement | M | Brian Trammell, Stephan Neuhaus |
FS 14 | MA-2014-10 | ||
![]() |
Help! My Birthday Reminder Wants to Brick My Phone | Network Security | M | Stephan Neuhaus, Brian Trammell |
FS 14 | MA-2014-09 | ||
![]() |
Visualization of HTTP Network Traffic for Digital Forensics [confidential] | Network Security | S | David Gugelmann, Vincent Lenders |
FS 14 | SA-2014-12 | ||
![]() |
Designing a Routing Algorithm for UAV Swarms based on Simulation and Measurements [confidential] | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 14 | SA-2014-23 | ||
![]() |
Specification, Implementation and Load Test of UepaaNet Cloud Services [confidential] | Peer-to-Peer Networks | S | Franck Legendre, Bernhard Distl |
FS 14 | SA-2014-19 | ||
![]() |
TCP Congestion Control on RTP Media Streams | Performance Evaluation | S | Brian Trammell | FS 14 | SA-2014-15 | ||
![]() |
Resource-efficient Dynamic Partial Reconfiguration on FPGAs | Reconfigurable Computing | S | Markus Happe, Ariane Trammell |
FS 14 | SA-2014-17 | ||
![]() |
Implementation of a dereverberation algorithm on an xPCtarget real time system and experimental validation using virtual acoustics | Speech Processing | M | Beat Pfister | FS 14 | MA-2014-03 | ||
![]() |
Semi-Automatic Transcription of Interviews | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
FS 14 | SA-2014-14 | ||
![]() |
Speech Recognition with Hierarchical Codebook Search | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
FS 14 | SA-2014-13 | ||
![]() |
General-Purpose Wireless Distance Sensor | S | Samuel Welten, Pascal Bissig |
HS 13 | SA-2013-60 | |||
![]() |
Convenient Smartphone Authentication [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | MA-2013-16 | |||
![]() |
Detection of GNSS Multipath Errors in Urban Environments [confidential] | M | Domenico Giustiniano | HS 13 | MA-2013-21 | |||
![]() |
Distributed HashTables for P2P-Messenger [confidential] | S | Tobias Langner, Philipp Brandes |
HS 13 | SA-2013-59 | |||
![]() |
Encrypted Peer-To-Peer Based Instant Messenger for Android [confidential] | S | Philipp Brandes, Tobias Langner |
HS 13 | SA-2013-62 | |||
![]() |
Fundamental Analysis [confidential] | S | Philipp Brandes | HS 13 | SA-2013-56 | |||
![]() |
Graph Exploration [confidential] | S | Klaus-Tycho Förster | HS 13 | SA-2013-55 | |||
![]() |
High Performance Location- and Attitude Estimation [confidential] | G | Pascal Bissig | HS 13 |
, |
GA-2013-08 | ||
![]() |
Improving Personal Safety [confidential] | G | Pascal Bissig, Klaus-Tycho Förster |
HS 13 |
, , |
GA-2013-07 | ||
![]() |
Is It Schroedinger´s Cat? | S | Jara Uitto | HS 13 | SA-2013-68 | |||
![]() |
Movie Recommendation | S | Michael König | HS 13 | SA-2013-65 | |||
![]() |
Off Screen Smartphone Controls [confidential] | B | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | BA-2013-19 | |||
![]() |
Optimization of the Management of Recycling Containers [confidential] | S | Michael König | HS 13 | SA-2013-54 | |||
![]() |
Peer-To-Peer Based Instant Messenger [confidential] | S | Philipp Brandes, Tobias Langner |
HS 13 | SA-2013-61 | |||
![]() |
Randomization in Anonymous Computation [confidential] | S | Jochen Seidel | HS 13 | SA-2013-64 | |||
![]() |
Telemetry Unit for a Formula Student Race Car | S | Mahdi Asadpour | HS 13 | SA-2013-67 | |||
![]() |
Using Music to Enhance your Running [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | SA-2013-53 | |||
![]() |
Automatic Vocabulary Generation | B | Philipp Brandes, Tobias Langner |
HS 13 | BA-2013-18 | |||
![]() |
What is in a Transaction? A Structural Analysis of Bitcoin Transactions [confidential] | B | Christian Decker, Klaus-Tycho Förster |
HS 13 | BA-2013-20 | |||
![]() |
High-Speed Data-Acquisition for FlockLab | Ad-hoc-Networks | M | Roman Lim, Christoph Walser |
HS 13 | MA-2013-14 | ||
![]() |
People Flow Monitoring: Tracing Public Transport Users Using WiFi Monitors [confidential] | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
HS 13 | SA-2013-50 | ||
![]() |
Wireless Cross-Platform Communication | Ad-hoc-Networks | S | Roman Lim | HS 13 | SA-2013-58 | ||
![]() |
A Voice-Activated Wireless Patient Monitoring System [confidential] | Embedded Systems | M | Felix Sutton, Marco Zimmerling |
HS 13 | MA-2013-08 | ||
![]() |
Crossing the Deadline: An Automata-Based Hard Real-Time Guarantee | Embedded Systems | B | Pratyush Kumar, Georgia Giannopoulou |
HS 13 | BA-2013-17 | ||
![]() |
Towards Exploiting Intra-Application Dynamism using an H.264 Codec | Embedded Systems | S | Lars Schor, Hoeseok Yang |
HS 13 | SA-2013-46 | ||
![]() |
Functional Simulation of a Flight Management System | Embedded Systems | S | Pengcheng Huang | HS 13 | SA-2013-63 | ||
![]() |
Healthy Navigation [confidential] | Embedded Systems | S | David Hasenfratz, Olga Saukh |
HS 13 | SA-2013-48 | ||
![]() |
Powerful Software | Embedded Systems | M | Pratyush Kumar, Lars Schor |
HS 13 | MA-2013-11 | ||
![]() |
Implementation and Evaluation of Mixed-Criticality Scheduling Algorithms for Multi-Core Systems | Embedded Systems | S | Georgia Giannopoulou, Pengcheng Huang |
HS 13 | SA-2013-57 | ||
![]() |
Sense the Air You Breathe! | Embedded Systems | S | David Hasenfratz, Christoph Walser |
HS 13 | SA-2013-51 | ||
![]() |
Blue Wallet: A Bitcoin Hardware Token and Electronic Wallet [confidential] | End-point Security | M | Christian Decker, Samuel Welten |
HS 13 | MA-2013-15 | ||
![]() |
Location-Aware Currency for a Social Shopping Game [confidential] | External Projects | S | Sacha Trifunovic | HS 13 | SA-2013-69 | ||
![]() |
XMPProbe - XMPP Server Monitoring | Internet Measurement | S | Brian Trammell, Xenofontas Dimitropoulos |
HS 13 | SA-2013-66 | ||
![]() |
Finding rogue WLAN Access Points [confidential] | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-10 | ||
![]() |
Time-of-Flight WLAN Indoor Tracking System | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-13 | ||
![]() |
Cross-Domain DoS Link-Flooding Attack Detection and Mitigation using SDN Principles | Network Security | M | Vasileios Kotronis, Xenofontas Dimitropoulos |
HS 13 | MA-2013-18 | ||
![]() |
Paying your Internet, One Byte at a Time | Service Provisioning | S | Christian Decker | HS 13 | SA-2013-49 | ||
![]() |
Evaluating the Effect of SDN Centralization on Internet Routing Convergence | Software Defined Networking | M | Vasileios Kotronis, Xenofontas Dimitropoulos |
HS 13 | MA-2013-19 | ||
![]() |
Policy-based Injection of Private Traffic into a Public SDN Testbed | Software Defined Networking | M | , Vasileios Kotronis |
HS 13 | MA-2013-12 | ||
![]() |
Audio-Visual Speech Activity Detection | Speech Processing | S | Tofigh Naghibi, Beat Pfister |
HS 13 | SA-2013-52 | ||
![]() |
UepaaNet Testbed, Performance Evaluation and Optimization [confidential] | Wireless Mesh Networks | M | Franck Legendre, Bernhard Distl |
HS 13 | MA-2013-07 | ||
![]() |
Bandwidth Hopping Spread Spectrum [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-20 | ||
![]() |
Design and Implementation of a GameCenter for Opportunistic Networks | G | Sacha Trifunovic | FS 13 |
, , |
GA-2013-05 | ||
![]() |
Accurate Localisation Using a Surround Speaker System [confidential] | B | Samuel Welten, Pascal Bissig |
FS 13 | BA-2013-02 | |||
![]() |
Android Workout | S | Klaus-Tycho Förster, Jara Uitto |
FS 13 | SA-2013-47 | |||
![]() |
Adversarial ANTS | M | Tobias Langner, Jara Uitto |
FS 13 | MA-2013-09 | |||
![]() |
Desktop-Client with Smart Synchronization | B | Samuel Welten, Tobias Langner |
FS 13 | BA-2013-03 | |||
![]() |
Efficient Multi-Aggregation with Applications to Centrality Computation [confidential] | S | Stephan Holzer | FS 13 | SA-2013-40 | |||
![]() |
Messaging Challenges in a Globally Distributed Network | M | David Gugelmann | FS 13 | MA-2013-02 | |||
![]() |
Obstacle Warning Mechanism for Smartphones [confidential] | G | Klaus-Tycho Förster, Jara Uitto |
FS 13 |
, |
GA-2013-04 | ||
![]() |
WLAN-Opp-based Game: Infectious | G | Sacha Trifunovic | FS 13 |
, |
GA-2013-06 | ||
![]() |
Personalized Filtering of Real Estate Offers [confidential] | M | Pascal Bissig, Philipp Brandes |
FS 13 | MA-2013-05 | |||
![]() |
WalkUnlock [confidential] | S | Samuel Welten, Pascal Bissig |
FS 13 | SA-2013-07 | |||
![]() |
Realtime Capacity Utilization | G | Samuel Welten | FS 13 |
, |
GA-2013-02 | ||
![]() |
Smart Photo Viewer | S | Michael König | FS 13 | SA-2013-45 | |||
![]() |
Smart Sun Protector [confidential] | B | Samuel Welten | FS 13 | BA-2013-01 | |||
![]() |
Steering an Autonomous Weather Balloon | S | Jara Uitto, Samuel Welten |
FS 13 | SA-2013-02 | |||
![]() |
TV 2.0 - Your Individual TV Experience! | B | Tobias Langner | FS 13 | BA-2013-16 | |||
![]() |
Using Social Proof to Evaluate Start-ups Investment Opportunities [confidential] | S | Philipp Brandes | FS 13 | SA-2013-39 | |||
![]() |
What`s it Worth? | S | Philipp Brandes, Pascal Bissig |
FS 13 | SA-2013-04 | |||
![]() |
NiMH Battery State-of-Charge Approximation | Ad-hoc-Networks | S | Bernhard Buchli, Felix Sutton |
FS 13 | SA-2013-05 | ||
![]() |
Power Management for the CoreStation Platform | Ad-hoc-Networks | S | Bernhard Buchli, Tonio Gsell |
FS 13 | SA-2013-41 | ||
![]() |
Cool Linux | Embedded Systems | S | Lars Schor, Pratyush Kumar |
FS 13 |
, |
SA-2013-06 | |
![]() |
Intrusion Prevention for Flexible Protocol Stacks | Embedded Systems | M | Ariane Trammell, Markus Happe |
FS 13 | MA-2013-04 | ||
![]() |
Investigating the Accuracy of SIFS Time for Time-Of-Flight WLAN Localization [confidential] | Embedded Systems | S | Domenico Giustiniano | FS 13 | SA-2013-03 | ||
![]() |
Power-line Communication Performance for Peer-To-Peer Mesh Networks in Urban Neighbourhoods | Embedded Systems | S | Domenico Giustiniano | FS 13 | SA-2013-42 | ||
![]() |
Implementation and Evaluation of Mixed Criticality Scheduling Approaches | Embedded Systems | S | Pengcheng Huang, Georgia Giannopoulou |
FS 13 | SA-2013-01 | ||
![]() |
Screen Watermarking for Data Leakage Investigations [confidential] | End-point Security | M | David Gugelmann | FS 13 | MA-2013-06 | ||
![]() |
Visualizing Dynamics in Frequent Itemset Mining Timeseries | Internet Measurement | S | , Eduard Glatz |
FS 13 | SA-2013-43 | ||
![]() |
Analysis of Data Leakage over HTTP [confidential] | Network Security | M | David Gugelmann | FS 13 | MA-2013-03 | ||
![]() |
Supporting Header Field Re-writing for Policy-bound Flows in a Software Defined Network | Software Defined Networking | S | FS 13 | SA-2013-44 | |||
![]() |
AudioInspector | Speech Processing | G | Beat Pfister, Sarah Hoffmann |
FS 13 |
, |
GA-2013-01 | |
![]() |
Clap Detection with Microcontroller | Speech Processing | G | Beat Pfister, Tofigh Naghibi |
FS 13 |
, , , |
GA-2013-03 | |
![]() |
Jamming-resistant Wireless Communication [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
FS 13 | MA-2013-01 | ||
![]() |
An Evaluation Framework for Time Synchronization in Lossy Links | M | Roger Wattenhofer | HS 12 | MA-2012-18 | |||
![]() |
Collaborative OCR for Tabularized Data | S | Tobias Langner, Jochen Seidel |
HS 12 | SA-2012-26 | |||
![]() |
Find your Personal Movie Critic [confidential] | S | Barbara Keller, Michael König |
HS 12 | SA-2012-13 | |||
![]() |
Bluetooth Jamming | B | Michael König | HS 12 | BA-2012-16 | |||
![]() |
Gait Recognition in Your Pocket [confidential] | S | Samuel Welten, Pascal Bissig |
HS 12 | SA-2012-18 | |||
![]() |
Improving Smartphone Indoor Localization [confidential] | M | Pascal Bissig, Samuel Welten |
HS 12 | MA-2012-21 | |||
![]() |
Make Us Richer! | B | Philipp Brandes | HS 12 | BA-2012-12 | |||
![]() |
NFC Glove | S | Klaus-Tycho Förster, Jochen Seidel |
HS 12 | SA-2012-15 | |||
![]() |
OppMap: Opportunistic Map and Location Sharing | S | Sacha Trifunovic | HS 12 |
, |
SA-2012-24 | ||
![]() |
WiFi-based Overflight Localization of Victims [confidential] | M | Franck Legendre | HS 12 | MA-2012-16 | |||
![]() |
Radio 2.0 [confidential] | B | Samuel Welten | HS 12 | BA-2012-10 | |||
![]() |
Smart Homes and Weather Events | B | Tobias Langner | HS 12 | BA-2012-13 | |||
![]() |
Smart Phone Skydiving [confidential] | G | Jara Uitto, Samuel Welten |
HS 12 |
, |
GA-2012-06 | ||
![]() |
Smartphone Localization Using a Surround Speaker System [confidential] | S | Pascal Bissig, Samuel Welten |
HS 12 | SA-2012-20 | |||
![]() |
SnowDroid - Your Private Snowboard Instructor | B | Tobias Langner | HS 12 | BA-2012-15 | |||
![]() |
Stabilizing Flight | G | Jara Uitto, Pascal Bissig |
HS 12 |
, , |
GA-2012-08 | ||
![]() |
Tampering with Distributed Hash Tables | M | Jochen Seidel, Christian Decker |
HS 12 | MA-2012-25 | |||
![]() |
Throw Your Smartphone | S | Barbara Keller, Jara Uitto |
HS 12 | SA-2012-12 | |||
![]() |
RealPong [confidential] | G | Samuel Welten, Pascal Bissig |
HS 12 |
, , |
GA-2012-07 | ||
![]() |
Use News to Make Us Rich! | S | Philipp Brandes | HS 12 | SA-2012-38 | |||
![]() |
WLAN-Opp-based Turn-based Strategy Game | S | Sacha Trifunovic | HS 12 | SA-2012-28 | |||
![]() |
CamZilla: A GigaPixel Panorama Robot in the Mountains | Ad-hoc-Networks | S | Matthias Keller, Jan Beutel |
HS 12 | SA-2012-11 | ||
![]() |
Real-World Evaluation of Ad Hoc Routing Algorithms | Ad-hoc-Networks | S | Mahdi Asadpour, Domenico Giustiniano |
HS 12 | SA-2012-35 | ||
![]() |
Time-of-Flight WLAN Localization [confidential] | Ad-hoc-Networks | S | Domenico Giustiniano | HS 12 | SA-2012-25 | ||
![]() |
Improved Offline Operation of Twimight | Ad-hoc-Networks | S | Theus Hossmann, Paolo Carta |
HS 12 | SA-2012-36 | ||
![]() |
Wireless Yet Reliable Patient Notification System: GUI and Back-end | Ad-hoc-Networks | S | Marco Zimmerling, Olga Saukh |
HS 12 | SA-2012-34 | ||
![]() |
WLAN based Opportunistic Networking Performance Evaluation and Optimization | Ad-hoc-Networks | M | Sacha Trifunovic, Bernhard Distl |
HS 12 | MA-2012-31 | ||
![]() |
Executing Process Networks on Heterogeneous Platforms using OpenCL | Embedded Systems | M | Lars Schor, Andreas Tretter |
HS 12 | MA-2012-22 | ||
![]() |
Designing a Benchmark for Many-Core Architectures | Embedded Systems | S | Devendra Rai, Lars Schor |
HS 12 | SA-2012-17 | ||
![]() |
Have a Break! Pay with Bitcoin [confidential] | Embedded Systems | G | Christian Decker, Samuel Welten |
HS 12 |
, |
GA-2012-05 | |
![]() |
Hardware Encryption for Embedded Systems | Embedded Systems | S | Ariane Trammell, Stephan Neuhaus |
HS 12 | SA-2012-16 | ||
![]() |
Application-Level Scheduling of Real-Time Tasks [confidential] | Embedded Systems | M | Lars Schor, Pratyush Kumar |
HS 12 | MA-2012-15 | ||
![]() |
Best Practices to Securely Operate Hardware Security Modules in a High Availability Setup | External Projects | S | Stephan Neuhaus | HS 12 | SA-2012-27 | ||
![]() |
Showing The Way To Alpine Safety [confidential] | External Projects | S | Franck Legendre | HS 12 | SA-2012-33 | ||
![]() |
Fraud Prevention and Detection in Mobile Payments [confidential] | Internet Economics | M | Christian Decker | HS 12 | MA-2012-26 | ||
![]() |
OpenFlow: A Security Analysis | Network Security | M | Paul Smith, Vasileios Kotronis |
HS 12 | MA-2012-20 | ||
![]() |
Anomaly Detection with Virtual Service Migration in Cloud Infrastructures | Network Security | M | Paul Smith, Bernhard Plattner |
HS 12 | MA-2012-17 | ||
![]() |
Text-Independent Speaker Verification with HMM-Based Abstract Acoustic Elements | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
HS 12 | SA-2012-32 | ||
![]() |
Reducing Energy Consumption in Hybrid Wireless Communication | Wireless Mesh Networks | S | Karin Anna Hummel, Franck Legendre |
HS 12 | SA-2012-22 | ||
![]() |
On the Feasibility of Opportunistic Ad Hoc Music Sharing [confidential] | B | Barbara Keller, Samuel Welten |
FS 12 | BA-2012-02 | |||
![]() |
Smart Shopping | G | Jochen Seidel | FS 12 |
, , |
GA-2012-03 | ||
![]() |
RFID-powered vending machine | G | Sacha Trifunovic | FS 12 |
, Johannes Suter |
GA-2012-01 | ||
![]() |
Sundroid v3 - Entwicklung eines solarbetriebenen UV Sensors [confidential] | S | Samuel Welten | FS 12 | SA-2012-08 | |||
![]() |
Entwicklung einer Android-App zur Förderung des UV-Bewusstseins für medizinische Anwendungen [confidential] | G | Samuel Welten | FS 12 |
, , |
GA-2012-04 | ||
![]() |
Enhancing the Performance of Twitter Storm with In-Network Processing | B | Roger Wattenhofer | FS 12 | BA-2012-14 | |||
![]() |
Extending the Personal Music Collection by Free Music | B | Samuel Welten | FS 12 | BA-2012-05 | |||
![]() |
Hazards of iterated block ciphers without expansion [confidential] | M | Roger Wattenhofer | FS 12 | MA-2012-24 | |||
![]() |
Identifying Music and Inferring Similarity | B | Samuel Welten | FS 12 | BA-2012-07 | |||
![]() |
Local Browsing | S | Bernhard Plattner | FS 12 |
, , |
SA-2012-37 | ||
![]() |
Make Us Rich! | S | Philipp Brandes | FS 12 | SA-2012-06 | |||
![]() |
Modern GPGPU Frameworks and their Application to the Physical Core of the ASUCA Weather Prediction Model | M | Roger Wattenhofer | FS 12 | MA-2012-23 | |||
![]() |
Music Tagging - A Social Game | B | Samuel Welten, Tobias Langner |
FS 12 | BA-2012-09 | |||
![]() |
My Music Statistics | B | Samuel Welten | FS 12 | BA-2012-06 | |||
![]() |
Probabilistic Inference in Online Social Networks [confidential] | M | Vincent Lenders, Franck Legendre |
FS 12 | MA-2012-12 | |||
![]() |
Collusion in Online Poker Pays Off | B | Tobias Langner | FS 12 | BA-2012-03 | |||
![]() |
Smartphone-Based Indoor Localization [confidential] | M | Samuel Welten | FS 12 | MA-2012-01 | |||
![]() |
New Algorithms for Fundamental Problems in Wireless Networks [confidential] | M | Stephan Holzer | FS 12 | MA-2012-14 | |||
![]() |
Virtual ID | G | Barbara Keller, Jochen Seidel |
FS 12 |
, |
GA-2012-02 | ||
![]() |
New Ways of Browsing and Reading News | M | Samuel Welten | FS 12 | MA-2012-05 | |||
![]() |
A Lightweight Data Dissemination Algorithm for Multi-hop Wireless Networks | Ad-hoc-Networks | S | Mahdi Asadpour, Karin Anna Hummel |
FS 12 | SA-2012-09 | ||
![]() |
Measuring Electrosmog Exposure Using Commodity Hardware [confidential] | Ad-hoc-Networks | M | David Hasenfratz, Olga Saukh |
FS 12 | MA-2012-09 | ||
![]() |
Recipes for Wireless Sensor Networks | Ad-hoc-Networks | S | Roman Lim, Jan Beutel |
FS 12 | SA-2012-10 | ||
![]() |
Spatial and Temporal Sensor Data Classification [confidential] | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
FS 12 | SA-2012-02 | ||
![]() |
WLAN-Opp-based RPG | Ad-hoc-Networks | B | Sacha Trifunovic | FS 12 | BA-2012-08 | ||
![]() |
Advanced Features for a Software Development Environment for Many-Core Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
FS 12 | SA-2012-07 | ||
![]() |
Efficient Process Network Specification of Ray-Tracing Application [confidential] | Embedded Systems | M | Hoeseok Yang, Iuliana Bacivarov |
FS 12 | MA-2012-10 | ||
![]() |
The Edit History of the National Vulnerability Database - and similar Vulnerability Databases | Internet Measurement | M | Stephan Neuhaus | FS 12 | MA-2012-06 | ||
![]() |
Production Traffic as a Service, Debugging OpenFlow Networks | Internet Measurement | M | Xenofontas Dimitropoulos, Vasileios Kotronis |
FS 12 | MA-2012-07 | ||
![]() |
Who turned off the Internet? [confidential] | Internet Measurement | M | Dominik Schatzmann | FS 12 | MA-2012-11 | ||
![]() |
Flow-Based Online-Time Anomaly Detection for Large Networks [confidential] | Network Security | S | Dominik Schatzmann | FS 12 | SA-2012-05 | ||
![]() |
Predicting the Impact of Denial of Service Attacks | Network Security | M | Vincent Lenders, David Gugelmann |
FS 12 | MA-2012-03 | ||
![]() |
WLAN-OPP Privacy | Network Security | S | Bernhard Distl, Franck Legendre |
FS 12 |
, |
SA-2012-01 | |
![]() |
UAVs in Rescue Mission Networks | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 12 | SA-2012-03 | ||
![]() |
Speech Features for Optimal Discrimination of Phonemes | Speech Processing | S | Beat Pfister, Sarah Hoffmann |
FS 12 | SA-2012-04 | ||
![]() |
An In-Memory RDMA-Based Architecture for the Hadoop Distributed Filesystem | Systems Optimization | M | Xenofontas Dimitropoulos | FS 12 | MA-2012-04 | ||
![]() |
Employing Opportunistic Communication to Relieve Cellular Data Traffic: Analysis and Evaluation [confidential] | Systems Optimization | M | Domenico Giustiniano, Franck Legendre |
FS 12 | MA-2012-13 | ||
![]() |
Ultra-fast and Accurate Wireless Link Quality Estimation and the Bene | Wireless Mesh Networks | M | Vincent Lenders, Franck Legendre |
FS 12 | MA-2012-02 | ||
![]() |
Ultra-low Power Wireless Hierarchical Sensing | Wireless Mesh Networks | M | Bernhard Buchli, Jan Beutel |
FS 12 | MA-2012-08 | ||
![]() |
Load-Balancing of Consumers in Electricity Networks | M | Stephan Holzer | HS 11 | MA-2011-19 | |||
![]() |
Collaborative Go | M | Samuel Welten | HS 11 | MA-2011-14 | |||
![]() |
Traffic Measurement on OpenFlow-enabled Switches | S | Jose F. Mingorance-Puga, Wolfgang Mühlbauer |
HS 11 | SA-2011-21 | |||
![]() |
Distributed Approximation Algorithms [confidential] | B | Stephan Holzer | HS 11 | BA-2011-10 | |||
![]() |
Extending HikeDroid - Smart Features for Hikers | B | Tobias Langner, Samuel Welten |
HS 11 | BA-2011-11 | |||
![]() |
Extending Social Music Similarity Measures by Audio Features | M | Samuel Welten | HS 11 | MA-2011-21 | |||
![]() |
Optimizing a UV radiation sensor for a medical application [confidential] | S | Samuel Welten | HS 11 | SA-2011-34 | |||
![]() |
Path Tracking - Guiding Smartphones Based on Recorded Tracks | G | Tobias Langner, Jochen Seidel |
HS 11 |
, |
GA-2011-06 | ||
![]() |
SGT Toolbox - A Playground for Spectral Graph Theory | M | Tobias Langner, Barbara Keller |
HS 11 | MA-2011-23 | |||
![]() |
Signature Verification on Finger Operated Touchscreen Devices | S | Tobias Langner, Samuel Welten |
HS 11 | SA-2011-23 | |||
![]() |
JUKEFOX core extraction | S | Tobias Langner, Samuel Welten |
HS 11 |
, |
SA-2011-25 | ||
![]() |
Development of a Location Based Game for Android Phones | S | Sacha Trifunovic, Bernhard Distl |
HS 11 |
, |
SA-2011-29 | ||
![]() |
What is New? Information and Entertainment Application for Android and iPhone | B | Samuel Welten | HS 11 | BA-2011-12 | |||
![]() |
Your Personalized Radio [confidential] | M | Samuel Welten | HS 11 | MA-2011-24 | |||
![]() |
Prototype of a Mobile Avalanche Rescue Beacon [confidential] | Ad-hoc-Networks | S | Bernhard Distl, Franck Legendre |
HS 11 | SA-2011-32 | ||
![]() |
Sensor-Based Control of Water Samplers in WSNs | Ad-hoc-Networks | M | Jan Beutel | HS 11 | MA-2011-22 | ||
![]() |
Timely Localization and Multi-Object Tracking for Sensor Networks [confidential] | Ad-hoc-Networks | M | Federico Ferrari, Marco Zimmerling |
HS 11 | MA-2011-25 | ||
![]() |
An Evaluation of Low Cost Inertial Sensors for Hierarchical Sensing | Ad-hoc-Networks | G | Bernhard Buchli | HS 11 |
, |
GA-2011-07 | |
![]() |
GasMobile: Operating Gas Sensors with Mobile Phones | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
HS 11 | SA-2011-24 | ||
![]() |
Specification and Implementation of the Twimight Server | Ad-hoc-Networks | S | Theus Hossmann, Dominik Schatzmann |
HS 11 | SA-2011-31 | ||
![]() |
Algorithms for Sensor Localization and Synchronization in Wireless Sensor Networks | Embedded Systems | M | Olga Saukh | HS 11 | MA-2011-13 | ||
![]() |
Execution of Multiple Dynamic Applications on a Many-Core Platform [confidential] | Embedded Systems | M | Lars Schor, Devendra Rai |
HS 11 | MA-2011-18 | ||
![]() |
A Dynamic Hardware Architecture for Future Networks | Embedded Systems | M | Ariane Trammell, Stephan Neuhaus |
HS 11 | MA-2011-27 | ||
![]() |
Network Protocols for Embedded Devices | Embedded Systems | M | Ariane Trammell, Stephan Neuhaus |
HS 11 | MA-2011-28 | ||
![]() |
Software Development Environment for Many-Core Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
HS 11 | SA-2011-26 | ||
![]() |
Task Migration for Multi-Processor Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
HS 11 | SA-2011-27 | ||
![]() |
Automatic Rating of VPN Links | External Projects | M | Martin Burkhart, David Gugelmann |
HS 11 | MA-2011-17 | ||
![]() |
Selfish Network Link Speedup [confidential] | Internet Economics | S | Raphael Eidenbenz | HS 11 | SA-2011-33 | ||
![]() |
Fuzzy Attacks on Web Logs | Network Security | G | David Gugelmann, Stephan Neuhaus |
HS 11 | GA-2011-05 | ||
![]() |
SEPIA Mobile: Teaching Privacy to Android Apps | Network Security | S | Martin Burkhart, Dilip Many |
HS 11 | SA-2011-22 | ||
![]() |
Exploring and Improving BitTorrent Swarm Topologies [confidential] | Peer-to-Peer Networks | M | Raphael Eidenbenz, Roger Wattenhofer |
HS 11 | MA-2011-20 | ||
![]() |
WLAN-OPP: WLAN-based Opportunistic Networking Implementation on Android | Peer-to-Peer Networks | S | Bernhard Distl, Sacha Trifunovic |
HS 11 | SA-2011-35 | ||
![]() |
Automatic Pronounciation Verification | Speech Processing | S | Beat Pfister, Sarah Hoffmann |
HS 11 | SA-2011-28 | ||
![]() |
Battery State of Charge Modeling | Wireless Mesh Networks | S | Bernhard Buchli | HS 11 | SA-2011-30 | ||
![]() |
Energy Harvesting Wireless Anemometer [confidential] | S | Johannes Schneider, Philipp Sommer |
FS 11 | SA-2011-11 | |||
![]() |
A Wireless Sensor Network for Orienteering Competitions | M | Philipp Sommer | FS 11 | MA-2011-15 | |||
![]() |
A touch-based music player interface optimized for tablet-sized devices | B | Samuel Welten | FS 11 | BA-2011-06 | |||
![]() |
Approximations and Heuristics for Estimating the Diameter of a graph [confidential] | B | Stephan Holzer | FS 11 | BA-2011-01 | |||
![]() |
User Behavior Profiling using Smartphones | M | Sacha Trifunovic | FS 11 | MA-2011-06 | |||
![]() |
Debugging TinyOS with COOJA | S | Philipp Sommer | FS 11 | SA-2011-06 | |||
![]() |
Lower Bounds for Distributed Computation of Basic Graph Properties [confidential] | S | Stephan Holzer | FS 11 | SA-2011-19 | |||
![]() |
Distributed Graph Coloring | S | Johannes Schneider | FS 11 | SA-2011-08 | |||
![]() |
Enhancement of Website Usability for Mobile Phones | M | Samuel Welten | FS 11 | MA-2011-16 | |||
![]() |
Explore the World of Bookcrossing | M | Raphael Eidenbenz, Roger Wattenhofer |
FS 11 | MA-2011-10 | |||
![]() |
Extensions to FACT (Flow-Based Approach for Connectivity Tracking) [confidential] | S | Dominik Schatzmann, Wolfgang Mühlbauer |
FS 11 |
, |
SA-2011-14 | ||
![]() |
FooDroid: A Food Recommendation App for University Canteens | S | Tobias Langner, Samuel Welten |
FS 11 | SA-2011-16 | |||
![]() |
A Testbed for Radio Propagation Measurements in Wireless Sensor Networks | S | Philipp Sommer | FS 11 | SA-2011-05 | |||
![]() |
HikeDroid - GPS Navigation for Hikers on Android Phones | B | Tobias Langner, Samuel Welten |
FS 11 | BA-2011-02 | |||
![]() |
Is it me? User detection on Personal (Android) Devices [confidential] | M | Samuel Welten | FS 11 | MA-2011-04 | |||
![]() |
Let your friends and mobile phone help you | S | Johannes Schneider | FS 11 | SA-2011-04 | |||
![]() |
Localizing Your Smart Phone | S | Johannes Schneider | FS 11 | SA-2011-03 | |||
![]() |
Mobile Peer-to-Peer Audio Streaming | B | Remo Meier | FS 11 | BA-2011-03 | |||
![]() |
Live Audio Streaming in Mobile Peer-to-Peer Systems | M | Remo Meier | FS 11 | MA-2011-11 | |||
![]() |
Mobile Sensing – Ein drahtloses Messsystem für die Druckanalyse von Füssen [confidential] | S | Samuel Welten, Philipp Sommer |
FS 11 |
, |
SA-2011-10 | ||
![]() |
MEAMM - Movie Experience and Metadata Manager | G | Raphael Eidenbenz | FS 11 |
, |
GA-2011-01 | ||
![]() |
Multicast-enabled Peer-to-Peer Systems [confidential] | M | Remo Meier | FS 11 | MA-2011-09 | |||
![]() |
Death to Balloons | S | Johannes Schneider, Samuel Welten |
FS 11 | SA-2011-12 | |||
![]() |
Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures | B | Raphael Eidenbenz, Roger Wattenhofer |
FS 11 | BA-2011-07 | |||
![]() |
Smart (Collaborative) Control [confidential] | B | Johannes Schneider | FS 11 | BA-2011-09 | |||
![]() |
Social Data Mining on Smartphones | S | Sacha Trifunovic | FS 11 | SA-2011-09 | |||
![]() |
Topology-Aware Peer-to-Peer Systems [confidential] | B | Remo Meier | FS 11 | BA-2011-04 | |||
![]() |
Tweaking Throughput on the Transport Layer [confidential] | B | Raphael Eidenbenz | FS 11 | BA-2011-08 | |||
![]() |
Virtual Wishlist | G | Sacha Trifunovic | FS 11 |
, , |
GA-2011-02 | ||
![]() |
wgfinance | G | Barbara Keller | FS 11 |
, , , |
GA-2011-03 | ||
![]() |
Comparative Analysis of Dozer Network Performance | Ad-hoc-Networks | S | Matthias Keller | FS 11 | SA-2011-13 | ||
![]() |
Implementation of a Disaster Mode to Maintain Twitter Communications in Times of Network Outages | Ad-hoc-Networks | M | Theus Hossmann, Franck Legendre |
FS 11 | MA-2011-02 | ||
![]() |
Inferring Shared Interests from Tweets | Ad-hoc-Networks | S | Theus Hossmann, Franck Legendre |
FS 11 | SA-2011-20 | ||
![]() |
Lightweight Autonomic Network Architecture | Embedded Systems | M | Ariane Trammell, Wolfgang Mühlbauer |
FS 11 | MA-2011-01 | ||
![]() |
A Framework for the State-based Real-time Analysis of Resource Contention Scenarios in Multicore Architectures [confidential] | Embedded Systems | M | Kai Lampka, Andreas Schranzhofer |
FS 11 | MA-2011-08 | ||
![]() |
Eciently programming the Intel SCC | Embedded Systems | S | Iuliana Bacivarov, Hoeseok Yang |
FS 11 | SA-2011-15 | ||
![]() |
Platform-Independent Software Development for Real-Time Embedded Systems [confidential] | Embedded Systems | M | Ehud Ben-Porat | FS 11 | MA-2011-26 | ||
![]() |
Extending HAPviewer: Time Window, Flow Classification, and Geolocation | Network Security | M | Eduard Glatz, Xenofontas Dimitropoulos |
FS 11 | MA-2011-12 | ||
![]() |
Practical Private Set Operations using Probabilistic Data Structures [confidential] | Network Security | M | Martin Burkhart, Dilip Many |
FS 11 | MA-2011-07 | ||
![]() |
Security Assessment of Infection Incidents in the ETH University Campus | Network Security | M | Elias Raftopoulos, Xenofontas Dimitropoulos |
FS 11 | MA-2011-03 | ||
![]() |
Security Monitoring at Enterprise Level [confidential] | Network Security | M | David Gugelmann | FS 11 | MA-2011-05 | ||
![]() |
Network Coding for Opportunistic Content Delivery Networks (o-CDN) [confidential] | Peer-to-Peer Networks | S | Gabriel Popa, Kavé Salamatian |
FS 11 | SA-2011-18 | ||
![]() |
Peer to Peer and Mobile Systems Support | Peer-to-Peer Networks | S | Remo Meier | FS 11 | SA-2011-17 | ||
![]() |
Performance Evaluation of OpenFlow Switches | Performance Evaluation | S | Jose F. Mingorance-Puga, Wolfgang Mühlbauer |
FS 11 | SA-2011-07 | ||
![]() |
Implementation and evaluation of an HMM-based speech generation component for the SVOX TTS system | Speech Processing | S | Thomas Ewender, Sarah Hoffmann |
FS 11 | SA-2011-02 | ||
![]() |
Historische Entwicklung der Sicherheit in Wireless Netzwerken | Wireless Security | G | David Gugelmann, Dominik Schatzmann |
FS 11 |
, |
GA-2011-04 | |
![]() |
Analysis of Sleeping Patterns Using Smartphone Sensors | S | Johannes Schneider | HS 10 |
, |
SA-2010-26 | ||
![]() |
Automated Appointment Recommendation on Mobile Devices [confidential] | S | Michael Kuhn, Samuel Welten |
HS 10 | SA-2010-19 | |||
![]() |
Automated Meta-Data Extraction for Confsearch | S | Michael Kuhn | HS 10 | SA-2010-13 | |||
![]() |
Localization of (moving) objects | S | Johannes Schneider | HS 10 | SA-2010-14 | |||
![]() |
YouTube News Channels: Classification and Relationships [confidential] | M | Michael Kuhn | HS 10 | MA-2010-18 | |||
![]() |
Acoustic Emission Sensing in Wireless Sensor Networks | Ad-hoc-Networks | M | Jan Beutel | HS 10 | MA-2010-08 | ||
![]() |
Experimental Performance Evaluation of Routing In Delay Tolerant Networks | Ad-hoc-Networks | M | Theus Hossmann, Franck Legendre |
HS 10 | MA-2010-16 | ||
![]() |
Using Dual Radios in Infrastructure-supported Mesh Networks: A Theme Park Scenario [confidential] | Ad-hoc-Networks | M | Philipp Sommer | HS 10 | MA-2010-15 | ||
![]() |
Distributed Simulation of Dynamic and Fault Tolerant System | Embedded Systems | M | Iuliana Bacivarov, Hoeseok Yang |
HS 10 | MA-2010-13 | ||
![]() |
Efficient and Predictable Real-Time Systems on Multiprocessor Platforms - Tackling the placement problem | Embedded Systems | M | Andreas Schranzhofer | HS 10 | MA-2010-12 | ||
![]() |
Interface Development for Next Generation FlockLab | Embedded Systems | S | Christoph Walser, Federico Ferrari |
HS 10 | SA-2010-17 | ||
![]() |
Sensor-Feeds for a WSN Simulation Environment [confidential] | Embedded Systems | M | Philipp Sommer | HS 10 | MA-2010-14 | ||
![]() |
Thermal Simulation and Analysis Methods for Many-Core Platforms | Embedded Systems | M | Iuliana Bacivarov, Hoeseok Yang |
HS 10 | MA-2010-09 | ||
![]() |
GPS-equipped Wireless Sensor Node for PermaSense | Embedded Systems | S | Bernhard Buchli, Jan Beutel |
HS 10 | SA-2010-18 | ||
![]() |
Identification of Connectivity Issues in Large Networks using Data Plane | Internet Measurement | S | Dominik Schatzmann, Wolfgang Mühlbauer |
HS 10 | SA-2010-21 | ||
![]() |
Wirefox – A Measurement Plug-In for Firefox | Internet Measurement | S | Dominik Schatzmann, Wolfgang Mühlbauer |
HS 10 | SA-2010-20 | ||
![]() |
Phased STM [confidential] | Multicore Architecture | S | Johannes Schneider | HS 10 | SA-2010-16 | ||
![]() |
Evaluating and Improving the Detection of Internet Background Radiation | Network Security | S | Eduard Glatz, Xenofontas Dimitropoulos |
HS 10 | SA-2010-23 | ||
![]() |
SMS-based Certificate Authority | Network Security | S | Sacha Trifunovic | HS 10 | SA-2010-25 | ||
![]() |
Custom Media Player with Integrated Feedback | Peer-to-Peer Networks | S | Sacha Trifunovic | HS 10 | SA-2010-24 | ||
![]() |
On-Demand Content Delivery [confidential] | Peer-to-Peer Networks | G | Remo Meier | HS 10 |
, |
GA-2010-06 | |
![]() |
Hidden Markov Models for Speech Segmentation | Speech Processing | S | Sarah Hoffmann | HS 10 | SA-2010-15 | ||
![]() |
A wireless real-time network for roller coasters [confidential] | Wireless Mesh Networks | S | Johannes Schneider, Philipp Sommer |
HS 10 | SA-2010-22 | ||
![]() |
Information Dissemination in Vehicular Networks | Wireless Mesh Networks | M | Franck Legendre, Thrasyvoulos Spyropoulos |
HS 10 | MA-2010-11 | ||
![]() |
Wireless Link Quality Estimation in Mobile Networks | Wireless Mesh Networks | M | Vincent Lenders, Franck Legendre |
HS 10 | MA-2010-17 | ||
![]() |
Studying Social-driven Mobility - Comparing Face-to-Face Meetings to Online Social Network Activity | M | Thrasyvoulos Spyropoulos, Franck Legendre |
FS 10 | MA-2010-06 | |||
![]() |
Time Awareness | G | Michael Kuhn, Samuel Welten |
FS 10 |
, , |
GA-2010-03 | ||
![]() |
Distributed Challenge Analysis and Remediation in Wireless Mesh Networks | M | Merkourios Karaliopoulos | FS 10 | MA-2010-10 | |||
![]() |
Head Tracking durch Bildanalyse auf einem Smartphone | G | Samuel Welten, Michael Kuhn |
FS 10 |
, |
GA-2010-05 | ||
![]() |
Musicexplorer Winamp Plugin | G | Michael Kuhn, Samuel Welten |
FS 10 |
, |
GA-2010-04 | ||
![]() |
Refactoring Extension for the Yeti Eclipse Plugin | G | Benjamin Sigg | FS 10 |
, |
GA-2010-01 | ||
![]() |
Debugging Wireless Sensor Network Simulations | Ad-hoc-Networks | S | Philipp Sommer | FS 10 | SA-2010-05 | ||
![]() |
Implementation of an Adaptive Dissemination Protocol on Sensor Nodes | Ad-hoc-Networks | S | Federico Ferrari, Marco Zimmerling |
FS 10 | SA-2010-11 | ||
![]() |
Management Software für ein Wireless Sensor Netzwerk Testbed | Ad-hoc-Networks | S | Matthias Woehrle, Christoph Walser |
FS 10 | SA-2010-06 | ||
![]() |
ParaglidingNet: A Sensor Network for Thermal Research [confidential] | Ad-hoc-Networks | M | Philipp Sommer | FS 10 | MA-2010-02 | ||
![]() |
Push vs. Pull in Wireless Sensor Networks [confidential] | Ad-hoc-Networks | M | Marco Zimmerling, Andreas F. Meier |
FS 10 | MA-2010-05 | ||
![]() |
SunDroid - A Wearable Sunburn Warning System for Android [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Samuel Welten |
FS 10 | SA-2010-10 | ||
![]() |
Predictable Communication on Multiprocessor Platforms | Embedded Systems | M | Andreas Schranzhofer | FS 10 | MA-2010-07 | ||
![]() |
Online GPS for PermaSense WSN | Embedded Systems | S | Bernhard Buchli, Jan Beutel |
FS 10 | SA-2010-12 | ||
![]() |
Modular Performance Analysis of Large-scale Distributed Embedded Systems [confidential] | Embedded Systems | S | Simon Perathoner, Kai Lampka |
FS 10 | SA-2010-08 | ||
![]() |
Multi-Sensor Monitoring for Host Security Characterization [confidential] | End-point Security | M | Elias Raftopoulos, Bernhard Tellenbach |
FS 10 | MA-2010-04 | ||
![]() |
SEBPS v1.0: Designing a Secure and Maintainable End-User Platform | End-point Security | S | Lukas Ruf | FS 10 | SA-2010-09 | ||
![]() |
Practicability of T4T Along Cycles | Peer-to-Peer Networks | S | Raphael Eidenbenz, Roger Wattenhofer |
FS 10 | SA-2010-04 | ||
![]() |
Constraint Handling in Evolutionary Multi-Objective Optimization | Systems Optimization | S | Tamara Ulrich | FS 10 | SA-2010-01 | ||
![]() |
A Wireless System to Measure Oscillations of Cable-Cars and Chair-Lifts [confidential] | Wireless Mesh Networks | M | Johannes Schneider, Philipp Sommer |
FS 10 | MA-2010-03 | ||
![]() |
Design of an Energy Harvesting Network Node for Wind Measurement | Wireless Mesh Networks | S | Johannes Schneider, Philipp Sommer |
FS 10 | SA-2010-03 | ||
![]() |
Improving the privacy of ZigBee / IEEE 802.15.4 with Dynamic and Secret Spreading Sequences [confidential] | Wireless Security | M | Franck Legendre | FS 10 | MA-2010-01 | ||
![]() |
Vulnerability Evaluation of Proportional Fairness Scheduling to Retransmissions Attacks | Wireless Security | S | Ehud Ben-Porat | FS 10 | SA-2010-02 | ||
![]() |
BACnet Service-based Web Operation Client using Silverlight Technology and Cimetrics Gateway [confidential] | M | Lothar Thiele | HS 09 | MA-2009-13 | |||
![]() |
Code Formatting for TinyOS in Eclipse | S | Benjamin Sigg | HS 09 | SA-2009-35 | |||
![]() |
Collaborative Chess | S | Michael Kuhn, Christoph Lenzen |
HS 09 | SA-2009-22 | |||
![]() |
MusicExplorer PartyDJ | S | Michael Kuhn | HS 09 |
, |
SA-2009-21 | ||
![]() |
Faster Parallel Datastructures | S | Johannes Schneider | HS 09 | SA-2009-28 | |||
![]() |
Implementation and Evaluation of a CNA-Based DTN Routing Protocol | S | Theus Hossmann, Franck Legendre |
HS 09 | SA-2009-30 | |||
![]() |
Sports Reporter Application for future Mobile Networks | M | Ariane Trammell, Franck Legendre |
HS 09 | MA-2009-16 | |||
![]() |
Path Length vs Distance in Mobile Wireless Networks | Ad-hoc-Networks | S | Simon Heimlicher, Merkourios Karaliopoulos |
HS 09 | SA-2009-33 | ||
![]() |
Evaluating the Overhead of Setting up TDMA Communication in Wireless Sensor Networks | Ad-hoc-Networks | S | Federico Ferrari | HS 09 | SA-2009-25 | ||
![]() |
Acoustic Localization in Sparse Wireless Sensor Networks [confidential] | Ad-hoc-Networks | M | Philipp Sommer, Roland Flury |
HS 09 | MA-2009-12 | ||
![]() |
Precise Time Synchronization for Wireless Sensor Networks using the Global Positioning System | Ad-hoc-Networks | S | Philipp Sommer | HS 09 | SA-2009-20 | ||
![]() |
Reliable and Energy-Efficient Data Dissemination in Wireless Sensor Networks [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
HS 09 | SA-2009-27 | ||
![]() |
Development of a Streaming Application Benchmark Set | Embedded Systems | S | Wolfgang Haid, Kai Huang |
HS 09 | SA-2009-26 | ||
![]() |
Online GPS für Permafrost Monitoring | Embedded Systems | S | Jan Beutel, Matthias Keller |
HS 09 | SA-2009-19 | ||
![]() |
Distributed Conversion of Public Transport Schedules | External Projects | M | Benjamin Sigg | HS 09 | MA-2009-17 | ||
![]() |
Privacy in Online Social Networks | External Projects | M | Martin Burkhart | HS 09 | MA-2009-11 | ||
![]() |
A Software-Based Trusted Platform Module | Network Security | M | Mario Strasser | HS 09 | MA-2009-10 | ||
![]() |
Virtual Network Topology for Data Centers [confidential] | Network Security | S | Bernhard Plattner | HS 09 | SA-2009-34 | ||
![]() |
To Be or Not to Be a BitThief [confidential] | Peer-to-Peer Networks | S | Raphael Eidenbenz, Thomas Locher |
HS 09 | SA-2009-29 | ||
![]() |
Frame-Klassifizierung von Sprachsignalen mit Support-Vektor-Maschinen | Speech Processing | S | Thomas Ewender, Sarah Hoffmann |
HS 09 | SA-2009-23 | ||
![]() |
Generierung von Sprachmustern für die Spracherkennung | Speech Processing | S | Michael Gerber, Beat Pfister |
HS 09 | SA-2009-24 | ||
![]() |
Schätzung des bewegten Vokaltraktes aus dem Sprachsignal | Speech Processing | M | Beat Pfister, Michael Gerber |
HS 09 | MA-2009-14 | ||
![]() |
Mehrzieloptimierung unter Berücksichtigung struktureller Eigenschaften von Lösungen | Systems Optimization | S | Tamara Ulrich | HS 09 | SA-2009-18 | ||
![]() |
Resilience of wireless mesh networks to node misbehaviors | Wireless Mesh Networks | S | Merkourios Karaliopoulos, Gabriel Popa |
HS 09 | SA-2009-36 | ||
![]() |
Jamming Detection and Performance of Rate Switching under Jamming | Wireless Security | M | Mario Strasser, Franck Legendre |
HS 09 |
, |
MA-2009-15 | |
![]() |
A Security Forensics Framework | Wireless Security | S | Mario Strasser | HS 09 | SA-2009-32 | ||
![]() |
Aufbau eines OpenFlow Netzwerkes (report) | G | Bernhard Plattner, Ariane Trammell |
FS 09 |
, |
GA-2009-05 | ||
![]() |
Deriving Web Site Classification from Web Page Classifications [confidential] | M | Michael Kuhn | FS 09 | MA-2009-09 | |||
![]() |
Erstellen einer Dokumentation für das PPS Voice over IP (report) | G | Bernhard Distl | FS 09 |
, , , |
GA-2009-01 | ||
![]() |
Linux Energy Attribution and Accounting Platform | M | Lothar Thiele | FS 09 | MA-2009-04 | |||
![]() |
Jukebox An Intelligent Online Music Player | S | Michael Kuhn, Olga Goussevskaia |
FS 09 | SA-2009-10 | |||
![]() |
Personalized Organization of Music on Mobile Devices [confidential] | M | Michael Kuhn, Olga Goussevskaia |
FS 09 | MA-2009-08 | |||
![]() |
Distributed Wireless Singlehop Network Monitoring [confidential] | Ad-hoc-Networks | S | Yvonne-Anne Pignolet-Oswald, Jasmin Smula |
FS 09 | SA-2009-15 | ||
![]() |
Neighbor Discovery and Topology Construction of Wireless Sensor Networks | Ad-hoc-Networks | M | Andreas F. Meier, Jan Beutel |
FS 09 | MA-2009-05 | ||
![]() |
Development of a Base Station for Wireless Sensor Networks [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
FS 09 | SA-2009-06 | ||
![]() |
IPv6 for Wireless Sensor Networks | Ad-hoc-Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-01 | ||
![]() |
A Load Adaptive & Frequency-Hopping MAC-Protocol | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
FS 09 | SA-2009-05 | ||
![]() |
Secure Messaging for Wireless Sensor Networks | Ad-hoc-Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-03 | ||
![]() |
Simulative Analysis of Routing Algorithms for Energy Harvesting Sensor Networks [confidential] | Ad-hoc-Networks | S | Jian-Jia Chen, Clemens Moser |
FS 09 | SA-2009-14 | ||
![]() |
Eclipse Plugin for TinyOS Debugging | Ad-hoc-Networks | S | Benjamin Sigg, Philipp Sommer |
FS 09 | SA-2009-04 | ||
![]() |
Zurinet - Using Public Transportation as a DTN Backbone | Ad-hoc-Networks | M | Thrasyvoulos Spyropoulos, Franck Legendre |
FS 09 | MA-2009-06 | ||
![]() |
Mobile Application for On-Site Sensor Installation Support | Embedded Systems | G | Matthias Keller, Jan Beutel |
FS 09 |
, , |
GA-2009-06 | |
![]() |
Power Aware Communication Platform for an Autonomous Sailboat | Embedded Systems | M | Andreas Schranzhofer, Clemens Moser |
FS 09 | MA-2009-03 | ||
![]() |
Wireless Weather Station for High-Alpine Locations | Embedded Systems | S | Matthias Keller, Jan Beutel |
FS 09 |
, |
SA-2009-11 | |
![]() |
Ground truth analysis of anomalies in traffic feature distributions | Network Security | G | Bernhard Tellenbach | FS 09 | GA-2009-04 | ||
![]() |
Evaluating and Improving TES II [confidential] | Network Security | S | Bernhard Tellenbach | FS 09 | SA-2009-17 | ||
![]() |
Event Correlation Engine | Network Security | M | Bernhard Tellenbach | FS 09 | MA-2009-01 | ||
![]() |
Privacy-Preserving Collaboration in Network Security | Network Security | M | Martin Burkhart, Mario Strasser |
FS 09 | MA-2009-02 | ||
![]() |
SIAN Software zur Identifikation von Applikationsklassen in NetFlow | Network Security | G | Eduard Glatz, Bernhard Tellenbach |
FS 09 |
, |
GA-2009-03 | |
![]() |
BitTorrent for Really Selfish Peers – T4T Trading over Cycles [confidential] | Peer-to-Peer Networks | S | Raphael Eidenbenz | FS 09 | SA-2009-09 | ||
![]() |
Automatische Bestimmung von unbekannten Wörtern | Speech Processing | S | Tobias Kaufmann, Thomas Ewender |
FS 09 | SA-2009-07 | ||
![]() |
Two-stage Utterance Detector for Speech Recognition | Speech Processing | S | Michael Gerber, Beat Pfister |
FS 09 | SA-2009-08 | ||
![]() |
Effective Multi-Objective Optimization of Robust Solutions | Systems Optimization | M | Johannes Bader, Eckart Zitzler |
FS 09 | MA-2009-07 | ||
![]() |
Optimization According to Interactively Quantied User Preferences | Systems Optimization | S | Tamara Ulrich, Dimo Brockhoff |
FS 09 |
, |
SA-2009-16 | |
![]() |
Memory Support for the Pixie Sensor Node | Wireless Mesh Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-02 | ||
![]() |
Development of software tools to facilitate management and experimentation with the TIK wireless testbed | Wireless Mesh Networks | S | Merkourios Karaliopoulos | FS 09 | SA-2009-12 | ||
![]() |
Attacking Volunteer Computing Systems | S | Michael Kuhn | HS 08 | SA-2008-29 | |||
![]() |
High Availability Seamless Ring Protocol Implementation in FPGA | M | Lothar Thiele | HS 08 | MA-2008-19 | |||
![]() |
Design and Implementation of SAFT on ANA II | S | Ariane Trammell, Simon Heimlicher |
HS 08 | SA-2008-21 | |||
![]() |
Improving Keyword Search in ConfSearch | S | Michael Kuhn | HS 08 | SA-2008-35 | |||
![]() |
Interconnection of Different Network Architectures | S | Ariane Trammell, Martin May |
HS 08 | SA-2008-22 | |||
![]() |
MPSoC Testbed for Analyzing Execution of Process Networks | S | Wolfgang Haid, Kai Huang |
HS 08 | SA-2008-26 | |||
![]() |
MusicExplorer Amarok2 Plug-in | S | Olga Goussevskaia, Michael Kuhn |
HS 08 | SA-2008-28 | |||
![]() |
Performance Enhancement of an Intersection Assistance System by Integrating WLAN Ad-Hoc Network with Multi-Hop Capabilities | M | Thrasyvoulos Spyropoulos | HS 08 | MA-2008-20 | |||
![]() |
Semantic Understanding of Location and Movement Information Collected by a Mobile Application | S | Michael Kuhn | HS 08 | SA-2008-25 | |||
![]() |
Wireless Sensor Network Testbed 2.0: A New Service Oriented Architecture | M | Matthias Woehrle, Jan Beutel |
HS 08 | MA-2008-26 | |||
![]() |
Autonomic Identifier Allocation for ANA (AIA) | S | Ariane Trammell, Martin May |
HS 08 | SA-2008-23 | |||
![]() |
Broadcast Synchonization in Wireless Ad Hoc Podcasting | Ad-hoc-Netze | S | Franck Legendre | HS 08 | SA-2008-17 | ||
![]() |
Lightweight Information System Technology LIST | Ad-hoc-Netze | S | Bernhard Distl, Franck Legendre |
HS 08 |
, |
SA-2008-19 | |
![]() |
Enhanced TinyOS Support in Eclipse | Ad-hoc-Netze | S | Philipp Sommer, Roland Flury |
HS 08 | SA-2008-33 | ||
![]() |
Secure Content Dissemination in Opportunistic Networks | Ad-hoc-Netze | M | Bernhard Distl, Franck Legendre |
HS 08 |
, |
MA-2008-27 | |
![]() |
Opportunistic Networks with ANA | Ad-hoc-Netze | M | Theus Hossmann, Franck Legendre |
HS 08 | MA-2008-23 | ||
![]() |
Execution of Process Networks on the Cell Broadband Engine | Eingebettete Systeme | S | Wolfgang Haid, Kai Huang |
HS 08 | SA-2008-24 | ||
![]() |
Mountain View - Eine Kamera für das PermaSense Projekt | Eingebettete Systeme | G | Jan Beutel, Matthias Keller |
HS 08 |
, |
GA-2008-01 | |
![]() |
Lego Mindstorms NXT Camera | Eingebettete Systeme | S | Wolfgang Haid, Matthias Woehrle |
HS 08 | SA-2008-18 | ||
![]() |
Make Multicore Systems Easily Programmable - With Focus on Contention Management [confidential] | Multicore Architecture | S | Johannes Schneider | HS 08 | SA-2008-31 | ||
![]() |
Secondary network activity and traffic of SMTP sender hosts [confidential] | Network Security | M | Dominik Schatzmann, Martin Burkhart |
HS 08 | MA-2008-24 | ||
![]() |
Evaluating and Improving TES [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
HS 08 | MA-2008-28 | ||
![]() |
Extending Flame: Anomaly Characterization and Extraction [confidential] | Network Security | M | Daniela Brauckhoff, Arno Wagner |
HS 08 | MA-2008-25 | ||
![]() |
Invasion of Privacy Using Fingerprinting Attacks | Network Security | M | Martin Burkhart, Dominik Schatzmann |
HS 08 | MA-2008-22 | ||
![]() |
Detektion und Elemination von Störgeräuschen bei Frikativlauten | Sprachverarbeitung | S | Thomas Ewender, Sarah Hoffmann |
HS 08 | SA-2008-30 | ||
![]() |
Effizienter und robuster Sprachmustererkenner | Sprachverarbeitung | S | Beat Pfister, Michael Gerber |
HS 08 | SA-2008-20 | ||
![]() |
Visualizing High-Dimensional Data | Systemoptimierung | S | Tamara Ulrich, Johannes Bader |
HS 08 | SA-2008-34 | ||
![]() |
Porting the ZigBit 900 Platform to TinyOS | Wireless Mesh Networks | G | Philipp Sommer, Roland Flury |
HS 08 |
, |
GA-2008-27 | |
![]() |
Development/Simulation Of Algorithms For Wireless Networks [confidential] | Wireless Mesh Networks | S | Johannes Schneider | HS 08 | SA-2008-32 | ||
![]() |
A mobile payment system using an NFC mobile phone [confidential] | Wireless Security | M | Bernhard Plattner | HS 08 | MA-2008-17 | ||
![]() |
Jamming Detection inWireless Ad Hoc Networks | Wireless Security | M | Vincent Lenders, Franck Legendre |
HS 08 | MA-2008-21 | ||
![]() |
Botnet Detection based on NetFlow Traces [confidential] | M | Dominik Schatzmann | FS 08 | MA-2008-14 | |||
![]() |
Speed Dating despite Jammers [confidential] | M | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
FS 08 | MA-2008-05 | |||
![]() |
Design and Implementation of SAFT on ANA | S | Ariane Trammell, Simon Heimlicher |
FS 08 | SA-2008-12 | |||
![]() |
Mobile Social Networking for Enhanced Group Communication [confidential] | M | Michael Kuhn | FS 08 | MA-2008-18 | |||
![]() |
History-Based Collaborative Filtering for Music Recommendation [confidential] | S | Michael Kuhn, Olga Goussevskaia |
FS 08 | SA-2008-03 | |||
![]() |
Pancho - The Mobile Music Explorer [confidential] | S | Michael Kuhn | FS 08 | SA-2008-05 | |||
![]() |
Wireless Ad Hoc Podcasting on Symbian | Ad-hoc-Netze | D | Vincent Lenders, Bernhard Distl |
FS 08 | DA-2008-03 | ||
![]() |
Mobility Modeling of Swarm Robots | Ad-hoc-Netze | S | Merkourios Karaliopoulos | FS 08 | SA-2008-07 | ||
![]() |
Multi Hop Send Protocol Tool for TinyNodes | Ad-hoc-Netze | S | Roland Flury | FS 08 | SA-2008-13 | ||
![]() |
Hop-by-hop Transport on Linux [confidential] | Ad-hoc-Netze | M | Simon Heimlicher, Ariane Trammell |
FS 08 | MA-2008-10 | ||
![]() |
SimBet | Ad-hoc-Netze | S | Thrasyvoulos Spyropoulos | FS 08 | SA-2008-15 | ||
![]() |
YETI 2 - TinyOS 2.x Eclipse Plugin | Ad-hoc-Netze | M | Nicolas Burri, Roland Flury |
FS 08 | MA-2008-11 | ||
![]() |
Automating Worldwide Sensor Network Testing | Eingebettete Systeme | S | Jan Beutel, Matthias Woehrle |
FS 08 | SA-2008-09 | ||
![]() |
PermaSense Persistent Storage Solution | Eingebettete Systeme | S | Jan Beutel, Roman Lim |
FS 08 |
, |
SA-2008-16 | |
![]() |
Redundancy for Compact Turbine Controller | External Projects | D | Rainer Baumann | FS 08 | DA-2008-01 | ||
![]() |
Symbolic approach for the state graph based verification of systems [confidential] | External Projects | D | Kai Lampka | FS 08 | DA-2008-06 | ||
![]() |
Lightweight Detection of Malicious Traffic in Wireless Mesh Networks | External Projects | M | Mario Strasser | FS 08 | MA-2008-15 | ||
![]() |
Analysis and Modeling of Internet Epidemics | Network Security | M | Daniela Brauckhoff, Bernhard Tellenbach |
FS 08 | MA-2008-01 | ||
![]() |
Towards Revealing Attackers Intent by Automatically Decrypting Network Traffic | Network Security | M | Bernhard Tellenbach | FS 08 | MA-2008-08 | ||
![]() |
Characterizing network activity of mail servers [confidential] | Network Security | S | Dominik Schatzmann, Bernhard Tellenbach |
FS 08 | SA-2008-11 | ||
![]() |
Implementation of an Anomaly Injection Framework | Network Security | D | Daniela Brauckhoff, Martin Burkhart |
FS 08 | DA-2008-04 | ||
![]() |
Next Generation / Secure E-Banking [confidential] | Network Security | M | Rainer Baumann | FS 08 | MA-2008-04 | ||
![]() |
Rating Autonomous Systems [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
FS 08 | MA-2008-07 | ||
![]() |
Sharing of Traffic Measurements with Privacy Based on Multi-Party Computation [confidential] | Network Security | M | Martin Burkhart, Mario Strasser |
FS 08 | MA-2008-02 | ||
![]() |
Signature-based Extrusion Detection | Network Security | M | Bernhard Tellenbach | FS 08 | MA-2008-06 | ||
![]() |
Extending the Functionality of BitThief | Peer-to-Peer Networks | S | Thomas Locher | FS 08 | SA-2008-10 | ||
![]() |
Honor Among Thieves — A Source Coding Based Sharing Mechanism for the BitThief Client | Peer-to-Peer Networks | M | Thomas Locher | FS 08 | MA-2008-09 | ||
![]() |
Increasing the Usability of BitThief: A Free Riding BitTorrent Client | Peer-to-Peer Networks | M | Thomas Locher | FS 08 | MA-2008-16 | ||
![]() |
Exploring Search Methods with Pulsar [confidential] | Peer-to-Peer Networks | M | Remo Meier | FS 08 | MA-2008-13 | ||
![]() |
Scalable Video for Peer-to-Peer Streaming [confidential] | Peer-to-Peer Networks | M | Remo Meier | FS 08 | MA-2008-12 | ||
![]() |
Using Air Traffic as a Delay-Tolerant Networking Backbone | Peer-to-Peer Networks | S | Franck Legendre, Martin May |
FS 08 | SA-2008-01 | ||
![]() |
Monitoring changes in speaking style over long time periods [confidential] | Sprachverarbeitung | M | Beat Pfister, Thomas Ewender |
FS 08 | MA-2008-03 | ||
![]() |
Sprachverarbeitungstechnologien für die computergestützte Sprechschulung [confidential] | Sprachverarbeitung | D | Beat Pfister, Michael Gerber |
FS 08 | DA-2008-05 | ||
![]() |
Wortbedeutung und Satzaufbau | Sprachverarbeitung | S | Tobias Kaufmann | FS 08 |
, |
SA-2008-14 | |
![]() |
Datenstrukturen für schnelle Dominanzüberprüfung in evolutionären Algorithmen | Systemoptimierung | S | Johannes Bader, Eckart Zitzler |
FS 08 | SA-2008-02 | ||
![]() |
Parallelization of Evolutionary Algorithms | Systemoptimierung | S | Johannes Bader, Dimo Brockhoff |
FS 08 | SA-2008-06 | ||
![]() |
Parameter Estimation in Differential Equation Models | Systemoptimierung | S | Tim Hohm | FS 08 | SA-2008-04 | ||
![]() |
Security of Field-based Routing | Wireless Security | S | Mario Strasser | FS 08 | SA-2008-08 | ||
![]() |
Crypto-Breaker Reloaded | S | Michael Kuhn, Stefan Schmid |
HS 07 | SA-2007-60 | |||
![]() |
ABAKABAR a mobile social network [confidential] | S | Michael Kuhn | HS 07 | SA-2007-61 | |||
![]() |
Development of a mobile MMOG | Ad-hoc-Netze | S | Martin May | HS 07 |
, |
SA-2007-66 | |
![]() |
Ethernet-based Deployment Support Network | Ad-hoc-Netze | M | Jan Beutel | HS 07 | MA-2007-44 | ||
![]() |
Code Refactoring and Memory Optimization for the Trace-based Simulation Framework | Eingebettete Systeme | S | Kai Huang, Iuliana Bacivarov |
HS 07 | SA-2007-63 | ||
![]() |
Developement of a Simulink Toolbox for the analysis of Real-Time Embedded Systems | Eingebettete Systeme | S | Simon Perathoner, Nikolay Stoimenov |
HS 07 |
, |
SA-2007-52 | |
![]() |
Generation of Accurate Performance Analysis Models for Embedded Systems | Eingebettete Systeme | M | Wolfgang Haid, Kai Huang |
HS 07 | MA-2007-45 | ||
![]() |
TinyOS Instrumentation | Eingebettete Systeme | S | Matthias Woehrle, Jan Beutel |
HS 07 | SA-2007-62 | ||
![]() |
Scalable Distributing Mutli-Linux System for DOL Application | Eingebettete Systeme | S | Kai Huang, Iuliana Bacivarov |
HS 07 | SA-2007-64 | ||
![]() |
Verteilte Messung von Photovoltaischer Energie für Sensornetze | Eingebettete Systeme | S | Clemens Moser | HS 07 | SA-2007-65 | ||
![]() |
Embedding of Naturally-Grown Networks [confidential] | External Projects | M | Michael Kuhn, Olga Goussevskaia |
HS 07 | MA-2007-36 | ||
![]() |
Game-Based Learning and its Application in Business Environments | External Projects | M | Bernhard Plattner, Rainer Baumann |
HS 07 | MA-2007-34 | ||
![]() |
Dissecting Port 80 Traffic [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
HS 07 | MA-2007-43 | ||
![]() |
Localization of Known Anomaly Types in NetFlow Traces | Network Security | S | Daniela Brauckhoff, Arno Wagner |
HS 07 | SA-2007-54 | ||
![]() |
Theft and Misuse Protection for Anonymous Credentials | Network Security | M | Bernhard Tellenbach | HS 07 | MA-2007-42 | ||
![]() |
New Protocols and Applications for the Future Internet | Reconfigurable Computing | M | Theus Hossmann, Martin May |
HS 07 | MA-2007-39 | ||
![]() |
Web-Interface for Natural Language Parsers | Sprachverarbeitung | S | Tobias Kaufmann, Thomas Ewender |
HS 07 | SA-2007-56 | ||
![]() |
Sprechererkennung anhand des Prosodieverlaufs | Sprachverarbeitung | S | Michael Gerber, Beat Pfister |
HS 07 |
, |
SA-2007-59 | |
![]() |
Pattern Identification in Pareto-Set Approximations | Systemoptimierung | M | Dimo Brockhoff | HS 07 | MA-2007-33 | ||
![]() |
Secure Node Monitoring in WSNs [confidential] | Wireless Security | M | Mario Strasser | HS 07 | MA-2007-35 | ||
![]() |
Aggressive TCP | S | Stefan Schmid | SS 07 | SA-2007-57 | |||
![]() |
Call Route Discovery with Asterisk / DUNDi | S | Ulrich Fiedler | SS 07 | André Wangler | SA-2007-58 | ||
![]() |
eMule Attacks and Measurements [confidential] | M | Stefan Schmid, Thomas Locher |
SS 07 | MA-2007-41 | |||
![]() |
The ANA Project - Development of the ANA-Core Software | M | Theus Hossmann | SS 07 | MA-2007-38 | |||
![]() |
Enhancing Kangoo And Building A Highly Scalable Server [confidential] | S | Stefan Schmid | SS 07 | SA-2007-55 | |||
![]() |
veNETa: Mobile Social Networking [confidential] | S | Michael Kuhn | SS 07 |
, |
SA-2007-48 | ||
![]() |
Similarity Measures in the World of Music | M | Michael Kuhn, Olga Goussevskaia |
SS 07 | MA-2007-27 | |||
![]() |
Experimentation and evaluation of routing metrics for multi-hop ad-hoc wireless networks on an indoor wireless testbed | Ad-hoc-Netze | S | Georgios Parissidis | SS 07 | SA-2007-39 | ||
![]() |
Advanced Aggregation in Ad-Hoc Sensor Networks [confidential] | Ad-hoc-Netze | S | Nicolas Burri, Thomas Locher |
SS 07 | SA-2007-47 | ||
![]() |
Automated Wireless Sensor Network Testing [confidential] | Ad-hoc-Netze | S | Matthias Woehrle, Jan Beutel |
SS 07 | SA-2007-51 | ||
![]() |
Distributed Spy Software-Tool WSNSpy | Ad-hoc-Netze | M | Andreas F. Meier | SS 07 | MA-2007-32 | ||
![]() |
Online Information and ACK Aggregation | Ad-hoc-Netze | M | Stefan Schmid, Yvonne-Anne Pignolet-Oswald |
SS 07 | MA-2007-08 | ||
![]() |
Energy Efficient Initialization of Wireless Sensor Networks | Ad-hoc-Netze | M | Andreas F. Meier | SS 07 | MA-2007-29 | ||
![]() |
Wake-up Time Estimation for a Wireless MAC Protocol | Ad-hoc-Netze | S | Andreas F. Meier, Matthias Woehrle |
SS 07 | SA-2007-45 | ||
![]() |
Topology Estimation in Mobile Ad Hoc Networks | Ad-hoc-Netze | M | Theus Hossmann | SS 07 | MA-2007-37 | ||
![]() |
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | SS 07 | MA-2007-13 | ||
![]() |
Simulating Media Access Control Protocols in Wireless Ad-Hoc Networks | Ad-hoc-Netze | S | Olga Goussevskaia | SS 07 | SA-2007-40 | ||
![]() |
Experimental Analysis of Photovoltaic Energy Scavengers for Sensor Nodes | Eingebettete Systeme | M | Clemens Moser | SS 07 | MA-2007-11 | ||
![]() |
A Modular Trace-based Simulation Framework for Multiprocessor Systems | Eingebettete Systeme | M | Kai Huang, Iuliana Bacivarov |
SS 07 | MA-2007-10 | ||
![]() |
Word of Mouth | Internet Economics | M | Yvonne-Anne Pignolet-Oswald | SS 07 | MA-2007-30 | ||
![]() |
Analyzing network traffic from the SWITCH network from 2003 until today | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-12 | ||
![]() |
Anomaly Analysis using Host-behavior Clustering | Network Security | M | Daniela Brauckhoff | SS 07 | MA-2007-31 | ||
![]() |
Application Detection and Modelling using Network Traces | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-14 | ||
![]() |
Towards Automated Exploit Signature Generation using Honeypots | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-09 | ||
![]() |
IEEE 802.11 Wireless Security | Network Security | S | Martin May, Bernhard Tellenbach |
SS 07 | SA-2007-43 | ||
![]() |
Broadcast-Authentifizierung für Pulsar | Peer-to-Peer Networks | S | Stefan Schmid, Remo Meier |
SS 07 | SA-2007-44 | ||
![]() |
Towards Peer-to-Peer Games: XP2Pilot | Peer-to-Peer Networks | M | Stefan Schmid | SS 07 | MA-2007-28 | ||
![]() |
Online-Games: Traffic Analysis of Popular Game Servers (Counter Strike: Source) | Peer-to-Peer Networks | S | Martin May | SS 07 | SA-2007-42 | ||
![]() |
Grid Computing Framework [confidential] | Peer-to-Peer Networks | M | Stefan Schmid, Michael Kuhn |
SS 07 | MA-2007-07 | ||
![]() |
Erkennung von Phrasengrenzen und Phrasentyp aus Sprachsignalen | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 |
, |
SA-2007-49 | |
![]() |
Erkennung von Silbenakzenten aus Sprachsignalen | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 | SA-2007-41 | ||
![]() |
Recognition of Music in Hearing Instruments [confidential] | Sprachverarbeitung | D | Beat Pfister | SS 07 | DA-2007-35 | ||
![]() |
Spracherkennung mit abstrakten Elementen [confidential] | Sprachverarbeitung | S | Michael Gerber | SS 07 | SA-2007-50 | ||
![]() |
Speech Synthesis with Hidden Markov Models | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 | SA-2007-46 | ||
![]() |
Portierung von Topsy v3 auf den Intel Pentium 4 | Voice over IP | S | Daniela Brauckhoff | SS 07 | SA-2007-19 | ||
![]() |
Industrial Networks - Connecting Controllers via OPC | M | Rainer Baumann | WS 07 | MA-2007-06 | |||
![]() |
Groups and Social Networking in Kangoo [confidential] | M | Stefan Schmid | WS 07 | MA-2007-04 | |||
![]() |
BTnode Application for automated Link Measurements | Ad-hoc-Netze | S | Andreas F. Meier | WS 07 | SA-2007-04 | ||
![]() |
Ant Algorithm | Ad-hoc-Netze | S | Roland Flury | WS 07 |
, |
SA-2007-05 | |
![]() |
Energy and Time Efficient Link-Quality Estimation for Wireless Sensor Networks | Ad-hoc-Netze | M | Andreas F. Meier | WS 07 | MA-2007-02 | ||
![]() |
Implementation of HEAT for Linux 2.6 with IPv6 | Ad-hoc-Netze | S | Rainer Baumann | WS 07 | SA-2007-16 | ||
![]() |
Implementation of a Field Based Routing Protocol for Wireless Mesh Networks | Ad-hoc-Netze | S | Rainer Baumann | WS 07 |
, |
SA-2007-03 | |
![]() |
A Framework For Transport Protocol Implementation And Evaluation On Linux 2.6 [confidential] | Ad-hoc-Netze | S | Simon Heimlicher | WS 07 | SA-2007-09 | ||
![]() |
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | WS 07 | MA-2007-00 | ||
![]() |
Wireless Ad Hoc Podcasting with Handhelds | Ad-hoc-Netze | M | Vincent Lenders | WS 07 | MA-2007-05 | ||
![]() |
MPEG-2 Decoder for SHAPES DOL | Eingebettete Systeme | D | Kai Huang | WS 07 | DA-2007-02 | ||
![]() |
Porting TOPSY v3 to the IXP2400 | Eingebettete Systeme | S | Lukas Ruf | WS 07 |
, |
SA-2007-18 | |
![]() |
Modular Network Router for Microkernel-Based Embedded Systems | External Projects | M | Stefan Schmid | WS 07 | MA-2007-03 | ||
![]() |
Representation of XML Schema Components | External Projects | D | Erik Wilde | WS 07 | DA-2007-01 | ||
![]() |
Virus Inoculation on Social Graphs - The Friendship Factor | Internet Economics | S | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
WS 07 | SA-2007-17 | ||
![]() |
Harpoon: A Flow-level Traffic Generator | Network Security | S | Daniela Brauckhoff | WS 07 | SA-2007-06 | ||
![]() |
Anomaly Visibility and Detectability in Sampled Traffic | Network Security | S | Daniela Brauckhoff | WS 07 | SA-2007-12 | ||
![]() |
Towards Exploit Signature Generation using Honeypots II | Network Security | S | Bernhard Tellenbach | WS 07 | SA-2007-13 | ||
![]() |
Game Theory: (Byzantine) Potential in Games | Peer-to-Peer Networks | D | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
WS 07 | DA-2007-03 | ||
![]() |
A Framework for Peer-to-Peer Service Interaction | Peer-to-Peer Networks | S | Thomas Locher, Stefan Schmid |
WS 07 | SA-2007-14 | ||
![]() |
A Recommender System for Kangoo [confidential] | Peer-to-Peer Networks | M | Stefan Schmid | WS 07 | MA-2007-01 | ||
![]() |
Force-based Visualization of Peer-to-peer Nodes | Peer-to-Peer Networks | S | Marcel Baur | WS 07 | SA-2007-01 | ||
![]() |
Erweiterung von PolyPhone um eine Infrastruktur für SIP Instant Messaging-Dienste | PolyPhone | S | Marcel Baur | WS 07 | SA-2007-02 | ||
![]() |
Darstellung von Abhängigkeitsgraphen | Sprachverarbeitung | S | Tobias Kaufmann | WS 07 | SA-2007-11 | ||
![]() |
Sprachsynthese mit spezieller Prosodie | Sprachverarbeitung | S | Beat Pfister | WS 07 | SA-2007-08 | ||
![]() |
Robustness and Uncertainty in Multiobjective Search | Systemoptimierung | S | Eckart Zitzler, Tim Hohm |
WS 07 | SA-2007-10 | ||
![]() |
Distributed Terminal Location Discovery in a TOWN Network | Voice over IP | N | Rainer Baumann | WS 07 | NA-2007-01 | ||
![]() |
Kangoo Eco-System [confidential] | S | Stefan Schmid | HS 06 | Stefan Sieber | SA-2006-43 | ||
![]() |
Competitive Routing in Dynamic Graphs [confidential] | S | Regina ODell -Bischoff | FS 06 | SA-2006-42 | |||
![]() |
Controlling Wireless Sensor Networks | M | Nicolas Burri | FS 06 | MA-2006-20 | |||
![]() |
Paging in TinyOS | S | Pascal von Rickenbach | FS 06 | Robin Zueger | SA-2006-44 | ||
![]() |
Implementing a Display Driver and a Console for TinyOS | S | Yves Weber | SS 06 | SA-2006-29 | |||
![]() |
Free Riding in BitTorrent and Countermeasures | M | Stefan Schmid, Thomas Locher |
SS 06 | MA-2006-26 | |||
![]() |
Comparing MAC Layers for Sensor Networks [confidential] | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-30 | |||
![]() |
Reverse Engineering of eMule [confidential] | S | Stefan Schmid, Thomas Locher |
SS 06 | SA-2006-35 | |||
![]() |
Enhanced Task Scheduling in TinyOS 2.0 & Channel Allocation in AMUHR | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-22 | |||
![]() |
Havelaar – Implementation Of A Peer-to-Peer Reputation System | S | Stefan Schmid | SS 06 | SA-2006-37 | |||
![]() |
Efficient Downloads of Popular Files in the Kangoo Distributed File System [confidential] | S | Stefan Schmid | SS 06 | SA-2006-34 | |||
![]() |
Kangoo PlanetLab Deployment [confidential] | S | Stefan Schmid | SS 06 | SA-2006-36 | |||
![]() |
PlanetLab Tests | S | Stefan Schmid, Thomas Locher |
SS 06 | SA-2006-32 | |||
![]() |
Organizing Email | M | Keno Albrecht | SS 06 | MA-2006-22 | |||
![]() |
Traffic Monitoring in Sensor Networks | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-24 | |||
![]() |
Updating Wireless Sensor Networks | M | Pascal von Rickenbach | SS 06 | MA-2006-19 | |||
![]() |
3D Visualisierung von Field Based Routing (FBR) | Ad-hoc-Netze | S | Rainer Baumann | SS 06 | SA-2006-14 | ||
![]() |
Channel Allocation for IEEE 802.16 Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | SS 06 | MA-2006-24 | ||
![]() |
Big MAC: Rendezvous-based Communication in Wireless Sensor Networks [confidential] | Ad-hoc-Netze | M | Nicolas Burri | SS 06 | MA-2006-21 | ||
![]() |
DSNAnalyzer: Backend for the Deployment Support Network | Ad-hoc-Netze | M | Martin May | SS 06 | MA-2006-18 | ||
![]() |
Evaluation of scheduling methods over multipath routing in wireless mobile Ad Hoc networks | Ad-hoc-Netze | S | Georgios Parissidis | SS 06 |
, |
SA-2006-26 | |
![]() |
Wireless Fire Sensor Network Demonstrator | Ad-hoc-Netze | M | Andreas F. Meier | SS 06 | MA-2006-14 | ||
![]() |
Scalable Real-time Multiplayer Game Network Support for Orxonox | Ad-hoc-Netze | S | Károly Farkas | SS 06 |
, |
SA-2006-31 | |
![]() |
Trace Control for Netem | Ad-hoc-Netze | S | Rainer Baumann | SS 06 | SA-2006-15 | ||
![]() |
Online Sensor Network Analysis Tools | Ad-hoc-Netze | M | Jan Beutel | SS 06 | MA-2006-17 | ||
![]() |
Routing Algorithms for Safety Critical Wireless Sensor Networks | Ad-hoc-Netze | M | Martin May | SS 06 | MA-2006-25 | ||
![]() |
ManS A Simulation Framework for Mobile Ad-Hoc Networks | Ad-hoc-Netze | D | Roland Flury | SS 06 | DA-2006-05 | ||
![]() |
The Impact of the Choice of Metrics for Routing - wicht a focus on Wireless Mesh Networking (WMN) | Ad-hoc-Netze | M | Rainer Baumann, Simon Heimlicher |
SS 06 | MA-2006-13 | ||
![]() |
BTnode Peripherals | Eingebettete Systeme | S | Matthias Dyer | SS 06 | SA-2006-12 | ||
![]() |
Window Based FIFIOs for Communication in On-Chip Multiprocessor Systems | Eingebettete Systeme | M | Kai Huang | SS 06 | MA-2006-15 | ||
![]() |
Design and Implementation of an Emulator for the Intel IXP 2400 Network Processor | Eingebettete Systeme | S | Lukas Ruf | SS 06 | SA-2006-17 | ||
![]() |
A Tool-Independent System Description for Real-Time Embedded Systems | Eingebettete Systeme | S | Ernesto Wandeler | SS 06 | SA-2006-13 | ||
![]() |
LEGO Mindstorms NXT -Next Generation- | Eingebettete Systeme | S | Christian Plessl | SS 06 |
, |
SA-2006-18 | |
![]() |
Simulative Leistungsbewertung und Entwicklung rekonfigurationsfester Routingverfahren für mehrstufige Verbindungsnetzwerke | Eingebettete Systeme | M | Lukas Ruf | SS 06 | Christian Zimmermann | MA-2006-16 | |
![]() |
XPath-Unterstützung in einer Linux Shell | ETH World Program | S | Erik Wilde | SS 06 | SA-2006-11 | ||
![]() |
Automated Monitoring of Internet Service Provider (ISP) Topologies | External Projects | M | Daniela Brauckhoff | SS 06 | MA-2006-11 | ||
![]() |
An Implementation of a Byte Frequency Signature Generator Using a Gibbs Sampler | Network Security | S | Bernhard Tellenbach | SS 06 | SA-2006-21 | ||
![]() |
Entropy Plug-in and Visualisation Tool | Network Security | S | Arno Wagner | SS 06 | SA-2006-25 | ||
![]() |
Design and Implementation of a Protocol-Aware Connection Tracker Framework | Network Security | S | Bernhard Tellenbach | SS 06 |
, |
SA-2006-20 | |
![]() |
Access Control in a Peer-to-Peer Storage Systems | Peer-to-Peer Networks | M | Marcel Baur | SS 06 | MA-2006-10 | ||
![]() |
Byzantine Caching Game | Peer-to-Peer Networks | S | Stefan Schmid, Thomas Moscibroda |
SS 06 | SA-2006-33 | ||
![]() |
Firewall and NAT Traversal for Peer-to-Peer Storage Nodes | Peer-to-Peer Networks | S | Marcel Baur | SS 06 | SA-2006-23 | ||
![]() |
Implementation of the Kademlia Distributed Hash Table | Peer-to-Peer Networks | S | Marcel Baur | SS 06 | SA-2006-19 | ||
![]() |
Peer-to-Peer Live Streaming | Peer-to-Peer Networks | M | Thomas Locher, Stefan Schmid |
SS 06 | MA-2006-23 | ||
![]() |
Proxies in PromethOS | Service Provisioning | S | Lukas Ruf | SS 06 | SA-2006-16 | ||
![]() |
Wort- und Satzakzentuierung gemischtsprachiger Texte für die Sprachsynthese | Sprachverarbeitung | D | Harald Romsdorfer | SS 06 | Manuel Weiss | DA-2006-08 | |
![]() |
Stimmmerkmale für die Sprecherverifikation | Sprachverarbeitung | S | Michael Gerber | SS 06 | SA-2006-27 | ||
![]() |
Zelluläre Automaten für die Modellierung und Simulation von Stammzellen | Systemoptimierung | S | Simon Barkow | SS 06 |
, |
SA-2006-28 | |
![]() |
A Simple Overlay Platform for Distributed Monitoring | D | Bernhard Plattner | WS 06 | DA-2006-06 | |||
![]() |
Worm Outbreak Detection in the Internet Backbone | D | Arno Wagner | WS 06 | DA-2006-03 | |||
![]() |
Implementierung eines H.264 Decoders auf einer dedizierten Hardware mit mehreren parallelen Recheneinheiten | M | Lothar Thiele | WS 06 | MA-2006-04 | |||
![]() |
Kangoo - A Distributed Storage System for the Internet [confidential] | M | Stefan Schmid | WS 06 | MA-2006-29 | |||
![]() |
Multihop Routing for Wireless Sensor Networks | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-01 | |||
![]() |
NesC Plug-In für Eclipse | M | Nicolas Burri | WS 06 | MA-2006-01 | |||
![]() |
Paketverlustanalyse in einem adaptiven Sensornetzwerk | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-06 | |||
![]() |
Proaktive Verhinderung von Attacken auf Applikationen | M | Bernhard Plattner | WS 06 |
, |
MA-2006-12 | ||
![]() |
Real-time Monitoring and Control for large Server Clusters | D | Bernhard Plattner | WS 06 | DA-2006-07 | |||
![]() |
Swistry: P2P Live Streaming | M | Stefan Schmid, Thomas Locher |
WS 06 | MA-2006-27 | |||
![]() |
Kontrolle und Visualisierung eines Sensornetzwerks | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-07 | |||
![]() |
Ad Hoc Communication with Handhelds | Ad-hoc-Netze | S | Vincent Lenders | WS 06 |
, |
SA-2006-02 | |
![]() |
BlueLocation II - A Localization Infrastructure for Blutooth Enabled Mobile Devices | Ad-hoc-Netze | S | Vincent Lenders | WS 06 |
, |
SA-2006-03 | |
![]() |
Interference in Multi-Hop Radio Networks | Ad-hoc-Netze | M | Thomas Moscibroda | WS 06 | MA-2006-09 | ||
![]() |
Implementation of SAFT [confidential] | Ad-hoc-Netze | S | Simon Heimlicher, Rainer Baumann |
WS 06 |
, |
SA-2006-08 | |
![]() |
Mobility Prediction in MANETs | Ad-hoc-Netze | M | Károly Farkas | WS 06 | MA-2006-08 | ||
![]() |
Multiplayer Gaming in Mobile Adhoc Networks | Ad-hoc-Netze | S | Károly Farkas | WS 06 |
, |
SA-2006-04 | |
![]() |
Routing in Ad Hoc Networks with mobile Users | Ad-hoc-Netze | M | Vincent Lenders | WS 06 | MA-2006-02 | ||
![]() |
Management of Distributed Services in MANETs | Ad-hoc-Netze | M | Károly Farkas | WS 06 | Eduardo Silva | MA-2006-07 | |
![]() |
Role and Link-State Selection for Bluetooth Scatternets | Ad-hoc-Netze | M | Matthias Dyer | WS 06 | MA-2006-06 | ||
![]() |
Evaluation and Comparison of Performance Analysis Methods for Distributed Embedded Systems | Eingebettete Systeme | M | Ernesto Wandeler | WS 06 | MA-2006-05 | ||
![]() |
Student Webportal for Courses | ETH World Program | S | Rainer Baumann | WS 06 | SA-2006-05 | ||
![]() |
Web Based Services (WBS) | ETH World Program | S | Keno Albrecht | WS 06 | SA-2006-09 | ||
![]() |
Passive Measurement of Network Quality (External) | External Projects | M | Arno Wagner | WS 06 | MA-2006-03 | ||
![]() |
Evaluating Circuit Emulation Adapters | External Projects | S | Rainer Baumann | WS 06 | SA-2006-10 | ||
![]() |
Metadata and Security in the Kangoo Distributed File System [confidential] | Peer-to-Peer Networks | M | Stefan Schmid | WS 06 | MA-2006-28 | ||
![]() |
Source Excitation Generation for a HMMBased Synthesizer | Sprachverarbeitung | D | Beat Pfister | WS 06 | DA-2006-02 | ||
![]() |
Multi-objective Clustering of Gene Expression Data with Evolutionary Algorithms - A Query Gene Approach | Systemoptimierung | D | Stefan Bleuler | WS 06 | DA-2006-01 | ||
![]() |
SPLIMER - Splitter and Merger for TinyOS | S | Pascal von Rickenbach | HS 05 | Marco De Santis | SA-2005-51 | ||
![]() |
Embedding of Unit Disk Trees [confidential] | M | Regina ODell -Bischoff | FS 05 | Andreas Ottiger | MA-2005-48 | ||
![]() |
Mobility Models [confidential] | S | Regina ODell -Bischoff | FS 05 | Florian Milde | SA-2005-49 | ||
![]() |
Peer-to-Peer Live Streaming [confidential] | S | Stefan Schmid | FS 05 | SA-2005-50 | |||
![]() |
Scalable Localized Histogram Aggregation for P2P MMOGs | M | Roger Wattenhofer | SS 05 | MA-2005-47 | |||
![]() |
Attacks on Peer-to-Peer Networks | S | Stefan Schmid | SS 05 | Prêtre Baptiste | SA-2005-40 | ||
![]() |
Distributed Printing Services | M | Nicolas Burri | SS 05 | MA-2005-19 | |||
![]() |
Enhancing a VPN-based Network Emulator | S | Nicolas Burri | SS 05 | SA-2005-33 | |||
![]() |
eQuus: A Provably Robust and Efficient Peer-to-Peer System | M | Stefan Schmid | SS 05 | MA-2005-39 | |||
![]() |
Implementing a circuit emulation adapter | S | Ulrich Fiedler | SS 05 | SA-2005-34 | |||
![]() |
Link Layer Measurements in Wireless Sensor Networks | S | Pascal von Rickenbach | SS 05 | SA-2005-28 | |||
![]() |
Locality Game: Network Creation in P2P Systems | S | Stefan Schmid, Thomas Moscibroda |
SS 05 | Yvonne Anne Oswald | SA-2005-41 | ||
![]() |
Semester Project Network Mappings | S | Regina ODell -Bischoff | SS 05 | Yves Jacoby | SA-2005-48 | ||
![]() |
Network Reprogramming for Mica2 Motes | S | Pascal von Rickenbach | SS 05 | Yelena Baghdasaryan | SA-2005-42 | ||
![]() |
P2P Mechanism Design | S | Stefan Schmid | SS 05 | Lukas Füllemann | SA-2005-43 | ||
![]() |
Software framework for simulation of intelligent buildings integrated with GIS data | S | Lennart Meier | SS 05 |
, |
SA-2005-23 | ||
![]() |
Spamato goes P2P | M | Keno Albrecht, Stefan Schmid |
SS 05 | MA-2005-44 | |||
![]() |
Implementing XTC on TinyOS | D | Pascal von Rickenbach, Nicolas Burri |
SS 05 | DA-2005-08 | |||
![]() |
Analysis of Dynamics in Mobile Ad-Hoc Networks | Ad-hoc-Netze | S | Vincent Lenders | SS 05 | , |
SA-2005-18 | |
![]() |
BlueLocation | Ad-hoc-Netze | S | Vincent Lenders | SS 05 | SA-2005-17 | ||
![]() |
BlueFramework - Application Framework for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | M | Matthias Bossardt | SS 05 | MA-2005-16 | ||
![]() |
5.9GHz Dedicated Short Range Communication - Design of a Vehicular Safety Communication Architecture | Ad-hoc-Netze | M | Lothar Thiele | SS 05 | MA-2005-12 | ||
![]() |
Routing Protocol for a Wireless Fire Detection Network | Ad-hoc-Netze | S | Martin May | SS 05 | SA-2005-35 | ||
![]() |
Large-scale Bluetooth Sensor-Network Demonstrator | Ad-hoc-Netze | M | Jan Beutel | SS 05 |
, |
MA-2005-13 | |
![]() |
Online Sensor-Network Monitoring | Ad-hoc-Netze | S | Jan Beutel | SS 05 | Christian Zimmermann | SA-2005-26 | |
![]() |
Quality of Service for Multiplayer Game Provisioning in Mobile Ad Hoc Networks | Ad-hoc-Netze | M | Károly Farkas | SS 05 | MA-2005-18 | ||
![]() |
Setting up an Ad Hoc Testbed Network | Ad-hoc-Netze | S | Károly Farkas | SS 05 | SA-2005-32 | ||
![]() |
Real-time Audio Data Transmission over MANETs^1 | Ad-hoc-Netze | S | Rainer Baumann | SS 05 | SA-2005-36 | ||
![]() |
A Variability Characterization Curve Editor | Eingebettete Systeme | S | Ernesto Wandeler | SS 05 | SA-2005-27 | ||
![]() |
Integration von PolyPhone in myETH | ETH World Program | S | Bernhard Plattner | SS 05 | SA-2005-37 | ||
![]() |
ShaRefWeb A Web Interface for the ShaRef Service | ETH World Program | M | Erik Wilde | SS 05 | MA-2005-15 | ||
![]() |
WebCam-Plattform für die ETH Zürich | ETH World Program | S | Bernhard Plattner | SS 05 |
, |
SA-2005-29 | |
![]() |
Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs | Network Security | D | Thomas Dübendorfer | SS 05 | DA-2005-06 | ||
![]() |
Automated Attack Signature Generation: A Survey | Network Security | S | Daniela Brauckhoff | SS 05 | SA-2005-38 | ||
![]() |
Implementation of a Distributed Traffic Control Service using FPGAs | Network Security | D | Matthias Bossardt | SS 05 | DA-2005-07 | ||
![]() |
Kostenanalyse von präventiven IT-Sicherheitsmassnahmen | Network Security | S | Thomas Dübendorfer | SS 05 | SA-2005-25 | ||
![]() |
Web Attack Showcases for the Security Demo Lab | Network Security | S | Stefan Frei | SS 05 | SA-2005-24 | ||
![]() |
Service Management Procedures Supporting Distributed Services in Mobile Ad Hoc Networks | Service Provisioning | M | Károly Farkas | SS 05 | MA-2005-14 | ||
![]() |
Liaison-Phänomene in Französisch-Deutsch gemischtsprachigen Sätzen | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-20 | ||
![]() |
Morphosyntaktische Analyse von italienisch-deutsch gemischtsprachigen Sätzen für SVOX | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-19 | ||
![]() |
Diphone Corpus Recording and Monitoring Tool | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-21 | ||
![]() |
Valenz und Semantik | Sprachverarbeitung | S | Tobias Kaufmann | SS 05 |
, |
SA-2005-22 | |
![]() |
Schlanke Programme mit genetischer Programmierung | Systemoptimierung | S | Stefan Bleuler | SS 05 | SA-2005-30 | ||
![]() |
Tool zum Vergleich von Stochastischen Mehrzieloptimierungsverfahren | Systemoptimierung | S | Stefan Bleuler | SS 05 | SA-2005-31 | ||
![]() |
A Churn-Resistant P2P-System Based on the Pancake Graph | D | Anja Wille | WS 05 | DA-2005-29 | |||
![]() |
Spamato Statistics - A Statistical Approach towards Spam Filtering | D | Keno Albrecht | WS 05 | DA-2005-04 | |||
![]() |
Application of Sectorized Antennas in RF-Based Indoor Localization Systems | M | Roger Wattenhofer | WS 05 | MA-2005-09 | |||
![]() |
Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? | N | Ulrich Fiedler | WS 05 | NA-2005-02 | |||
![]() |
Energy Efficient Deployment of Wireless Sensor Networks | S | Pascal von Rickenbach | WS 05 | SA-2005-12 | |||
![]() |
Gclipse A Collaborative Editor Plug-In for Eclipse | M | Keno Albrecht | WS 05 | MA-2005-45 | |||
![]() |
GPS on iPAQ | S | Aaron Zollinger | WS 05 | SA-2005-45 | |||
![]() |
Spamato Plug-in Architecture | S | Keno Albrecht | WS 05 | SA-2005-14 | |||
![]() |
Internet Coordinates | D | Regina ODell -Bischoff | WS 05 | DA-2005-02 | |||
![]() |
JaCal – ein verteilter Kalender | S | Keno Albrecht | WS 05 | SA-2005-46 | |||
![]() |
Optimization of Compact Set Membership Representation for Distributed Computing | M | Roger Wattenhofer | WS 05 | MA-2005-46 | |||
![]() |
Kangoo A Simple, Robust, and Efficient DHT for Large Amounts of Data [confidential] | S | Stefan Schmid | WS 05 |
, |
SA-2005-16 | ||
![]() |
TripletMail: Replicated E-Mail Storage | S | Keno Albrecht | WS 05 | SA-2005-15 | |||
![]() |
Spamato Plug-in Architecture | S | Keno Albrecht | WS 05 | SA-2005-47 | |||
![]() |
Spamato Statistics | D | Keno Albrecht | WS 05 | DA-2005-30 | |||
![]() |
Thunderbird Extension for Spamato | S | Keno Albrecht | WS 05 | SA-2005-09 | |||
![]() |
Topology Information Gathering with Scatterweb Sensor Boards | S | Aaron Zollinger | WS 05 | Frank Lyner | SA-2005-44 | ||
![]() |
Trace-Based Network Emulation | M | Ulrich Fiedler | WS 05 | MA-2005-06 | |||
![]() |
Vom Fahrgastinformations- zum Infotainmentsystem | M | Ulrich Fiedler | WS 05 | MA-2005-20 | |||
![]() |
Adaptive XTC on BTnodes | Ad-hoc-Netze | M | Matthias Dyer | WS 05 | MA-2005-05 | ||
![]() |
Algorithms for Radio Networks | Ad-hoc-Netze | D | Thomas Moscibroda | WS 05 | DA-2005-01 | ||
![]() |
Angewandte Uhrensynchronisation auf BTnodes | Ad-hoc-Netze | S | Lennart Meier | WS 05 |
, |
SA-2005-02 | |
![]() |
BlueDating - Dating Application for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | S | Vincent Lenders | WS 05 |
, |
SA-2005-08 | |
![]() |
Bluetella - File Sharing for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | S | Matthias Bossardt | WS 05 |
, |
SA-2005-03 | |
![]() |
SAFT Store And Forward Transport - Reliable Transport in Wireless Mobile Ad-hoc Networks | Ad-hoc-Netze | M | Martin May | WS 05 | MA-2005-08 | ||
![]() |
Efficient Constant K-Dominating set Aproximation | Ad-hoc-Netze | S | Thomas Moscibroda | WS 05 | SA-2005-10 | ||
![]() |
Service Discovery and Routing in Mobile Ad-Hoc Networks | Ad-hoc-Netze | M | Martin May | WS 05 | MA-2005-03 | ||
![]() |
Energy Conserving Camera Scheduling Policies for Sensor Networks | Ad-hoc-Netze | M | Matthias Bossardt | WS 05 | MA-2005-11 | ||
![]() |
Porting TinyOS on to BTnodes | Eingebettete Systeme | S | Jan Beutel | WS 05 | SA-2005-07 | ||
![]() |
Management of Distributed Traffic Control Service | Network Security | M | Matthias Bossardt | WS 05 | MA-2005-02 | ||
![]() |
Near Real-Time Detection of Traffic Usage Rhythm Anomalies in the Backbone | Network Security | D | Thomas Dübendorfer | WS 05 | DA-2005-03 | ||
![]() |
Scan Detection Based Identification of Worm-Infected Hosts | Network Security | M | Arno Wagner | WS 05 |
, |
MA-2005-01 | |
![]() |
Dynamic Peer-to-Peer Networks | Peer-to-Peer Networks | D | Fabian Kuhn, Stefan Schmid |
WS 05 | DA-2005-05 | ||
![]() |
Gclipse - A Collaborative Editor Plug-In for Eclipse | Peer-to-Peer Networks | M | Keno Albrecht | WS 05 | MA-2005-07 | ||
![]() |
P2P Filesharing Traffic Identification Method Validation and Verification | Peer-to-Peer Networks | S | Arno Wagner | WS 05 | SA-2005-11 | ||
![]() |
Sprache mit Tierstimmencharakteristik | Sprachverarbeitung | S | Harald Romsdorfer | WS 05 |
, |
SA-2005-04 | |
![]() |
Datenpool für die Verwaltung von Genom Daten | Systemoptimierung | S | Amela Prelic | WS 05 | SA-2005-06 | ||
![]() |
An evaluation of the feasibility of gene network reconstruction using current methods | Systemoptimierung | M | Amela Prelic | WS 05 | MA-2005-04 | ||
![]() |
Radio Communication with ScatterWeb Sensor Boards | S | Aaron Zollinger | FS 04 | Frank Lyner | SA-2004-49 | ||
![]() |
Reliable, Extensible, and Distributed Platform for Internet applications (german report, bait) | G | Keno Albrecht, Aaron Zollinger |
FS 04 | Markus Egli, , , Fabio Lanfranchi |
GA-2004-01 | ||
![]() |
A Framework for Programming Packet Processors | D | Lukas Ruf | SS 04 | DA-2004-01 | |||
![]() |
Communication and Management Infrastructure for Services on Active Router | S | Matthias Bossardt | SS 04 |
, |
SA-2004-27 | ||
![]() |
Mapping Services Onto Hierarchy-extended Active Network Nodes | D | Lukas Ruf | SS 04 | DA-2004-13 | |||
![]() |
Dynamic & Fault-Tolerant P2P Topologies | D | Fabian Kuhn | SS 04 | DA-2004-21 | |||
![]() |
Dynamic Graph Labelings | S | Regina ODell -Bischoff | SS 04 | Andreas Kinell | SA-2004-47 | ||
![]() |
Internet Coordinates | D | Regina ODell -Bischoff | SS 04 | DA-2004-47 | |||
![]() |
Spamato Reloaded | M | Keno Albrecht | SS 04 | MA-2004-06 | |||
![]() |
Parallel Image Registration in Distributed Memory Environments | M | Placi Flury | SS 04 | MA-2004-05 | |||
![]() |
Positioning with WLAN | S | Aaron Zollinger | SS 04 | SA-2004-48 | |||
![]() |
Spamato Revolutions | D | Nicolas Burri, Keno Albrecht |
SS 04 | DA-2004-20 | |||
![]() |
Routing and Applications in Mobile Ad hoc Networks | M | Regina ODell -Bischoff | SS 04 | MA-2004-07 | |||
![]() |
Scheduling Aircrafts | S | Alexander Hall | SS 04 | SA-2004-22 | |||
![]() |
Aircraft Scheduling | M | Alexander Hall | SS 04 |
, |
MA-2004-10 | ||
![]() |
Sensor Networks: Interference Reduction and Possible Applications | D | Aaron Zollinger | SS 04 | DA-2004-19 | |||
![]() |
Spamato Reloaded | M | Keno Albrecht | SS 04 | MA-2004-40 | |||
![]() |
Virtual Cordinates Simulation | D | Regina ODell -Bischoff | SS 04 | DA-2004-23 | |||
![]() |
Virtual Coordinates Simulation | S | Nicolas Burri | SS 04 | SA-2004-43 | |||
![]() |
VPN Network Testbed | S | Nicolas Burri | SS 04 | SA-2004-36 | |||
![]() |
VSETH Informations-System | S | Benjamin Stäger | SS 04 | SA-2004-34 | |||
![]() |
Components and Services | Eingebettete Systeme | M | Herbert Walder | SS 04 | MA-2004-02 | ||
![]() |
Tool für die Bewertung von Eingebetteten Systemen Design und Integration einer Analysemethode in Sym TA/S | Eingebettete Systeme | S | Simon Künzli | SS 04 |
, |
SA-2004-21 | |
![]() |
Analysis of Sobig.F and Blaster Worm Characteristics | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-23 | ||
![]() |
Detecting Bots in Internet Relay Chat Systems | Network Security | S | Thomas Dübendorfer | SS 04 |
, |
SA-2004-29 | |
![]() |
Kostenmodell zu präventiven IT-Sicherheitsmassnahmen | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-28 | ||
![]() |
Secure Java Code Interpreter for Public Utility Computing | Network Security | N | Thomas Dübendorfer | SS 04 | NA-2004-01 | ||
![]() |
Visualisation of Client/Server Behaviour | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-24 | ||
![]() |
Distributed Accounting for P2P Content Services | Peer-to-Peer Networks | D | David Hausheer | SS 04 | DA-2004-15 | ||
![]() |
P2P Population Tracking and Traffic Characterization of Current P2P File-sharing Systems | Peer-to-Peer Networks | M | Arno Wagner | SS 04 | MA-2004-04 | ||
![]() |
Implementation eines Auktions-basierten Pricing Mechanismus für Peer-to-Peer Systeme | Peer-to-Peer Networks | S | David Hausheer | SS 04 | SA-2004-26 | ||
![]() |
Embedded Task Machine with BTnode and FPGA | Reconfigurable Computing | S | Matthias Dyer | SS 04 |
, |
SA-2004-30 | |
![]() |
Network Attached Storage | Reconfigurable Computing | S | Matthias Dyer | SS 04 |
, |
SA-2004-31 | |
![]() |
Service Provisioning in Mobile Ad Hoc Networks | Service Provisioning | M | Károly Farkas | SS 04 | MA-2004-09 | ||
![]() |
Optimierung einer Merkmalsextraktionsmethode | Sprachverarbeitung | S | Ulrike Glavitsch | SS 04 |
, |
SA-2004-32 | |
![]() |
Sprachsteuerung eines Audiogerätes | Sprachverarbeitung | S | Harald Romsdorfer | SS 04 |
, |
SA-2004-25 | |
![]() |
Biclustering von Genexpressionsdaten mit Ameisen Algorithmen | Systemoptimierung | S | Stefan Bleuler | SS 04 | SA-2004-33 | ||
![]() |
A Lightweight Packet Capturer for High-Speed Links | S | Thomas Dübendorfer | WS 04 | SA-2004-08 | |||
![]() |
Patterns for Service Deployment in Programmable Networks | D | Matthias Bossardt | WS 04 | Daniela Brauckhoff | DA-2004-03 | ||
![]() |
Analysis of Internet Relay Chat Usage by DDoS Zombies | M | Thomas Dübendorfer | WS 04 | MA-2004-01 | |||
![]() |
Multi-objective Routing mit Ameisenalgorithmen | S | Placi Flury | WS 04 | SA-2004-02 | |||
![]() |
Audio Playback Tasks for RHWOS | S | Herbert Walder | WS 04 |
, |
SA-2004-12 | ||
![]() |
Mindstorms Admin Framework | S | Philipp Blum | WS 04 | SA-2004-05 | |||
![]() |
Computing the modular decomposition of a graph | S | Thomas Erlebach | WS 04 | SA-2004-03 | |||
![]() |
Design and Implementation of an Emulator for the IBM PowerNP 4GS3 | D | Lukas Ruf | WS 04 | DA-2004-08 | |||
![]() |
Development and Testing Layer for Ad-Hoc Network Software in Java | S | Aaron Zollinger | WS 04 | SA-2004-44 | |||
![]() |
Embedded Machine | S | Matthias Dyer | WS 04 |
, |
SA-2004-01 | ||
![]() |
Embedded Machine on FPGA | M | Matthias Dyer | WS 04 | MA-2004-03 | |||
![]() |
Energiesparende BTnodes | D | Lennart Meier | WS 04 | DA-2004-10 | |||
![]() |
Evolutionaere Optimierung von Synchronisationsalgorithmen | S | Philipp Blum | WS 04 |
, |
SA-2004-04 | ||
![]() |
Firmware for Reconfigurable Hardware OS Platform | S | Herbert Walder | WS 04 | SA-2004-09 | |||
![]() |
Gene Expression Profiling and Pathway Scoring | D | Eckart Zitzler | WS 04 | DA-2004-09 | |||
![]() |
Gossiping | D | Ruedi Arnold | WS 04 | Dirk Maier | DA-2004-44 | ||
![]() |
Reconfigurable Hardware OS Prototype - Part FPGA | D | Herbert Walder | WS 04 | DA-2004-05 | |||
![]() |
High-Performance Computing mit TIKDIMM | D | Christian Plessl | WS 04 | DA-2004-06 | |||
![]() |
Implementierung eines verteilten Dateisystems für “CLIPPEE” | D | Keno Albrecht, Ruedi Arnold |
WS 04 | Kliment Stojanov | DA-2004-45 | ||
![]() |
Interference and Topology Control in Ad-Hoc Networks | M | Aaron Zollinger | WS 04 | Pascal von Rickenbach | MA-2004-42 | ||
![]() |
Internet Topology Comparing different approaches of inferring AS relationships | M | Regina ODell -Bischoff | WS 04 | Beatrice Huber | MA-2004-43 | ||
![]() |
Kosten- Nutzenanalyse des Neptun Projekts | S | Bernhard Plattner | WS 04 | SA-2004-20 | |||
![]() |
TinyOS meets BTnode | S | Jan Beutel | WS 04 |
, |
SA-2004-16 | ||
![]() |
MultiSweeper Ein fesselndes Multiplayer-Spiel auf P2P-Basis | S | Keno Albrecht | WS 04 | Bernhard Stähli | SA-2004-45 | ||
![]() |
Optimizing the Ranking in Google | S | Keno Albrecht | WS 04 | SA-2004-46 | |||
![]() |
P2P Filesharing Systems: Real World NetFlow Traffic Characterization | B | Arno Wagner | WS 04 | BA-2004-01 | |||
![]() |
Parallel distributed filesystem with metadata database | D | Bernhard Plattner | WS 04 |
, |
DA-2004-11 | ||
![]() |
Phonem-Graphem Konversion für deutsche Wörter | S | René Beutler | WS 04 | SA-2004-15 | |||
![]() |
Plug-ins for DDoS Attack Detection in Realtime | S | Thomas Dübendorfer | WS 04 | SA-2004-19 | |||
![]() |
Signal Processing Tasks for RHWOS | S | Herbert Walder | WS 04 |
, |
SA-2004-11 | ||
![]() |
Reconfigurable Hardware OS Prototype - Part CPU | D | Herbert Walder | WS 04 | DA-2004-04 | |||
![]() |
Rekonstruktion von Graphen | D | Thomas Erlebach | WS 04 | DA-2004-02 | |||
![]() |
Resource Controlled Interprocessor Communication On NP-based Active Network Nodes | D | Lukas Ruf | WS 04 | DA-2004-17 | |||
![]() |
Secure Multicast for Virtual Private Converencing | M | Reto Strobel | WS 04 | MA-2004-41 | |||
![]() |
Active Network Service mit Netlink | S | Matthias Bossardt | WS 04 | SA-2004-17 | |||
![]() |
Spamato | D | Keno Albrecht | WS 04 | Nicolas Burri | DA-2004-43 | ||
![]() |
Survey of Mobile Ad-hoc Routing Algorithms | D | Regina ODell -Bischoff | WS 04 | Marc Schiely | DA-2004-46 | ||
![]() |
System Self-Test for RHWOS Platform | S | Herbert Walder | WS 04 | SA-2004-10 | |||
![]() |
A Framework for the Analysis of Gene Expression Data | S | Amela Prelic | WS 04 | SA-2004-18 | |||
![]() |
Towards Resilience Against Node Failures in Overlay Multicast Schemes | S | Kostas Katrinis | WS 04 | SA-2004-14 | |||
![]() |
Uhrensynchronisation in einem Ad-Hoc-Netz von BTnodes | S | Lennart Meier | WS 04 | SA-2004-06 | |||
![]() |
Video Playback Tasks for RHWOS | D | Herbert Walder | WS 04 | DA-2004-07 | |||
![]() |
Ähnlichkeitsmass für gesprochene Einzelwörter | S | René Beutler | WS 04 | SA-2004-13 | |||
![]() |
Integrity Protection for Secure Networked Storage | Network Security | D | Marcel Waldvogel | WS 04 | DA-2004-16 | ||
![]() |
Wireless LAN IPAQ (report, bait) | S | Aaron Zollinger | FS 03 | Nicolas Burri | SA-2003-49 | ||
![]() |
A Distributed Monitoring System for large, heterogeneous WLANs | D | Vincent Lenders | SS 03 | DA-2003-30 | |||
![]() |
Analysis of Interference in Ad-Hoc Networks | D | Aaron Zollinger | SS 03 | Martin Burkhart | DA-2003-37 | ||
![]() |
Ant Based Routing System | S | Placi Flury | SS 03 |
, |
SA-2003-21 | ||
![]() |
Aufbau und Betrieb eines Konferenzplanungssystems für die WWW2003 | S | Erik Wilde | SS 03 |
, |
SA-2003-33 | ||
![]() |
Clippee’s Monitoring & Testing Tool | S | Keno Albrecht | SS 03 | Guido Hager | SA-2003-41 | ||
![]() |
Configuration of SIP-based Conference Servers | S | Kostas Katrinis | SS 03 | SA-2003-32 | |||
![]() |
DDoS Attack Detection Based on Netflow Logs | S | Thomas Dübendorfer | SS 03 | SA-2003-35 | |||
![]() |
Distributed Content-based Accounting and Charging in P2P | D | David Hausheer | SS 03 | DA-2003-33 | |||
![]() |
Evolving the Ultimate Processor | D | Stefan Bleuler | SS 03 | DA-2003-31 | |||
![]() |
Grundlagen für das Mapping des Internet-Graphen | S | Thomas Erlebach | SS 03 | SA-2003-30 | |||
![]() |
HW-Tasks for Reconfigurable OS | S | Herbert Walder | SS 03 |
, |
SA-2003-23 | ||
![]() |
Bluetella: A Java Application for New Mobile Phones | S | Matthias Bossardt | SS 03 | SA-2003-19 | |||
![]() |
Java on the iPAQ | S | Aaron Zollinger | SS 03 | Nicolas Burri | SA-2003-38 | ||
![]() |
Join in Peer-to-Peer Systems: The Steady State Statistics Service Approach | D | Ruedi Arnold | SS 03 | Michael Gähwiler | DA-2003-39 | ||
![]() |
Lookup in Peer-to-Peer Networks | S | Jan Mischke | SS 03 | SA-2003-29 | |||
![]() |
Mapping the Gnutella Network | S | Keno Albrecht | SS 03 | Charly Wilhelm | SA-2003-46 | ||
![]() |
Messungen in Ad-Hoc-Netzwerken | S | Aaron Zollinger | SS 03 | André Bayer | SA-2003-36 | ||
![]() |
Minimum Stretch Spanning Trees | D | Fabian Kuhn | SS 03 | Philipp Boksberger | DA-2003-40 | ||
![]() |
Optimierungsmethoden für einen personalisierten Informationsservice | D | Thomas Erlebach | SS 03 | DA-2003-29 | |||
![]() |
Optimierung der Kommunikation in einer Peer-to-Peer Echtzeitanwendung | S | Keno Albrecht | SS 03 | Micha Trautweiler | SA-2003-47 | ||
![]() |
Positioning Algorithms | S | Ruedi Arnold, Regina ODell -Bischoff |
SS 03 | Christina Pöpper | SA-2003-42 | ||
![]() |
Prototype Board for Reconfigurable OS | S | Herbert Walder | SS 03 | SA-2003-22 | |||
![]() |
Design and implementation of a modular emulator for Topsy | D | Lukas Ruf | SS 03 | DA-2003-25 | |||
![]() |
Realisierung eines professionellen Audio-Netzwerkes mit IEEE1394 | S | Philipp Blum | SS 03 | SA-2003-31 | |||
![]() |
Realtime UDP NetFlow Processing Framework | D | Thomas Dübendorfer | SS 03 | DA-2003-26 | |||
![]() |
Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes | D | Vincent Lenders | SS 03 | DA-2003-27 | |||
![]() |
Running Time Analysis of Evolutionary Algorithms | D | Marco Laumanns | SS 03 | DA-2003-28 | |||
![]() |
Satzübergreifende Einflüsse auf die Prosodie | D | Harald Romsdorfer | SS 03 | DA-2003-32 | |||
![]() |
Search in Peer-to-Peer Networks | S | Jan Mischke | SS 03 | SA-2003-34 | |||
![]() |
ShaDoW | D | Ruedi Arnold | SS 03 | Martin Meier | DA-2003-43 | ||
![]() |
Simulation-Based Analysis of Internet Worm Characteristics | S | Thomas Dübendorfer | SS 03 | SA-2003-26 | |||
![]() |
Strukturierung, Navigation und Suche in semantischen Netzen | S | Placi Flury | SS 03 | SA-2003-24 | |||
![]() |
Text Independent Speaker Recognition | S | Beat Pfister | SS 03 |
, |
SA-2003-18 | ||
![]() |
Report On the Approximation of Unit Disk Graph | S | Fabian Kuhn | SS 03 | Thomas Rusterholz | SA-2003-45 | ||
![]() |
Wearable Presenter | S | Matthias Dyer | SS 03 |
, |
SA-2003-25 | ||
![]() |
Wireless Stereo Speakers | S | Philipp Blum | SS 03 |
, |
SA-2003-20 | ||
![]() |
Wirtschaftliche Auswirkungen von DDoS Attacken auf Backbone-Provider | S | Thomas Dübendorfer | SS 03 |
, |
SA-2003-27 | ||
![]() |
A Simulation Framework for Multiprocessor SoC | S | Alexandre Maxiaguine | WS 03 | SA-2003-15 | |||
![]() |
Ad-Hoc Services | S | Aaron Zollinger | WS 03 | Marc Schiely, |
SA-2003-44 | ||
![]() |
Adhoc Game | S | Aaron Zollinger | WS 03 | Christian Gegenschatz | SA-2003-43 | ||
![]() |
Pattern-based service deployment in active networks | S | Matthias Bossardt | WS 03 |
, |
SA-2003-13 | ||
![]() |
Analyzing MorphMix - a Peer-to-Peer based System for Anonymous Internet Access | S | Marc Rennhard | WS 03 | SA-2003-12 | |||
![]() |
Database-driven XML-anabled Bibliography Management System | D | Erik Wilde | WS 03 |
, |
DA-2003-05 | ||
![]() |
Comparison of Centralized (Client/Server) and Decentralized (Peer-to-peer) Networking | S | Jan Mischke | WS 03 | SA-2003-16 | |||
![]() |
Design and implementation of a Presentation Tool for an Educational Delivery Platform | S | Georgios Parissidis | WS 03 | SA-2003-08 | |||
![]() |
Desktop Firewalls and Intrunsion Detection | D | Marc Rennhard | WS 03 | DA-2003-22 | |||
![]() |
Evaluation von Arbitrierungsschemen in Netzwerkprozessoren | D | Simon Künzli | WS 03 |
, |
DA-2003-17 | ||
![]() |
Einsatz und Programmierung des IBM NP4GS3 Netzwerkprozessors fuer AktiveNetzwerkknoten unter Linux | D | Lukas Ruf | WS 03 | DA-2003-12 | |||
![]() |
Inter-Task-Communication in Reconfigurable Operating Systems | D | Herbert Walder | WS 03 |
, |
DA-2003-15 | ||
![]() |
Improved GOAFR Algorithm for Geometric Ad-Hoc Routing | S | Fabian Kuhn | WS 03 | Yan Zhang | SA-2003-48 | ||
![]() |
Integration of a Proof of Delivery in a WAP Content Billing Architecture for Third Party Services | D | Burkhard Stiller | WS 03 | DA-2003-18 | |||
![]() |
Java basierter Lexicon Editor | S | Harald Romsdorfer | WS 03 |
, |
SA-2003-07 | ||
![]() |
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers | S | Keno Albrecht | WS 03 | SA-2003-04 | |||
![]() |
Lautmodellierung mit neuronalen Netzen | S | René Beutler | WS 03 |
, |
SA-2003-05 | ||
![]() |
PromethOS v2.0 - Memory Resource Control in the Linux 2.4 Kernel | D | Lukas Ruf | WS 03 | DA-2003-24 | |||
![]() |
BTNode FPGA Mobiler FPGA mit Bluetooth Kommunikation | D | Matthias Dyer | WS 03 | DA-2003-08 | |||
![]() |
MPEG-4 FGS Codec | D | Kostas Katrinis | WS 03 | DA-2003-20 | |||
![]() |
Network Troubleshooting Expert System | D | Marc Rennhard | WS 03 | DA-2003-21 | |||
![]() |
Non-Repudiation of Service Consumption in MobyDick Networks | D | Hasan Hasan | WS 03 | DA-2003-01 | |||
![]() |
Online-Matching | D | Ruedi Arnold | WS 03 | Christian Schlup | DA-2003-45 | ||
![]() |
Paralinguistische Sprachtransformationen | S | Ulrike Glavitsch | WS 03 | SA-2003-06 | |||
![]() |
Personenerkennung anhand des Sprachsignals | S | Beat Pfister | WS 03 | SA-2003-03 | |||
![]() |
Real-World Interface for Evolutionary Algorithms | S | Marco Laumanns | WS 03 | SA-2003-02 | |||
![]() |
Reconfigurable Computing auf einem DIMM Modul | D | Christian Plessl | WS 03 | DA-2003-10 | |||
![]() |
Reconfigurable Computing on a DIMM Module | D | Christian Plessl | WS 03 | DA-2003-10 | |||
![]() |
Reconfigurable OS Prototype | D | Herbert Walder | WS 03 | DA-2003-11 | |||
![]() |
Routing and Wavelength Assignment in All-Optical Ring Networks | S | Stamatis Stefanakos | WS 03 | SA-2003-14 | |||
![]() |
Simulation of a Data Centric Routing Protocol for Mobile Ad Hoc Networks | D | Vincent Lenders | WS 03 | DA-2003-07 | |||
![]() |
Secure E-MAIL | D | Nathalie Weiler | WS 03 | DA-2003-13 | |||
![]() |
Service Composition for Active Networks | D | Matthias Bossardt | WS 03 |
, |
DA-2003-06 | ||
![]() |
Simulative Performance Optimization for TCP over UMTS | D | Burkhard Stiller | WS 03 | DA-2003-19 | |||
![]() |
Topology and Position Estimation in Buetooth Ad-hoc Networks | D | Jan Beutel | WS 03 | DA-2003-09 | |||
![]() |
Trace QoS A tool for locating QoS failures on an Internet path | D | Placi Flury | WS 03 | DA-2003-16 | |||
![]() |
Virtual Private Network Provisioning in the Hose Model | D | Thomas Erlebach | WS 03 | DA-2003-02 | |||
![]() |
Toolkit für Konferenzprogrammverwaltung und -personalisierung | D | Erik Wilde | WS 03 |
, |
DA-2003-03 | ||
![]() |
A Compact Syntax for XML Schema | D | Erik Wilde | WS 03 | DA-2003-04 | |||
![]() |
Chord/CFS | S | Keno Albrecht | SS 02 | David Baer | SA-2002-50 | ||
![]() |
Efficient Airplane Boarding | S | Aaron Zollinger | SS 02 | Andreas Westhoff | SA-2002-49 | ||
![]() |
Routing in Ad-Hoc-Netzen | S | Aaron Zollinger | SS 02 | Björn Glaus | SA-2002-48 |