|
Past Theses for all TIK Groups |
||||||||
title | category | type | contact/supervisor | assigned | student(s) | thesis number | ||
---|---|---|---|---|---|---|---|---|
Anomaly Detection for Automated Visual Inspection [confidential] | M | Ioana Giurgiu | HS 24 | MA-2024-23 | ||||
Computing with Asynchronous Cellular Automata [confidential] | M | Florian Grötschla, Andreas Plesner |
HS 24 | MA-2024-22 | ||||
Breaking Image CAPTCHAs and designing a new CAPTCHA [confidential] | M | Andreas Plesner | HS 24 | MA-2024-24 | ||||
Leveraging Pre-Trained LMs for Rapid and Accurate Structure Elucidation from 2D NMR Data [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
HS 24 | SA-2024-20 | ||||
Symbolic Music Generation with Autoregressive Graph Autoencoder [confidential] | S | Florian Grötschla, Luca Lanzendörfer |
HS 24 | SA-2024-21 | ||||
Exploit Detection in the Evolution of DApps | M | Benjamin Estermann, Ye Wang |
FS 24 | MA-2024-13 | ||||
Breaking Google’s reCAPTCHAv3 [confidential] | S | Andreas Plesner | FS 24 | SA-2024-09 | ||||
Breaking Google’s reCAPTCHAv3 - Getting good cookies [confidential] | S | Andreas Plesner | FS 24 | SA-2024-11 | ||||
Breaking Google’s reCAPTCHAv3 - How are humans classified [confidential] | S | Andreas Plesner | FS 24 | SA-2024-10 | ||||
CLLAP: Contrastive Language-Lyrics-Audio Pretraining [confidential] | M | Luca Lanzendörfer, Florian Grötschla |
FS 24 | MA-2024-12 | ||||
Compute-Efficient Pretraining of Large EEG Models [confidential] | B | Ard Kastrati | FS 24 | BA-2024-09 | ||||
Conditional Generation of Wavetables | B | Luca Lanzendörfer, Florian Grötschla |
FS 24 | BA-2024-07 | ||||
Improving the Data Quality of ConfSearch using LLMs | S | Andreas Plesner | FS 24 | SA-2024-18 | ||||
Data Driven Anomaly Detection for Rails using In-service Railway Vehicles | B | Andreas Plesner | FS 24 | BA-2024-02 | ||||
Data Driven Anomaly Detection of Springs in In-service Railway Vehicles [confidential] | B | Andreas Plesner | FS 24 | BA-2024-06 | ||||
Hidden State Aggregation Models with GNN Convolutions Applied to Multivariate Time-Series Forecasting in Energy Markets [confidential] | M | Benjamin Estermann | FS 24 | MA-2024-01 | ||||
Byzantine Distributed Stable Matching [confidential] | M | Diana Ghinea, Andrei Constantinescu |
FS 24 | MA-2024-11 | ||||
Deep Learning-Based Compression of EEG Data Using Neural Codecs [confidential] | S | Ard Kastrati, Luca Lanzendörfer |
FS 24 | SA-2024-19 | ||||
Benchmarking Music Generation Models and Metrics via Human Preference Studies [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-06 | ||||
Benchmarking Positional Encodings for GNNs [confidential] | S | Florian Grötschla | FS 24 | SA-2024-02 | ||||
Sybil Detection using Graph Neural Networks [confidential] | M | Andreas Plesner | FS 24 | MA-2024-08 | ||||
Improving Investment Strategies with GNNs [confidential] | S | Florian Grötschla, Joël Mathys |
FS 24 | SA-2024-16 | ||||
Graph Algorithms for Dynamic Directories [confidential] | M | Andrei Constantinescu, Pankaj Khanchandani |
FS 24 | MA-2024-15 | ||||
CLAP Embeddings for Artist Similarity with Graph Neural Networks [confidential] | G | Florian Grötschla, Luca Lanzendörfer |
FS 24 | GA-2024-04 | ||||
Next Level Message-Passing with Hierarchical Support Graphs [confidential] | S | Florian Grötschla | FS 24 | SA-2024-03 | ||||
FuzzNet: Imitating Byzantine Behavior in Distributed Systems [confidential] | M | Yann Vonlanthen | FS 24 | MA-2024-16 | ||||
Incentivizing Simple Transactions [confidential] | B | Lioba Heimbach, Andrei Constantinescu |
FS 24 | BA-2024-01 | ||||
Jigsaw Puzzle Solver using Machine Learning [confidential] | S | Andreas Plesner, Till Aczel |
FS 24 | SA-2024-04 | ||||
Reinforcement Learning for State-Based Algorithms on Graphs [confidential] | M | Florian Grötschla, Joël Mathys |
FS 24 | MA-2024-04 | ||||
Leverage Staking using Liquid Staking Tokens [confidential] | B | Lioba Heimbach, Robin Fritsch |
FS 24 | BA-2024-08 | ||||
Contrastive Lyrics Alignment with a Timestamp-Informed Loss [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-12 | ||||
Lyrics to Vocals Generation [confidential] | M | Luca Lanzendörfer, Florian Grötschla |
FS 24 | MA-2024-06 | ||||
High-Fidelity Music Vocoder Using Neural Audio Codecs [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-07 | ||||
FunctaFormer: Domain Agnostic Super Resolution [confidential] | M | Luca Lanzendörfer, Benjamin Estermann |
FS 24 | MA-2024-05 | ||||
Solving Poisson Equations using Neural Walk-on-Spheres [confidential] | M | Anima Anandkumar | FS 24 | MA-2024-10 | ||||
Open-LLark: Open-Sourcing And Extending LLark [confidential] | B | Luca Lanzendörfer, Florian Grötschla |
FS 24 | BA-2024-05 | ||||
Toward Robust Voting Advice Applications: Lessons from Smartvote [confidential] | M | Yann Vonlanthen, Frédéric Berdoz |
FS 24 | MA-2024-03 | ||||
Reconstructing ODEs for Railway Vehicles Using Machine Learning [confidential] | B | Andreas Plesner | FS 24 | BA-2024-04 | ||||
Mangrove: Fast and Parallelizable Smart Contract Agreement [confidential] | M | Yann Vonlanthen, Quentin Kniep |
FS 24 | MA-2024-02 | ||||
Analyzing Deep Learning Architectures on Stock Prediction [confidential] | G | Florian Grötschla, Joël Mathys |
FS 24 |
, |
GA-2024-05 | |||
Structured Sparsity for Efficiency in Model Inference | S | Peter Belcák | FS 24 | SA-2024-14 | ||||
Text-to-Speech Arena [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 24 | SA-2024-05 | ||||
Using Physics-Informed Neural Networks to Predict Railway Irregularities | M | Andreas Plesner | FS 24 | MA-2024-14 | ||||
Building a Multi-Cryptocurrency Node Explorer | Peer-to-Peer Networks | S | Lucianna Kiffer | FS 24 | SA-2024-08 | |||
Uncovering Discovery: A Deep Dive Into Ethereum’s Discovery Protocols [confidential] | Peer-to-Peer Networks | M | Lucianna Kiffer, Yann Vonlanthen |
FS 24 | MA-2024-17 | |||
Infrastructure Impact on Cryptocurrency Networks | Peer-to-Peer Networks | S | Lucianna Kiffer | FS 24 | SA-2024-15 | |||
Exploring Typical and Uncertainty-Driven Active Learning on DINO Embeddings to Enhance Versatility [confidential] | S | Till Aczel, Benjamin Estermann |
HS 23 | SA-2023-20 | ||||
AEye: A Visualization Tool for Image Datasets [confidential] | G | Florian Grötschla, Luca Lanzendörfer |
HS 23 | GA-2023-19 | ||||
Airdrop Mechanisms and Their Sybil Resistance [confidential] | B | Lioba Heimbach, Yann Vonlanthen |
HS 23 | BA-2023-19 | ||||
Object-Centric Reasoning with Language and Code [confidential] | G | Benjamin Estermann, Joël Mathys |
HS 23 | GA-2023-18 | ||||
Attacks on DAOs [confidential] | S | Lioba Heimbach, Yann Vonlanthen |
HS 23 | SA-2023-17 | ||||
Generative Musical Source Separation Based on Neural Audio Codecs [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
HS 23 | SA-2023-24 | ||||
Best Pokémon Team | B | Andreas Plesner | HS 23 | BA-2023-23 | ||||
I’m a Robot. Solving CAPTCHAs with Advanced Machine Learning Techniques [confidential] | S | Andreas Plesner | HS 23 | SA-2023-33 | ||||
Audio Data Visualization Using Text-Audio Embeddings [confidential] | B | Luca Lanzendörfer, Florian Grötschla |
HS 23 | BA-2023-20 | ||||
Building Practical Distributed Algorithms | G | Yann Vonlanthen | HS 23 |
, |
GA-2023-12 | |||
Building Practical Longest Chain Protocols | G | Yann Vonlanthen | HS 23 | GA-2023-13 | ||||
WikiGame: Graph-Exploration, Fun included | G | Luca Lanzendörfer | HS 23 |
, , , |
GA-2023-10 | |||
Dawn of an Era: How Layer 2 Solutions Change the Workload on Ethereum Blockchains [confidential] | M | Lioba Heimbach, Quentin Kniep |
HS 23 | MA-2023-23 | ||||
Improving Non-Linear Redundancy Reduction in Self-Supervised Contrastive Learning [confidential] | G | Béni Egressy | HS 23 | GA-2023-20 | ||||
Cue and Mix-Point Estimation for Automated DJ Systems [confidential] | M | Luca Lanzendörfer | HS 23 | MA-2023-09 | ||||
DataComp Challenge | G | Till Aczel, Benjamin Estermann |
HS 23 | GA-2023-09 | ||||
Personalized Federated Learning with Pre-Trained GNNs [confidential] | M | Béni Egressy | HS 23 | MA-2023-24 | ||||
Pre-training a Deep Learning Model for Decoding Brain Activity [confidential] | B | Ard Kastrati | HS 23 | BA-2023-21 | ||||
Diverse Datasets for BCI [confidential] | S | Ard Kastrati | HS 23 | SA-2023-34 | ||||
Leveraging Dense Text Representations for Efficient Language Modeling | M | Peter Belcák | HS 23 | MA-2023-20 | ||||
SUPClust: Active Learning at the Boundaries | S | Benjamin Estermann, Till Aczel |
HS 23 | SA-2023-16 | ||||
Exploring Activation Ensembles for Feed-Forward Neural Networks | B | Florian Grötschla, Joël Mathys |
HS 23 | BA-2023-17 | ||||
Fair Transaction Ordering Website | B | Lioba Heimbach | HS 23 | BA-2023-18 | ||||
Logarithmic Approximation for Road Pricing on Grids [confidential] | M | Andrei Constantinescu | HS 23 | MA-2023-03 | ||||
GNN Pretraining | M | Béni Egressy | HS 23 | MA-2023-21 | ||||
GNNs for TPU Graphs | S | Joël Mathys, Florian Grötschla |
HS 23 | SA-2023-22 | ||||
Bridging Image and Audio Compression: A Spectrogram-based Neural Approach | M | Luca Lanzendörfer | HS 23 | MA-2023-22 | ||||
Machine Unlearning Challenge | S | Luca Lanzendörfer, Benjamin Estermann |
HS 23 | SA-2023-21 | ||||
Evaluating Generative Models on Musical Mel Spectrogram Inversion [confidential] | G | Luca Lanzendörfer | HS 23 | GA-2023-11 | ||||
Adding Music Modality to LLMs by Leveraging Contrastive Pretraining [confidential] | B | Luca Lanzendörfer | HS 23 | BA-2023-13 | ||||
Network-level Attacks Against Ethereum PoS | B | Lioba Heimbach | HS 23 | BA-2023-16 | ||||
In-Depth Analysis of Bidding Strategies in MEV Auctions [confidential] | G | Benjamin Estermann, Ye Wang |
HS 23 | GA-2023-17 | ||||
Train Small - Solve Big: Reinforcement Learning on Logic Puzzles using Graph Neural Networks [confidential] | M | Benjamin Estermann, Joël Mathys |
HS 23 | MA-2023-16 | ||||
Understanding the Effects of Improved Representations on Downstream Reinforcement Learning Tasks [confidential] | S | Benjamin Estermann | HS 23 | SA-2023-13 | ||||
Automated Positioning for Smart Lighting [confidential] | M | Judith Beestermöller, Andreas Plesner |
HS 23 | MA-2023-10 | ||||
Scaling MARL with Graph Neural Networks | M | Benjamin Estermann, Florian Grötschla |
HS 23 | MA-2023-15 | ||||
Text Compression for Efficient Language Generation | M | Peter Belcák | HS 23 | MA-2023-19 | ||||
Coarse-to-Fine Unsupervised Text-to-Music Latent Diffusion [confidential] | M | Luca Lanzendörfer | HS 23 | MA-2023-12 | ||||
The Price of Weighted Majority Support [confidential] | G | Andrei Constantinescu | HS 23 | GA-2023-15 | ||||
Distributed Reinforcement Learning for Autonomous Driving in TrackMania [confidential] | G | Benjamin Estermann, Luca Lanzendörfer |
HS 23 | GA-2023-08 | ||||
Validity Properties of Byzantine Agreement [confidential] | G | Andrei Constantinescu, Diana Ghinea |
HS 23 | GA-2023-16 | ||||
Tokenization of Ethereum Stake [confidential] | Internet Measurement | S | Lucianna Kiffer, Lioba Heimbach |
HS 23 | SA-2023-28 | |||
Crawling the Bitcoin Client Ecosystem | Internet Measurement | S | Lucianna Kiffer, Lioba Heimbach |
HS 23 | SA-2023-25 | |||
Locating and Hiding Validators in the Ethereum Consensus Network [confidential] | Peer-to-Peer Networks | M | Lucianna Kiffer, Yann Vonlanthen |
HS 23 | MA-2023-13 | |||
Peer-to-peer Networks under Churn | Peer-to-Peer Networks | S | Lucianna Kiffer | HS 23 | SA-2023-15 | |||
The Peer Discovery Layer of the Ethereum Network | Peer-to-Peer Networks | S | Lucianna Kiffer | HS 23 | SA-2023-14 | |||
Enhancing GNNs: An Exploration of Iterative Solving and Augmentation Techniques | B | Joël Mathys, Florian Grötschla |
FS 23 | BA-2023-05 | ||||
Enhancing the Building Blocks of Language-Based Visual Reasoning for ARC | M | Joël Mathys, Benjamin Estermann |
FS 23 | MA-2023-11 | ||||
Asynchronous GNNs [confidential] | G | Joël Mathys, Florian Grötschla |
FS 23 | GA-2023-04 | ||||
Audit for Digital Assets [confidential] | B | Jakub Sliwinski | FS 23 | BA-2023-14 | ||||
DISCO-10M Creation and Data Exploration [confidential] | S | Luca Lanzendörfer, Florian Grötschla |
FS 23 | SA-2023-11 | ||||
Finite State Algorithm Learning on Graphs [confidential] | M | Joël Mathys, Florian Grötschla |
FS 23 | MA-2023-02 | ||||
Comparison of Electoral Systems and Optimization of Voting Advice Questionnaires | B | Andrei Constantinescu, Judith Beestermöller |
FS 23 | BA-2023-08 | ||||
Contrastive Pre-Training for Integer Sequence Understanding [confidential] | S | Peter Belcák | FS 23 | SA-2023-09 | ||||
Post Merge Cryptocurrencies | B | Lucianna Kiffer, Yann Vonlanthen |
FS 23 | BA-2023-04 | ||||
Large Language Model Augmented Contrastive Sentence Representation Learning | B | Zhao Meng | FS 23 | BA-2023-09 | ||||
Federated Reinforcement Learning with Heterogeneous Environments [confidential] | S | Xiaofeng Flint Fan, Luca Lanzendörfer |
FS 23 | SA-2023-04 | ||||
SUBER: An RL Environment with Simulated Human Behavior for Recommender Systems [confidential] | G | Xiaofeng Flint Fan, Luca Lanzendörfer |
FS 23 |
, |
GA-2023-05 | |||
Enabling Interactions Between Encointer Local Communities | G | Yann Vonlanthen | FS 23 | GA-2023-14 | ||||
Evaluating the Robustness of Large Language Models against Adversarial Attacks [confidential] | M | Zhao Meng | FS 23 | MA-2023-04 | ||||
Expressions and Emotion Detection from HMD Sensors | M | Ard Kastrati | FS 23 | MA-2023-08 | ||||
Generative Models for Financial Data: Applications to Initial Margin and its Backtesting [confidential] | M | Andreas Plesner | FS 23 | MA-2023-06 | ||||
From Pixels to Nodes: A Segmentation-Driven Approach to Image Classification | G | Karolis Martinkus, Ard Kastrati |
FS 23 |
, , |
GA-2023-06 | |||
Adversarial Robustness of Expressive Graph Neural Networks | B | Karolis Martinkus | FS 23 | BA-2023-06 | ||||
Abstract Approximate Agreement with Asynchronous Fallback [confidential] | S | Diana Ghinea, Andrei Constantinescu |
FS 23 | SA-2023-03 | ||||
Improving the Interface of the Jass AI | G | Benjamin Estermann | FS 23 | GA-2023-02 | ||||
Efficient Neural Representation Learning for Star-Convex Boundaries [confidential] | S | Karolis Martinkus | FS 23 | SA-2023-12 | ||||
Make Blockchain Public Again [confidential] | B | Benjamin Estermann, Ye Wang |
FS 23 | BA-2023-01 | ||||
From Searchers to Proposers: User Behaviour in Ethereum’s Proposer-Builder Separation | B | Ye Wang, Robin Fritsch |
FS 23 | BA-2023-12 | ||||
Mel Spectrogram Inversion [confidential] | B | Luca Lanzendörfer | FS 23 | BA-2023-11 | ||||
Analyzing the Use and Potential of Transaction Access Lists in Ethereum [confidential] | S | Yann Vonlanthen, Quentin Kniep |
FS 23 | SA-2023-08 | ||||
Popularity for Approval Ballots [confidential] | B | Andrei Constantinescu | FS 23 | BA-2023-15 | ||||
SALSA-CLRS: A Sparse and Scalable Benchmark for Algorithmic Reasoning [confidential] | S | Florian Grötschla, Joël Mathys |
FS 23 | SA-2023-01 | ||||
Reinforcement Learning Benchmark for Logic Puzzles [confidential] | M | Luca Lanzendörfer, Benjamin Estermann |
FS 23 | MA-2023-01 | ||||
Reinforcement Learning of TSP Heuristics with Message Passing Neural Networks | G | Xiaofeng Flint Fan, Joël Mathys |
FS 23 |
, |
GA-2023-01 | |||
Representation Learning for Reinforcement Learning [confidential] | B | Benjamin Estermann | FS 23 | BA-2023-10 | ||||
A Generalisation Benchmark for Machine Learning Methods Predicting Fluid Flows [confidential] | B | Florian Grötschla, Joël Mathys |
FS 23 | BA-2023-02 | ||||
Text-based Model on Voting Advice Application | S | Zhao Meng | FS 23 | SA-2023-10 | ||||
Efficient and Scalable Graph Generation by Spectrum Preserving Local Expansion [confidential] | M | Karolis Martinkus | FS 23 | MA-2023-05 | ||||
Swarm Intelligence Cup [confidential] | G | Benjamin Estermann, Florian Grötschla |
FS 23 | GA-2023-07 | ||||
Graph-based Metrics and Approaches for Sketch Generation [confidential] | M | Karolis Martinkus | FS 23 | MA-2023-07 | ||||
Distributed Setup for Trackmania Reinforcement Learning | G | Luca Lanzendörfer, Benjamin Estermann |
FS 23 | GA-2023-03 | ||||
Exploring Community Influence on DAOs [confidential] | B | Robin Fritsch, Ye Wang |
FS 23 | BA-2023-03 | ||||
Wikipedia Walker | B | Luca Lanzendörfer, Judith Beestermöller |
FS 23 | BA-2023-07 | ||||
Bitcoin Lightning Network Statistics and On-Chain Analysis [confidential] | B | Florian Grötschla, Lioba Heimbach |
HS 22 | BA-2022-39 | ||||
Analyzing the Solana Blockchain [confidential] | B | Quentin Kniep, Jakub Sliwinski |
HS 22 | BA-2022-33 | ||||
A Neural-Guided Program Synthesis Approach to the Abstraction and Reasoning Challenge [confidential] | G | Joël Mathys, Benjamin Estermann |
HS 22 | GA-2022-06 | ||||
Abstraction and Reasoning Challenge - Reasoning with Language [confidential] | G | Joël Mathys, Benjamin Estermann |
HS 22 |
, |
GA-2022-05 | |||
Challenging Code Search Models through Semantic Attacks [confidential] | S | Peter Belcák, Florian Grötschla |
HS 22 | SA-2022-31 | ||||
Challenging the Lexical Focus of Code Search | S | Peter Belcák, Florian Grötschla |
HS 22 | SA-2022-29 | ||||
Canonical Identifier Naming on Code Search Models | G | Peter Belcák, Florian Grötschla |
HS 22 | GA-2022-07 | ||||
Contrastive Learning using SPECTRE for Generating Graph Augmentations | S | Karolis Martinkus, Zhao Meng |
HS 22 | SA-2022-43 | ||||
Cascaded BeamSearch: Plug-and-Play Terminology-Forcing For Neural Machine Translation [confidential] | S | Béni Egressy | HS 22 | SA-2022-21 | ||||
Dangers of Voting Advice Applications in Swiss Politics [confidential] | M | Judith Beestermöller, Yann Vonlanthen |
HS 22 | MA-2022-22 | ||||
Deep Learning Sensor Fusion Models in the domain of Electroencephalogram-based Eye Tracking [confidential] | M | Ard Kastrati | HS 22 | MA-2022-30 | ||||
Towards Multi-Hop Open-Domain Question Answering by Dense Retrieval | B | Zhao Meng | HS 22 | BA-2022-35 | ||||
Detecting DDoS Attacks on Ethereum Validators [confidential] | M | Lioba Heimbach | HS 22 | MA-2022-31 | ||||
Decentralized Federated Policy Gradient with Provably Fast Convergence and Byzantine Fault Tolerance [confidential] | S | Xiaofeng Flint Fan, Florian Grötschla |
HS 22 | SA-2022-33 | ||||
EEG - Eye Tracking: A Wavelet Packets Approach | S | Ard Kastrati | HS 22 | SA-2022-44 | ||||
Fair Transaction Ordering [confidential] | M | Lioba Heimbach, Andrei Constantinescu |
HS 22 | MA-2022-26 | ||||
Fast Internet Computer Consensus [confidential] | M | Jakub Sliwinski, Yann Vonlanthen |
HS 22 | MA-2022-23 | ||||
Efficient Graph Drawing with GNNs using Overlay Graphs [confidential] | B | Florian Grötschla, Joël Mathys |
HS 22 | BA-2022-38 | ||||
Graph Neural Networks for Financial Fraud Detection [confidential] | M | Béni Egressy | HS 22 | MA-2022-19 | ||||
Developing Interpretable Graph Neural Networks for High Dimensional Feature Spaces | B | Karolis Martinkus, Lukas Faber |
HS 22 | BA-2022-43 | ||||
Incentivizing Simple Transactions [confidential] | S | Lioba Heimbach, Andrei Constantinescu |
HS 22 | SA-2022-36 | ||||
Learning Representations for Integer Sequences [confidential] | S | Peter Belcák | HS 22 | SA-2022-28 | ||||
Investigating `Grokking` – Late Generalisation in Deep Learning | B | Peter Belcák | HS 22 | BA-2022-45 | ||||
Benchmarking The Algorithmic Reasoning Of Neural Models | B | Peter Belcák | HS 22 | BA-2022-42 | ||||
Node-level Prediction Tasks with Agent-based Graph Neural Networks | B | Karolis Martinkus | HS 22 | BA-2022-41 | ||||
On the Mental State Classification in the VSS Paradigm [confidential] | M | Ard Kastrati | HS 22 | MA-2022-29 | ||||
Organizational Roles for Low-Power Multi-Agent Systems [confidential] | M | Naomi Stricker | HS 22 | MA-2022-25 | ||||
Exploring Trading on Decentralized Exchanges using Reinforcement Learning | M | Benjamin Estermann, Ye Wang |
HS 22 | MA-2022-28 | ||||
Performing Better Trading Strategies in DeFi with the Help of Machine Learning [confidential] | S | Benjamin Estermann, Ye Wang |
HS 22 | SA-2022-35 | ||||
Understanding Peer-Discovery in ETH 2.0 | M | Lucianna Kiffer, Yann Vonlanthen |
HS 22 | MA-2022-32 | ||||
Predicting Future Events via Markets | S | Robin Fritsch, Quentin Kniep |
HS 22 | SA-2022-42 | ||||
Predicting Horizontal Direction of Eye Movement using Electroencephalography Data from EEGEyeNet’s Visual Symbol Search Dataset | S | Ard Kastrati | HS 22 | SA-2022-38 | ||||
Reinforcement Learning for the Jass AI [confidential] | S | Benjamin Estermann, Xiaofeng Flint Fan |
HS 22 | SA-2022-37 | ||||
Restricted Domains in Computational Social Choice [confidential] | M | Andrei Constantinescu | HS 22 | MA-2022-27 | ||||
Snapshot Processing Pipeline & Positioning Algorithm for a Non-recovered GNSS Receiver [confidential] | M | Peter Belcák | HS 22 | MA-2022-21 | ||||
Spectral Denoising Diffusion Probabilistic Models for Graphs [confidential] | S | Karolis Martinkus | HS 22 | SA-2022-27 | ||||
Stability in Seating Arrangements [confidential] | S | Andrei Constantinescu | HS 22 | SA-2022-32 | ||||
Topological Methods in Distributed Systems: Approximate Agreement in Various Input Spaces [confidential] | M | Diana Ghinea | HS 22 | MA-2022-33 | ||||
Towards Semi-Supervised Region-Learning for Electroencephalography Models | S | Ard Kastrati | HS 22 |
, Jieming Li, |
SA-2022-45 | |||
Exploring Graph Neural Networks and Hierarchical Structures for Traffic Forecasting | B | Joël Mathys, Florian Grötschla |
HS 22 | BA-2022-44 | ||||
Measuring Cryptocurrency Networks | Internet Measurement | B | Lucianna Kiffer, Lioba Heimbach |
HS 22 | BA-2022-46 | |||
Dynamic Scheduling of Harvesting-Based Gas Sensing [confidential] | S | Naomi Stricker, Yun Cheng |
FS 22 | SA-2022-14 | ||||
SSA Data Flow Information for Semantic Code Tasks | B | Peter Belcák, Florian Grötschla |
FS 22 | BA-2022-21 | ||||
Algorithm Learning on OEIS | B | Peter Belcák, Ard Kastrati |
FS 22 | BA-2022-17 | ||||
A Practical Study on Anomaly Detection for a Hydro-Power Plant [confidential] | M | Béni Egressy | FS 22 | MA-2022-14 | ||||
Implementation of Self-triggered Model Predictive Control with Energy Harvesting Sensors for Building Control [confidential] | S | Naomi Stricker | FS 22 | SA-2022-15 | ||||
Inconvenient Data Sets for Graph Neural Networks [confidential] | B | Béni Egressy, Florian Grötschla |
FS 22 | BA-2022-29 | ||||
Clustering Ethereum Addresses | S | Lioba Heimbach, Quentin Kniep |
FS 22 | SA-2022-11 | ||||
Code Search for Natural Querying [confidential] | B | Peter Belcák, Benjamin Estermann |
FS 22 | BA-2022-26 | ||||
Comparing Liquidity Pools of Decentralized Exchanges | B | Robin Fritsch | FS 22 | BA-2022-04 | ||||
Analysis of Protests in Nigeria using Social Media Data | M | Zhao Meng | FS 22 | MA-2022-03 | ||||
ConfSearch 2022 | B | Ye Wang | FS 22 | BA-2022-02 | ||||
Data Curation Mechanisms for Algorithm Learning | B | Peter Belcák, Benjamin Estermann |
FS 22 | BA-2022-27 | ||||
Data-driven Preprocessing of EEG Data | M | Ard Kastrati, Benjamin Estermann |
FS 22 | MA-2022-18 | ||||
Discrete Denoising Diffusion Probabilistic Models for Graphs [confidential] | B | Karolis Martinkus | FS 22 | BA-2022-20 | ||||
Understanding the Economies of Blockchain Games: An Empirical Analysis of Axie Infinity | B | Ye Wang | FS 22 | BA-2022-08 | ||||
Disentangling Representations of Graph Drawings [confidential] | B | Benjamin Estermann, Peter Belcák |
FS 22 | BA-2022-28 | ||||
Disentanglement for Reinforcement Learning | B | Benjamin Estermann | FS 22 | BA-2022-09 | ||||
DeepEye: Eye Tracking with Deep Learning | S | Ard Kastrati | FS 22 | SA-2022-22 | ||||
The Impact of General Data Protection Regulation on Social Media Research [confidential] | B | Ye Wang | FS 22 | BA-2022-01 | ||||
Exploring Game Engine Architecture and Building an Experimental Voxel Renderer with Rust and Vulkan | B | Quentin Kniep | FS 22 | BA-2022-34 | ||||
Vector-Quantized Generative Adversarial Networks for Graphs | M | Karolis Martinkus | FS 22 | MA-2022-11 | ||||
Unreasonable Effectiveness of Edge Features: Formalization and Applications of Edge Pre-coloring in Color Refinement [confidential] | S | Béni Egressy, Florian Grötschla |
FS 22 | SA-2022-18 | ||||
Hedging the Risks of Liquidity Providers | B | Lioba Heimbach, Robin Fritsch |
FS 22 | BA-2022-19 | ||||
Do Politicians Keep Their Election Campaign Position? [confidential] | M | Yann Vonlanthen | FS 22 | MA-2022-01 | ||||
Improving Multi-hop Retrieval with QA Generation [confidential] | M | Zhao Meng | FS 22 | MA-2022-08 | ||||
Discovering Graph Generation Algorithms [confidential] | M | Karolis Martinkus | FS 22 | MA-2022-12 | ||||
Algorithm Learning from Data | B | Peter Belcák, Florian Grötschla |
FS 22 | BA-2022-36 | ||||
Machine Learning vs. Swiss Politics | B | Yann Vonlanthen, Robin Fritsch |
FS 22 | BA-2022-05 | ||||
Improving Deep Learning-Powered Iterative Combinatorial Auctions [confidential] | B | Ye Wang, Benjamin Estermann |
FS 22 | BA-2022-22 | ||||
Arbitrage Opportunities on Decentralized Exchanges | B | Robin Fritsch, Lioba Heimbach |
FS 22 | BA-2022-03 | ||||
Benchmarking Graph Neural Network Models [confidential] | S | Béni Egressy, Florian Grötschla |
FS 22 | SA-2022-19 | ||||
More Democracy on the Blockchain [confidential] | B | Robin Fritsch, Yann Vonlanthen |
FS 22 | BA-2022-23 | ||||
Multi-Agent Systems on Ultra Low Power Platforms [confidential] | M | Naomi Stricker | FS 22 | MA-2022-17 | ||||
MMP: An Object-Oriented Multi-Machine Parser Generator | M | Peter Belcák | FS 22 | MA-2022-02 | ||||
CYK and Earley in Multi-Machine Parser Generator [confidential] | B | Peter Belcák | FS 22 | BA-2022-14 | ||||
Neural Grammatical Inference for Regular Grammars [confidential] | B | Peter Belcák | FS 22 | BA-2022-37 | ||||
On the Generalization of Saliency Models [confidential] | B | Ard Kastrati | FS 22 | BA-2022-30 | ||||
Optimal Liquidity Pool Graphs [confidential] | M | Lioba Heimbach, Judith Beestermöller |
FS 22 | MA-2022-16 | ||||
Optimizing Synchronous Networks for Harvesting-Based Operation [confidential] | S | Naomi Stricker, Reto Da Forno |
FS 22 | SA-2022-17 | ||||
Optimizing Swiss Politics [confidential] | B | Yann Vonlanthen, Judith Beestermöller |
FS 22 | BA-2022-07 | ||||
Analysis of Core Constraints and Core Selecting Payment Rules Breaking Non-Decreasing Property | S | Ye Wang, Robin Fritsch |
FS 22 | SA-2022-09 | ||||
Information Systems of People Who Use Drugs [confidential] | M | Ye Wang | FS 22 | MA-2022-15 | ||||
Pretrained Model for Understanding of Integer Sequences | B | Peter Belcák, Ard Kastrati |
FS 22 | BA-2022-16 | ||||
GitDAO - Blockchain Primitives for Trustless Open Source | M | Yann Vonlanthen | FS 22 | MA-2022-06 | ||||
Quantifying Effects of Design Decisions in VAE-based Unsupervised Disentanglement Learning [confidential] | B | Benjamin Estermann, Peter Belcák |
FS 22 | BA-2022-32 | ||||
Real Time Public Transport App | S | Joël Mathys | FS 22 | SA-2022-24 | ||||
Enabling new Applications for Control Systems with Energy Harvesting Sensors [confidential] | B | Naomi Stricker | FS 22 | BA-2022-24 | ||||
Replicating Liquidity Provision Strategies in Uniswap | B | Robin Fritsch | FS 22 | BA-2022-06 | ||||
Virtual Subnetworks for Energy Harvesting Systems [confidential] | M | Naomi Stricker, Reto Da Forno |
FS 22 | MA-2022-13 | ||||
What Can Neural Networks Learn? Set Functions [confidential] | B | Béni Egressy | FS 22 | BA-2022-31 | ||||
Simulating Liquidity Allocation in Decentralized Exchanges [confidential] | S | Robin Fritsch | FS 22 | SA-2022-03 | ||||
Taking an Electoral Photograph with Neural Networks | S | Andrei Constantinescu, Peter Belcák |
FS 22 | SA-2022-23 | ||||
Understanding Smart Contract Auditing in the DeFi Ecosystem [confidential] | B | Ye Wang | FS 22 | BA-2022-25 | ||||
What can Neural Networks learn? - Set Functions [confidential] | G | Béni Egressy | FS 22 |
, |
GA-2022-03 | |||
Designing a Low-Power Autonomous Embedded System for Aircraft Collision Prevention | Embedded Systems | B | Peter Belcák | FS 22 | BA-2022-18 | |||
Designing PACAS Pilot | Embedded Systems | B | Peter Belcák | FS 22 | BA-2022-15 | |||
Agent-Based Simulation of Community Currencies with Basic Income | External Projects | S | Yann Vonlanthen | FS 22 | SA-2022-01 | |||
Abstraction and Reasoning Challenge | B | Ard Kastrati | HS 21 | BA-2021-38 | ||||
Efficient Gas Sensing with a Harvesting-Based Platform [confidential] | S | Naomi Stricker, Yun Cheng |
HS 21 | SA-2021-50 | ||||
Agent-based Graph Neural Network [confidential] | S | Karolis Martinkus | HS 21 | SA-2021-41 | ||||
Deep Neural Network-based Voting Assistant | B | Zhao Meng | HS 21 | BA-2021-37 | ||||
Automated Formulaic Alpha Generation for Quantitative Investing using Evolutionary Algorithms | B | Zhao Meng | HS 21 | BA-2021-32 | ||||
Automated Exercise Generation [confidential] | M | Damian Pascual, Oliver Richter |
HS 21 | MA-2021-44 | ||||
Benchmarking Graph Neural Networks [confidential] | M | Béni Egressy, Ard Kastrati |
HS 21 | MA-2021-61 | ||||
Building an Application on ICP | B | Robin Fritsch | HS 21 | BA-2021-26 | ||||
Selective Flooding Protocol for Harvesting-Based Networks [confidential] | S | Naomi Stricker, Reto Da Forno |
HS 21 | SA-2021-42 | ||||
Applying Predictability Minimization onto Unsupervised Contrastive Representation Learning [confidential] | B | Béni Egressy | HS 21 | BA-2021-31 | ||||
Contrastive Learning for Programming Languages | B | Zhao Meng | HS 21 | BA-2021-25 | ||||
Deep Learning for Smartphone-based Cough Detection | M | Roger Wattenhofer | HS 21 | MA-2021-64 | ||||
Hierarchical Reinforcement Learning for Algorithmic Trading | S | Zhao Meng | HS 21 | SA-2021-48 | ||||
Democracy on the Blockchain | B | Robin Fritsch | HS 21 | BA-2021-28 | ||||
Distributed Asynchronous Policy (DAP) with RL [confidential] | M | Karolis Martinkus, Lukas Faber |
HS 21 | MA-2021-48 | ||||
CloudMLS: A Cloud-based E2EE scheme | M | Karolis Martinkus, Ard Kastrati |
HS 21 | MA-2021-53 | ||||
Interpretable Graph Neural Network [confidential] | M | Karolis Martinkus, Lukas Faber |
HS 21 | MA-2021-52 | ||||
Gauging Risk in Resource Optimizations on Stateful Packet-Processing Devices | M | Alexander Dietmüller | HS 21 | MA-2021-62 | ||||
Graph Pattern Mining In Code | B | Peter Belcák | HS 21 | BA-2021-35 | ||||
Harvesting-Based DPP for Indoor Environmental Monitoring [confidential] | S | Naomi Stricker, Reto Da Forno |
HS 21 | SA-2021-43 | ||||
Using Pattern Recognition and Imitation Learning to Improve the Jass AI [confidential] | S | Oliver Richter, Benjamin Estermann |
HS 21 | SA-2021-44 | ||||
Advancing Predictions for Video Streaming with Transformers | S | Alexander Dietmüller, Romain Jacob |
HS 21 | SA-2021-39 | ||||
Mining and Visualizing Ethereum [confidential] | B | Yann Vonlanthen, Lioba Heimbach |
HS 21 | BA-2021-33 | ||||
Networking Meets BFT - An Implementation of P4Auth [confidential] | B | Roland Schmid | HS 21 | BA-2021-20 | ||||
Using Affordances to Understand Fan-Idol Interaction on Social Media [confidential] | S | Ye Wang, Zhao Meng |
HS 21 | SA-2021-35 | ||||
PACKS: A Practical Abstraction for Programmable Packet Scheduling [confidential] | S | Alberto Gran Alcoz | HS 21 | SA-2021-36 | ||||
Collision Detection Algorithm for a Practical Airborne Collision Avoidance System | B | Peter Belcák | HS 21 | BA-2021-30 | ||||
Preprocessing of EEG Data for DL Models [confidential] | S | Ard Kastrati | HS 21 | SA-2021-49 | ||||
Scalability of Encointer - a Proof-Of-Personhood Cryptocurrency | M | Tejaswi Nadahalli | HS 21 | MA-2021-42 | ||||
Providing Liquidity in Uniswap V3 | B | Robin Fritsch | HS 21 | BA-2021-21 | ||||
Scaling Attention Using Binary Trees [confidential] | M | Karolis Martinkus | HS 21 | MA-2021-47 | ||||
Can Computer Understand Chinese Internet Slang? | S | Ye Wang, Zhao Meng |
HS 21 | SA-2021-34 | ||||
Understanding PancakeSwap Through Data [confidential] | S | Lioba Heimbach, Ye Wang |
HS 21 | SA-2021-46 | ||||
Understanding Reinforcement Learning with 6nimmt! | G | Béni Egressy | HS 21 |
, |
GA-2021-02 | |||
Understanding Uniswap V3 Through Data [confidential] | B | Lioba Heimbach, Ye Wang |
HS 21 | BA-2021-29 | ||||
User Tailored Jass AI | S | Oliver Richter, Benjamin Estermann |
HS 21 | SA-2021-40 | ||||
Analysis of Convergence Processes in Internet Networks [confidential] | Systems Verification | M | Tibor Schneider, Roland Schmid |
HS 21 | MA-2021-51 | |||
A Framework for Algorithmic Learning: How Does Complexity Arise in Evolution? | G | Ard Kastrati | FS 21 |
, |
GA-2021-01 | |||
Title is confidential [confidential] | S | Patrick Jattke | FS 21 | SA-2021-04 | ||||
Operating System-Level Load Distribution for Network Telemetry Data Collection | M | Tobias Bühler, Laurent Vanbever |
FS 21 | MA-2021-02 | ||||
The Weak Snapshot Abstraction | B | Ye Wang | FS 21 | BA-2021-03 | ||||
Automated BGP Policy Analysis | S | Rüdiger Birkner, Rui Yang |
FS 21 | SA-2021-07 | ||||
OEIS Sequence Classification [confidential] | S | Ard Kastrati | FS 21 | SA-2021-32 | ||||
Beyond Left-Right Gaze Prediction with EEG Data [confidential] | B | Ard Kastrati, Damian Pascual |
FS 21 | BA-2021-13 | ||||
Bitcoin Privacy from Chain Analysis [confidential] | M | Tejaswi Nadahalli | FS 21 | MA-2021-45 | ||||
Title is confidential [confidential] | B | Finn de Ridder | FS 21 | BA-2021-11 | ||||
Budget Restricted Market Games with Continuous Spendings | B | Ye Wang, Yuyi Wang |
FS 21 | BA-2021-02 | ||||
Title is confidential [confidential] | B | Patrick Jattke | FS 21 | BA-2021-16 | ||||
Self-Supervised Contrastive Learning with Adversarial Perturbations for Robust Pretrained Language Models | M | Zhao Meng | FS 21 | MA-2021-38 | ||||
Improving Brain Decoding Methods and Evaluation | M | Béni Egressy, Damian Pascual |
FS 21 | MA-2021-09 | ||||
Reinforcement Learning for Blockchain-Based Trading | S | Ye Wang, Zhongnan Qu |
FS 21 | SA-2021-12 | ||||
A Batteryless Chemical Sensor [confidential] | S | Yun Cheng | FS 21 | SA-2021-24 | ||||
Distance Preserving Graph Embedding | B | Karolis Martinkus | FS 21 | BA-2021-17 | ||||
Evolutionary Methods for Sequences | B | Ard Kastrati | FS 21 | BA-2021-19 | ||||
Exploring Optimal Methods for Generating High-Precision Timestamps from Satellite Communication [confidential] | S | Vincent Lenders, Laurent Vanbever |
FS 21 | SA-2021-29 | ||||
Reliability Benefits of Upgrading Mobile Backhaul Networks from MPLS to SRv6 [confidential] | M | Coralie Busse-Grawitz, Laurent Vanbever |
FS 21 | MA-2021-43 | ||||
Title is confidential [confidential] | M | Finn de Ridder | FS 21 | MA-2021-05 | ||||
Graph Algorithms in Harsh Conditions | B | Diana Ghinea, Jakub Sliwinski |
FS 21 | BA-2021-34 | ||||
Graph Coloring with Deep Learning [confidential] | S | Karolis Martinkus | FS 21 | SA-2021-15 | ||||
Labeling Schemes for Reachability in Directed Graphs [confidential] | M | Robin Fritsch | FS 21 | MA-2021-07 | ||||
Enhancing Graph Neural Networks with Boosting | B | Lukas Faber, Karolis Martinkus |
FS 21 | BA-2021-22 | ||||
QPEP In the Real World [confidential] | M | Vincent Lenders, Roland Meier |
FS 21 | MA-2021-03 | ||||
Implementing Graph Algorithms for Dynamic Directories [confidential] | B | Robin Fritsch, Pál András Papp |
FS 21 | BA-2021-06 | ||||
Improving the Breathing-Phase Detection of an Interactive Breathing Training App [confidential] | S | Roger Wattenhofer | FS 21 | SA-2021-22 | ||||
In Search of Network Shifts | B | Alexander Dietmüller, Romain Jacob |
FS 21 | BA-2021-10 | ||||
Using Random Forest for Indoor Solar Energy Estimates on Embedded Systems | S | Naomi Stricker, Stefan Draskovic |
FS 21 | SA-2021-20 | ||||
Analytical Model for Indoor Solar Energy Harvesting | B | Naomi Stricker, Stefan Draskovic |
FS 21 | BA-2021-24 | ||||
Live Content Generation in Momentum-based Games | S | Oliver Richter | FS 21 | SA-2021-30 | ||||
RMCL : A Robust Multimodal Contrastive Learning Framework [confidential] | M | Zhao Meng | FS 21 | MA-2021-08 | ||||
KM-BART: Knowledge Enhanced Multimodal BART for Visual Commonsense Generation [confidential] | M | Zhao Meng | FS 21 | MA-2021-04 | ||||
NANOG Mailing List Analysis | S | Rüdiger Birkner, Alexander Dietmüller |
FS 21 | SA-2021-09 | ||||
Networking Meets BFT [confidential] | S | Roland Schmid | FS 21 | SA-2021-19 | ||||
Neural Distance Oracle for Road Graphs | B | Karolis Martinkus | FS 21 | BA-2021-08 | ||||
Analyzing and Preventing Sandwich Attacks in Ethereum | B | Tejaswi Nadahalli, Ye Wang |
FS 21 | BA-2021-07 | ||||
Optimal Trading and Arbitrage in a Network of Decentralized Exchanges [confidential] | B | Robin Fritsch, Lioba Heimbach |
FS 21 | BA-2021-05 | ||||
Quantifying TWAP Oracle Manipulation Attacks [confidential] | B | Tejaswi Nadahalli | FS 21 | BA-2021-27 | ||||
O4: A Higher-level Data-plane Programming Language [confidential] | M | Alberto Gran Alcoz, Coralie Busse-Grawitz |
FS 21 | MA-2021-40 | ||||
Preprocessing of EEG Data for Deep Learning Models [confidential] | S | Ard Kastrati, Damian Pascual |
FS 21 | SA-2021-38 | ||||
Reproduction and Behaviour of Local and Non-local Distribution | B | Yuyi Wang, Ye Wang |
FS 21 | BA-2021-01 | ||||
Region Based File Sharing | B | Robin Fritsch, Béni Egressy |
FS 21 | BA-2021-18 | ||||
Multi Agent Reinforcement Learning for Game Theory: Financial Graphs [confidential] | M | Béni Egressy, Pál András Papp |
FS 21 | MA-2021-41 | ||||
Understanding Permutations in Deep Neural Network [confidential] | S | Zhongnan Qu | FS 21 | SA-2021-26 | ||||
Stateful Tofino-based Traffic Generator [confidential] | M | Tobias Bühler | FS 21 | MA-2021-01 | ||||
Study About the Size and Quality of the EEG Dataset | S | Ard Kastrati, Damian Pascual |
FS 21 | SA-2021-37 | ||||
Title is confidential [confidential] | B | Kaveh Razavi | FS 21 | BA-2021-23 | ||||
Towards a Full Implementation of RPKI in the Mini-Internet | S | Thomas Holterbach, Tobias Bühler |
FS 21 | SA-2021-11 | ||||
Deploying a Mini-Internet Instance Across Multiple Servers | B | Thomas Holterbach, Tobias Bühler |
FS 21 | BA-2021-12 | ||||
BERT is Robust! A Case Against Synonym-Based Adversarial Examples in Text Classification | M | Zhao Meng, Damian Pascual |
FS 21 | MA-2021-06 | ||||
Website Fingerprinting in the Data Plane | S | Ege Cem Kirci, Roland Meier |
FS 21 | SA-2021-25 | ||||
Proving Ownership of Bitcoin-like UTXO’s Using a zk-SNARK Scheme | S | Tejaswi Nadahalli | FS 21 | SA-2021-02 | ||||
End to End Encryption in a Cloud-Based Messenger [confidential] | End-point Security | S | Ard Kastrati, Karolis Martinkus |
FS 21 | SA-2021-23 | |||
Air Quality Map Prediction with Fine-grained Weather Data [confidential] | Environmental Sensing | S | Yun Cheng, Xiaoxi He |
FS 21 | SA-2021-17 | |||
Route Convergence Optimization in the SWITCH Network | Internet Architecture | M | Tibor Schneider | FS 21 | MA-2021-39 | |||
An Auto-grading Framework for the Mini-Internet Project | Network Coding | S | Thomas Holterbach, Laurent Vanbever |
FS 21 | SA-2021-13 | |||
Process Mining for Networking | Network Monitoring | S | Romain Jacob | FS 21 | SA-2021-27 | |||
Towards a New Framework for Integration of Network Planes | Software Defined Networking | S | Edgar Costa Molero | FS 21 | SA-2021-16 | |||
Improving Current P4 Prototyping Tools | Software Defined Networking | S | Edgar Costa Molero | FS 21 | SA-2021-10 | |||
Towards Robust Graph Contrastive Learning [confidential] | S | Lukas Faber, Zhao Meng |
HS 20 | SA-2020-61 | ||||
AI in Financial Markets | S | Ye Wang, Zhongnan Qu |
HS 20 | SA-2020-28 | ||||
Automated Exercise Coach [confidential] | S | Oliver Richter, Damian Pascual |
HS 20 | SA-2020-51 | ||||
Title is confidential [confidential] | B | Kaveh Razavi | HS 20 | BA-2020-48 | ||||
Make Your Own Internet - Setting up a Brand New P&S Project | G | Laurent Vanbever, Edgar Costa Molero |
HS 20 | GA-2020-03 | ||||
Exploring Blockchain Peer-to-Peer Networks | B | Ye Wang, Zeta Avarikioti |
HS 20 | BA-2020-46 | ||||
Classifying Medical Text using State-of-the-art Natural Language Processing Techniques | M | Damian Pascual | HS 20 | MA-2020-17 | ||||
Conditional Language Generation [confidential] | S | Damian Pascual, Béni Egressy |
HS 20 | SA-2020-65 | ||||
Control Theory Meets Programmable Data-Plane | S | Maria Apostolaki, Alexander Dietmüller |
HS 20 | SA-2020-55 | ||||
Web App Design for Cryptocurrency Transaction System | S | Ye Wang | HS 20 | SA-2020-33 | ||||
Cryptomoney In Real Life | S | Ye Wang | HS 20 | SA-2020-31 | ||||
Server Design for Digital Payment System | S | Ye Wang | HS 20 | SA-2020-32 | ||||
DAB+ Positioning | S | Simon Tanner, Damian Pascual |
HS 20 | SA-2020-58 | ||||
Variance Reduction in Decentralized Training over Heterogeneous Data | M | Roger Wattenhofer | HS 20 | MA-2020-32 | ||||
DyR-MLP: a Dynamic Routing MLP Model for Temporal Knowledge Graph [confidential] | M | Zhao Meng | HS 20 | MA-2020-34 | ||||
Deep Learning for Text Attribute Transfer on Auto Encoder Models | B | Zhao Meng, Damian Pascual |
HS 20 | BA-2020-45 | ||||
Event-centric Forecasting on Temporal Knowledge Graph with Transformer | S | Zhao Meng | HS 20 | SA-2020-67 | ||||
On Isotropy Calibration of Transformer Models [confidential] | M | Damian Pascual, Karolis Martinkus |
HS 20 | MA-2020-36 | ||||
Deep Sensor Calibration Method with Multi-Level Sequence Modeling [confidential] | S | Yun Cheng, Xiaoxi He |
HS 20 | SA-2020-57 | ||||
Developing a Jass AI Server | B | Oliver Richter | HS 20 | BA-2020-47 | ||||
Development of a Decentralised Communication Framework for an Online Tichu Game | S | Lukas Faber, Oliver Richter |
HS 20 | SA-2020-37 | ||||
Electromagnetic Tracking via Deep Learning [confidential] | M | Lothar Thiele | HS 20 | MA-2020-33 | ||||
Emoji for Natural Language Processing | M | Ye Wang, Zhao Meng |
HS 20 | MA-2020-31 | ||||
Evaluating Performance Limits of BFT Protocols [confidential] | S | Zeta Avarikioti, Roland Schmid |
HS 20 | SA-2020-30 | ||||
Cloud Causality Analyzer for Anomaly Detection [confidential] | M | Lothar Thiele | HS 20 | MA-2020-20 | ||||
Explaining and Visualizing Graph Neural Networks [confidential] | M | Lukas Faber | HS 20 | MA-2020-22 | ||||
Title is confidential [confidential] | S | Kaveh Razavi | HS 20 | SA-2020-54 | ||||
Generating Flashcards From Wikipedia Articles [confidential] | G | Damian Pascual, Oliver Richter |
HS 20 |
, |
GA-2020-02 | |||
Graph Neural Networks in Finance | S | Lukas Faber, Béni Egressy |
HS 20 | SA-2020-69 | ||||
HomeDetective: Improved Area Subdivision and Support for Areas of Interest [confidential] | B | Simon Tanner | HS 20 | BA-2020-50 | ||||
Implementing the Resource Public Key Infrastructure (RPKI) in a Virtual Mini-Internet [confidential] | S | Tobias Bühler, Thomas Holterbach |
HS 20 | SA-2020-29 | ||||
Infection Spreading in Graphs | S | Pál András Papp, Béni Egressy |
HS 20 | SA-2020-60 | ||||
LTE Positioning [confidential] | S | Simon Tanner | HS 20 | SA-2020-70 | ||||
Multiagent Reinforcement Learning in Financial Networks | S | Lukas Faber, Pál András Papp |
HS 20 | SA-2020-68 | ||||
Normalized Attention Reinforcement Learning [confidential] | S | Oliver Richter, Damian Pascual |
HS 20 | SA-2020-36 | ||||
Collusion Resistance in Peer Grading | S | Jakub Sliwinski, Diana Ghinea |
HS 20 | SA-2020-64 | ||||
Strategyproof Cardinal Peer Grading | S | Jakub Sliwinski, Diana Ghinea |
HS 20 | SA-2020-66 | ||||
Predicting COVID-19 Spread from Large-Scale Mobility Data [confidential] | M | Roger Wattenhofer | HS 20 | MA-2020-37 | ||||
Prediction of Sleep Quality from Smartphone Sound Recordings | S | Roger Wattenhofer | HS 20 | SA-2020-59 | ||||
Receiving ADS-B Messages with Deep Learning using Past-Message Information [confidential] | M | Simon Tanner, Damian Pascual |
HS 20 | MA-2020-23 | ||||
A Rigid Origami Environment for Reinforcement Learning [confidential] | M | Oliver Richter, Karolis Martinkus |
HS 20 | MA-2020-35 | ||||
Transparent Field Device Management for Complex Cyber-Physical Industrial Automation Systems | S | Roger Wattenhofer | HS 20 | SA-2020-53 | ||||
Smart Vote [confidential] | B | Béni Egressy, Robin Fritsch |
HS 20 | BA-2020-49 | ||||
Snowcap: Synthesizing Network-Wide Configuration Updates [confidential] | M | Laurent Vanbever, Rüdiger Birkner |
HS 20 | MA-2020-19 | ||||
Plasticine: A Flexible Buffer Management Scheme for Data Center Networks [confidential] | M | Laurent Vanbever, Maria Apostolaki |
HS 20 | MA-2020-06 | ||||
Indoor WSN with On-Board PV Energy Harvesting - Making Sense of People Detection Data | Embedded Systems | S | Stefan Draskovic, Naomi Stricker |
HS 20 | SA-2020-52 | |||
Primus Inter Pares No More: Increasing The Fault Tolerance of Wireless Sensor Networks [confidential] | Embedded Systems | M | Andreas Biri, Reto Da Forno |
HS 20 | MA-2020-18 | |||
De-anonymizing Users of Cryptocurrencies | Peer-to-Peer Networks | S | Laurent Vanbever, Maria Apostolaki |
HS 20 | SA-2020-07 | |||
Network Configuration Synthesis with Fuzzing [confidential] | S | Rüdiger Birkner, Coralie Busse-Grawitz |
FS 20 | SA-2020-23 | ||||
Ambient Noise Audio Communication [confidential] | S | Simon Tanner | FS 20 | SA-2020-04 | ||||
Anonymized Traffic Trace Collection in the Data Plane [confidential] | M | Tobias Bühler, Thomas Holterbach |
FS 20 | MA-2020-08 | ||||
Are You Human? | S | Tejaswi Nadahalli, Darya Melnyk |
FS 20 | SA-2020-24 | ||||
Asynchronous Consensus-Free Transaction Systems [confidential] | B | Roland Schmid, Jakub Sliwinski |
FS 20 | BA-2020-01 | ||||
Attribution Methods for Understanding and Visualizing Graph Neural Networks [confidential] | S | Lukas Faber | FS 20 | SA-2020-17 | ||||
Data Hiding in Speech Files and Data Compression of Cepstral Coefficients [confidential] | M | Simon Tanner | FS 20 | MA-2020-03 | ||||
BGP Verification without Specification | S | Rüdiger Birkner | FS 20 | SA-2020-21 | ||||
Bitcoin on Tendermint | S | Tejaswi Nadahalli | FS 20 | SA-2020-13 | ||||
Bubble-Tea Market Games [confidential] | S | Ye Wang, Yuyi Wang |
FS 20 | SA-2020-16 | ||||
Implementation and Simulation of the PermitBFT Algorithm [confidential] | S | Roland Schmid | FS 20 | SA-2020-18 | ||||
FnF-BFT: Exploring Performance Limits of BFT Protocols [confidential] | M | Roland Schmid, Zeta Avarikioti |
FS 20 | MA-2020-02 | ||||
Byzantine Reinforcement Learning | M | Darya Melnyk, Oliver Richter |
FS 20 | MA-2020-10 | ||||
How Faithful Are Current Vision Language Navigation Models: A Study on R2R and R4R Datasets | S | Zhao Meng | FS 20 | SA-2020-25 | ||||
Ensuring Transport Fairness with Smart Networks | S | Alexander Dietmüller, Maria Apostolaki |
FS 20 | SA-2020-26 | ||||
Consensus Number of Objects in Distributed Systems [confidential] | S | Ye Wang, Pankaj Khanchandani |
FS 20 | SA-2020-27 | ||||
Developing a Jass AI [confidential] | M | Oliver Richter | FS 20 | MA-2020-05 | ||||
Distributed Debugging for FlockLab 2 | S | Roman Trüb, Reto Da Forno |
FS 20 | SA-2020-05 | ||||
Value Convergence in Actor-Critic Reinforcement Learning [confidential] | S | Oliver Richter | FS 20 | SA-2020-22 | ||||
Brain2Word: Decoding Brain Activity for Language Generation | M | Damian Pascual, Béni Egressy |
FS 20 | MA-2020-11 | ||||
Extending NetComplete | M | Rüdiger Birkner, Coralie Busse-Grawitz |
FS 20 | MA-2020-13 | ||||
Traffic-Aware Compilation | S | Maria Apostolaki, Alexander Dietmüller |
FS 20 | SA-2020-15 | ||||
An Algorithm For Tree Evacuation [confidential] | B | Béni Egressy, Henri Devillez |
FS 20 | BA-2020-43 | ||||
High-speed Traffic Generation | S | Tobias Bühler | FS 20 | SA-2020-06 | ||||
HomeDetective: Advanced Features [confidential] | S | Simon Tanner | FS 20 | SA-2020-02 | ||||
Dynamic Taint Analysis on Android for ART and Native Code [confidential] | M | Simon Tanner | FS 20 | MA-2020-01 | ||||
Meta Congestion Control | S | Maria Apostolaki, Alexander Dietmüller |
FS 20 | SA-2020-14 | ||||
Mobile Resource Sharing [confidential] | B | Pankaj Khanchandani, Pál András Papp |
FS 20 | BA-2020-41 | ||||
Network Surveillance in an IoT Environment [confidential] | M | Simon Tanner | FS 20 | MA-2020-07 | ||||
Online Alpine Laboratory [confidential] | M | Matthias Meyer, Jan Beutel |
FS 20 | MA-2020-14 | ||||
Online Matching [confidential] | B | Yuyi Wang, Darya Melnyk |
FS 20 | BA-2020-36 | ||||
Over-bidding Strategies in Combinatorial Auctions | M | Ye Wang | FS 20 | MA-2020-15 | ||||
PTP Time Synchronization for FlockLab 2 | S | Roman Trüb, Reto Da Forno |
FS 20 | SA-2020-01 | ||||
Reinforcement Learning in Graph Theory [confidential] | B | Pankaj Khanchandani, Lukas Faber |
FS 20 | BA-2020-02 | ||||
Identifying and Using Task Relations in Multi-Task Reinforcement Learning [confidential] | M | Oliver Richter | FS 20 | MA-2020-09 | ||||
Emulations on Energy Harvesting Embedded Systems | S | Naomi Stricker, Stefan Draskovic |
FS 20 | SA-2020-11 | ||||
Using ElectionGuard for Secure Remote Voting on Untrusted Devices | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-37 | ||||
Secure E-Voting with ETHVote | M | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | MA-2020-12 | ||||
Adding Ranked Voting to Artemis and Implementing a Registrar [confidential] | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-42 | ||||
Artemis: Solving the Secure Platform Problem for the Helios E-Voting System [confidential] | B | Darya Melnyk, Tejaswi Nadahalli |
FS 20 | BA-2020-34 | ||||
A Machine Learning Analysis of the Swiss Political Spectrum and Candidate Recommendation Process | G | Henri Devillez, Darya Melnyk |
FS 20 |
, , |
GA-2020-01 | |||
SwitP: Mobile Application for Real-Time Swimming Analysis | S | Darya Melnyk, Simon Tanner |
FS 20 | SA-2020-09 | ||||
A Debatable Way to Gain Participation in Voting | B | Darya Melnyk, Pál András Papp |
FS 20 | BA-2020-35 | ||||
Tichu Bot | S | Lukas Faber, Zeta Avarikioti |
FS 20 | SA-2020-19 | ||||
Understanding and Visualizing Graph Neural Networks | S | Lukas Faber | FS 20 | SA-2020-20 | ||||
Visualizing BGP RIB Changes into Forwarding Plane by Leveraging BMP and IPFIX [confidential] | M | Tobias Bühler | FS 20 | MA-2020-16 | ||||
Graph Evacuation [confidential] | S | Béni Egressy | FS 20 | SA-2020-62 | ||||
Benchmarking Estimators of Harvestable Energy on a Low-Power System | Embedded Systems | S | Stefan Draskovic, Reto Da Forno |
FS 20 | SA-2020-10 | |||
People Counting System Using Wireless Sensor Nodes | Embedded Systems | S | Stefan Draskovic, Andreas Biri |
FS 20 | SA-2020-03 | |||
Evaluating and Defeating Network Flow Classifiers Through Adversarial Machine Learning [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
FS 20 | SA-2020-12 | |||
Evaluation and Deployment of Resource-Constrained Machine Learning on Embedded Devices [confidential] | Performance Evaluation | M | Zhongnan Qu, Andreas Biri |
FS 20 | MA-2020-04 | |||
A Framework for Collecting Data Traffic from Real Networks [confidential] | S | Thomas Holterbach, Tobias Bühler |
HS 19 | SA-2019-23 | ||||
Aircraft Positioning System: Reliable Data Storage & Website Revision [confidential] | B | Simon Tanner | HS 19 | BA-2019-36 | ||||
Anomaly Detection on High-Dimensional Time Series [confidential] | M | Lothar Thiele | HS 19 | MA-2019-25 | ||||
Asynchronous Consensus-Free Transaction Systems [confidential] | S | Roland Schmid, Jakub Sliwinski |
HS 19 | SA-2019-27 | ||||
Deep Reinforcement Learning Applied to Byzantine Agreement | S | Darya Melnyk, Oliver Richter |
HS 19 | SA-2019-22 | ||||
Rethinking Aircraft Localization - A Novel Likelihood Approach and a Combined Satellite and Aircraft Method [confidential] | M | Simon Tanner | HS 19 | MA-2019-23 | ||||
ConfSearch 2020 | B | Roland Schmid, Pankaj Khanchandani |
HS 19 | BA-2019-38 | ||||
Convenient Password Manager | B | Simon Tanner, Roland Schmid |
HS 19 | BA-2019-39 | ||||
Developing a Semi-Automated Framework to Label Network Traffic Datasets [confidential] | M | Roland Meier, Laurent Vanbever |
HS 19 | MA-2019-24 | ||||
Dynamic Directories using Reinforcement Learning [confidential] | M | Pankaj Khanchandani, Oliver Richter |
HS 19 | MA-2019-20 | ||||
Exploration of Neural Architectures for Generation of Synthetic Epileptic Seizures [confidential] | S | Damian Pascual | HS 19 | SA-2019-26 | ||||
Fast Route Finding | S | Aryaz Eghbali | HS 19 | SA-2019-20 | ||||
HomeDetective: UX Study and Development [confidential] | S | Simon Tanner | HS 19 | SA-2019-19 | ||||
Hyperloop Network Design | G | Roland Schmid | HS 19 |
, |
GA-2019-01 | |||
Two-Choice Consensus Dynamics with Rankings [confidential] | B | Darya Melnyk, Yuyi Wang |
HS 19 | BA-2019-33 | ||||
Improving Performance with Network-aware Scheduling Algorithms | S | Alberto Gran Alcoz, Alexander Dietmüller |
HS 19 | SA-2019-24 | ||||
Investigating Reinforcement Learning Algorithms [confidential] | S | Oliver Richter, Damian Pascual |
HS 19 | SA-2019-25 | ||||
Investigating Transformers [confidential] | M | Gino Brunner, Damian Pascual |
HS 19 | MA-2019-29 | ||||
Developing a Jass AI Platform [confidential] | G | Oliver Richter | HS 19 |
, |
GA-2019-03 | |||
Learning Tumors from OCT Imagery with Generative Deep Learning Models | B | Lothar Thiele | HS 19 | BA-2019-37 | ||||
Time Synchronization For Linear Motors [confidential] | S | Simon Tanner | HS 19 | SA-2019-29 | ||||
Music Medley Generation [confidential] | G | Damian Pascual, Lukas Faber |
HS 19 |
, |
GA-2019-04 | |||
Network Behavior Monitoring in the Data Plane [confidential] | S | Roland Meier | HS 19 | SA-2019-28 | ||||
Scalable Byzantine Agreement with Epoch-Adaptive Adversaries [confidential] | M | Zeta Avarikioti, Roland Schmid |
HS 19 | MA-2019-26 | ||||
Visual Analysis and Comparison of Seismic Events | S | Matthias Meyer, Andreas Biri |
HS 19 | SA-2019-18 | ||||
Event-triggered Multi-hop Communication for Wireless Sensor Networks | Ad-hoc-Networks | M | Andreas Biri | HS 19 | MA-2019-28 | |||
Multi-sensor Wireless Sensor Network Nodes for Alpine Environment Monitoring | Environmental Sensing | S | Andreas Biri, Jan Beutel |
HS 19 | SA-2019-17 | |||
Network Visualization for the Routing Project | Network Monitoring | G | Alexander Dietmüller | HS 19 |
, , |
GA-2019-02 | ||
On Combining SWIFT and Blink to Improve Internet Convergence [confidential] | Network Monitoring | M | Laurent Vanbever, Thomas Holterbach |
HS 19 | MA-2019-22 | |||
Mass Surveillance of VoIP Calls Does Not Require a Nation-state Budget [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
HS 19 | MA-2019-30 | |||
Self-protecting Networks from IoT-based Attacks [confidential] | Network Security | M | Alberto Gran Alcoz, Roland Meier |
HS 19 | MA-2019-27 | |||
Pushing the Internet to the Edge | Wireless Mesh Networks | M | Andreas Biri, Romain Jacob |
HS 19 | MA-2019-21 | |||
A Test Framework to Verify End Point Implementations [confidential] | S | Tobias Bühler | FS 19 | SA-2019-06 | ||||
Accurate Aircraft Positioning [confidential] | M | Simon Tanner, Manuel Eichelberger |
FS 19 | MA-2019-16 | ||||
Advanced Housing Search [confidential] | S | Simon Tanner | FS 19 | SA-2019-12 | ||||
Improving Robustness of an Aircraft Signal Positioning System [confidential] | B | Simon Tanner, Manuel Eichelberger |
FS 19 | BA-2019-07 | ||||
Aircraft Signal Fingerprinting [confidential] | M | Simon Tanner | FS 19 | MA-2019-12 | ||||
Soteroid: Android Runtime Application Self-Protection (RASP) Against Repackaging [confidential] | M | Simon Tanner | FS 19 | MA-2019-11 | ||||
Attentive Multi-tasking [confidential] | B | Oliver Richter, Gino Brunner |
FS 19 | BA-2019-04 | ||||
Deep Monaural Music Source Separation [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-11 | ||||
Automatic Generation of Adversarial Workload for Programmable Switches [confidential] | S | Edgar Costa Molero, Roland Meier |
FS 19 | SA-2019-05 | ||||
Benchmarking of Distributed Ledger Technology | B | Roger Wattenhofer | FS 19 | BA-2019-32 | ||||
EEG Data Generation with Generative Adversarial Networks [confidential] | B | Damian Pascual | FS 19 | BA-2019-30 | ||||
Network Creation Game on Blockchain Payment Channels | S | Zeta Avarikioti, Yuyi Wang |
FS 19 | SA-2019-15 | ||||
Evaluation of Network Connection Strategies in Cryptocurrencies [confidential] | B | Zeta Avarikioti, Yuyi Wang |
FS 19 | BA-2019-06 | ||||
The k-Server Problem with Delay [confidential] | B | Yuyi Wang, Darya Melnyk |
FS 19 | BA-2019-03 | ||||
PolyPass - A Convenient Password Manager | M | Simon Tanner, Roland Schmid |
FS 19 | MA-2019-04 | ||||
Privacy-Preserving Smart Contracts for Industrial Services | M | Roger Wattenhofer | FS 19 | MA-2019-18 | ||||
FlockLab 2.0: Hardware Design | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-10 | ||||
FlockLab 2.0: Linux Platform | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-09 | ||||
Flower Mapping in Grasslands with Drones and Deep Learning | M | Roger Wattenhofer | FS 19 | MA-2019-06 | ||||
Frequency Spectrum Monitoring for FlockLab | S | Jan Beutel, Roman Trüb |
FS 19 | SA-2019-08 | ||||
The Future of Jobs [confidential] | B | Aryaz Eghbali | FS 19 | BA-2019-05 | ||||
Generalizing Audio Source Separation [confidential] | M | Oliver Richter, Gino Brunner |
FS 19 | MA-2019-07 | ||||
Robustness In Reinforcement Learning [confidential] | M | Gino Brunner, Oliver Richter |
FS 19 | MA-2019-05 | ||||
High speed NAT64 with P4 | M | Tobias Bühler | FS 19 | MA-2019-19 | ||||
Hyperloop Pod Scheduling [confidential] | M | Manuel Eichelberger, Roland Schmid |
FS 19 | MA-2019-02 | ||||
Imperceptible Audio Communication App [confidential] | B | Simon Tanner, Manuel Eichelberger |
FS 19 | BA-2019-01 | ||||
Deep Transformer Models in Natural Language Processing [confidential] | M | Gino Brunner, Oliver Richter |
FS 19 | MA-2019-08 | ||||
Mode-S Physical Layer Deep Learning [confidential] | M | Simon Tanner, Damian Pascual |
FS 19 | MA-2019-15 | ||||
Analysis and Modeling of Urban Shared-Mobility Systems through Data Mining | M | Manuel Eichelberger, Roland Schmid |
FS 19 | MA-2019-03 | ||||
Music Genre Transfer [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-03 | ||||
Music Genre Transfer with Deep Learning [confidential] | S | Gino Brunner, Oliver Richter |
FS 19 | SA-2019-14 | ||||
Network Virtualization - Creating Arbitrary Networks with one Click [confidential] | S | Tobias Bühler, Thomas Holterbach |
FS 19 | SA-2019-07 | ||||
Online Graph Coloring [confidential] | B | Darya Melnyk, Pál András Papp |
FS 19 | BA-2019-29 | ||||
P4-Programming on an FPGA [confidential] | S | Tobias Bühler | FS 19 | SA-2019-02 | ||||
Peer Grading and Byzantine Sorting [confidential] | B | Darya Melnyk, Jakub Sliwinski |
FS 19 | BA-2019-40 | ||||
Arvy Heuristics for Distributed Mutual Exclusion | B | Pankaj Khanchandani, Pál András Papp |
FS 19 | BA-2019-31 | ||||
Swimming Activity Recognition with Smartwatches and Deep Learning [confidential] | M | Gino Brunner, Darya Melnyk |
FS 19 | MA-2019-17 | ||||
Seismic Event Detection using MEMS Accelerometers | S | Andreas Biri, Jan Beutel |
FS 19 | SA-2019-13 | ||||
Detecting Ambient Vibration Patterns using Multiple Sensors [confidential] | Embedded Systems | S | Jan Beutel, Matthias Meyer |
FS 19 | SA-2019-16 | |||
Truth be told: Benchmarking BLE and IEEE 802.15.4 | Embedded Systems | M | Romain Jacob, Reto Da Forno |
FS 19 | MA-2019-10 | |||
On Making Blink Deployable in Practice [confidential] | Internet Architecture | M | Thomas Holterbach | FS 19 | MA-2019-09 | |||
Developing a Dataset with Coordinated Network Attacks [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
FS 19 | MA-2019-13 | |||
Network Performance Obfuscation [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
FS 19 | SA-2019-04 | |||
Traffic-analysis Attacks over Encrypted HTTP [confidential] | Network Security | M | Alberto Gran Alcoz, Roland Meier |
FS 19 | MA-2019-14 | |||
Aircraft Signal Antispoofing [confidential] | S | Manuel Eichelberger, Simon Tanner |
HS 18 | SA-2018-38 | ||||
Automatic BGP Configuration Analysis [confidential] | S | Rüdiger Birkner, Laurent Vanbever |
HS 18 | SA-2018-43 | ||||
Micropayment Channels Game | M | Zeta Avarikioti | HS 18 | MA-2018-33 | ||||
The k-Server Problem with Delay on the Uniform Metric [confidential] | B | Yuyi Wang, Darya Melnyk |
HS 18 | BA-2018-17 | ||||
Creative Robot Composer | S | Manuel Eichelberger | HS 18 | SA-2018-39 | ||||
Deep Preference Learning for Advanced Home Search [confidential] | S | Oliver Richter, Simon Tanner |
HS 18 | SA-2018-44 | ||||
Democracy in Deep Reinforcement Learning [confidential] | S | Oliver Richter, Gino Brunner |
HS 18 | SA-2018-49 | ||||
Efficient Train Scheduling [confidential] | S | Manuel Eichelberger | HS 18 | SA-2018-37 | ||||
Exploring Centralized Payment Network Topology | S | Zeta Avarikioti, Tejaswi Nadahalli |
HS 18 | SA-2018-34 | ||||
Exploring Datacenter Topology Structures For Low Overhead Active Monitoring [confidential] | M | Laurent Vanbever | HS 18 | MA-2018-35 | ||||
GPS Tracking over LTE [confidential] | S | Manuel Eichelberger | HS 18 | SA-2018-27 | ||||
Coloring with Conflicts [confidential] | B | Pál András Papp, Roland Schmid |
HS 18 | BA-2018-24 | ||||
HomeDetective: Housing Ad Incorporation and Performance Optimization [confidential] | B | Simon Tanner, Gino Brunner |
HS 18 | BA-2018-25 | ||||
Hyperloop Network Design | M | Manuel Eichelberger, Roland Schmid |
HS 18 | MA-2018-27 | ||||
In-Network Inference with Random Forests [confidential] | M | Roland Meier, Laurent Vanbever |
HS 18 | MA-2018-30 | ||||
Low-power Network Design: Work Hard, Play Hard | S | Romain Jacob, Reto Da Forno |
HS 18 | SA-2018-50 | ||||
LWB with Long-Range Modulation | M | Jan Beutel, Roman Trüb |
HS 18 | MA-2018-29 | ||||
Prediction Models for Indoor Solar Energy Harvesting | S | Stefan Draskovic, Lukas Sigrist |
HS 18 | SA-2018-42 | ||||
Multi-path Routing | S | Maria Apostolaki, Laurent Vanbever |
HS 18 | SA-2018-41 | ||||
On-Device Classification for the Geophone Dual Processor Platform | S | Matthias Meyer, Jan Beutel |
HS 18 | SA-2018-35 | ||||
Online Algorithmic Channel Design [confidential] | B | Zeta Avarikioti, Yuyi Wang |
HS 18 | BA-2018-27 | ||||
Hat Hunters Online | B | Manuel Eichelberger | HS 18 | BA-2018-22 | ||||
Meta-Learning an Image Editing Style | B | Oliver Richter, Gino Brunner |
HS 18 | BA-2018-23 | ||||
Reinforcement Learning in Graph Theory [confidential] | M | Yuyi Wang, Pankaj Khanchandani |
HS 18 | MA-2018-25 | ||||
Reliable ADS-B Signal Reception [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-16 | ||||
Reliable ADS-B Signal Reception [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-28 | ||||
Restaurant Swiper | B | Roland Schmid, Simon Tanner |
HS 18 | BA-2018-18 | ||||
Self-Sovereign Identities in Cardossier | M | Roger Wattenhofer, Remo Meier |
HS 18 | MA-2018-34 | ||||
Simulating Bitcoins Network Topology | S | Zeta Avarikioti, Roland Schmid |
HS 18 | SA-2018-32 | ||||
Smartphone Aircraft Localization [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 18 | BA-2018-21 | ||||
Student Democracy with Blockchain | B | Darya Melnyk, Tejaswi Nadahalli |
HS 18 | BA-2018-20 | ||||
ETHVote - A Distributed E-Voting Application [confidential] | M | Darya Melnyk, Tejaswi Nadahalli |
HS 18 | MA-2018-31 | ||||
Style Change Detection | B | Roland Schmid, Gino Brunner |
HS 18 | BA-2018-19 | ||||
TotTernary: A Wearable Platform for Social Interaction Tracking | M | Lothar Thiele | HS 18 | MA-2018-36 | ||||
Last Mile Urban Drone Delivery to Mobile Outdoor Clients | S | Gino Brunner, Simon Tanner |
HS 18 | SA-2018-47 | ||||
Is Low-power Wireless Networking a Reproducible Science? | Embedded Systems | S | Romain Jacob | HS 18 | SA-2018-40 | |||
Low-Power Network Design: Work Hard, Play Hard - Data Collection | Embedded Systems | S | Romain Jacob, Reto Da Forno |
HS 18 | SA-2018-31 | |||
A Communication Policy for Transient Sensor Nodes [confidential] | Embedded Systems | M | Lukas Sigrist, Rehan Ahmed |
HS 18 | MA-2018-32 | |||
Design of a Low-Cost Sensor Calibration Testbed | Environmental Sensing | S | Balz Maag | HS 18 | SA-2018-30 | |||
Dynamic Visualization of Geophysical Data | Environmental Sensing | S | Matthias Meyer, Samuel Weber |
HS 18 | SA-2018-36 | |||
Automatization of Internet Path Transparency Measurements | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
HS 18 | SA-2018-28 | |||
Representation of Internet Path Transparency | Internet Measurement | S | Mirja Kühlewind, Brian Trammell |
HS 18 | SA-2018-25 | |||
Towards Task Inference on Mobile Systems based on Thermal Traces [confidential] | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
HS 18 | SA-2018-48 | |||
How Bad Are Data Leaks Really? [confidential] | Multicore Architecture | M | Philipp Miedl | HS 18 | MA-2018-28 | |||
Monitoring and Controlling Network Reconnaissance using Programmable Networks [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 18 | SA-2018-45 | |||
AtDEPH: Anonymity Through Data-Plane Encryption of Packet Headers [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 18 | SA-2018-33 | |||
Securing Data-plane Driven Fast-reroute Systems | Network Security | S | Thomas Holterbach | HS 18 | SA-2018-46 | |||
3G Datalink for Wireless GPS Sensors | S | Jan Beutel, Tonio Gsell |
FS 18 | SA-2018-10 | ||||
A Framework for Energy-Aware Scheduling | S | Stefan Draskovic, Rehan Ahmed |
FS 18 | SA-2018-02 | ||||
Adaptive Hierarchical Deep Reinforcement Learning [confidential] | M | Oliver Richter, Gino Brunner |
FS 18 | MA-2018-05 | ||||
Advanced Aircraft Positioning [confidential] | S | Manuel Eichelberger, Simon Tanner |
FS 18 | SA-2018-06 | ||||
HomeDetective++ Enhancements in Functionality and User Experience [confidential] | S | Simon Tanner | FS 18 |
, , |
SA-2018-22 | |||
Analytics System for Internet Security Dataset [confidential] | M | Laurent Vanbever | FS 18 | MA-2018-21 | ||||
Robust Android App Repackaging Protection Using Native Code [confidential] | B | Simon Tanner | FS 18 | BA-2018-08 | ||||
Attractive Sports Route Generation | S | Manuel Eichelberger | FS 18 | SA-2018-04 | ||||
NOCUST - A Non-Custodial 2nd-Layer Blockchain Payment Hub | M | Roger Wattenhofer | FS 18 | Rami Khalil | MA-2018-24 | |||
Bitcoin Security under Temporary Dishonest Majority | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-09 | ||||
Chord Analysis App | B | Manuel Eichelberger | FS 18 | BA-2018-14 | ||||
Contention Management [confidential] | S | Pankaj Khanchandani | FS 18 | SA-2018-07 | ||||
Data-Driven Performance Correlation | S | Maria Apostolaki | FS 18 | SA-2018-16 | ||||
Deep Learning for Natural Language Processing (NLP) using Variational Autoencoders (VAE) | M | Gino Brunner, Oliver Richter |
FS 18 | MA-2018-22 | ||||
Design of a Payment Network with Fees | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-06 | ||||
Developing a Capsule Network [confidential] | S | Oliver Richter, Gino Brunner |
FS 18 | SA-2018-19 | ||||
The Urban Last Mile Problem: Autonomous Drone Delivery to Your Balcony [confidential] | M | Gino Brunner, Simon Tanner |
FS 18 | MA-2018-06 | ||||
E-Voting Under the Hood [confidential] | S | Darya Melnyk, Julian Steger |
FS 18 | SA-2018-24 | ||||
Efficient Load Balancing [confidential] | S | Pankaj Khanchandani | FS 18 | SA-2018-08 | ||||
Exploration-Exploitation Trade-off in Deep Reinforcement Learning | B | Oliver Richter, Gino Brunner |
FS 18 | BA-2018-15 | ||||
LORA-based Data Collection on DPP | S | Jan Beutel, Roman Trüb |
FS 18 | SA-2018-26 | ||||
Music Style Translation based on CycleGAN [confidential] | S | Gino Brunner, Yuyi Wang |
FS 18 | SA-2018-20 | ||||
GPS Spoofing [confidential] | M | Manuel Eichelberger | FS 18 | MA-2018-17 | ||||
Grigori: Does the network work as I expected? | S | Ahmed Elhassany | FS 18 | SA-2018-11 | ||||
Mercenary Space Battle | B | Manuel Eichelberger | FS 18 | BA-2018-01 | ||||
Hat Hunters | B | Manuel Eichelberger | FS 18 | BA-2018-02 | ||||
High Dimensional Clustering | B | Zeta Avarikioti, Yuyi Wang |
FS 18 | BA-2018-13 | ||||
Hip Hop Robot | S | Manuel Eichelberger | FS 18 | SA-2018-23 | ||||
Imperceptible Audio Communication [confidential] | M | Simon Tanner, Manuel Eichelberger |
FS 18 | MA-2018-12 | ||||
Generalized Metrics in Online Matching [confidential] | G | Yuyi Wang, Darya Melnyk |
FS 18 |
, |
GA-2018-01 | |||
Structure and Content of the Visible Darknet [confidential] | B | Zeta Avarikioti | FS 18 | BA-2018-05 | ||||
Mobile Smartphone Speed Test | B | Gino Brunner, Simon Tanner |
FS 18 | BA-2018-11 | ||||
Net2Text Over Time [confidential] | M | Rüdiger Birkner | FS 18 | MA-2018-07 | ||||
Network Monitoring and Attack Detection [confidential] | M | Roland Meier, Vincent Lenders |
FS 18 | MA-2018-02 | ||||
On the Advice Complexity for Min-cost Perfect Matching and the K-Server Problem with Delays [confidential] | G | Yuyi Wang, Darya Melnyk |
FS 18 |
, |
GA-2018-02 | |||
One Intelligent Agent to Rule Them All | B | Manuel Eichelberger | FS 18 | BA-2018-04 | ||||
Lower Bounds on Local Distributed Deterministic Coloring Algorithms [confidential] | S | Darya Melnyk, Pál András Papp |
FS 18 | SA-2018-14 | ||||
Randomized Algorithms for Online Matching with Delay for Two Sources [confidential] | M | Yuyi Wang, Darya Melnyk |
FS 18 | MA-2018-23 | ||||
Protecting Blockchain Applications with Programmable Networks [confidential] | S | Maria Apostolaki | FS 18 | SA-2018-15 | ||||
Radio Signal Fingerprinting [confidential] | S | Simon Tanner | FS 18 | SA-2018-05 | ||||
ResNet Autoencoder for Monaural Music Source Separation [confidential] | M | Gino Brunner, Oliver Richter |
FS 18 | MA-2018-04 | ||||
Creative Robot Composer | B | Manuel Eichelberger | FS 18 | BA-2018-10 | ||||
Robust Scaling of Blockchain Protocols [confidential] | M | Zeta Avarikioti, Yuyi Wang |
FS 18 | MA-2018-16 | ||||
Drone Precision Landing using Computer Vision | S | Simon Tanner, Manuel Eichelberger |
FS 18 | SA-2018-21 | ||||
Seamless Drone Replacement | S | Manuel Eichelberger, Simon Tanner |
FS 18 | SA-2018-29 | ||||
Smart Conference Call [confidential] | M | Simon Tanner | FS 18 | MA-2018-11 | ||||
Swimming Style Recognition and Lane Counting Using a Smartwatch [confidential] | M | Darya Melnyk, Gino Brunner |
FS 18 | MA-2018-18 | ||||
Sport Analysis using Smartwatches [confidential] | M | Gino Brunner, Simon Tanner |
FS 18 | MA-2018-19 | ||||
Teaching Machines Curiosity [confidential] | S | Oliver Richter, Gino Brunner |
FS 18 | SA-2018-03 | ||||
Transferring Knowledge Between Games [confidential] | M | Oliver Richter, Gino Brunner |
FS 18 | MA-2018-10 | ||||
Transient Bluetooth Low Energy Node [confidential] | S | Lukas Sigrist, Andres Gomez |
FS 18 | SA-2018-18 | ||||
Unobtrusive Android Audio Synchronization [confidential] | B | Simon Tanner | FS 18 | BA-2018-03 | ||||
Towards Usable Off-Chain Payments | M | Roger Wattenhofer | FS 18 | Guillaume Felley | MA-2018-20 | |||
Undercover Construction: A Multiplayer Game with Hidden Aspects | S | Manuel Eichelberger | FS 18 | SA-2018-12 | ||||
Dynamic Range Low-power Wireless Protocols for Environmental Monitoring | Embedded Systems | M | Romain Jacob, Jan Beutel |
FS 18 | MA-2018-01 | |||
Feature Extraction from Thermal Traces for the Thermal Fingerprinting Attack [confidential] | Embedded Systems | S | Philipp Miedl, Rehan Ahmed |
FS 18 | SA-2018-01 | |||
Reliable 3rd Generation Data Collection | Embedded Systems | M | Jan Beutel, Roman Trüb |
FS 18 | MA-2018-08 | |||
Urban Air Pollution Inference: A Neural Network Ensemble Approach | Environmental Sensing | M | Balz Maag, Zimu Zhou |
FS 18 | MA-2018-03 | |||
Come again? Towards repeatable security experiments [confidential] | Multicore Architecture | S | Philipp Miedl | FS 18 | SA-2018-13 | |||
You also want to explore other security leaks? Building an easily extendable application library for security leak research. [confidential] | Multicore Architecture | S | Philipp Miedl | FS 18 | SA-2018-17 | |||
Next-Generation Monitoring Using Programmable Network Devices [confidential] | Network Monitoring | M | Tobias Bühler | FS 18 | MA-2018-09 | |||
Traffix Matrix Obfuscation [confidential] | Network Security | M | Roland Meier, Laurent Vanbever |
FS 18 | MA-2018-15 | |||
On Offloading Control Plane Applications to the Data Plane [confidential] | Software Defined Networking | M | Edgar Costa Molero | FS 18 | MA-2018-14 | |||
Accurate Aircraft Positioning [confidential] | S | Manuel Eichelberger, Simon Tanner |
HS 17 | SA-2017-88 | ||||
Aircraft Positioning Service [confidential] | B | Manuel Eichelberger, Simon Tanner |
HS 17 | BA-2017-30 | ||||
Enhancement of System Design and User Experience in HomeDetective [confidential] | B | Gino Brunner, Simon Tanner |
HS 17 | BA-2017-37 | ||||
Android Audio Synchronization [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-35 | ||||
Finding Sources and Sinks in Android by Observation of System Calls [confidential] | S | Simon Tanner, Gino Brunner |
HS 17 | SA-2017-93 | ||||
Anonymous and Transparent E-Voting System | B | Conrad Burchert | HS 17 | BA-2017-40 | ||||
On the Benefits of Making your Clients Wait [confidential] | B | Yuyi Wang, Darya Melnyk |
HS 17 | BA-2017-34 | ||||
NoKey - A Distributed Password Manager | M | Gino Brunner, Simon Tanner |
HS 17 | MA-2017-24 | ||||
Fine-grained Image Classification of Dog Breeds [confidential] | S | Gino Brunner, Yuyi Wang |
HS 17 | SA-2017-97 | ||||
DCF77 Based Long-Term Timer | S | Roman Trüb | HS 17 | SA-2017-96 | ||||
Event-based Geophone Platform with Co-detection | M | Jan Beutel, Matthias Meyer |
HS 17 | MA-2017-25 | ||||
Implementation of an Intuitive Android Application for HomeDetective [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-41 | ||||
XGBoost and LGBM for Porto Seguro`s Kaggle challenge: A Comparison | S | Gino Brunner, Yuyi Wang |
HS 17 | SA-2017-98 | ||||
Implementation of a Blockchain Micropayment Channel Network [confidential] | M | Conrad Burchert | HS 17 | MA-2017-13 | ||||
Implementation of a Fast Cryptocurrency for Micropayment Channels [confidential] | B | Conrad Burchert | HS 17 | BA-2017-38 | ||||
Implementing a Distributed Reliable Database | B | Conrad Burchert | HS 17 | BA-2017-36 | ||||
Multi-Agent Path Planning on Cyclic Routes [confidential] | M | Manuel Eichelberger | HS 17 | MA-2017-14 | ||||
Unaligned Neural Transfer of Musical Style [confidential] | M | Gino Brunner, Yuyi Wang |
HS 17 | MA-2017-19 | ||||
Havanews [confidential] | M | Manuel Eichelberger, Simon Tanner |
HS 17 | MA-2017-20 | ||||
Quantized Convolutional Neural Networks for Embedded Platforms | M | Matthias Meyer | HS 17 | MA-2017-15 | ||||
Robot Composer Framework | S | Manuel Eichelberger | HS 17 | SA-2017-95 | ||||
Balanced Routing in Micropayment Channel Networks | M | Conrad Burchert | HS 17 | MA-2017-11 | ||||
Smart Lighting [confidential] | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-31 | ||||
Tesselating Switzerland of the Past | B | Manuel Eichelberger | HS 17 | BA-2017-32 | ||||
Ultrasonic Smartphone Communication | B | Simon Tanner, Gino Brunner |
HS 17 | BA-2017-39 | ||||
Using Deep Learning to Annotate Karaoke Songs | S | Yuyi Wang, Gino Brunner |
HS 17 | SA-2017-92 | ||||
Worldwide Sports Route Generation | S | Manuel Eichelberger | HS 17 | SA-2017-94 | ||||
Automated Program Analysis for Predicting Memory Access Collisions | Embedded Systems | S | Andreas Tretter, Stefan Draskovic |
HS 17 | SA-2017-89 | |||
Creating a Flexible Middleware for Low-Power Flooding Protocols [confidential] | Embedded Systems | M | Romain Jacob, Reto Da Forno |
HS 17 | MA-2017-23 | |||
Emulation of Distributed Energy Harvesting Systems [confidential] | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
HS 17 | SA-2017-85 | |||
Towards Autonomous Navigation for Nano-Blimps [confidential] | Embedded Systems | S | Stefan Draskovic, Andres Gomez |
HS 17 | SA-2017-86 | |||
Unleashing the Potential of Real-time Internet of Things | Embedded Systems | S | Romain Jacob | HS 17 | SA-2017-84 | |||
Digital Signal Processing for Micro-Seismic Event Detection on Embedded Platforms | Environmental Sensing | M | Matthias Meyer | HS 17 | MA-2017-22 | |||
Towards High Data Quality in Mobile Crowdsensing | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 17 | SA-2017-91 | |||
Analysis of Sleep-related Symptoms of Parkinson`s Patients based on a System of Ambient Sensors | External Projects | M | Lothar Thiele, Zimu Zhou |
HS 17 | MA-2017-10 | |||
Detection of Malicious Remote Shell Sessions [confidential] | External Projects | S | Vincent Lenders, Roland Meier |
HS 17 | SA-2017-87 | |||
Verifying ADS-B Position Claims with Passive Radar [confidential] | External Projects | M | Vincent Lenders | HS 17 | MA-2017-18 | |||
Designing a Dynamic Micropayment Channel Network | Internet Economics | B | Conrad Burchert | HS 17 | BA-2017-29 | |||
Adding Passive Measurability to QUIC | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
HS 17 | MA-2017-16 | |||
Analysis and Optimization of Frequency Governors [confidential] | Mechanism Design | M | Rehan Ahmed, Philipp Miedl |
HS 17 | MA-2017-17 | |||
Data-driven Classification and Isolation of Network Devices [confidential] | Network Security | S | Roland Meier, Laurent Vanbever |
HS 17 | SA-2017-90 | |||
Safeguarding Bitcoin Against Active Routing Attacks [confidential] | Network Security | S | Maria Apostolaki | HS 17 | Gian Marti | SA-2017-99 | ||
Data-Driven Network Convergence [confidential] | Software Defined Networking | M | Thomas Holterbach, Edgar Costa Molero |
HS 17 | MA-2017-21 | |||
A Flarm Receiver for the OpenSky Network | S | Vincent Lenders | FS 17 | SA-2017-05 | ||||
Advanced State Retention for Transient Computing Systems [confidential] | M | Andres Gomez, Andreas Tretter |
FS 17 | MA-2017-01 | ||||
Android App Private Data Usage [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-02 | ||||
CARP: Cryptographic Android Repackaging Protection [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-22 | ||||
Android Audio Beamforming [confidential] | G | Simon Tanner, Gino Brunner |
FS 17 |
, |
GA-2017-08 | |||
Android Audio Synchronization [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 | SA-2017-75 | ||||
Android Smart Cloud Storage | S | Gino Brunner, Simon Tanner |
FS 17 | SA-2017-82 | ||||
Audio Compression for Acoustic Sensing | S | Matthias Meyer, Jan Beutel |
FS 17 | SA-2017-16 | ||||
BitThief QoL | B | Michael König, Georg Bachmeier |
FS 17 | BA-2017-21 | ||||
Building a 3D Object Scanner | B | Manuel Eichelberger, Gino Brunner |
FS 17 | BA-2017-01 | ||||
Building a 3D Indoor Scanner | S | Manuel Eichelberger, Simon Tanner |
FS 17 | SA-2017-06 | ||||
Chronos: Finding the configurations recipe for fast convergence | S | Ahmed Elhassany | FS 17 | SA-2017-13 | ||||
Convenient Apartment Search [confidential] | B | Gino Brunner, Simon Tanner |
FS 17 | BA-2017-07 | ||||
DJ Roboto | B | Yuyi Wang, Gino Brunner |
FS 17 | BA-2017-28 | ||||
DVB-T Positioning [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 | SA-2017-01 | ||||
Exploring the Unknown: An Agent in Graphland [confidential] | B | Sebastian Brandt | FS 17 | BA-2017-23 | ||||
Fictional Language Generation [confidential] | M | Gino Brunner, Yuyi Wang |
FS 17 | MA-2017-04 | ||||
Finding Advanced Features for Housing Price Prediction | B | Gino Brunner, Yuyi Wang |
FS 17 | BA-2017-06 | ||||
Invisibee: Multiplayer Game with Secret Strategies on a Shared Screen | S | Michael König, Manuel Eichelberger |
FS 17 |
, |
SA-2017-77 | |||
HomeDetective [confidential] | B | Simon Tanner, Gino Brunner |
FS 17 | BA-2017-08 | ||||
Improving RAFT | S | Darya Melnyk, Georg Bachmeier |
FS 17 | SA-2017-80 | ||||
Towards Accurate Simulations of Programmable Dataplanes | M | Laurent Vanbever, Maria Apostolaki |
FS 17 | MA-2017-03 | ||||
Low-Power GPS Tracking Hardware [confidential] | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-76 | ||||
Low-Power GPS Tracking Software [confidential] | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-78 | ||||
Multi-System GNSS Receiver Software | S | Pascal Bissig, Manuel Eichelberger |
FS 17 | SA-2017-79 | ||||
JamBot: Music Theory Aware Chord Based Generation of Polyphonic Music with LSTMs [confidential] | S | Gino Brunner, Yuyi Wang |
FS 17 | SA-2017-83 | ||||
Online Graph Construction with Reinforcement Learning [confidential] | S | Sebastian Brandt, Yuyi Wang |
FS 17 | SA-2017-81 | ||||
Online k-Taxi Problem | B | Georg Bachmeier, Yuyi Wang |
FS 17 | BA-2017-27 | ||||
Randomized Algorithms for Online Matching with Two Sources | B | Yuyi Wang | FS 17 | BA-2017-24 | ||||
Outdoor Sports Route Generation | B | Manuel Eichelberger | FS 17 | BA-2017-05 | ||||
Accessibility Evaluation for Public Transport Systems [confidential] | S | Simon Tanner, Gino Brunner |
FS 17 |
, |
SA-2017-14 | |||
Reinforcement Learning Playground [confidential] | M | Gino Brunner, Yuyi Wang |
FS 17 | MA-2017-09 | ||||
SmartCanvas: a Drawing Assistance Application for Android Devices | G | Pankaj Khanchandani | FS 17 |
, |
GA-2017-09 | |||
Automated Energy Harvesting Source Characterization [confidential] | Embedded Systems | M | Lukas Sigrist, Andres Gomez |
FS 17 | MA-2017-02 | |||
Batteryless Bluetooth Communication | Embedded Systems | B | Lukas Sigrist, Andres Gomez |
FS 17 | BA-2017-03 | |||
A Robust Sensing Platform for High Alpine Sensor Networks | Embedded Systems | S | Jan Beutel, Tonio Gsell |
FS 17 | SA-2017-15 | |||
Fault-Tolerance Mechanisms for Glossy-based Wireless Communication Networks | Embedded Systems | S | Romain Jacob | FS 17 | SA-2017-12 | |||
Harvesting Driven Long-Range Communication [confidential] | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
FS 17 | SA-2017-11 | |||
Framework for Stochastic Analysis of Mixed-Criticality Scheduling | Embedded Systems | B | Stefan Draskovic, Rehan Ahmed |
FS 17 | BA-2017-26 | |||
Prediction Strategies for Energy Harvesting Systems [confidential] | Embedded Systems | S | Rehan Ahmed, Stefan Draskovic |
FS 17 | SA-2017-10 | |||
Real-time Network Functions for the Internet of Things | Embedded Systems | S | Romain Jacob | FS 17 | SA-2017-07 | |||
Exploiting Correlations between Pollutants for Fine-Grained Air Quality Assessment [confidential] | Environmental Sensing | B | Balz Maag, Zimu Zhou |
FS 17 | BA-2017-25 | |||
Visualize Volumes of Air Quality Data | Environmental Sensing | M | Balz Maag, Zimu Zhou |
FS 17 | MA-2017-06 | |||
Tracing Internet Path Transparency | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
FS 17 | MA-2017-12 | |||
A Smart Attack using the Frequency Covert Channel [confidential] | Multicore Architecture | M | Philipp Miedl, Matthias Meyer |
FS 17 | MA-2017-05 | |||
UnCovert 4: The Power Covert Channel [confidential] | Multicore Architecture | S | Philipp Miedl | FS 17 | SA-2017-02 | |||
What is my Thermal Fingerprint? [confidential] | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
FS 17 | SA-2017-03 | |||
Methods to Evaluate Cyber Threat Intelligence Feeds [confidential] | Network Security | M | Laurent Vanbever, Roland Meier |
FS 17 | MA-2017-08 | |||
In-network Anomaly Detection with Programmable Switches [confidential] | Network Security | S | Laurent Vanbever, Roland Meier |
FS 17 | SA-2017-09 | |||
Battle of the Smartphones | Performance Evaluation | B | Gino Brunner, Pascal Bissig |
FS 17 | BA-2017-04 | |||
Evaluation of AQM Schemes to Support Low Latency in the Internet | Performance Evaluation | M | Mirja Kühlewind, Brian Trammell |
FS 17 | MA-2017-07 | |||
Accurate Temporal Map of Switzerland | B | Manuel Eichelberger | HS 16 | BA-2016-19 | ||||
Frequency-Accuracy Measurement of Oscillators [confidential] | G | Manuel Eichelberger, Simon Tanner |
HS 16 |
, |
GA-2016-06 | |||
Advancing Cryptocurrencies and Blockchain Technology [confidential] | M | Roger Wattenhofer | HS 16 | MA-2016-57 | ||||
Aircraft Positioning [confidential] | M | Manuel Eichelberger, Simon Tanner |
HS 16 | MA-2016-56 | ||||
Android GPS Revisited [confidential] | G | Manuel Eichelberger, Pascal Bissig |
HS 16 |
, , |
GA-2016-05 | |||
Android Smart Cloud Storage [confidential] | S | Gino Brunner, Pascal Bissig |
HS 16 | SA-2016-57 | ||||
Boosting the Convergence Performance of SDX Platforms [confidential] | S | Rüdiger Birkner, Thomas Holterbach |
HS 16 | SA-2016-69 | ||||
Practical Concurrency Analysis for SDN | M | Ahmed Elhassany | HS 16 | MA-2016-60 | ||||
Cops and Robbers | B | Sebastian Brandt, Georg Bachmeier |
HS 16 | BA-2016-20 | ||||
Detecting and Mitigating Network Attacks on Bitcoin [confidential] | S | Maria Apostolaki | HS 16 | SA-2016-72 | ||||
Distributed Cryptography for Blockchains [confidential] | M | Roger Wattenhofer | HS 16 | MA-2016-58 | ||||
Fictional Language Generator [confidential] | S | Gino Brunner, Yuyi Wang |
HS 16 | SA-2016-60 | ||||
GPS on a GPU [confidential] | B | Manuel Eichelberger, Pascal Bissig |
HS 16 | BA-2016-14 | ||||
A Perfect Strategy to Play the Graph Connection Game, Starting from a Specific Stage of the Game [confidential] | S | Pankaj Khanchandani | HS 16 | SA-2016-73 | ||||
Headphone Assistant [confidential] | B | Gino Brunner, Simon Tanner |
HS 16 | BA-2016-17 | ||||
Hidden in Plain Sight | S | Manuel Eichelberger, Michael König |
HS 16 | SA-2016-74 | ||||
Housing Price Predictor [confidential] | B | Gino Brunner, Yuyi Wang |
HS 16 | BA-2016-16 | ||||
Learning Crowd Behaviour with Neuroevolution | M | Manuel Eichelberger, Michael König |
HS 16 | MA-2016-62 | ||||
Building the Next Generation of GPS Receivers 2.0 | G | Manuel Eichelberger, Pascal Bissig |
HS 16 |
, |
GA-2016-04 | |||
Metric Approximations and Clustering | M | Yuyi Wang | HS 16 | MA-2016-59 | ||||
Online Graph Exploration | S | Sebastian Brandt | HS 16 | SA-2016-70 | ||||
Plan My Vacation | G | Georg Bachmeier, Gino Brunner |
HS 16 |
, |
GA-2016-07 | |||
Professional Android Phone Benchmarker [confidential] | S | Gino Brunner, Pascal Bissig |
HS 16 | SA-2016-62 | ||||
Ranking Review Sites [confidential] | M | Gino Brunner, Pascal Bissig |
HS 16 | MA-2016-55 | ||||
Robot Composer | S | Manuel Eichelberger, Michael König |
HS 16 | SA-2016-63 | ||||
SSD Stress Relief | S | Georg Bachmeier | HS 16 | SA-2016-65 | ||||
The Recommendation Problem | M | Darya Melnyk, Thomas Ulrich |
HS 16 | MA-2016-61 | ||||
Weather Forecast for the Lazy [confidential] | B | Pascal Bissig, Gino Brunner |
HS 16 | BA-2016-18 | ||||
Ultra-Low Power Convolutional Neural Networks for People Recognition [confidential] | Embedded Systems | S | Andres Gomez, Andreas Tretter |
HS 16 | SA-2016-56 | |||
Neural Network System-on-a-Chip for Acoustic Sensing [confidential] | Embedded Systems | S | Matthias Meyer | HS 16 | SA-2016-55 | |||
Orchestrate the Mixed-Criticality Melody: Reconcile Temperature and Safety | Embedded Systems | S | Rehan Ahmed, Pengcheng Huang |
HS 16 | SA-2016-66 | |||
Parallelization of Compressed Sensing Based Ultrasound Imaging [confidential] | Embedded Systems | M | Andreas Tretter | HS 16 | MA-2016-53 | |||
Towards Self-Sustainable Unmanned Aerial Vehicles [confidential] | Embedded Systems | S | Andres Gomez, Stefan Draskovic |
HS 16 | SA-2016-61 | |||
Accurate Air Pollution Monitoring with a Smartwatch [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-59 | |||
Anomaly Detection in Mobile Sensor Networks for Environmental Monitoring [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-58 | |||
What Is My Smart-Watch Measuring? [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
HS 16 | SA-2016-64 | |||
Continuous Measurement of Internet Path Transparency | Internet Measurement | S | Mirja Kühlewind, Brian Trammell |
HS 16 | SA-2016-68 | |||
UnCovert3: Covert Channel Attacks on Commercial Multicore Systems | Multicore Architecture | M | Philipp Miedl | HS 16 | MA-2016-54 | |||
Automated Ground-Truth Measurements for App Launches on Android [confidential] | Performance Evaluation | B | Gino Brunner, Pascal Bissig |
HS 16 | BA-2016-15 | |||
Live Android Performance Monitor [confidential] | Performance Evaluation | M | Gino Brunner, Pascal Bissig |
HS 16 | MA-2016-52 | |||
A Fast and Loop-Free Convergence upon Remote BGP Disruptions in Large IP Networks [confidential] | Software Defined Networking | S | Thomas Holterbach | HS 16 | SA-2016-71 | |||
Debugging Software-Defined Networks Through Systematic Destruction [confidential] | S | Laurent Vanbever | FS 16 | SA-2016-67 | ||||
BitThief New UX | B | Michael König | FS 16 | BA-2016-13 | ||||
Classifying Usage of LAN Ports [confidential] | S | Laura Peer, Manuel Eichelberger |
FS 16 | SA-2016-52 | ||||
Collaborative Graph Evacuation [confidential] | B | Klaus-Tycho Förster, Sebastian Brandt |
FS 16 | BA-2016-06 | ||||
Communication and Feature Enhancement of CPM [confidential] | G | Philipp Brandes, Pascal Bissig |
FS 16 |
, |
GA-2016-02 | |||
Crowd Simulation - A Python Framework for the Simulation of Human Actors in Miarmy | B | Michael König, Klaus-Tycho Förster |
FS 16 | BA-2016-10 | ||||
Discussion Dynamics [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
FS 16 | MA-2016-45 | ||||
Distributed Graph Languages [confidential] | S | Klaus-Tycho Förster, Jochen Seidel |
FS 16 | SA-2016-50 | ||||
Drawing Questions from Wikidata | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-03 | ||||
Flexible Traffic Engineering in existing networks with Fibbing [confidential] | S | Laurent Vanbever | FS 16 | SA-2016-44 | ||||
Improving Load-Balancing Decisions in Data Center Networks Using Software-Defined Networking [confidential] | M | Laurent Vanbever | FS 16 | MA-2016-49 | ||||
iOS Swipe | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-05 | ||||
Karaoke Song Generator [confidential] | M | Laura Peer, Pascal Bissig |
FS 16 | MA-2016-46 | ||||
Multi-Agent Pathfinding on Graphs [confidential] | B | Michael König, Klaus-Tycho Förster |
FS 16 | BA-2016-12 | ||||
Opportunistic Trip Planner [confidential] | S | Pascal Bissig, Philipp Brandes |
FS 16 | SA-2016-39 | ||||
Permasense GPS Postprocessing | S | Jan Beutel, Tonio Gsell |
FS 16 | SA-2016-51 | ||||
Mobilescan: A Usage-based Contract Recommendation Application [confidential] | S | Laura Peer, Pascal Bissig |
FS 16 | SA-2016-46 | ||||
Kännsch - Adaptive Keyboard for iOS | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-01 | ||||
Quaternion based Estimation and Control for Attitude Tracking of a Quadcopter using IMU Sensors [confidential] | M | Lothar Thiele | FS 16 | Matthias Grob | MA-2016-64 | |||
Ranking Alternatives Offline | B | Georg Bachmeier | FS 16 | BA-2016-11 | ||||
Ranking Alternatives Online | B | Georg Bachmeier | FS 16 | BA-2016-07 | ||||
Robust Relative Position Estimation in a UAV Swarm using UWB Time of Flight Ranging [confidential] | M | Lothar Thiele | FS 16 | MA-2016-63 | ||||
Smart Real Estate Value Estimation | B | Philipp Brandes, Pascal Bissig |
FS 16 | BA-2016-04 | ||||
Smart Running Route Generation | M | Manuel Eichelberger | FS 16 | MA-2016-51 | ||||
Smart Watch Actigraphy | B | Manuel Eichelberger, Philipp Brandes |
FS 16 | BA-2016-02 | ||||
Smart Web Filtering | B | Pascal Bissig, Philipp Brandes |
FS 16 | BA-2016-09 | ||||
Distributed Speaker Synchronization | S | Pascal Bissig, Laura Peer |
FS 16 | SA-2016-36 | ||||
Kännsch - Updates and Improvements to the Swiss German Keyboard | B | Laura Peer, Philipp Brandes |
FS 16 | BA-2016-08 | ||||
TEG-based Energy Scavenging Platform [confidential] | M | Jan Beutel, Lukas Sigrist |
FS 16 | MA-2016-50 | ||||
Temporal Map of Switzerland | S | Manuel Eichelberger | FS 16 | SA-2016-41 | ||||
Advanced Testbed Resource Allocation | Ad-hoc-Networks | S | Roman Lim | FS 16 | SA-2016-53 | |||
A Protocol Gateway for the Internet of Things | Embedded Systems | S | Felix Sutton, Romain Jacob |
FS 16 | SA-2016-03 | |||
Energy Management for Low Power Harvesting Scenarios [confidential] | Embedded Systems | S | Andres Gomez, Lukas Sigrist |
FS 16 |
, |
SA-2016-47 | ||
RocketLogger: Mobile Data-Logger for Ultra-Low Current and Power Measurements | Embedded Systems | S | Lukas Sigrist, Andres Gomez |
FS 16 |
, |
SA-2016-40 | ||
Platform Micro-benchmarking for Real-time Applications [confidential] | Embedded Systems | S | Georgia Giannopoulou, Andreas Tretter |
FS 16 | SA-2016-38 | |||
Power-Aware Scheduling for Transient Systems [confidential] | Embedded Systems | S | Andres Gomez, Rehan Ahmed |
FS 16 | SA-2016-37 | |||
Scheduling Strategies for Energy Harvesting Systems [confidential] | Embedded Systems | S | Rehan Ahmed, Lukas Sigrist |
FS 16 | SA-2016-48 | |||
Transiently Powered and Wearable Device for Ultra-Low-Power Vision Sensing [confidential] | Embedded Systems | M | Lukas Sigrist, Andres Gomez |
FS 16 | MA-2016-43 | |||
Enabling Environmental Sensing with a Smart-Watch [confidential] | Environmental Sensing | S | Balz Maag, Zimu Zhou |
FS 16 | SA-2016-54 | |||
Cooperating with Middleboxes in the Internet | Internet Architecture | S | Mirja Kühlewind, Brian Trammell |
FS 16 | SA-2016-45 | |||
Building a Path Transparency Observatory | Internet Measurement | M | Brian Trammell, Mirja Kühlewind |
FS 16 | MA-2016-44 | |||
Does Your Phone Spy on You? | Internet Measurement | M | Mirja Kühlewind, David Gugelmann |
FS 16 | MA-2016-47 | |||
Measuring Internet Path Transparency for Transport Protocol Extensions | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
FS 16 | SA-2016-49 | |||
UnCovert: Evaluating Thermal Covert Channels on Android Systems | Multicore Architecture | S | Philipp Miedl, Rehan Ahmed |
FS 16 | SA-2016-35 | |||
Accurate Classification of Web Requests [confidential] | Network Security | S | David Gugelmann | FS 16 | SA-2016-43 | |||
Human or Malware? Detection of Malicious Web Requests | Network Security | M | David Gugelmann, Markus Happe |
FS 16 | MA-2016-48 | |||
Android Benchmark | M | Pascal Bissig, Philipp Brandes |
HS 15 | MA-2015-38 | ||||
Army of Two [confidential] | B | Sebastian Brandt, David Stolz |
HS 15 | BA-2015-20 | ||||
On the Fly! Automatic Running Route Generation | B | David Stolz | HS 15 | BA-2015-18 | ||||
Building the Next Generation of GPS Receivers [confidential] | S | Pascal Bissig, Laura Peer |
HS 15 | SA-2015-22 | ||||
Classify the News | B | Philipp Brandes, Klaus-Tycho Förster |
HS 15 | BA-2015-16 | ||||
Convenient Password Manager | G | Pascal Bissig, Philipp Brandes |
HS 15 |
, |
GA-2015-06 | |||
Crowd Simulation | S | Michael König, Klaus-Tycho Förster |
HS 15 | SA-2015-37 | ||||
Distributed Speaker Synchronization [confidential] | S | Laura Peer, Pascal Bissig |
HS 15 | SA-2015-18 | ||||
Kinect 3D Editor | S | Philipp Brandes, Laura Peer |
HS 15 | SA-2015-24 | ||||
Emergency Localization [confidential] | M | Pascal Bissig, Laura Peer |
HS 15 | MA-2015-42 | ||||
Fitness Tracking 2.0 [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
HS 15 | SA-2015-33 | ||||
Help the Bitcoin Community Reach Consensus | S | Christian Decker | HS 15 | SA-2015-30 | ||||
Improve Your Vacation | S | Philipp Brandes, Pascal Bissig |
HS 15 | SA-2015-32 | ||||
Internet-Technologien für die Erhaltung und Verbesserung der Lebensqualität und der Selbständigkeit von älteren Menschen [confidential] | S | Bernhard Plattner | HS 15 | SA-2015-72 | ||||
Is the Price Right | B | Laura Peer, Philipp Brandes |
HS 15 | BA-2015-14 | ||||
Multi-Agent Pathfinding [confidential] | B | Michael König, Klaus-Tycho Förster |
HS 15 | BA-2015-19 | ||||
On the Correctness of Inter-Domain Deflections [confidential] | M | Laurent Vanbever | HS 15 | MA-2015-47 | ||||
Opportunistic Trip Planner | S | Pascal Bissig, Philipp Brandes |
HS 15 | SA-2015-23 | ||||
Real Life Piano Hero [confidential] | S | Philipp Brandes, Pascal Bissig |
HS 15 | SA-2015-25 | ||||
Sequential Proximity - Capturing Scalable Concurrent Search Data Structures [confidential] | M | Roger Wattenhofer | HS 15 | MA-2015-43 | ||||
Swiss FoodQuiz: Education Effects on Nutritional Knowledge Through a Personalized Mobile Game [confidential] | M | Roger Wattenhofer | HS 15 | MA-2015-48 | ||||
ATP: Improving the Speed of Small Flows in Data Centers with a New Transport Layer Protocol [confidential] | M | David Stolz | HS 15 | MA-2015-41 | ||||
Unleashing The Dragon | M | Laurent Vanbever | HS 15 | MA-2015-46 | ||||
Low-Error Multi-Hop Clock Synchronization | Ad-hoc-Networks | S | Roman Lim, Olga Saukh |
HS 15 | SA-2015-20 | |||
Towards Low-Power, Timing-Predictable Medical Monitoring | Embedded Systems | S | Georgia Giannopoulou, Felix Sutton |
HS 15 | SA-2015-27 | |||
Code Generation and Optimisation on Asymmetric Multi-Core Platforms [confidential] | Embedded Systems | S | Andreas Tretter, Andres Gomez |
HS 15 |
, |
SA-2015-26 | ||
Optimization of Data Intensive Inter-core Communication on Many-core Platforms [confidential] | Embedded Systems | M | Andreas Tretter, Georgia Giannopoulou |
HS 15 | MA-2015-39 | |||
Real-Time Field Bus Systems with Linux | Embedded Systems | S | Pengcheng Huang, Georgia Giannopoulou |
HS 15 | SA-2015-21 | |||
An Ultra-low Power Wake-up Circuit for Acoustic Emission Sensing [confidential] | Embedded Systems | S | Felix Sutton | HS 15 | SA-2015-19 | |||
Context-awareness of Opportunistic radio contacts [confidential] | External Projects | S | Laurent Vanbever, Bernhard Plattner |
HS 15 | SA-2015-29 | |||
Integration of Measurement Probes into a Distributed Measurement Plane | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
HS 15 | SA-2015-28 | |||
UnCovert: Operating Frequency, a Security Leak? [confidential] | Multicore Architecture | S | Philipp Miedl | HS 15 | SA-2015-31 | |||
Mesh networking with Bitcoin | Peer-to-Peer Networks | S | Christian Decker | HS 15 | SA-2015-34 | |||
Design and Implementation of an ECN Proxy for Performance Improvements in the Internet | Performance Evaluation | S | Mirja Kühlewind, Brian Trammell |
HS 15 | SA-2015-36 | |||
Speaker-Adaptive ANN-Based Feature Extractor for Speaker Diarisation [confidential] | Speech Processing | S | Hui Liang | HS 15 | SA-2015-17 | |||
RouMim: Self-learned Automation on Smartphones [confidential] | M | Philipp Brandes, Pascal Bissig |
FS 15 | MA-2015-02 | ||||
Airfare Prediction - Are You Paying Too Much? [confidential] | S | Philipp Brandes, Pascal Bissig |
FS 15 | SA-2015-04 | ||||
Content Sharing using Cooperative Playlists and Social Quizz Games | B | Laura Peer, Pascal Bissig |
FS 15 | BA-2015-09 | ||||
Data-Driven De-Anonymization in Bitcoin [confidential] | M | Christian Decker | FS 15 | MA-2015-26 | ||||
Distributed Discussion Statistics [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
FS 15 | SA-2015-01 | ||||
Distributed Speaker Synchronization | S | Laura Peer, Pascal Bissig |
FS 15 | SA-2015-02 | ||||
Dominating the Stone Age [confidential] | M | Sebastian Brandt, Jara Uitto |
FS 15 | MA-2015-34 | ||||
Exploiting Bitcoin`s Topology for Double-spend Attacks | B | Christian Decker | FS 15 | BA-2015-10 | ||||
Drawing Questions from Wikidata | B | Philipp Brandes, Laura Peer |
FS 15 | BA-2015-13 | ||||
Exploiting the Heterogeneity of the Parallella Platform for an Ultrasound Imaging Algorithm [confidential] | S | Andreas Tretter | FS 15 | SA-2015-11 | ||||
Graph Exploration [confidential] | B | Klaus-Tycho Förster, Sebastian Brandt |
FS 15 | BA-2015-07 | ||||
Improving Network-Wide Troubleshooting with Few SDN Devices [confidential] | M | Laurent Vanbever | FS 15 | MA-2015-45 | ||||
New Bounds for Distributed Problems [confidential] | M | Jochen Seidel, Sebastian Brandt |
FS 15 | MA-2015-35 | ||||
Parallel Computing with DNA | S | Jochen Seidel, Sebastian Brandt |
FS 15 | SA-2015-10 | ||||
Personalized Provider Selection [confidential] | B | Laura Peer, Pascal Bissig |
FS 15 | BA-2015-11 | ||||
Real Life Piano Hero [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-04 | ||||
Rethinking GPS Localization [confidential] | M | Pascal Bissig, Laura Peer |
FS 15 | MA-2015-30 | ||||
Security and Privacy in Opportunistic Networks [confidential] | M | Bernhard Plattner | FS 15 | MA-2015-40 | ||||
Selfish Strategies to Increase Your Throughput in 802.11 Networks | B | David Stolz | FS 15 | BA-2015-06 | ||||
Shopping 2.0 - Automated Shopping Lists | B | Jochen Seidel, Philipp Brandes |
FS 15 | BA-2015-03 | ||||
Smart Real Estate Value Estimation [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-01 | ||||
Smart Recipes | B | Laura Peer | FS 15 | BA-2015-15 | ||||
Streaming Applications on Parallella: Architecture Bottlenecks and Optimization [confidential] | N | Andreas Tretter, Georgia Giannopoulou |
FS 15 | NA-2015-01 | ||||
Supercharging IP router memory with SDN | S | Laurent Vanbever | FS 15 | SA-2015-14 | ||||
Kännsch - Improving Swiss German Keyboard [confidential] | M | Laura Peer, Philipp Brandes |
FS 15 | MA-2015-23 | ||||
Kännsch - Swiss German Keyboard for iOS | B | Laura Peer, Philipp Brandes |
FS 15 | BA-2015-08 | ||||
What is in the yelp data? | G | Barbara Keller, Jochen Seidel |
FS 15 |
, |
GA-2015-05 | |||
Towards Datamarkets with Bitcoin [confidential] | M | Christian Decker, Laura Peer |
FS 15 | MA-2015-33 | ||||
Towards Probabilistic Scheduling of Mixed-Criticality Systems [confidential] | M | Pengcheng Huang | FS 15 | MA-2015-37 | ||||
Towards the Design of Real-Time Mixed-Safety-Critical Systems on Multicores [confidential] | S | Pengcheng Huang | FS 15 | SA-2015-16 | ||||
Owner Recognition for Smartwatch [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-05 | ||||
Using Smartwatches to Recognize Handwritten Text and Letters [confidential] | B | Philipp Brandes, Pascal Bissig |
FS 15 | BA-2015-02 | ||||
Smart Prices for the Smart Grid | M | Lothar Thiele | FS 15 | MA-2015-29 | ||||
Thermal Energy Scavenging for WSNs | Ad-hoc-Networks | M | Jan Beutel, Reto Da Forno |
FS 15 | MA-2015-31 | |||
Orchestrating Mixed-Criticality Melody [confidential] | Embedded Systems | M | Pengcheng Huang, Georgia Giannopoulou |
FS 15 | MA-2015-24 | |||
Performance/Energy Tradeoffs in Novel Microcontroller Platforms [confidential] | Embedded Systems | S | Andres Gomez, Rehan Ahmed |
FS 15 | SA-2015-15 | |||
TimeGenie [confidential] | Embedded Systems | G | Bernhard Buchli | FS 15 |
, , , |
GA-2015-01 | ||
Transiently Powered Systems: Theory and Design [confidential] | Embedded Systems | G | Andres Gomez, Lukas Sigrist |
FS 15 |
, |
GA-2015-02 | ||
Multipath bonding at Layer 3 [confidential] | External Projects | M | Mirja Kühlewind, Brian Trammell |
FS 15 | MA-2015-44 | |||
Measuring Explicit Congestion Negotiation (ECN) support based on P2P networks | Internet Measurement | S | Brian Trammell, Mirja Kühlewind |
FS 15 | SA-2015-05 | |||
A Mission-Aware Routing Algorithm for Micro Aerial Vehicle Networks | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 15 |
, |
SA-2015-03 | ||
Performance Evaluation and Optimization of p2pkit-based Opportunistic Networking [confidential] | Peer-to-Peer Networks | M | Franck Legendre, Bernhard Plattner |
FS 15 | MA-2015-36 | |||
Routing Scalable Bitcoin Payments | Peer-to-Peer Networks | B | Christian Decker | FS 15 | BA-2015-12 | |||
An Adaptive Hardware/Software Interface for EmbedNet | Reconfigurable Computing | S | Markus Happe | FS 15 | SA-2015-09 | |||
Generic Functional Blocks for FPGA-based Network Nodes | Reconfigurable Computing | S | Markus Happe | FS 15 | SA-2015-08 | |||
Flexible SDN Testing in Production with Shadow Policies | Software Defined Networking | M | Laurent Vanbever | FS 15 | MA-2015-27 | |||
Improving the Scalability of Software-Defined Internet Exchange Points | Software Defined Networking | S | Laurent Vanbever, Vasileios Kotronis |
FS 15 | SA-2015-07 | |||
Self-Learning Enterprise Networks Via Software Defined Networking [confidential] | Software Defined Networking | M | Panagiotis Georgopoulos, Laurent Vanbever |
FS 15 | MA-2015-25 | |||
SDN-based Network Obfuscation [confidential] | Software Defined Networking | M | Laurent Vanbever | FS 15 | MA-2015-32 | |||
Automatic Pronunciation Checker | Speech Processing | M | Beat Pfister, Tofigh Naghibi |
FS 15 | MA-2015-28 | |||
Detecting Strong Prosodic Events | Speech Processing | S | Beat Pfister, Hui Liang |
FS 15 |
, |
SA-2015-06 | ||
DNN-based Phoneme Models for Speech Recognition | Speech Processing | M | Beat Pfister | FS 15 | MA-2015-01 | |||
Accurate Weather Forecast | B | Barbara Keller, Jochen Seidel |
HS 14 | BA-2014-12 | ||||
Algorithmically Balancing a Collectible Card Game | B | Michael König | HS 14 | BA-2014-11 | ||||
Automated Resistor Classification | G | Tobias Langner, Jochen Seidel |
HS 14 |
, |
GA-2014-02 | |||
Distributed Graph Languages [confidential] | S | Jochen Seidel, Klaus-Tycho Förster |
HS 14 | SA-2014-34 | ||||
Using Document Categorization to Identify Similar Start-ups [confidential] | M | Philipp Brandes | HS 14 | MA-2014-17 | ||||
Fitness 2.0 - Modeling Fitness and Heart Rate | M | Pascal Bissig, Klaus-Tycho Förster |
HS 14 | MA-2014-19 | ||||
Fooling the Android Permission System [confidential] | B | Pascal Bissig, Philipp Brandes |
HS 14 | BA-2014-13 | ||||
Magic Public Transport Information [confidential] | S | Barbara Keller, Pascal Bissig |
HS 14 | SA-2014-29 | ||||
Making Bitcoin Exchanges Truly Transparent [confidential] | S | Christian Decker, Jochen Seidel |
HS 14 | SA-2014-41 | ||||
Mapping the Past | S | Christian Decker, Barbara Keller |
HS 14 | SA-2014-35 | ||||
Newspaper 2.0 | M | Jochen Seidel, Jara Uitto |
HS 14 | MA-2014-22 | ||||
Parallel Computing with DNA [confidential] | S | Jochen Seidel, Sebastian Brandt |
HS 14 | SA-2014-40 | ||||
A RESTful API for the AMIV | G | Jochen Seidel, Barbara Keller |
HS 14 |
, , |
GA-2014-04 | |||
Hide Spoiler [confidential] | B | Philipp Brandes, Pascal Bissig |
HS 14 | BA-2014-10 | ||||
Haptic, Acoustic, and Visual Short Range Communication on Smartphones | G | Pascal Bissig, Philipp Brandes |
HS 14 |
, |
GA-2014-03 | |||
Lower Bound for The Capture Time with Multiple Robbers [confidential] | B | Jara Uitto | HS 14 | BA-2014-17 | ||||
The Meta Data Troll Detector | S | Tobias Langner, Jochen Seidel |
HS 14 | SA-2014-32 | ||||
CONTACT: Information Sharing Between Strangers With Hyperlocal Community Wireless Networks [confidential] | Ad-hoc-Networks | S | Panayotis Antoniadis | HS 14 | SA-2014-44 | |||
Flooja: Visualisierung von FlockLab-Testbed-Daten | Ad-hoc-Networks | S | Roman Lim, Marco Zimmerling |
HS 14 | SA-2014-31 | |||
Framework for End-to-End Thermal Modeling and Control [confidential] | Embedded Systems | M | Devendra Rai | HS 14 | MA-2014-13 | |||
Easy Breathe: Health-Optimal Routing in Urban Areas | Embedded Systems | S | David Hasenfratz, Olga Saukh |
HS 14 | SA-2014-28 | |||
A DAL Backend for the Parallella Platform | Embedded Systems | S | Andreas Tretter, Lars Schor |
HS 14 | SA-2014-33 | |||
Analyzing the Time Dynamics in IXP Datasets | Internet Measurement | S | , Vasileios Kotronis |
HS 14 | SA-2014-43 | |||
Early Detection of Real-World Events with Twitter | Internet Measurement | M | Vincent Lenders, David Gugelmann |
HS 14 | MA-2014-18 | |||
A Faster Bitcoin Network | Internet Measurement | S | Christian Decker | HS 14 | SA-2014-42 | |||
Quantifying Web Personalization | Internet Measurement | S | David Gugelmann | HS 14 | SA-2014-37 | |||
A Smart Situational Reminder | Localization | S | Barbara Keller, Jara Uitto |
HS 14 | SA-2014-39 | |||
WiFi Based Time-of-Flight Indoor Localization [confidential] | Localization | M | Domenico Giustiniano, Vincent Lenders |
HS 14 | MA-2014-15 | |||
Smartphone App for Fused Indoor Localization | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 14 | MA-2014-20 | |||
Reconstructing HTTPS Activity from Traffic Metadata [confidential] | Network Security | S | David Gugelmann | HS 14 | SA-2014-38 | |||
Torrent Recommendation System Based on Data Gathered from the Mainline DHT | Peer-to-Peer Networks | B | Christian Decker | HS 14 | BA-2014-16 | |||
A Torrent Recommender based on DHT Crawling | Peer-to-Peer Networks | B | Christian Decker | HS 14 | BA-2014-15 | |||
Flow Embedding Algorithms for Software Defined Audio Networks | Software Defined Networking | M | Panagiotis Georgopoulos, Vasileios Kotronis |
HS 14 | MA-2014-14 | |||
SDN-assisted IP Multicast | Software Defined Networking | S | Panagiotis Georgopoulos | HS 14 | SA-2014-30 | |||
SDN-based Source Address Dilution Service [confidential] | Software Defined Networking | M | Vincent Lenders | HS 14 | MA-2014-12 | |||
Theoretical and Empirical Evaluation of UepaaNet`s Scalability [confidential] | Wireless Mesh Networks | S | Bernhard Distl | HS 14 | SA-2014-27 | |||
Jamming Mitigation in Bandwidth Hopping Spread Spectrum Communications [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
HS 14 | MA-2014-21 | |||
Low-cost UV Sensor for Smartphones [confidential] | S | Pascal Bissig | FS 14 | SA-2014-02 | ||||
BLEPS: Security Based on Proximity [confidential] | B | Pascal Bissig | FS 14 | BA-2014-08 | ||||
Kännsch - a Swiss German Keyboard for Android [confidential] | M | Philipp Brandes, Pascal Bissig |
FS 14 | MA-2014-11 | ||||
Android Workout | S | Klaus-Tycho Förster, Jara Uitto |
FS 14 | SA-2014-09 | ||||
Collaborative Spectrum Monitoring [confidential] | M | Vincent Lenders, Domenico Giustiniano |
FS 14 | MA-2014-07 | ||||
BeatRunner - An Android Application to Enhance a Workout through Music [confidential] | S | Klaus-Tycho Förster, Pascal Bissig |
FS 14 | SA-2014-04 | ||||
Distributed Multiplayer Scenario | B | Michael König | FS 14 | BA-2014-05 | ||||
Beeping the Multi-Algorithm [confidential] | S | Jochen Seidel, Klaus-Tycho Förster |
FS 14 | SA-2014-11 | ||||
FIFA World Ranking | S | Tobias Langner, Philipp Brandes |
FS 14 | SA-2014-20 | ||||
Get Rhythm | S | Philipp Brandes, Pascal Bissig |
FS 14 | SA-2014-26 | ||||
Listening to Music in Groups | S | Jara Uitto, Barbara Keller |
FS 14 | SA-2014-25 | ||||
Low Power Gesture Recognition | S | Pascal Bissig | FS 14 | SA-2014-21 | ||||
Obstacle Warning for Texting | B | Jara Uitto, Klaus-Tycho Förster |
FS 14 | BA-2014-07 | ||||
Optimized Distributed Network Traffic Monitoring in Global Networks [confidential] | M | Christian Decker | FS 14 | MA-2014-16 | ||||
PaperRank for Literature Research | G | Jochen Seidel, Tobias Langner |
FS 14 |
, , |
GA-2014-01 | |||
Secure P2P-Messenger | S | Philipp Brandes, Tobias Langner |
FS 14 |
, |
SA-2014-16 | |||
Extensions to a Peer-to-Peer Instant Messenger | B | Tobias Langner, Philipp Brandes |
FS 14 | BA-2014-06 | ||||
Walking with your Smartphone: Stabilizing Screen Content | S | Tobias Langner, Pascal Bissig |
FS 14 | SA-2014-22 | ||||
A Particle Filter Approach to GPS Signals [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
FS 14 | MA-2014-08 | ||||
Smart Mobile Imaging | S | Pascal Bissig, Jara Uitto |
FS 14 | SA-2014-24 | ||||
Smartphone App Profiling | B | Tobias Langner | FS 14 | BA-2014-04 | ||||
Smartphone Audio Processing [confidential] | B | Pascal Bissig, Klaus-Tycho Förster |
FS 14 | BA-2014-02 | ||||
Zero-Effort Procrastination | S | Jochen Seidel, Jara Uitto |
FS 14 | SA-2014-10 | ||||
Avalanche Rescue Beacon with Smartphones [confidential] | Ad-hoc-Networks | M | Franck Legendre, Bernhard Distl |
FS 14 | MA-2014-05 | |||
Bringing Network Access to Disconnected Regions using DTN Throwboxes | Ad-hoc-Networks | M | Abdullah Alhussainy, Karin Anna Hummel |
FS 14 | MA-2014-04 | |||
Distributed Time Pulse for FlockLab | Ad-hoc-Networks | M | Roman Lim | FS 14 | MA-2014-06 | |||
Wind Energy Harvester Power Subsystem [confidential] | Ad-hoc-Networks | S | Felix Sutton, Bernhard Buchli |
FS 14 | SA-2014-18 | |||
OppNet: An Energy Optimized Service Platform for Opportunistic Networking on Android | Ad-hoc-Networks | M | Sacha Trifunovic | FS 14 | MA-2014-01 | |||
Mapping Optimisation of Streaming Applications on Heterogeneous Platforms | Embedded Systems | M | Andreas Tretter, Lars Schor |
FS 14 | MA-2014-02 | |||
High-Level Programming Framework for Executing Streaming Applications on Heterogeneous OpenCL Platforms | Embedded Systems | S | Lars Schor, Andreas Tretter |
FS 14 | SA-2014-07 | |||
Automated Transformation of CAL Dataflow Actors to Kahn Processes [confidential] | Embedded Systems | S | Lars Schor, Andreas Tretter |
FS 14 | SA-2014-01 | |||
Ultrasound “To Go” [confidential] | Embedded Systems | B | Andreas Tretter, Devendra Rai |
FS 14 | BA-2014-01 | |||
Path Transparency for Explicit Congestion Notification | Internet Measurement | M | Brian Trammell, Stephan Neuhaus |
FS 14 | MA-2014-10 | |||
Help! My Birthday Reminder Wants to Brick My Phone | Network Security | M | Stephan Neuhaus, Brian Trammell |
FS 14 | MA-2014-09 | |||
Visualization of HTTP Network Traffic for Digital Forensics [confidential] | Network Security | S | David Gugelmann, Vincent Lenders |
FS 14 | SA-2014-12 | |||
Designing a Routing Algorithm for UAV Swarms based on Simulation and Measurements [confidential] | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 14 | SA-2014-23 | |||
Specification, Implementation and Load Test of UepaaNet Cloud Services [confidential] | Peer-to-Peer Networks | S | Franck Legendre, Bernhard Distl |
FS 14 | SA-2014-19 | |||
TCP Congestion Control on RTP Media Streams | Performance Evaluation | S | Brian Trammell | FS 14 | SA-2014-15 | |||
Resource-efficient Dynamic Partial Reconfiguration on FPGAs | Reconfigurable Computing | S | Markus Happe, Ariane Trammell |
FS 14 | SA-2014-17 | |||
Implementation of a dereverberation algorithm on an xPCtarget real time system and experimental validation using virtual acoustics | Speech Processing | M | Beat Pfister | FS 14 | MA-2014-03 | |||
Semi-Automatic Transcription of Interviews | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
FS 14 | SA-2014-14 | |||
Speech Recognition with Hierarchical Codebook Search | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
FS 14 | SA-2014-13 | |||
General-Purpose Wireless Distance Sensor | S | Samuel Welten, Pascal Bissig |
HS 13 | SA-2013-60 | ||||
Convenient Smartphone Authentication [confidential] | M | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | MA-2013-16 | ||||
Detection of GNSS Multipath Errors in Urban Environments [confidential] | M | Domenico Giustiniano | HS 13 | MA-2013-21 | ||||
Distributed HashTables for P2P-Messenger [confidential] | S | Tobias Langner, Philipp Brandes |
HS 13 | SA-2013-59 | ||||
Encrypted Peer-To-Peer Based Instant Messenger for Android [confidential] | S | Philipp Brandes, Tobias Langner |
HS 13 | SA-2013-62 | ||||
Fundamental Analysis [confidential] | S | Philipp Brandes | HS 13 | SA-2013-56 | ||||
Graph Exploration [confidential] | S | Klaus-Tycho Förster | HS 13 | SA-2013-55 | ||||
High Performance Location- and Attitude Estimation [confidential] | G | Pascal Bissig | HS 13 |
, |
GA-2013-08 | |||
Improving Personal Safety [confidential] | G | Pascal Bissig, Klaus-Tycho Förster |
HS 13 |
, , |
GA-2013-07 | |||
Is It Schroedinger´s Cat? | S | Jara Uitto | HS 13 | SA-2013-68 | ||||
Movie Recommendation | S | Michael König | HS 13 | SA-2013-65 | ||||
Off Screen Smartphone Controls [confidential] | B | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | BA-2013-19 | ||||
Optimization of the Management of Recycling Containers [confidential] | S | Michael König | HS 13 | SA-2013-54 | ||||
Peer-To-Peer Based Instant Messenger [confidential] | S | Philipp Brandes, Tobias Langner |
HS 13 | SA-2013-61 | ||||
Randomization in Anonymous Computation [confidential] | S | Jochen Seidel | HS 13 | SA-2013-64 | ||||
Telemetry Unit for a Formula Student Race Car | S | Mahdi Asadpour | HS 13 | SA-2013-67 | ||||
Using Music to Enhance your Running [confidential] | S | Pascal Bissig, Klaus-Tycho Förster |
HS 13 | SA-2013-53 | ||||
Automatic Vocabulary Generation | B | Philipp Brandes, Tobias Langner |
HS 13 | BA-2013-18 | ||||
What is in a Transaction? A Structural Analysis of Bitcoin Transactions [confidential] | B | Christian Decker, Klaus-Tycho Förster |
HS 13 | BA-2013-20 | ||||
High-Speed Data-Acquisition for FlockLab | Ad-hoc-Networks | M | Roman Lim, Christoph Walser |
HS 13 | MA-2013-14 | |||
People Flow Monitoring: Tracing Public Transport Users Using WiFi Monitors [confidential] | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
HS 13 | SA-2013-50 | |||
Wireless Cross-Platform Communication | Ad-hoc-Networks | S | Roman Lim | HS 13 | SA-2013-58 | |||
A Voice-Activated Wireless Patient Monitoring System [confidential] | Embedded Systems | M | Felix Sutton, Marco Zimmerling |
HS 13 | MA-2013-08 | |||
Crossing the Deadline: An Automata-Based Hard Real-Time Guarantee | Embedded Systems | B | Pratyush Kumar, Georgia Giannopoulou |
HS 13 | BA-2013-17 | |||
Towards Exploiting Intra-Application Dynamism using an H.264 Codec | Embedded Systems | S | Lars Schor, Hoeseok Yang |
HS 13 | SA-2013-46 | |||
Functional Simulation of a Flight Management System | Embedded Systems | S | Pengcheng Huang | HS 13 | SA-2013-63 | |||
Healthy Navigation [confidential] | Embedded Systems | S | David Hasenfratz, Olga Saukh |
HS 13 | SA-2013-48 | |||
Powerful Software | Embedded Systems | M | Pratyush Kumar, Lars Schor |
HS 13 | MA-2013-11 | |||
Implementation and Evaluation of Mixed-Criticality Scheduling Algorithms for Multi-Core Systems | Embedded Systems | S | Georgia Giannopoulou, Pengcheng Huang |
HS 13 | SA-2013-57 | |||
Sense the Air You Breathe! | Embedded Systems | S | David Hasenfratz, Christoph Walser |
HS 13 | SA-2013-51 | |||
Blue Wallet: A Bitcoin Hardware Token and Electronic Wallet [confidential] | End-point Security | M | Christian Decker, Samuel Welten |
HS 13 | MA-2013-15 | |||
Location-Aware Currency for a Social Shopping Game [confidential] | External Projects | S | Sacha Trifunovic | HS 13 | SA-2013-69 | |||
XMPProbe - XMPP Server Monitoring | Internet Measurement | S | Brian Trammell, Xenofontas Dimitropoulos |
HS 13 | SA-2013-66 | |||
Finding rogue WLAN Access Points [confidential] | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-10 | |||
Time-of-Flight WLAN Indoor Tracking System | Localization | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-13 | |||
Cross-Domain DoS Link-Flooding Attack Detection and Mitigation using SDN Principles | Network Security | M | Vasileios Kotronis, Xenofontas Dimitropoulos |
HS 13 | MA-2013-18 | |||
Paying your Internet, One Byte at a Time | Service Provisioning | S | Christian Decker | HS 13 | SA-2013-49 | |||
Evaluating the Effect of SDN Centralization on Internet Routing Convergence | Software Defined Networking | M | Vasileios Kotronis, Xenofontas Dimitropoulos |
HS 13 | MA-2013-19 | |||
Policy-based Injection of Private Traffic into a Public SDN Testbed | Software Defined Networking | M | , Vasileios Kotronis |
HS 13 | MA-2013-12 | |||
Audio-Visual Speech Activity Detection | Speech Processing | S | Tofigh Naghibi, Beat Pfister |
HS 13 | SA-2013-52 | |||
UepaaNet Testbed, Performance Evaluation and Optimization [confidential] | Wireless Mesh Networks | M | Franck Legendre, Bernhard Distl |
HS 13 | MA-2013-07 | |||
Bandwidth Hopping Spread Spectrum [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
HS 13 | MA-2013-20 | |||
Design and Implementation of a GameCenter for Opportunistic Networks | G | Sacha Trifunovic | FS 13 |
, , |
GA-2013-05 | |||
Accurate Localisation Using a Surround Speaker System [confidential] | B | Samuel Welten, Pascal Bissig |
FS 13 | BA-2013-02 | ||||
Android Workout | S | Klaus-Tycho Förster, Jara Uitto |
FS 13 | SA-2013-47 | ||||
Adversarial ANTS | M | Tobias Langner, Jara Uitto |
FS 13 | MA-2013-09 | ||||
Desktop-Client with Smart Synchronization | B | Samuel Welten, Tobias Langner |
FS 13 | BA-2013-03 | ||||
Efficient Multi-Aggregation with Applications to Centrality Computation [confidential] | S | Stephan Holzer | FS 13 | SA-2013-40 | ||||
Messaging Challenges in a Globally Distributed Network | M | David Gugelmann | FS 13 | MA-2013-02 | ||||
Obstacle Warning Mechanism for Smartphones [confidential] | G | Klaus-Tycho Förster, Jara Uitto |
FS 13 |
, |
GA-2013-04 | |||
WLAN-Opp-based Game: Infectious | G | Sacha Trifunovic | FS 13 |
, |
GA-2013-06 | |||
Personalized Filtering of Real Estate Offers [confidential] | M | Pascal Bissig, Philipp Brandes |
FS 13 | MA-2013-05 | ||||
WalkUnlock [confidential] | S | Samuel Welten, Pascal Bissig |
FS 13 | SA-2013-07 | ||||
Realtime Capacity Utilization | G | Samuel Welten | FS 13 |
, |
GA-2013-02 | |||
Smart Photo Viewer | S | Michael König | FS 13 | SA-2013-45 | ||||
Smart Sun Protector [confidential] | B | Samuel Welten | FS 13 | BA-2013-01 | ||||
Steering an Autonomous Weather Balloon | S | Jara Uitto, Samuel Welten |
FS 13 | SA-2013-02 | ||||
TV 2.0 - Your Individual TV Experience! | B | Tobias Langner | FS 13 | BA-2013-16 | ||||
Using Social Proof to Evaluate Start-ups Investment Opportunities [confidential] | S | Philipp Brandes | FS 13 | SA-2013-39 | ||||
What`s it Worth? | S | Philipp Brandes, Pascal Bissig |
FS 13 | SA-2013-04 | ||||
NiMH Battery State-of-Charge Approximation | Ad-hoc-Networks | S | Bernhard Buchli, Felix Sutton |
FS 13 | SA-2013-05 | |||
Power Management for the CoreStation Platform | Ad-hoc-Networks | S | Bernhard Buchli, Tonio Gsell |
FS 13 | SA-2013-41 | |||
Cool Linux | Embedded Systems | S | Lars Schor, Pratyush Kumar |
FS 13 |
, |
SA-2013-06 | ||
Intrusion Prevention for Flexible Protocol Stacks | Embedded Systems | M | Ariane Trammell, Markus Happe |
FS 13 | MA-2013-04 | |||
Investigating the Accuracy of SIFS Time for Time-Of-Flight WLAN Localization [confidential] | Embedded Systems | S | Domenico Giustiniano | FS 13 | SA-2013-03 | |||
Power-line Communication Performance for Peer-To-Peer Mesh Networks in Urban Neighbourhoods | Embedded Systems | S | Domenico Giustiniano | FS 13 | SA-2013-42 | |||
Implementation and Evaluation of Mixed Criticality Scheduling Approaches | Embedded Systems | S | Pengcheng Huang, Georgia Giannopoulou |
FS 13 | SA-2013-01 | |||
Screen Watermarking for Data Leakage Investigations [confidential] | End-point Security | M | David Gugelmann | FS 13 | MA-2013-06 | |||
Visualizing Dynamics in Frequent Itemset Mining Timeseries | Internet Measurement | S | , Eduard Glatz |
FS 13 | SA-2013-43 | |||
Analysis of Data Leakage over HTTP [confidential] | Network Security | M | David Gugelmann | FS 13 | MA-2013-03 | |||
Supporting Header Field Re-writing for Policy-bound Flows in a Software Defined Network | Software Defined Networking | S | FS 13 | SA-2013-44 | ||||
AudioInspector | Speech Processing | G | Beat Pfister, Sarah Hoffmann |
FS 13 |
, |
GA-2013-01 | ||
Clap Detection with Microcontroller | Speech Processing | G | Beat Pfister, Tofigh Naghibi |
FS 13 |
, , , |
GA-2013-03 | ||
Jamming-resistant Wireless Communication [confidential] | Wireless Security | M | Vincent Lenders, Domenico Giustiniano |
FS 13 | MA-2013-01 | |||
An Evaluation Framework for Time Synchronization in Lossy Links | M | Roger Wattenhofer | HS 12 | MA-2012-18 | ||||
Collaborative OCR for Tabularized Data | S | Tobias Langner, Jochen Seidel |
HS 12 | SA-2012-26 | ||||
Find your Personal Movie Critic [confidential] | S | Barbara Keller, Michael König |
HS 12 | SA-2012-13 | ||||
Bluetooth Jamming | B | Michael König | HS 12 | BA-2012-16 | ||||
Gait Recognition in Your Pocket [confidential] | S | Samuel Welten, Pascal Bissig |
HS 12 | SA-2012-18 | ||||
Improving Smartphone Indoor Localization [confidential] | M | Pascal Bissig, Samuel Welten |
HS 12 | MA-2012-21 | ||||
Make Us Richer! | B | Philipp Brandes | HS 12 | BA-2012-12 | ||||
NFC Glove | S | Klaus-Tycho Förster, Jochen Seidel |
HS 12 | SA-2012-15 | ||||
OppMap: Opportunistic Map and Location Sharing | S | Sacha Trifunovic | HS 12 |
, |
SA-2012-24 | |||
WiFi-based Overflight Localization of Victims [confidential] | M | Franck Legendre | HS 12 | MA-2012-16 | ||||
Radio 2.0 [confidential] | B | Samuel Welten | HS 12 | BA-2012-10 | ||||
Smart Homes and Weather Events | B | Tobias Langner | HS 12 | BA-2012-13 | ||||
Smart Phone Skydiving [confidential] | G | Jara Uitto, Samuel Welten |
HS 12 |
, |
GA-2012-06 | |||
Smartphone Localization Using a Surround Speaker System [confidential] | S | Pascal Bissig, Samuel Welten |
HS 12 | SA-2012-20 | ||||
SnowDroid - Your Private Snowboard Instructor | B | Tobias Langner | HS 12 | BA-2012-15 | ||||
Stabilizing Flight | G | Jara Uitto, Pascal Bissig |
HS 12 |
, , |
GA-2012-08 | |||
Tampering with Distributed Hash Tables | M | Jochen Seidel, Christian Decker |
HS 12 | MA-2012-25 | ||||
Throw Your Smartphone | S | Barbara Keller, Jara Uitto |
HS 12 | SA-2012-12 | ||||
RealPong [confidential] | G | Samuel Welten, Pascal Bissig |
HS 12 |
, , |
GA-2012-07 | |||
Use News to Make Us Rich! | S | Philipp Brandes | HS 12 | SA-2012-38 | ||||
WLAN-Opp-based Turn-based Strategy Game | S | Sacha Trifunovic | HS 12 | SA-2012-28 | ||||
CamZilla: A GigaPixel Panorama Robot in the Mountains | Ad-hoc-Networks | S | Matthias Keller, Jan Beutel |
HS 12 | SA-2012-11 | |||
Real-World Evaluation of Ad Hoc Routing Algorithms | Ad-hoc-Networks | S | Mahdi Asadpour, Domenico Giustiniano |
HS 12 | SA-2012-35 | |||
Time-of-Flight WLAN Localization [confidential] | Ad-hoc-Networks | S | Domenico Giustiniano | HS 12 | SA-2012-25 | |||
Improved Offline Operation of Twimight | Ad-hoc-Networks | S | Theus Hossmann, Paolo Carta |
HS 12 | SA-2012-36 | |||
Wireless Yet Reliable Patient Notification System: GUI and Back-end | Ad-hoc-Networks | S | Marco Zimmerling, Olga Saukh |
HS 12 | SA-2012-34 | |||
WLAN based Opportunistic Networking Performance Evaluation and Optimization | Ad-hoc-Networks | M | Sacha Trifunovic, Bernhard Distl |
HS 12 | MA-2012-31 | |||
Executing Process Networks on Heterogeneous Platforms using OpenCL | Embedded Systems | M | Lars Schor, Andreas Tretter |
HS 12 | MA-2012-22 | |||
Designing a Benchmark for Many-Core Architectures | Embedded Systems | S | Devendra Rai, Lars Schor |
HS 12 | SA-2012-17 | |||
Have a Break! Pay with Bitcoin [confidential] | Embedded Systems | G | Christian Decker, Samuel Welten |
HS 12 |
, |
GA-2012-05 | ||
Hardware Encryption for Embedded Systems | Embedded Systems | S | Ariane Trammell, Stephan Neuhaus |
HS 12 | SA-2012-16 | |||
Application-Level Scheduling of Real-Time Tasks [confidential] | Embedded Systems | M | Lars Schor, Pratyush Kumar |
HS 12 | MA-2012-15 | |||
Best Practices to Securely Operate Hardware Security Modules in a High Availability Setup | External Projects | S | Stephan Neuhaus | HS 12 | SA-2012-27 | |||
Showing The Way To Alpine Safety [confidential] | External Projects | S | Franck Legendre | HS 12 | SA-2012-33 | |||
Fraud Prevention and Detection in Mobile Payments [confidential] | Internet Economics | M | Christian Decker | HS 12 | MA-2012-26 | |||
OpenFlow: A Security Analysis | Network Security | M | Paul Smith, Vasileios Kotronis |
HS 12 | MA-2012-20 | |||
Anomaly Detection with Virtual Service Migration in Cloud Infrastructures | Network Security | M | Paul Smith, Bernhard Plattner |
HS 12 | MA-2012-17 | |||
Text-Independent Speaker Verification with HMM-Based Abstract Acoustic Elements | Speech Processing | S | Beat Pfister, Tofigh Naghibi |
HS 12 | SA-2012-32 | |||
Reducing Energy Consumption in Hybrid Wireless Communication | Wireless Mesh Networks | S | Karin Anna Hummel, Franck Legendre |
HS 12 | SA-2012-22 | |||
On the Feasibility of Opportunistic Ad Hoc Music Sharing [confidential] | B | Barbara Keller, Samuel Welten |
FS 12 | BA-2012-02 | ||||
Smart Shopping | G | Jochen Seidel | FS 12 |
, , |
GA-2012-03 | |||
RFID-powered vending machine | G | Sacha Trifunovic | FS 12 |
, Johannes Suter |
GA-2012-01 | |||
Sundroid v3 - Entwicklung eines solarbetriebenen UV Sensors [confidential] | S | Samuel Welten | FS 12 | SA-2012-08 | ||||
Entwicklung einer Android-App zur Förderung des UV-Bewusstseins für medizinische Anwendungen [confidential] | G | Samuel Welten | FS 12 |
, , |
GA-2012-04 | |||
Enhancing the Performance of Twitter Storm with In-Network Processing | B | Roger Wattenhofer | FS 12 | BA-2012-14 | ||||
Extending the Personal Music Collection by Free Music | B | Samuel Welten | FS 12 | BA-2012-05 | ||||
Hazards of iterated block ciphers without expansion [confidential] | M | Roger Wattenhofer | FS 12 | MA-2012-24 | ||||
Identifying Music and Inferring Similarity | B | Samuel Welten | FS 12 | BA-2012-07 | ||||
Local Browsing | S | Bernhard Plattner | FS 12 |
, , |
SA-2012-37 | |||
Make Us Rich! | S | Philipp Brandes | FS 12 | SA-2012-06 | ||||
Modern GPGPU Frameworks and their Application to the Physical Core of the ASUCA Weather Prediction Model | M | Roger Wattenhofer | FS 12 | MA-2012-23 | ||||
Music Tagging - A Social Game | B | Samuel Welten, Tobias Langner |
FS 12 | BA-2012-09 | ||||
My Music Statistics | B | Samuel Welten | FS 12 | BA-2012-06 | ||||
Probabilistic Inference in Online Social Networks [confidential] | M | Vincent Lenders, Franck Legendre |
FS 12 | MA-2012-12 | ||||
Collusion in Online Poker Pays Off | B | Tobias Langner | FS 12 | BA-2012-03 | ||||
Smartphone-Based Indoor Localization [confidential] | M | Samuel Welten | FS 12 | MA-2012-01 | ||||
New Algorithms for Fundamental Problems in Wireless Networks [confidential] | M | Stephan Holzer | FS 12 | MA-2012-14 | ||||
Virtual ID | G | Barbara Keller, Jochen Seidel |
FS 12 |
, |
GA-2012-02 | |||
New Ways of Browsing and Reading News | M | Samuel Welten | FS 12 | MA-2012-05 | ||||
A Lightweight Data Dissemination Algorithm for Multi-hop Wireless Networks | Ad-hoc-Networks | S | Mahdi Asadpour, Karin Anna Hummel |
FS 12 | SA-2012-09 | |||
Measuring Electrosmog Exposure Using Commodity Hardware [confidential] | Ad-hoc-Networks | M | David Hasenfratz, Olga Saukh |
FS 12 | MA-2012-09 | |||
Recipes for Wireless Sensor Networks | Ad-hoc-Networks | S | Roman Lim, Jan Beutel |
FS 12 | SA-2012-10 | |||
Spatial and Temporal Sensor Data Classification [confidential] | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
FS 12 | SA-2012-02 | |||
WLAN-Opp-based RPG | Ad-hoc-Networks | B | Sacha Trifunovic | FS 12 | BA-2012-08 | |||
Advanced Features for a Software Development Environment for Many-Core Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
FS 12 | SA-2012-07 | |||
Efficient Process Network Specification of Ray-Tracing Application [confidential] | Embedded Systems | M | Hoeseok Yang, Iuliana Bacivarov |
FS 12 | MA-2012-10 | |||
The Edit History of the National Vulnerability Database - and similar Vulnerability Databases | Internet Measurement | M | Stephan Neuhaus | FS 12 | MA-2012-06 | |||
Production Traffic as a Service, Debugging OpenFlow Networks | Internet Measurement | M | Xenofontas Dimitropoulos, Vasileios Kotronis |
FS 12 | MA-2012-07 | |||
Who turned off the Internet? [confidential] | Internet Measurement | M | Dominik Schatzmann | FS 12 | MA-2012-11 | |||
Flow-Based Online-Time Anomaly Detection for Large Networks [confidential] | Network Security | S | Dominik Schatzmann | FS 12 | SA-2012-05 | |||
Predicting the Impact of Denial of Service Attacks | Network Security | M | Vincent Lenders, David Gugelmann |
FS 12 | MA-2012-03 | |||
WLAN-OPP Privacy | Network Security | S | Bernhard Distl, Franck Legendre |
FS 12 |
, |
SA-2012-01 | ||
UAVs in Rescue Mission Networks | Networked robotics | S | Mahdi Asadpour, Karin Anna Hummel |
FS 12 | SA-2012-03 | |||
Speech Features for Optimal Discrimination of Phonemes | Speech Processing | S | Beat Pfister, Sarah Hoffmann |
FS 12 | SA-2012-04 | |||
An In-Memory RDMA-Based Architecture for the Hadoop Distributed Filesystem | Systems Optimization | M | Xenofontas Dimitropoulos | FS 12 | MA-2012-04 | |||
Employing Opportunistic Communication to Relieve Cellular Data Traffic: Analysis and Evaluation [confidential] | Systems Optimization | M | Domenico Giustiniano, Franck Legendre |
FS 12 | MA-2012-13 | |||
Ultra-fast and Accurate Wireless Link Quality Estimation and the Bene | Wireless Mesh Networks | M | Vincent Lenders, Franck Legendre |
FS 12 | MA-2012-02 | |||
Ultra-low Power Wireless Hierarchical Sensing | Wireless Mesh Networks | M | Bernhard Buchli, Jan Beutel |
FS 12 | MA-2012-08 | |||
Load-Balancing of Consumers in Electricity Networks | M | Stephan Holzer | HS 11 | MA-2011-19 | ||||
Collaborative Go | M | Samuel Welten | HS 11 | MA-2011-14 | ||||
Traffic Measurement on OpenFlow-enabled Switches | S | Jose F. Mingorance-Puga, Wolfgang Mühlbauer |
HS 11 | SA-2011-21 | ||||
Distributed Approximation Algorithms [confidential] | B | Stephan Holzer | HS 11 | BA-2011-10 | ||||
Extending HikeDroid - Smart Features for Hikers | B | Tobias Langner, Samuel Welten |
HS 11 | BA-2011-11 | ||||
Extending Social Music Similarity Measures by Audio Features | M | Samuel Welten | HS 11 | MA-2011-21 | ||||
Optimizing a UV radiation sensor for a medical application [confidential] | S | Samuel Welten | HS 11 | SA-2011-34 | ||||
Path Tracking - Guiding Smartphones Based on Recorded Tracks | G | Tobias Langner, Jochen Seidel |
HS 11 |
, |
GA-2011-06 | |||
SGT Toolbox - A Playground for Spectral Graph Theory | M | Tobias Langner, Barbara Keller |
HS 11 | MA-2011-23 | ||||
Signature Verification on Finger Operated Touchscreen Devices | S | Tobias Langner, Samuel Welten |
HS 11 | SA-2011-23 | ||||
JUKEFOX core extraction | S | Tobias Langner, Samuel Welten |
HS 11 |
, |
SA-2011-25 | |||
Development of a Location Based Game for Android Phones | S | Sacha Trifunovic, Bernhard Distl |
HS 11 |
, |
SA-2011-29 | |||
What is New? Information and Entertainment Application for Android and iPhone | B | Samuel Welten | HS 11 | BA-2011-12 | ||||
Your Personalized Radio [confidential] | M | Samuel Welten | HS 11 | MA-2011-24 | ||||
Prototype of a Mobile Avalanche Rescue Beacon [confidential] | Ad-hoc-Networks | S | Bernhard Distl, Franck Legendre |
HS 11 | SA-2011-32 | |||
Sensor-Based Control of Water Samplers in WSNs | Ad-hoc-Networks | M | Jan Beutel | HS 11 | MA-2011-22 | |||
Timely Localization and Multi-Object Tracking for Sensor Networks [confidential] | Ad-hoc-Networks | M | Federico Ferrari, Marco Zimmerling |
HS 11 | MA-2011-25 | |||
An Evaluation of Low Cost Inertial Sensors for Hierarchical Sensing | Ad-hoc-Networks | G | Bernhard Buchli | HS 11 |
, |
GA-2011-07 | ||
GasMobile: Operating Gas Sensors with Mobile Phones | Ad-hoc-Networks | S | David Hasenfratz, Olga Saukh |
HS 11 | SA-2011-24 | |||
Specification and Implementation of the Twimight Server | Ad-hoc-Networks | S | Theus Hossmann, Dominik Schatzmann |
HS 11 | SA-2011-31 | |||
Algorithms for Sensor Localization and Synchronization in Wireless Sensor Networks | Embedded Systems | M | Olga Saukh | HS 11 | MA-2011-13 | |||
Execution of Multiple Dynamic Applications on a Many-Core Platform [confidential] | Embedded Systems | M | Lars Schor, Devendra Rai |
HS 11 | MA-2011-18 | |||
A Dynamic Hardware Architecture for Future Networks | Embedded Systems | M | Ariane Trammell, Stephan Neuhaus |
HS 11 | MA-2011-27 | |||
Network Protocols for Embedded Devices | Embedded Systems | M | Ariane Trammell, Stephan Neuhaus |
HS 11 | MA-2011-28 | |||
Software Development Environment for Many-Core Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
HS 11 | SA-2011-26 | |||
Task Migration for Multi-Processor Systems | Embedded Systems | S | Lars Schor, Devendra Rai |
HS 11 | SA-2011-27 | |||
Automatic Rating of VPN Links | External Projects | M | Martin Burkhart, David Gugelmann |
HS 11 | MA-2011-17 | |||
Selfish Network Link Speedup [confidential] | Internet Economics | S | Raphael Eidenbenz | HS 11 | SA-2011-33 | |||
Fuzzy Attacks on Web Logs | Network Security | G | David Gugelmann, Stephan Neuhaus |
HS 11 | GA-2011-05 | |||
SEPIA Mobile: Teaching Privacy to Android Apps | Network Security | S | Martin Burkhart, Dilip Many |
HS 11 | SA-2011-22 | |||
Exploring and Improving BitTorrent Swarm Topologies [confidential] | Peer-to-Peer Networks | M | Raphael Eidenbenz, Roger Wattenhofer |
HS 11 | MA-2011-20 | |||
WLAN-OPP: WLAN-based Opportunistic Networking Implementation on Android | Peer-to-Peer Networks | S | Bernhard Distl, Sacha Trifunovic |
HS 11 | SA-2011-35 | |||
Automatic Pronounciation Verification | Speech Processing | S | Beat Pfister, Sarah Hoffmann |
HS 11 | SA-2011-28 | |||
Battery State of Charge Modeling | Wireless Mesh Networks | S | Bernhard Buchli | HS 11 | SA-2011-30 | |||
Energy Harvesting Wireless Anemometer [confidential] | S | Johannes Schneider, Philipp Sommer |
FS 11 | SA-2011-11 | ||||
A Wireless Sensor Network for Orienteering Competitions | M | Philipp Sommer | FS 11 | MA-2011-15 | ||||
A touch-based music player interface optimized for tablet-sized devices | B | Samuel Welten | FS 11 | BA-2011-06 | ||||
Approximations and Heuristics for Estimating the Diameter of a graph [confidential] | B | Stephan Holzer | FS 11 | BA-2011-01 | ||||
User Behavior Profiling using Smartphones | M | Sacha Trifunovic | FS 11 | MA-2011-06 | ||||
Debugging TinyOS with COOJA | S | Philipp Sommer | FS 11 | SA-2011-06 | ||||
Lower Bounds for Distributed Computation of Basic Graph Properties [confidential] | S | Stephan Holzer | FS 11 | SA-2011-19 | ||||
Distributed Graph Coloring | S | Johannes Schneider | FS 11 | SA-2011-08 | ||||
Enhancement of Website Usability for Mobile Phones | M | Samuel Welten | FS 11 | MA-2011-16 | ||||
Explore the World of Bookcrossing | M | Raphael Eidenbenz, Roger Wattenhofer |
FS 11 | MA-2011-10 | ||||
Extensions to FACT (Flow-Based Approach for Connectivity Tracking) [confidential] | S | Dominik Schatzmann, Wolfgang Mühlbauer |
FS 11 |
, |
SA-2011-14 | |||
FooDroid: A Food Recommendation App for University Canteens | S | Tobias Langner, Samuel Welten |
FS 11 | SA-2011-16 | ||||
A Testbed for Radio Propagation Measurements in Wireless Sensor Networks | S | Philipp Sommer | FS 11 | SA-2011-05 | ||||
HikeDroid - GPS Navigation for Hikers on Android Phones | B | Tobias Langner, Samuel Welten |
FS 11 | BA-2011-02 | ||||
Is it me? User detection on Personal (Android) Devices [confidential] | M | Samuel Welten | FS 11 | MA-2011-04 | ||||
Let your friends and mobile phone help you | S | Johannes Schneider | FS 11 | SA-2011-04 | ||||
Localizing Your Smart Phone | S | Johannes Schneider | FS 11 | SA-2011-03 | ||||
Mobile Peer-to-Peer Audio Streaming | B | Remo Meier | FS 11 | BA-2011-03 | ||||
Live Audio Streaming in Mobile Peer-to-Peer Systems | M | Remo Meier | FS 11 | MA-2011-11 | ||||
Mobile Sensing – Ein drahtloses Messsystem für die Druckanalyse von Füssen [confidential] | S | Samuel Welten, Philipp Sommer |
FS 11 |
, |
SA-2011-10 | |||
MEAMM - Movie Experience and Metadata Manager | G | Raphael Eidenbenz | FS 11 |
, |
GA-2011-01 | |||
Multicast-enabled Peer-to-Peer Systems [confidential] | M | Remo Meier | FS 11 | MA-2011-09 | ||||
Death to Balloons | S | Johannes Schneider, Samuel Welten |
FS 11 | SA-2011-12 | ||||
Skirting ISP Traffic Shaping in P2P Systems, and Countermeasures | B | Raphael Eidenbenz, Roger Wattenhofer |
FS 11 | BA-2011-07 | ||||
Smart (Collaborative) Control [confidential] | B | Johannes Schneider | FS 11 | BA-2011-09 | ||||
Social Data Mining on Smartphones | S | Sacha Trifunovic | FS 11 | SA-2011-09 | ||||
Topology-Aware Peer-to-Peer Systems [confidential] | B | Remo Meier | FS 11 | BA-2011-04 | ||||
Tweaking Throughput on the Transport Layer [confidential] | B | Raphael Eidenbenz | FS 11 | BA-2011-08 | ||||
Virtual Wishlist | G | Sacha Trifunovic | FS 11 |
, , |
GA-2011-02 | |||
wgfinance | G | Barbara Keller | FS 11 |
, , , |
GA-2011-03 | |||
Comparative Analysis of Dozer Network Performance | Ad-hoc-Networks | S | Matthias Keller | FS 11 | SA-2011-13 | |||
Implementation of a Disaster Mode to Maintain Twitter Communications in Times of Network Outages | Ad-hoc-Networks | M | Theus Hossmann, Franck Legendre |
FS 11 | MA-2011-02 | |||
Inferring Shared Interests from Tweets | Ad-hoc-Networks | S | Theus Hossmann, Franck Legendre |
FS 11 | SA-2011-20 | |||
Lightweight Autonomic Network Architecture | Embedded Systems | M | Ariane Trammell, Wolfgang Mühlbauer |
FS 11 | MA-2011-01 | |||
A Framework for the State-based Real-time Analysis of Resource Contention Scenarios in Multicore Architectures [confidential] | Embedded Systems | M | Kai Lampka, Andreas Schranzhofer |
FS 11 | MA-2011-08 | |||
Eciently programming the Intel SCC | Embedded Systems | S | Iuliana Bacivarov, Hoeseok Yang |
FS 11 | SA-2011-15 | |||
Platform-Independent Software Development for Real-Time Embedded Systems [confidential] | Embedded Systems | M | Ehud Ben-Porat | FS 11 | MA-2011-26 | |||
Extending HAPviewer: Time Window, Flow Classification, and Geolocation | Network Security | M | Eduard Glatz, Xenofontas Dimitropoulos |
FS 11 | MA-2011-12 | |||
Practical Private Set Operations using Probabilistic Data Structures [confidential] | Network Security | M | Martin Burkhart, Dilip Many |
FS 11 | MA-2011-07 | |||
Security Assessment of Infection Incidents in the ETH University Campus | Network Security | M | Elias Raftopoulos, Xenofontas Dimitropoulos |
FS 11 | MA-2011-03 | |||
Security Monitoring at Enterprise Level [confidential] | Network Security | M | David Gugelmann | FS 11 | MA-2011-05 | |||
Network Coding for Opportunistic Content Delivery Networks (o-CDN) [confidential] | Peer-to-Peer Networks | S | Gabriel Popa, Kavé Salamatian |
FS 11 | SA-2011-18 | |||
Peer to Peer and Mobile Systems Support | Peer-to-Peer Networks | S | Remo Meier | FS 11 | SA-2011-17 | |||
Performance Evaluation of OpenFlow Switches | Performance Evaluation | S | Jose F. Mingorance-Puga, Wolfgang Mühlbauer |
FS 11 | SA-2011-07 | |||
Implementation and evaluation of an HMM-based speech generation component for the SVOX TTS system | Speech Processing | S | Thomas Ewender, Sarah Hoffmann |
FS 11 | SA-2011-02 | |||
Historische Entwicklung der Sicherheit in Wireless Netzwerken | Wireless Security | G | David Gugelmann, Dominik Schatzmann |
FS 11 |
, |
GA-2011-04 | ||
Analysis of Sleeping Patterns Using Smartphone Sensors | S | Johannes Schneider | HS 10 |
, |
SA-2010-26 | |||
Automated Appointment Recommendation on Mobile Devices [confidential] | S | Michael Kuhn, Samuel Welten |
HS 10 | SA-2010-19 | ||||
Automated Meta-Data Extraction for Confsearch | S | Michael Kuhn | HS 10 | SA-2010-13 | ||||
Localization of (moving) objects | S | Johannes Schneider | HS 10 | SA-2010-14 | ||||
YouTube News Channels: Classification and Relationships [confidential] | M | Michael Kuhn | HS 10 | MA-2010-18 | ||||
Acoustic Emission Sensing in Wireless Sensor Networks | Ad-hoc-Networks | M | Jan Beutel | HS 10 | MA-2010-08 | |||
Experimental Performance Evaluation of Routing In Delay Tolerant Networks | Ad-hoc-Networks | M | Theus Hossmann, Franck Legendre |
HS 10 | MA-2010-16 | |||
Using Dual Radios in Infrastructure-supported Mesh Networks: A Theme Park Scenario [confidential] | Ad-hoc-Networks | M | Philipp Sommer | HS 10 | MA-2010-15 | |||
Distributed Simulation of Dynamic and Fault Tolerant System | Embedded Systems | M | Iuliana Bacivarov, Hoeseok Yang |
HS 10 | MA-2010-13 | |||
Efficient and Predictable Real-Time Systems on Multiprocessor Platforms - Tackling the placement problem | Embedded Systems | M | Andreas Schranzhofer | HS 10 | MA-2010-12 | |||
Interface Development for Next Generation FlockLab | Embedded Systems | S | Christoph Walser, Federico Ferrari |
HS 10 | SA-2010-17 | |||
Sensor-Feeds for a WSN Simulation Environment [confidential] | Embedded Systems | M | Philipp Sommer | HS 10 | MA-2010-14 | |||
Thermal Simulation and Analysis Methods for Many-Core Platforms | Embedded Systems | M | Iuliana Bacivarov, Hoeseok Yang |
HS 10 | MA-2010-09 | |||
GPS-equipped Wireless Sensor Node for PermaSense | Embedded Systems | S | Bernhard Buchli, Jan Beutel |
HS 10 | SA-2010-18 | |||
Identification of Connectivity Issues in Large Networks using Data Plane | Internet Measurement | S | Dominik Schatzmann, Wolfgang Mühlbauer |
HS 10 | SA-2010-21 | |||
Wirefox – A Measurement Plug-In for Firefox | Internet Measurement | S | Dominik Schatzmann, Wolfgang Mühlbauer |
HS 10 | SA-2010-20 | |||
Phased STM [confidential] | Multicore Architecture | S | Johannes Schneider | HS 10 | SA-2010-16 | |||
Evaluating and Improving the Detection of Internet Background Radiation | Network Security | S | Eduard Glatz, Xenofontas Dimitropoulos |
HS 10 | SA-2010-23 | |||
SMS-based Certificate Authority | Network Security | S | Sacha Trifunovic | HS 10 | SA-2010-25 | |||
Custom Media Player with Integrated Feedback | Peer-to-Peer Networks | S | Sacha Trifunovic | HS 10 | SA-2010-24 | |||
On-Demand Content Delivery [confidential] | Peer-to-Peer Networks | G | Remo Meier | HS 10 |
, |
GA-2010-06 | ||
Hidden Markov Models for Speech Segmentation | Speech Processing | S | Sarah Hoffmann | HS 10 | SA-2010-15 | |||
A wireless real-time network for roller coasters [confidential] | Wireless Mesh Networks | S | Johannes Schneider, Philipp Sommer |
HS 10 | SA-2010-22 | |||
Information Dissemination in Vehicular Networks | Wireless Mesh Networks | M | Franck Legendre, Thrasyvoulos Spyropoulos |
HS 10 | MA-2010-11 | |||
Wireless Link Quality Estimation in Mobile Networks | Wireless Mesh Networks | M | Vincent Lenders, Franck Legendre |
HS 10 | MA-2010-17 | |||
Studying Social-driven Mobility - Comparing Face-to-Face Meetings to Online Social Network Activity | M | Thrasyvoulos Spyropoulos, Franck Legendre |
FS 10 | MA-2010-06 | ||||
Time Awareness | G | Michael Kuhn, Samuel Welten |
FS 10 |
, , |
GA-2010-03 | |||
Distributed Challenge Analysis and Remediation in Wireless Mesh Networks | M | Merkourios Karaliopoulos | FS 10 | MA-2010-10 | ||||
Head Tracking durch Bildanalyse auf einem Smartphone | G | Samuel Welten, Michael Kuhn |
FS 10 |
, |
GA-2010-05 | |||
Musicexplorer Winamp Plugin | G | Michael Kuhn, Samuel Welten |
FS 10 |
, |
GA-2010-04 | |||
Refactoring Extension for the Yeti Eclipse Plugin | G | Benjamin Sigg | FS 10 |
, |
GA-2010-01 | |||
Debugging Wireless Sensor Network Simulations | Ad-hoc-Networks | S | Philipp Sommer | FS 10 | SA-2010-05 | |||
Implementation of an Adaptive Dissemination Protocol on Sensor Nodes | Ad-hoc-Networks | S | Federico Ferrari, Marco Zimmerling |
FS 10 | SA-2010-11 | |||
Management Software für ein Wireless Sensor Netzwerk Testbed | Ad-hoc-Networks | S | Matthias Woehrle, Christoph Walser |
FS 10 | SA-2010-06 | |||
ParaglidingNet: A Sensor Network for Thermal Research [confidential] | Ad-hoc-Networks | M | Philipp Sommer | FS 10 | MA-2010-02 | |||
Push vs. Pull in Wireless Sensor Networks [confidential] | Ad-hoc-Networks | M | Marco Zimmerling, Andreas F. Meier |
FS 10 | MA-2010-05 | |||
SunDroid - A Wearable Sunburn Warning System for Android [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Samuel Welten |
FS 10 | SA-2010-10 | |||
Predictable Communication on Multiprocessor Platforms | Embedded Systems | M | Andreas Schranzhofer | FS 10 | MA-2010-07 | |||
Online GPS for PermaSense WSN | Embedded Systems | S | Bernhard Buchli, Jan Beutel |
FS 10 | SA-2010-12 | |||
Modular Performance Analysis of Large-scale Distributed Embedded Systems [confidential] | Embedded Systems | S | Simon Perathoner, Kai Lampka |
FS 10 | SA-2010-08 | |||
Multi-Sensor Monitoring for Host Security Characterization [confidential] | End-point Security | M | Elias Raftopoulos, Bernhard Tellenbach |
FS 10 | MA-2010-04 | |||
SEBPS v1.0: Designing a Secure and Maintainable End-User Platform | End-point Security | S | Lukas Ruf | FS 10 | SA-2010-09 | |||
Practicability of T4T Along Cycles | Peer-to-Peer Networks | S | Raphael Eidenbenz, Roger Wattenhofer |
FS 10 | SA-2010-04 | |||
Constraint Handling in Evolutionary Multi-Objective Optimization | Systems Optimization | S | Tamara Ulrich | FS 10 | SA-2010-01 | |||
A Wireless System to Measure Oscillations of Cable-Cars and Chair-Lifts [confidential] | Wireless Mesh Networks | M | Johannes Schneider, Philipp Sommer |
FS 10 | MA-2010-03 | |||
Design of an Energy Harvesting Network Node for Wind Measurement | Wireless Mesh Networks | S | Johannes Schneider, Philipp Sommer |
FS 10 | SA-2010-03 | |||
Improving the privacy of ZigBee / IEEE 802.15.4 with Dynamic and Secret Spreading Sequences [confidential] | Wireless Security | M | Franck Legendre | FS 10 | MA-2010-01 | |||
Vulnerability Evaluation of Proportional Fairness Scheduling to Retransmissions Attacks | Wireless Security | S | Ehud Ben-Porat | FS 10 | SA-2010-02 | |||
BACnet Service-based Web Operation Client using Silverlight Technology and Cimetrics Gateway [confidential] | M | Lothar Thiele | HS 09 | MA-2009-13 | ||||
Code Formatting for TinyOS in Eclipse | S | Benjamin Sigg | HS 09 | SA-2009-35 | ||||
Collaborative Chess | S | Michael Kuhn, Christoph Lenzen |
HS 09 | SA-2009-22 | ||||
MusicExplorer PartyDJ | S | Michael Kuhn | HS 09 |
, |
SA-2009-21 | |||
Faster Parallel Datastructures | S | Johannes Schneider | HS 09 | SA-2009-28 | ||||
Implementation and Evaluation of a CNA-Based DTN Routing Protocol | S | Theus Hossmann, Franck Legendre |
HS 09 | SA-2009-30 | ||||
Sports Reporter Application for future Mobile Networks | M | Ariane Trammell, Franck Legendre |
HS 09 | MA-2009-16 | ||||
Path Length vs Distance in Mobile Wireless Networks | Ad-hoc-Networks | S | Simon Heimlicher, Merkourios Karaliopoulos |
HS 09 | SA-2009-33 | |||
Evaluating the Overhead of Setting up TDMA Communication in Wireless Sensor Networks | Ad-hoc-Networks | S | Federico Ferrari | HS 09 | SA-2009-25 | |||
Acoustic Localization in Sparse Wireless Sensor Networks [confidential] | Ad-hoc-Networks | M | Philipp Sommer, Roland Flury |
HS 09 | MA-2009-12 | |||
Precise Time Synchronization for Wireless Sensor Networks using the Global Positioning System | Ad-hoc-Networks | S | Philipp Sommer | HS 09 | SA-2009-20 | |||
Reliable and Energy-Efficient Data Dissemination in Wireless Sensor Networks [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
HS 09 | SA-2009-27 | |||
Development of a Streaming Application Benchmark Set | Embedded Systems | S | Wolfgang Haid, Kai Huang |
HS 09 | SA-2009-26 | |||
Online GPS für Permafrost Monitoring | Embedded Systems | S | Jan Beutel, Matthias Keller |
HS 09 | SA-2009-19 | |||
Distributed Conversion of Public Transport Schedules | External Projects | M | Benjamin Sigg | HS 09 | MA-2009-17 | |||
Privacy in Online Social Networks | External Projects | M | Martin Burkhart | HS 09 | MA-2009-11 | |||
A Software-Based Trusted Platform Module | Network Security | M | Mario Strasser | HS 09 | MA-2009-10 | |||
Virtual Network Topology for Data Centers [confidential] | Network Security | S | Bernhard Plattner | HS 09 | SA-2009-34 | |||
To Be or Not to Be a BitThief [confidential] | Peer-to-Peer Networks | S | Raphael Eidenbenz, Thomas Locher |
HS 09 | SA-2009-29 | |||
Frame-Klassifizierung von Sprachsignalen mit Support-Vektor-Maschinen | Speech Processing | S | Thomas Ewender, Sarah Hoffmann |
HS 09 | SA-2009-23 | |||
Generierung von Sprachmustern für die Spracherkennung | Speech Processing | S | Michael Gerber, Beat Pfister |
HS 09 | SA-2009-24 | |||
Schätzung des bewegten Vokaltraktes aus dem Sprachsignal | Speech Processing | M | Beat Pfister, Michael Gerber |
HS 09 | MA-2009-14 | |||
Mehrzieloptimierung unter Berücksichtigung struktureller Eigenschaften von Lösungen | Systems Optimization | S | Tamara Ulrich | HS 09 | SA-2009-18 | |||
Resilience of wireless mesh networks to node misbehaviors | Wireless Mesh Networks | S | Merkourios Karaliopoulos, Gabriel Popa |
HS 09 | SA-2009-36 | |||
Jamming Detection and Performance of Rate Switching under Jamming | Wireless Security | M | Mario Strasser, Franck Legendre |
HS 09 |
, |
MA-2009-15 | ||
A Security Forensics Framework | Wireless Security | S | Mario Strasser | HS 09 | SA-2009-32 | |||
Aufbau eines OpenFlow Netzwerkes (report) | G | Bernhard Plattner, Ariane Trammell |
FS 09 |
, |
GA-2009-05 | |||
Deriving Web Site Classification from Web Page Classifications [confidential] | M | Michael Kuhn | FS 09 | MA-2009-09 | ||||
Erstellen einer Dokumentation für das PPS Voice over IP (report) | G | Bernhard Distl | FS 09 |
, , , |
GA-2009-01 | |||
Linux Energy Attribution and Accounting Platform | M | Lothar Thiele | FS 09 | MA-2009-04 | ||||
Jukebox An Intelligent Online Music Player | S | Michael Kuhn, Olga Goussevskaia |
FS 09 | SA-2009-10 | ||||
Personalized Organization of Music on Mobile Devices [confidential] | M | Michael Kuhn, Olga Goussevskaia |
FS 09 | MA-2009-08 | ||||
Distributed Wireless Singlehop Network Monitoring [confidential] | Ad-hoc-Networks | S | Yvonne-Anne Pignolet-Oswald, Jasmin Smula |
FS 09 | SA-2009-15 | |||
Neighbor Discovery and Topology Construction of Wireless Sensor Networks | Ad-hoc-Networks | M | Andreas F. Meier, Jan Beutel |
FS 09 | MA-2009-05 | |||
Development of a Base Station for Wireless Sensor Networks [confidential] | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
FS 09 | SA-2009-06 | |||
IPv6 for Wireless Sensor Networks | Ad-hoc-Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-01 | |||
A Load Adaptive & Frequency-Hopping MAC-Protocol | Ad-hoc-Networks | S | Philipp Sommer, Roland Flury |
FS 09 | SA-2009-05 | |||
Secure Messaging for Wireless Sensor Networks | Ad-hoc-Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-03 | |||
Simulative Analysis of Routing Algorithms for Energy Harvesting Sensor Networks [confidential] | Ad-hoc-Networks | S | Jian-Jia Chen, Clemens Moser |
FS 09 | SA-2009-14 | |||
Eclipse Plugin for TinyOS Debugging | Ad-hoc-Networks | S | Benjamin Sigg, Philipp Sommer |
FS 09 | SA-2009-04 | |||
Zurinet - Using Public Transportation as a DTN Backbone | Ad-hoc-Networks | M | Thrasyvoulos Spyropoulos, Franck Legendre |
FS 09 | MA-2009-06 | |||
Mobile Application for On-Site Sensor Installation Support | Embedded Systems | G | Matthias Keller, Jan Beutel |
FS 09 |
, , |
GA-2009-06 | ||
Power Aware Communication Platform for an Autonomous Sailboat | Embedded Systems | M | Andreas Schranzhofer, Clemens Moser |
FS 09 | MA-2009-03 | |||
Wireless Weather Station for High-Alpine Locations | Embedded Systems | S | Matthias Keller, Jan Beutel |
FS 09 |
, |
SA-2009-11 | ||
Ground truth analysis of anomalies in traffic feature distributions | Network Security | G | Bernhard Tellenbach | FS 09 | GA-2009-04 | |||
Evaluating and Improving TES II [confidential] | Network Security | S | Bernhard Tellenbach | FS 09 | SA-2009-17 | |||
Event Correlation Engine | Network Security | M | Bernhard Tellenbach | FS 09 | MA-2009-01 | |||
Privacy-Preserving Collaboration in Network Security | Network Security | M | Martin Burkhart, Mario Strasser |
FS 09 | MA-2009-02 | |||
SIAN Software zur Identifikation von Applikationsklassen in NetFlow | Network Security | G | Eduard Glatz, Bernhard Tellenbach |
FS 09 |
, |
GA-2009-03 | ||
BitTorrent for Really Selfish Peers – T4T Trading over Cycles [confidential] | Peer-to-Peer Networks | S | Raphael Eidenbenz | FS 09 | SA-2009-09 | |||
Automatische Bestimmung von unbekannten Wörtern | Speech Processing | S | Tobias Kaufmann, Thomas Ewender |
FS 09 | SA-2009-07 | |||
Two-stage Utterance Detector for Speech Recognition | Speech Processing | S | Michael Gerber, Beat Pfister |
FS 09 | SA-2009-08 | |||
Effective Multi-Objective Optimization of Robust Solutions | Systems Optimization | M | Johannes Bader, Eckart Zitzler |
FS 09 | MA-2009-07 | |||
Optimization According to Interactively Quantied User Preferences | Systems Optimization | S | Tamara Ulrich, Dimo Brockhoff |
FS 09 |
, |
SA-2009-16 | ||
Memory Support for the Pixie Sensor Node | Wireless Mesh Networks | S | Roland Flury, Philipp Sommer |
FS 09 | SA-2009-02 | |||
Development of software tools to facilitate management and experimentation with the TIK wireless testbed | Wireless Mesh Networks | S | Merkourios Karaliopoulos | FS 09 | SA-2009-12 | |||
Attacking Volunteer Computing Systems | S | Michael Kuhn | HS 08 | SA-2008-29 | ||||
High Availability Seamless Ring Protocol Implementation in FPGA | M | Lothar Thiele | HS 08 | MA-2008-19 | ||||
Design and Implementation of SAFT on ANA II | S | Ariane Trammell, Simon Heimlicher |
HS 08 | SA-2008-21 | ||||
Improving Keyword Search in ConfSearch | S | Michael Kuhn | HS 08 | SA-2008-35 | ||||
Interconnection of Different Network Architectures | S | Ariane Trammell, Martin May |
HS 08 | SA-2008-22 | ||||
MPSoC Testbed for Analyzing Execution of Process Networks | S | Wolfgang Haid, Kai Huang |
HS 08 | SA-2008-26 | ||||
MusicExplorer Amarok2 Plug-in | S | Olga Goussevskaia, Michael Kuhn |
HS 08 | SA-2008-28 | ||||
Performance Enhancement of an Intersection Assistance System by Integrating WLAN Ad-Hoc Network with Multi-Hop Capabilities | M | Thrasyvoulos Spyropoulos | HS 08 | MA-2008-20 | ||||
Semantic Understanding of Location and Movement Information Collected by a Mobile Application | S | Michael Kuhn | HS 08 | SA-2008-25 | ||||
Wireless Sensor Network Testbed 2.0: A New Service Oriented Architecture | M | Matthias Woehrle, Jan Beutel |
HS 08 | MA-2008-26 | ||||
Autonomic Identifier Allocation for ANA (AIA) | S | Ariane Trammell, Martin May |
HS 08 | SA-2008-23 | ||||
Broadcast Synchonization in Wireless Ad Hoc Podcasting | Ad-hoc-Netze | S | Franck Legendre | HS 08 | SA-2008-17 | |||
Lightweight Information System Technology LIST | Ad-hoc-Netze | S | Bernhard Distl, Franck Legendre |
HS 08 |
, |
SA-2008-19 | ||
Enhanced TinyOS Support in Eclipse | Ad-hoc-Netze | S | Philipp Sommer, Roland Flury |
HS 08 | SA-2008-33 | |||
Secure Content Dissemination in Opportunistic Networks | Ad-hoc-Netze | M | Bernhard Distl, Franck Legendre |
HS 08 |
, |
MA-2008-27 | ||
Opportunistic Networks with ANA | Ad-hoc-Netze | M | Theus Hossmann, Franck Legendre |
HS 08 | MA-2008-23 | |||
Execution of Process Networks on the Cell Broadband Engine | Eingebettete Systeme | S | Wolfgang Haid, Kai Huang |
HS 08 | SA-2008-24 | |||
Mountain View - Eine Kamera für das PermaSense Projekt | Eingebettete Systeme | G | Jan Beutel, Matthias Keller |
HS 08 |
, |
GA-2008-01 | ||
Lego Mindstorms NXT Camera | Eingebettete Systeme | S | Wolfgang Haid, Matthias Woehrle |
HS 08 | SA-2008-18 | |||
Make Multicore Systems Easily Programmable - With Focus on Contention Management [confidential] | Multicore Architecture | S | Johannes Schneider | HS 08 | SA-2008-31 | |||
Secondary network activity and traffic of SMTP sender hosts [confidential] | Network Security | M | Dominik Schatzmann, Martin Burkhart |
HS 08 | MA-2008-24 | |||
Evaluating and Improving TES [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
HS 08 | MA-2008-28 | |||
Extending Flame: Anomaly Characterization and Extraction [confidential] | Network Security | M | Daniela Brauckhoff, Arno Wagner |
HS 08 | MA-2008-25 | |||
Invasion of Privacy Using Fingerprinting Attacks | Network Security | M | Martin Burkhart, Dominik Schatzmann |
HS 08 | MA-2008-22 | |||
Detektion und Elemination von Störgeräuschen bei Frikativlauten | Sprachverarbeitung | S | Thomas Ewender, Sarah Hoffmann |
HS 08 | SA-2008-30 | |||
Effizienter und robuster Sprachmustererkenner | Sprachverarbeitung | S | Beat Pfister, Michael Gerber |
HS 08 | SA-2008-20 | |||
Visualizing High-Dimensional Data | Systemoptimierung | S | Tamara Ulrich, Johannes Bader |
HS 08 | SA-2008-34 | |||
Porting the ZigBit 900 Platform to TinyOS | Wireless Mesh Networks | G | Philipp Sommer, Roland Flury |
HS 08 |
, |
GA-2008-27 | ||
Development/Simulation Of Algorithms For Wireless Networks [confidential] | Wireless Mesh Networks | S | Johannes Schneider | HS 08 | SA-2008-32 | |||
A mobile payment system using an NFC mobile phone [confidential] | Wireless Security | M | Bernhard Plattner | HS 08 | MA-2008-17 | |||
Jamming Detection inWireless Ad Hoc Networks | Wireless Security | M | Vincent Lenders, Franck Legendre |
HS 08 | MA-2008-21 | |||
Botnet Detection based on NetFlow Traces [confidential] | M | Dominik Schatzmann | FS 08 | MA-2008-14 | ||||
Speed Dating despite Jammers [confidential] | M | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
FS 08 | MA-2008-05 | ||||
Design and Implementation of SAFT on ANA | S | Ariane Trammell, Simon Heimlicher |
FS 08 | SA-2008-12 | ||||
Mobile Social Networking for Enhanced Group Communication [confidential] | M | Michael Kuhn | FS 08 | MA-2008-18 | ||||
History-Based Collaborative Filtering for Music Recommendation [confidential] | S | Michael Kuhn, Olga Goussevskaia |
FS 08 | SA-2008-03 | ||||
Pancho - The Mobile Music Explorer [confidential] | S | Michael Kuhn | FS 08 | SA-2008-05 | ||||
Wireless Ad Hoc Podcasting on Symbian | Ad-hoc-Netze | D | Vincent Lenders, Bernhard Distl |
FS 08 | DA-2008-03 | |||
Mobility Modeling of Swarm Robots | Ad-hoc-Netze | S | Merkourios Karaliopoulos | FS 08 | SA-2008-07 | |||
Multi Hop Send Protocol Tool for TinyNodes | Ad-hoc-Netze | S | Roland Flury | FS 08 | SA-2008-13 | |||
Hop-by-hop Transport on Linux [confidential] | Ad-hoc-Netze | M | Simon Heimlicher, Ariane Trammell |
FS 08 | MA-2008-10 | |||
SimBet | Ad-hoc-Netze | S | Thrasyvoulos Spyropoulos | FS 08 | SA-2008-15 | |||
YETI 2 - TinyOS 2.x Eclipse Plugin | Ad-hoc-Netze | M | Nicolas Burri, Roland Flury |
FS 08 | MA-2008-11 | |||
Automating Worldwide Sensor Network Testing | Eingebettete Systeme | S | Jan Beutel, Matthias Woehrle |
FS 08 | SA-2008-09 | |||
PermaSense Persistent Storage Solution | Eingebettete Systeme | S | Jan Beutel, Roman Lim |
FS 08 |
, |
SA-2008-16 | ||
Redundancy for Compact Turbine Controller | External Projects | D | Rainer Baumann | FS 08 | DA-2008-01 | |||
Symbolic approach for the state graph based verification of systems [confidential] | External Projects | D | Kai Lampka | FS 08 | DA-2008-06 | |||
Lightweight Detection of Malicious Traffic in Wireless Mesh Networks | External Projects | M | Mario Strasser | FS 08 | MA-2008-15 | |||
Analysis and Modeling of Internet Epidemics | Network Security | M | Daniela Brauckhoff, Bernhard Tellenbach |
FS 08 | MA-2008-01 | |||
Towards Revealing Attackers Intent by Automatically Decrypting Network Traffic | Network Security | M | Bernhard Tellenbach | FS 08 | MA-2008-08 | |||
Characterizing network activity of mail servers [confidential] | Network Security | S | Dominik Schatzmann, Bernhard Tellenbach |
FS 08 | SA-2008-11 | |||
Implementation of an Anomaly Injection Framework | Network Security | D | Daniela Brauckhoff, Martin Burkhart |
FS 08 | DA-2008-04 | |||
Next Generation / Secure E-Banking [confidential] | Network Security | M | Rainer Baumann | FS 08 | MA-2008-04 | |||
Rating Autonomous Systems [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
FS 08 | MA-2008-07 | |||
Sharing of Traffic Measurements with Privacy Based on Multi-Party Computation [confidential] | Network Security | M | Martin Burkhart, Mario Strasser |
FS 08 | MA-2008-02 | |||
Signature-based Extrusion Detection | Network Security | M | Bernhard Tellenbach | FS 08 | MA-2008-06 | |||
Extending the Functionality of BitThief | Peer-to-Peer Networks | S | Thomas Locher | FS 08 | SA-2008-10 | |||
Honor Among Thieves — A Source Coding Based Sharing Mechanism for the BitThief Client | Peer-to-Peer Networks | M | Thomas Locher | FS 08 | MA-2008-09 | |||
Increasing the Usability of BitThief: A Free Riding BitTorrent Client | Peer-to-Peer Networks | M | Thomas Locher | FS 08 | MA-2008-16 | |||
Exploring Search Methods with Pulsar [confidential] | Peer-to-Peer Networks | M | Remo Meier | FS 08 | MA-2008-13 | |||
Scalable Video for Peer-to-Peer Streaming [confidential] | Peer-to-Peer Networks | M | Remo Meier | FS 08 | MA-2008-12 | |||
Using Air Traffic as a Delay-Tolerant Networking Backbone | Peer-to-Peer Networks | S | Franck Legendre, Martin May |
FS 08 | SA-2008-01 | |||
Monitoring changes in speaking style over long time periods [confidential] | Sprachverarbeitung | M | Beat Pfister, Thomas Ewender |
FS 08 | MA-2008-03 | |||
Sprachverarbeitungstechnologien für die computergestützte Sprechschulung [confidential] | Sprachverarbeitung | D | Beat Pfister, Michael Gerber |
FS 08 | DA-2008-05 | |||
Wortbedeutung und Satzaufbau | Sprachverarbeitung | S | Tobias Kaufmann | FS 08 |
, |
SA-2008-14 | ||
Datenstrukturen für schnelle Dominanzüberprüfung in evolutionären Algorithmen | Systemoptimierung | S | Johannes Bader, Eckart Zitzler |
FS 08 | SA-2008-02 | |||
Parallelization of Evolutionary Algorithms | Systemoptimierung | S | Johannes Bader, Dimo Brockhoff |
FS 08 | SA-2008-06 | |||
Parameter Estimation in Differential Equation Models | Systemoptimierung | S | Tim Hohm | FS 08 | SA-2008-04 | |||
Security of Field-based Routing | Wireless Security | S | Mario Strasser | FS 08 | SA-2008-08 | |||
Crypto-Breaker Reloaded | S | Michael Kuhn, Stefan Schmid |
HS 07 | SA-2007-60 | ||||
ABAKABAR a mobile social network [confidential] | S | Michael Kuhn | HS 07 | SA-2007-61 | ||||
Development of a mobile MMOG | Ad-hoc-Netze | S | Martin May | HS 07 |
, |
SA-2007-66 | ||
Ethernet-based Deployment Support Network | Ad-hoc-Netze | M | Jan Beutel | HS 07 | MA-2007-44 | |||
Code Refactoring and Memory Optimization for the Trace-based Simulation Framework | Eingebettete Systeme | S | Kai Huang, Iuliana Bacivarov |
HS 07 | SA-2007-63 | |||
Developement of a Simulink Toolbox for the analysis of Real-Time Embedded Systems | Eingebettete Systeme | S | Simon Perathoner, Nikolay Stoimenov |
HS 07 |
, |
SA-2007-52 | ||
Generation of Accurate Performance Analysis Models for Embedded Systems | Eingebettete Systeme | M | Wolfgang Haid, Kai Huang |
HS 07 | MA-2007-45 | |||
TinyOS Instrumentation | Eingebettete Systeme | S | Matthias Woehrle, Jan Beutel |
HS 07 | SA-2007-62 | |||
Scalable Distributing Mutli-Linux System for DOL Application | Eingebettete Systeme | S | Kai Huang, Iuliana Bacivarov |
HS 07 | SA-2007-64 | |||
Verteilte Messung von Photovoltaischer Energie für Sensornetze | Eingebettete Systeme | S | Clemens Moser | HS 07 | SA-2007-65 | |||
Embedding of Naturally-Grown Networks [confidential] | External Projects | M | Michael Kuhn, Olga Goussevskaia |
HS 07 | MA-2007-36 | |||
Game-Based Learning and its Application in Business Environments | External Projects | M | Bernhard Plattner, Rainer Baumann |
HS 07 | MA-2007-34 | |||
Dissecting Port 80 Traffic [confidential] | Network Security | M | Bernhard Tellenbach, Dominik Schatzmann |
HS 07 | MA-2007-43 | |||
Localization of Known Anomaly Types in NetFlow Traces | Network Security | S | Daniela Brauckhoff, Arno Wagner |
HS 07 | SA-2007-54 | |||
Theft and Misuse Protection for Anonymous Credentials | Network Security | M | Bernhard Tellenbach | HS 07 | MA-2007-42 | |||
New Protocols and Applications for the Future Internet | Reconfigurable Computing | M | Theus Hossmann, Martin May |
HS 07 | MA-2007-39 | |||
Web-Interface for Natural Language Parsers | Sprachverarbeitung | S | Tobias Kaufmann, Thomas Ewender |
HS 07 | SA-2007-56 | |||
Sprechererkennung anhand des Prosodieverlaufs | Sprachverarbeitung | S | Michael Gerber, Beat Pfister |
HS 07 |
, |
SA-2007-59 | ||
Pattern Identification in Pareto-Set Approximations | Systemoptimierung | M | Dimo Brockhoff | HS 07 | MA-2007-33 | |||
Secure Node Monitoring in WSNs [confidential] | Wireless Security | M | Mario Strasser | HS 07 | MA-2007-35 | |||
Aggressive TCP | S | Stefan Schmid | SS 07 | SA-2007-57 | ||||
Call Route Discovery with Asterisk / DUNDi | S | Ulrich Fiedler | SS 07 | André Wangler | SA-2007-58 | |||
eMule Attacks and Measurements [confidential] | M | Stefan Schmid, Thomas Locher |
SS 07 | MA-2007-41 | ||||
The ANA Project - Development of the ANA-Core Software | M | Theus Hossmann | SS 07 | MA-2007-38 | ||||
Enhancing Kangoo And Building A Highly Scalable Server [confidential] | S | Stefan Schmid | SS 07 | SA-2007-55 | ||||
veNETa: Mobile Social Networking [confidential] | S | Michael Kuhn | SS 07 |
, |
SA-2007-48 | |||
Similarity Measures in the World of Music | M | Michael Kuhn, Olga Goussevskaia |
SS 07 | MA-2007-27 | ||||
Experimentation and evaluation of routing metrics for multi-hop ad-hoc wireless networks on an indoor wireless testbed | Ad-hoc-Netze | S | Georgios Parissidis | SS 07 | SA-2007-39 | |||
Advanced Aggregation in Ad-Hoc Sensor Networks [confidential] | Ad-hoc-Netze | S | Nicolas Burri, Thomas Locher |
SS 07 | SA-2007-47 | |||
Automated Wireless Sensor Network Testing [confidential] | Ad-hoc-Netze | S | Matthias Woehrle, Jan Beutel |
SS 07 | SA-2007-51 | |||
Distributed Spy Software-Tool WSNSpy | Ad-hoc-Netze | M | Andreas F. Meier | SS 07 | MA-2007-32 | |||
Online Information and ACK Aggregation | Ad-hoc-Netze | M | Stefan Schmid, Yvonne-Anne Pignolet-Oswald |
SS 07 | MA-2007-08 | |||
Energy Efficient Initialization of Wireless Sensor Networks | Ad-hoc-Netze | M | Andreas F. Meier | SS 07 | MA-2007-29 | |||
Wake-up Time Estimation for a Wireless MAC Protocol | Ad-hoc-Netze | S | Andreas F. Meier, Matthias Woehrle |
SS 07 | SA-2007-45 | |||
Topology Estimation in Mobile Ad Hoc Networks | Ad-hoc-Netze | M | Theus Hossmann | SS 07 | MA-2007-37 | |||
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | SS 07 | MA-2007-13 | |||
Simulating Media Access Control Protocols in Wireless Ad-Hoc Networks | Ad-hoc-Netze | S | Olga Goussevskaia | SS 07 | SA-2007-40 | |||
Experimental Analysis of Photovoltaic Energy Scavengers for Sensor Nodes | Eingebettete Systeme | M | Clemens Moser | SS 07 | MA-2007-11 | |||
A Modular Trace-based Simulation Framework for Multiprocessor Systems | Eingebettete Systeme | M | Kai Huang, Iuliana Bacivarov |
SS 07 | MA-2007-10 | |||
Word of Mouth | Internet Economics | M | Yvonne-Anne Pignolet-Oswald | SS 07 | MA-2007-30 | |||
Analyzing network traffic from the SWITCH network from 2003 until today | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-12 | |||
Anomaly Analysis using Host-behavior Clustering | Network Security | M | Daniela Brauckhoff | SS 07 | MA-2007-31 | |||
Application Detection and Modelling using Network Traces | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-14 | |||
Towards Automated Exploit Signature Generation using Honeypots | Network Security | M | Bernhard Tellenbach | SS 07 | MA-2007-09 | |||
IEEE 802.11 Wireless Security | Network Security | S | Martin May, Bernhard Tellenbach |
SS 07 | SA-2007-43 | |||
Broadcast-Authentifizierung für Pulsar | Peer-to-Peer Networks | S | Stefan Schmid, Remo Meier |
SS 07 | SA-2007-44 | |||
Towards Peer-to-Peer Games: XP2Pilot | Peer-to-Peer Networks | M | Stefan Schmid | SS 07 | MA-2007-28 | |||
Online-Games: Traffic Analysis of Popular Game Servers (Counter Strike: Source) | Peer-to-Peer Networks | S | Martin May | SS 07 | SA-2007-42 | |||
Grid Computing Framework [confidential] | Peer-to-Peer Networks | M | Stefan Schmid, Michael Kuhn |
SS 07 | MA-2007-07 | |||
Erkennung von Phrasengrenzen und Phrasentyp aus Sprachsignalen | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 |
, |
SA-2007-49 | ||
Erkennung von Silbenakzenten aus Sprachsignalen | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 | SA-2007-41 | |||
Recognition of Music in Hearing Instruments [confidential] | Sprachverarbeitung | D | Beat Pfister | SS 07 | DA-2007-35 | |||
Spracherkennung mit abstrakten Elementen [confidential] | Sprachverarbeitung | S | Michael Gerber | SS 07 | SA-2007-50 | |||
Speech Synthesis with Hidden Markov Models | Sprachverarbeitung | S | Harald Romsdorfer | SS 07 | SA-2007-46 | |||
Portierung von Topsy v3 auf den Intel Pentium 4 | Voice over IP | S | Daniela Brauckhoff | SS 07 | SA-2007-19 | |||
Industrial Networks - Connecting Controllers via OPC | M | Rainer Baumann | WS 07 | MA-2007-06 | ||||
Groups and Social Networking in Kangoo [confidential] | M | Stefan Schmid | WS 07 | MA-2007-04 | ||||
BTnode Application for automated Link Measurements | Ad-hoc-Netze | S | Andreas F. Meier | WS 07 | SA-2007-04 | |||
Ant Algorithm | Ad-hoc-Netze | S | Roland Flury | WS 07 |
, |
SA-2007-05 | ||
Energy and Time Efficient Link-Quality Estimation for Wireless Sensor Networks | Ad-hoc-Netze | M | Andreas F. Meier | WS 07 | MA-2007-02 | |||
Implementation of HEAT for Linux 2.6 with IPv6 | Ad-hoc-Netze | S | Rainer Baumann | WS 07 | SA-2007-16 | |||
Implementation of a Field Based Routing Protocol for Wireless Mesh Networks | Ad-hoc-Netze | S | Rainer Baumann | WS 07 |
, |
SA-2007-03 | ||
A Framework For Transport Protocol Implementation And Evaluation On Linux 2.6 [confidential] | Ad-hoc-Netze | S | Simon Heimlicher | WS 07 | SA-2007-09 | |||
Design and Analysis of Realistic Mobility Models for Wireless Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | WS 07 | MA-2007-00 | |||
Wireless Ad Hoc Podcasting with Handhelds | Ad-hoc-Netze | M | Vincent Lenders | WS 07 | MA-2007-05 | |||
MPEG-2 Decoder for SHAPES DOL | Eingebettete Systeme | D | Kai Huang | WS 07 | DA-2007-02 | |||
Porting TOPSY v3 to the IXP2400 | Eingebettete Systeme | S | Lukas Ruf | WS 07 |
, |
SA-2007-18 | ||
Modular Network Router for Microkernel-Based Embedded Systems | External Projects | M | Stefan Schmid | WS 07 | MA-2007-03 | |||
Representation of XML Schema Components | External Projects | D | Erik Wilde | WS 07 | DA-2007-01 | |||
Virus Inoculation on Social Graphs - The Friendship Factor | Internet Economics | S | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
WS 07 | SA-2007-17 | |||
Harpoon: A Flow-level Traffic Generator | Network Security | S | Daniela Brauckhoff | WS 07 | SA-2007-06 | |||
Anomaly Visibility and Detectability in Sampled Traffic | Network Security | S | Daniela Brauckhoff | WS 07 | SA-2007-12 | |||
Towards Exploit Signature Generation using Honeypots II | Network Security | S | Bernhard Tellenbach | WS 07 | SA-2007-13 | |||
Game Theory: (Byzantine) Potential in Games | Peer-to-Peer Networks | D | Yvonne-Anne Pignolet-Oswald, Stefan Schmid |
WS 07 | DA-2007-03 | |||
A Framework for Peer-to-Peer Service Interaction | Peer-to-Peer Networks | S | Thomas Locher, Stefan Schmid |
WS 07 | SA-2007-14 | |||
A Recommender System for Kangoo [confidential] | Peer-to-Peer Networks | M | Stefan Schmid | WS 07 | MA-2007-01 | |||
Force-based Visualization of Peer-to-peer Nodes | Peer-to-Peer Networks | S | Marcel Baur | WS 07 | SA-2007-01 | |||
Erweiterung von PolyPhone um eine Infrastruktur für SIP Instant Messaging-Dienste | PolyPhone | S | Marcel Baur | WS 07 | SA-2007-02 | |||
Darstellung von Abhängigkeitsgraphen | Sprachverarbeitung | S | Tobias Kaufmann | WS 07 | SA-2007-11 | |||
Sprachsynthese mit spezieller Prosodie | Sprachverarbeitung | S | Beat Pfister | WS 07 | SA-2007-08 | |||
Robustness and Uncertainty in Multiobjective Search | Systemoptimierung | S | Eckart Zitzler, Tim Hohm |
WS 07 | SA-2007-10 | |||
Distributed Terminal Location Discovery in a TOWN Network | Voice over IP | N | Rainer Baumann | WS 07 | NA-2007-01 | |||
Kangoo Eco-System [confidential] | S | Stefan Schmid | HS 06 | Stefan Sieber | SA-2006-43 | |||
Competitive Routing in Dynamic Graphs [confidential] | S | Regina ODell -Bischoff | FS 06 | SA-2006-42 | ||||
Controlling Wireless Sensor Networks | M | Nicolas Burri | FS 06 | MA-2006-20 | ||||
Paging in TinyOS | S | Pascal von Rickenbach | FS 06 | Robin Zueger | SA-2006-44 | |||
Implementing a Display Driver and a Console for TinyOS | S | Yves Weber | SS 06 | SA-2006-29 | ||||
Free Riding in BitTorrent and Countermeasures | M | Stefan Schmid, Thomas Locher |
SS 06 | MA-2006-26 | ||||
Comparing MAC Layers for Sensor Networks [confidential] | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-30 | ||||
Reverse Engineering of eMule [confidential] | S | Stefan Schmid, Thomas Locher |
SS 06 | SA-2006-35 | ||||
Enhanced Task Scheduling in TinyOS 2.0 & Channel Allocation in AMUHR | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-22 | ||||
Havelaar – Implementation Of A Peer-to-Peer Reputation System | S | Stefan Schmid | SS 06 | SA-2006-37 | ||||
Efficient Downloads of Popular Files in the Kangoo Distributed File System [confidential] | S | Stefan Schmid | SS 06 | SA-2006-34 | ||||
Kangoo PlanetLab Deployment [confidential] | S | Stefan Schmid | SS 06 | SA-2006-36 | ||||
PlanetLab Tests | S | Stefan Schmid, Thomas Locher |
SS 06 | SA-2006-32 | ||||
Organizing Email | M | Keno Albrecht | SS 06 | MA-2006-22 | ||||
Traffic Monitoring in Sensor Networks | S | Pascal von Rickenbach, Nicolas Burri |
SS 06 | SA-2006-24 | ||||
Updating Wireless Sensor Networks | M | Pascal von Rickenbach | SS 06 | MA-2006-19 | ||||
3D Visualisierung von Field Based Routing (FBR) | Ad-hoc-Netze | S | Rainer Baumann | SS 06 | SA-2006-14 | |||
Channel Allocation for IEEE 802.16 Mesh Networks | Ad-hoc-Netze | M | Rainer Baumann | SS 06 | MA-2006-24 | |||
Big MAC: Rendezvous-based Communication in Wireless Sensor Networks [confidential] | Ad-hoc-Netze | M | Nicolas Burri | SS 06 | MA-2006-21 | |||
DSNAnalyzer: Backend for the Deployment Support Network | Ad-hoc-Netze | M | Martin May | SS 06 | MA-2006-18 | |||
Evaluation of scheduling methods over multipath routing in wireless mobile Ad Hoc networks | Ad-hoc-Netze | S | Georgios Parissidis | SS 06 |
, |
SA-2006-26 | ||
Wireless Fire Sensor Network Demonstrator | Ad-hoc-Netze | M | Andreas F. Meier | SS 06 | MA-2006-14 | |||
Scalable Real-time Multiplayer Game Network Support for Orxonox | Ad-hoc-Netze | S | Károly Farkas | SS 06 |
, |
SA-2006-31 | ||
Trace Control for Netem | Ad-hoc-Netze | S | Rainer Baumann | SS 06 | SA-2006-15 | |||
Online Sensor Network Analysis Tools | Ad-hoc-Netze | M | Jan Beutel | SS 06 | MA-2006-17 | |||
Routing Algorithms for Safety Critical Wireless Sensor Networks | Ad-hoc-Netze | M | Martin May | SS 06 | MA-2006-25 | |||
ManS A Simulation Framework for Mobile Ad-Hoc Networks | Ad-hoc-Netze | D | Roland Flury | SS 06 | DA-2006-05 | |||
The Impact of the Choice of Metrics for Routing - wicht a focus on Wireless Mesh Networking (WMN) | Ad-hoc-Netze | M | Rainer Baumann, Simon Heimlicher |
SS 06 | MA-2006-13 | |||
BTnode Peripherals | Eingebettete Systeme | S | Matthias Dyer | SS 06 | SA-2006-12 | |||
Window Based FIFIOs for Communication in On-Chip Multiprocessor Systems | Eingebettete Systeme | M | Kai Huang | SS 06 | MA-2006-15 | |||
Design and Implementation of an Emulator for the Intel IXP 2400 Network Processor | Eingebettete Systeme | S | Lukas Ruf | SS 06 | SA-2006-17 | |||
A Tool-Independent System Description for Real-Time Embedded Systems | Eingebettete Systeme | S | Ernesto Wandeler | SS 06 | SA-2006-13 | |||
LEGO Mindstorms NXT -Next Generation- | Eingebettete Systeme | S | Christian Plessl | SS 06 |
, |
SA-2006-18 | ||
Simulative Leistungsbewertung und Entwicklung rekonfigurationsfester Routingverfahren für mehrstufige Verbindungsnetzwerke | Eingebettete Systeme | M | Lukas Ruf | SS 06 | Christian Zimmermann | MA-2006-16 | ||
XPath-Unterstützung in einer Linux Shell | ETH World Program | S | Erik Wilde | SS 06 | SA-2006-11 | |||
Automated Monitoring of Internet Service Provider (ISP) Topologies | External Projects | M | Daniela Brauckhoff | SS 06 | MA-2006-11 | |||
An Implementation of a Byte Frequency Signature Generator Using a Gibbs Sampler | Network Security | S | Bernhard Tellenbach | SS 06 | SA-2006-21 | |||
Entropy Plug-in and Visualisation Tool | Network Security | S | Arno Wagner | SS 06 | SA-2006-25 | |||
Design and Implementation of a Protocol-Aware Connection Tracker Framework | Network Security | S | Bernhard Tellenbach | SS 06 |
, |
SA-2006-20 | ||
Access Control in a Peer-to-Peer Storage Systems | Peer-to-Peer Networks | M | Marcel Baur | SS 06 | MA-2006-10 | |||
Byzantine Caching Game | Peer-to-Peer Networks | S | Stefan Schmid, Thomas Moscibroda |
SS 06 | SA-2006-33 | |||
Firewall and NAT Traversal for Peer-to-Peer Storage Nodes | Peer-to-Peer Networks | S | Marcel Baur | SS 06 | SA-2006-23 | |||
Implementation of the Kademlia Distributed Hash Table | Peer-to-Peer Networks | S | Marcel Baur | SS 06 | SA-2006-19 | |||
Peer-to-Peer Live Streaming | Peer-to-Peer Networks | M | Thomas Locher, Stefan Schmid |
SS 06 | MA-2006-23 | |||
Proxies in PromethOS | Service Provisioning | S | Lukas Ruf | SS 06 | SA-2006-16 | |||
Wort- und Satzakzentuierung gemischtsprachiger Texte für die Sprachsynthese | Sprachverarbeitung | D | Harald Romsdorfer | SS 06 | Manuel Weiss | DA-2006-08 | ||
Stimmmerkmale für die Sprecherverifikation | Sprachverarbeitung | S | Michael Gerber | SS 06 | SA-2006-27 | |||
Zelluläre Automaten für die Modellierung und Simulation von Stammzellen | Systemoptimierung | S | Simon Barkow | SS 06 |
, |
SA-2006-28 | ||
A Simple Overlay Platform for Distributed Monitoring | D | Bernhard Plattner | WS 06 | DA-2006-06 | ||||
Worm Outbreak Detection in the Internet Backbone | D | Arno Wagner | WS 06 | DA-2006-03 | ||||
Implementierung eines H.264 Decoders auf einer dedizierten Hardware mit mehreren parallelen Recheneinheiten | M | Lothar Thiele | WS 06 | MA-2006-04 | ||||
Kangoo - A Distributed Storage System for the Internet [confidential] | M | Stefan Schmid | WS 06 | MA-2006-29 | ||||
Multihop Routing for Wireless Sensor Networks | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-01 | ||||
NesC Plug-In für Eclipse | M | Nicolas Burri | WS 06 | MA-2006-01 | ||||
Paketverlustanalyse in einem adaptiven Sensornetzwerk | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-06 | ||||
Proaktive Verhinderung von Attacken auf Applikationen | M | Bernhard Plattner | WS 06 |
, |
MA-2006-12 | |||
Real-time Monitoring and Control for large Server Clusters | D | Bernhard Plattner | WS 06 | DA-2006-07 | ||||
Swistry: P2P Live Streaming | M | Stefan Schmid, Thomas Locher |
WS 06 | MA-2006-27 | ||||
Kontrolle und Visualisierung eines Sensornetzwerks | S | Nicolas Burri, Pascal von Rickenbach |
WS 06 | SA-2006-07 | ||||
Ad Hoc Communication with Handhelds | Ad-hoc-Netze | S | Vincent Lenders | WS 06 |
, |
SA-2006-02 | ||
BlueLocation II - A Localization Infrastructure for Blutooth Enabled Mobile Devices | Ad-hoc-Netze | S | Vincent Lenders | WS 06 |
, |
SA-2006-03 | ||
Interference in Multi-Hop Radio Networks | Ad-hoc-Netze | M | Thomas Moscibroda | WS 06 | MA-2006-09 | |||
Implementation of SAFT [confidential] | Ad-hoc-Netze | S | Simon Heimlicher, Rainer Baumann |
WS 06 |
, |
SA-2006-08 | ||
Mobility Prediction in MANETs | Ad-hoc-Netze | M | Károly Farkas | WS 06 | MA-2006-08 | |||
Multiplayer Gaming in Mobile Adhoc Networks | Ad-hoc-Netze | S | Károly Farkas | WS 06 |
, |
SA-2006-04 | ||
Routing in Ad Hoc Networks with mobile Users | Ad-hoc-Netze | M | Vincent Lenders | WS 06 | MA-2006-02 | |||
Management of Distributed Services in MANETs | Ad-hoc-Netze | M | Károly Farkas | WS 06 | Eduardo Silva | MA-2006-07 | ||
Role and Link-State Selection for Bluetooth Scatternets | Ad-hoc-Netze | M | Matthias Dyer | WS 06 | MA-2006-06 | |||
Evaluation and Comparison of Performance Analysis Methods for Distributed Embedded Systems | Eingebettete Systeme | M | Ernesto Wandeler | WS 06 | MA-2006-05 | |||
Student Webportal for Courses | ETH World Program | S | Rainer Baumann | WS 06 | SA-2006-05 | |||
Web Based Services (WBS) | ETH World Program | S | Keno Albrecht | WS 06 | SA-2006-09 | |||
Passive Measurement of Network Quality (External) | External Projects | M | Arno Wagner | WS 06 | MA-2006-03 | |||
Evaluating Circuit Emulation Adapters | External Projects | S | Rainer Baumann | WS 06 | SA-2006-10 | |||
Metadata and Security in the Kangoo Distributed File System [confidential] | Peer-to-Peer Networks | M | Stefan Schmid | WS 06 | MA-2006-28 | |||
Source Excitation Generation for a HMMBased Synthesizer | Sprachverarbeitung | D | Beat Pfister | WS 06 | DA-2006-02 | |||
Multi-objective Clustering of Gene Expression Data with Evolutionary Algorithms - A Query Gene Approach | Systemoptimierung | D | Stefan Bleuler | WS 06 | DA-2006-01 | |||
SPLIMER - Splitter and Merger for TinyOS | S | Pascal von Rickenbach | HS 05 | Marco De Santis | SA-2005-51 | |||
Embedding of Unit Disk Trees [confidential] | M | Regina ODell -Bischoff | FS 05 | Andreas Ottiger | MA-2005-48 | |||
Mobility Models [confidential] | S | Regina ODell -Bischoff | FS 05 | Florian Milde | SA-2005-49 | |||
Peer-to-Peer Live Streaming [confidential] | S | Stefan Schmid | FS 05 | SA-2005-50 | ||||
Scalable Localized Histogram Aggregation for P2P MMOGs | M | Roger Wattenhofer | SS 05 | MA-2005-47 | ||||
Attacks on Peer-to-Peer Networks | S | Stefan Schmid | SS 05 | Prêtre Baptiste | SA-2005-40 | |||
Distributed Printing Services | M | Nicolas Burri | SS 05 | MA-2005-19 | ||||
Enhancing a VPN-based Network Emulator | S | Nicolas Burri | SS 05 | SA-2005-33 | ||||
eQuus: A Provably Robust and Efficient Peer-to-Peer System | M | Stefan Schmid | SS 05 | MA-2005-39 | ||||
Implementing a circuit emulation adapter | S | Ulrich Fiedler | SS 05 | SA-2005-34 | ||||
Link Layer Measurements in Wireless Sensor Networks | S | Pascal von Rickenbach | SS 05 | SA-2005-28 | ||||
Locality Game: Network Creation in P2P Systems | S | Stefan Schmid, Thomas Moscibroda |
SS 05 | Yvonne Anne Oswald | SA-2005-41 | |||
Semester Project Network Mappings | S | Regina ODell -Bischoff | SS 05 | Yves Jacoby | SA-2005-48 | |||
Network Reprogramming for Mica2 Motes | S | Pascal von Rickenbach | SS 05 | Yelena Baghdasaryan | SA-2005-42 | |||
P2P Mechanism Design | S | Stefan Schmid | SS 05 | Lukas Füllemann | SA-2005-43 | |||
Software framework for simulation of intelligent buildings integrated with GIS data | S | Lennart Meier | SS 05 |
, |
SA-2005-23 | |||
Spamato goes P2P | M | Keno Albrecht, Stefan Schmid |
SS 05 | MA-2005-44 | ||||
Implementing XTC on TinyOS | D | Pascal von Rickenbach, Nicolas Burri |
SS 05 | DA-2005-08 | ||||
Analysis of Dynamics in Mobile Ad-Hoc Networks | Ad-hoc-Netze | S | Vincent Lenders | SS 05 | , |
SA-2005-18 | ||
BlueLocation | Ad-hoc-Netze | S | Vincent Lenders | SS 05 | SA-2005-17 | |||
BlueFramework - Application Framework for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | M | Matthias Bossardt | SS 05 | MA-2005-16 | |||
5.9GHz Dedicated Short Range Communication - Design of a Vehicular Safety Communication Architecture | Ad-hoc-Netze | M | Lothar Thiele | SS 05 | MA-2005-12 | |||
Routing Protocol for a Wireless Fire Detection Network | Ad-hoc-Netze | S | Martin May | SS 05 | SA-2005-35 | |||
Large-scale Bluetooth Sensor-Network Demonstrator | Ad-hoc-Netze | M | Jan Beutel | SS 05 |
, |
MA-2005-13 | ||
Online Sensor-Network Monitoring | Ad-hoc-Netze | S | Jan Beutel | SS 05 | Christian Zimmermann | SA-2005-26 | ||
Quality of Service for Multiplayer Game Provisioning in Mobile Ad Hoc Networks | Ad-hoc-Netze | M | Károly Farkas | SS 05 | MA-2005-18 | |||
Setting up an Ad Hoc Testbed Network | Ad-hoc-Netze | S | Károly Farkas | SS 05 | SA-2005-32 | |||
Real-time Audio Data Transmission over MANETs^1 | Ad-hoc-Netze | S | Rainer Baumann | SS 05 | SA-2005-36 | |||
A Variability Characterization Curve Editor | Eingebettete Systeme | S | Ernesto Wandeler | SS 05 | SA-2005-27 | |||
Integration von PolyPhone in myETH | ETH World Program | S | Bernhard Plattner | SS 05 | SA-2005-37 | |||
ShaRefWeb A Web Interface for the ShaRef Service | ETH World Program | M | Erik Wilde | SS 05 | MA-2005-15 | |||
WebCam-Plattform für die ETH Zürich | ETH World Program | S | Bernhard Plattner | SS 05 |
, |
SA-2005-29 | ||
Analysis and Detection of DDoS Attacks in the Internet Backbone using Netflow Logs | Network Security | D | Thomas Dübendorfer | SS 05 | DA-2005-06 | |||
Automated Attack Signature Generation: A Survey | Network Security | S | Daniela Brauckhoff | SS 05 | SA-2005-38 | |||
Implementation of a Distributed Traffic Control Service using FPGAs | Network Security | D | Matthias Bossardt | SS 05 | DA-2005-07 | |||
Kostenanalyse von präventiven IT-Sicherheitsmassnahmen | Network Security | S | Thomas Dübendorfer | SS 05 | SA-2005-25 | |||
Web Attack Showcases for the Security Demo Lab | Network Security | S | Stefan Frei | SS 05 | SA-2005-24 | |||
Service Management Procedures Supporting Distributed Services in Mobile Ad Hoc Networks | Service Provisioning | M | Károly Farkas | SS 05 | MA-2005-14 | |||
Liaison-Phänomene in Französisch-Deutsch gemischtsprachigen Sätzen | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-20 | |||
Morphosyntaktische Analyse von italienisch-deutsch gemischtsprachigen Sätzen für SVOX | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-19 | |||
Diphone Corpus Recording and Monitoring Tool | Sprachverarbeitung | S | Harald Romsdorfer | SS 05 | SA-2005-21 | |||
Valenz und Semantik | Sprachverarbeitung | S | Tobias Kaufmann | SS 05 |
, |
SA-2005-22 | ||
Schlanke Programme mit genetischer Programmierung | Systemoptimierung | S | Stefan Bleuler | SS 05 | SA-2005-30 | |||
Tool zum Vergleich von Stochastischen Mehrzieloptimierungsverfahren | Systemoptimierung | S | Stefan Bleuler | SS 05 | SA-2005-31 | |||
A Churn-Resistant P2P-System Based on the Pancake Graph | D | Anja Wille | WS 05 | DA-2005-29 | ||||
Spamato Statistics - A Statistical Approach towards Spam Filtering | D | Keno Albrecht | WS 05 | DA-2005-04 | ||||
Application of Sectorized Antennas in RF-Based Indoor Localization Systems | M | Roger Wattenhofer | WS 05 | MA-2005-09 | ||||
Does Circuit Emulation in Metropolitan Gigabit Ethernets require Service Priority? | N | Ulrich Fiedler | WS 05 | NA-2005-02 | ||||
Energy Efficient Deployment of Wireless Sensor Networks | S | Pascal von Rickenbach | WS 05 | SA-2005-12 | ||||
Gclipse A Collaborative Editor Plug-In for Eclipse | M | Keno Albrecht | WS 05 | MA-2005-45 | ||||
GPS on iPAQ | S | Aaron Zollinger | WS 05 | SA-2005-45 | ||||
Spamato Plug-in Architecture | S | Keno Albrecht | WS 05 | SA-2005-14 | ||||
Internet Coordinates | D | Regina ODell -Bischoff | WS 05 | DA-2005-02 | ||||
JaCal – ein verteilter Kalender | S | Keno Albrecht | WS 05 | SA-2005-46 | ||||
Optimization of Compact Set Membership Representation for Distributed Computing | M | Roger Wattenhofer | WS 05 | MA-2005-46 | ||||
Kangoo A Simple, Robust, and Efficient DHT for Large Amounts of Data [confidential] | S | Stefan Schmid | WS 05 |
, |
SA-2005-16 | |||
TripletMail: Replicated E-Mail Storage | S | Keno Albrecht | WS 05 | SA-2005-15 | ||||
Spamato Plug-in Architecture | S | Keno Albrecht | WS 05 | SA-2005-47 | ||||
Spamato Statistics | D | Keno Albrecht | WS 05 | DA-2005-30 | ||||
Thunderbird Extension for Spamato | S | Keno Albrecht | WS 05 | SA-2005-09 | ||||
Topology Information Gathering with Scatterweb Sensor Boards | S | Aaron Zollinger | WS 05 | Frank Lyner | SA-2005-44 | |||
Trace-Based Network Emulation | M | Ulrich Fiedler | WS 05 | MA-2005-06 | ||||
Vom Fahrgastinformations- zum Infotainmentsystem | M | Ulrich Fiedler | WS 05 | MA-2005-20 | ||||
Adaptive XTC on BTnodes | Ad-hoc-Netze | M | Matthias Dyer | WS 05 | MA-2005-05 | |||
Algorithms for Radio Networks | Ad-hoc-Netze | D | Thomas Moscibroda | WS 05 | DA-2005-01 | |||
Angewandte Uhrensynchronisation auf BTnodes | Ad-hoc-Netze | S | Lennart Meier | WS 05 |
, |
SA-2005-02 | ||
BlueDating - Dating Application for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | S | Vincent Lenders | WS 05 |
, |
SA-2005-08 | ||
Bluetella - File Sharing for Bluetooth Enabled Mobile Phones | Ad-hoc-Netze | S | Matthias Bossardt | WS 05 |
, |
SA-2005-03 | ||
SAFT Store And Forward Transport - Reliable Transport in Wireless Mobile Ad-hoc Networks | Ad-hoc-Netze | M | Martin May | WS 05 | MA-2005-08 | |||
Efficient Constant K-Dominating set Aproximation | Ad-hoc-Netze | S | Thomas Moscibroda | WS 05 | SA-2005-10 | |||
Service Discovery and Routing in Mobile Ad-Hoc Networks | Ad-hoc-Netze | M | Martin May | WS 05 | MA-2005-03 | |||
Energy Conserving Camera Scheduling Policies for Sensor Networks | Ad-hoc-Netze | M | Matthias Bossardt | WS 05 | MA-2005-11 | |||
Porting TinyOS on to BTnodes | Eingebettete Systeme | S | Jan Beutel | WS 05 | SA-2005-07 | |||
Management of Distributed Traffic Control Service | Network Security | M | Matthias Bossardt | WS 05 | MA-2005-02 | |||
Near Real-Time Detection of Traffic Usage Rhythm Anomalies in the Backbone | Network Security | D | Thomas Dübendorfer | WS 05 | DA-2005-03 | |||
Scan Detection Based Identification of Worm-Infected Hosts | Network Security | M | Arno Wagner | WS 05 |
, |
MA-2005-01 | ||
Dynamic Peer-to-Peer Networks | Peer-to-Peer Networks | D | Fabian Kuhn, Stefan Schmid |
WS 05 | DA-2005-05 | |||
Gclipse - A Collaborative Editor Plug-In for Eclipse | Peer-to-Peer Networks | M | Keno Albrecht | WS 05 | MA-2005-07 | |||
P2P Filesharing Traffic Identification Method Validation and Verification | Peer-to-Peer Networks | S | Arno Wagner | WS 05 | SA-2005-11 | |||
Sprache mit Tierstimmencharakteristik | Sprachverarbeitung | S | Harald Romsdorfer | WS 05 |
, |
SA-2005-04 | ||
Datenpool für die Verwaltung von Genom Daten | Systemoptimierung | S | Amela Prelic | WS 05 | SA-2005-06 | |||
An evaluation of the feasibility of gene network reconstruction using current methods | Systemoptimierung | M | Amela Prelic | WS 05 | MA-2005-04 | |||
Radio Communication with ScatterWeb Sensor Boards | S | Aaron Zollinger | FS 04 | Frank Lyner | SA-2004-49 | |||
Reliable, Extensible, and Distributed Platform for Internet applications (german report, bait) | G | Keno Albrecht, Aaron Zollinger |
FS 04 | Markus Egli, , , Fabio Lanfranchi |
GA-2004-01 | |||
A Framework for Programming Packet Processors | D | Lukas Ruf | SS 04 | DA-2004-01 | ||||
Communication and Management Infrastructure for Services on Active Router | S | Matthias Bossardt | SS 04 |
, |
SA-2004-27 | |||
Mapping Services Onto Hierarchy-extended Active Network Nodes | D | Lukas Ruf | SS 04 | DA-2004-13 | ||||
Dynamic & Fault-Tolerant P2P Topologies | D | Fabian Kuhn | SS 04 | DA-2004-21 | ||||
Dynamic Graph Labelings | S | Regina ODell -Bischoff | SS 04 | Andreas Kinell | SA-2004-47 | |||
Internet Coordinates | D | Regina ODell -Bischoff | SS 04 | DA-2004-47 | ||||
Spamato Reloaded | M | Keno Albrecht | SS 04 | MA-2004-06 | ||||
Parallel Image Registration in Distributed Memory Environments | M | Placi Flury | SS 04 | MA-2004-05 | ||||
Positioning with WLAN | S | Aaron Zollinger | SS 04 | SA-2004-48 | ||||
Spamato Revolutions | D | Nicolas Burri, Keno Albrecht |
SS 04 | DA-2004-20 | ||||
Routing and Applications in Mobile Ad hoc Networks | M | Regina ODell -Bischoff | SS 04 | MA-2004-07 | ||||
Scheduling Aircrafts | S | Alexander Hall | SS 04 | SA-2004-22 | ||||
Aircraft Scheduling | M | Alexander Hall | SS 04 |
, |
MA-2004-10 | |||
Sensor Networks: Interference Reduction and Possible Applications | D | Aaron Zollinger | SS 04 | DA-2004-19 | ||||
Spamato Reloaded | M | Keno Albrecht | SS 04 | MA-2004-40 | ||||
Virtual Cordinates Simulation | D | Regina ODell -Bischoff | SS 04 | DA-2004-23 | ||||
Virtual Coordinates Simulation | S | Nicolas Burri | SS 04 | SA-2004-43 | ||||
VPN Network Testbed | S | Nicolas Burri | SS 04 | SA-2004-36 | ||||
VSETH Informations-System | S | Benjamin Stäger | SS 04 | SA-2004-34 | ||||
Components and Services | Eingebettete Systeme | M | Herbert Walder | SS 04 | MA-2004-02 | |||
Tool für die Bewertung von Eingebetteten Systemen Design und Integration einer Analysemethode in Sym TA/S | Eingebettete Systeme | S | Simon Künzli | SS 04 |
, |
SA-2004-21 | ||
Analysis of Sobig.F and Blaster Worm Characteristics | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-23 | |||
Detecting Bots in Internet Relay Chat Systems | Network Security | S | Thomas Dübendorfer | SS 04 |
, |
SA-2004-29 | ||
Kostenmodell zu präventiven IT-Sicherheitsmassnahmen | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-28 | |||
Secure Java Code Interpreter for Public Utility Computing | Network Security | N | Thomas Dübendorfer | SS 04 | NA-2004-01 | |||
Visualisation of Client/Server Behaviour | Network Security | S | Thomas Dübendorfer | SS 04 | SA-2004-24 | |||
Distributed Accounting for P2P Content Services | Peer-to-Peer Networks | D | David Hausheer | SS 04 | DA-2004-15 | |||
P2P Population Tracking and Traffic Characterization of Current P2P File-sharing Systems | Peer-to-Peer Networks | M | Arno Wagner | SS 04 | MA-2004-04 | |||
Implementation eines Auktions-basierten Pricing Mechanismus für Peer-to-Peer Systeme | Peer-to-Peer Networks | S | David Hausheer | SS 04 | SA-2004-26 | |||
Embedded Task Machine with BTnode and FPGA | Reconfigurable Computing | S | Matthias Dyer | SS 04 |
, |
SA-2004-30 | ||
Network Attached Storage | Reconfigurable Computing | S | Matthias Dyer | SS 04 |
, |
SA-2004-31 | ||
Service Provisioning in Mobile Ad Hoc Networks | Service Provisioning | M | Károly Farkas | SS 04 | MA-2004-09 | |||
Optimierung einer Merkmalsextraktionsmethode | Sprachverarbeitung | S | Ulrike Glavitsch | SS 04 |
, |
SA-2004-32 | ||
Sprachsteuerung eines Audiogerätes | Sprachverarbeitung | S | Harald Romsdorfer | SS 04 |
, |
SA-2004-25 | ||
Biclustering von Genexpressionsdaten mit Ameisen Algorithmen | Systemoptimierung | S | Stefan Bleuler | SS 04 | SA-2004-33 | |||
A Lightweight Packet Capturer for High-Speed Links | S | Thomas Dübendorfer | WS 04 | SA-2004-08 | ||||
Patterns for Service Deployment in Programmable Networks | D | Matthias Bossardt | WS 04 | Daniela Brauckhoff | DA-2004-03 | |||
Analysis of Internet Relay Chat Usage by DDoS Zombies | M | Thomas Dübendorfer | WS 04 | MA-2004-01 | ||||
Multi-objective Routing mit Ameisenalgorithmen | S | Placi Flury | WS 04 | SA-2004-02 | ||||
Audio Playback Tasks for RHWOS | S | Herbert Walder | WS 04 |
, |
SA-2004-12 | |||
Mindstorms Admin Framework | S | Philipp Blum | WS 04 | SA-2004-05 | ||||
Computing the modular decomposition of a graph | S | Thomas Erlebach | WS 04 | SA-2004-03 | ||||
Design and Implementation of an Emulator for the IBM PowerNP 4GS3 | D | Lukas Ruf | WS 04 | DA-2004-08 | ||||
Development and Testing Layer for Ad-Hoc Network Software in Java | S | Aaron Zollinger | WS 04 | SA-2004-44 | ||||
Embedded Machine | S | Matthias Dyer | WS 04 |
, |
SA-2004-01 | |||
Embedded Machine on FPGA | M | Matthias Dyer | WS 04 | MA-2004-03 | ||||
Energiesparende BTnodes | D | Lennart Meier | WS 04 | DA-2004-10 | ||||
Evolutionaere Optimierung von Synchronisationsalgorithmen | S | Philipp Blum | WS 04 |
, |
SA-2004-04 | |||
Firmware for Reconfigurable Hardware OS Platform | S | Herbert Walder | WS 04 | SA-2004-09 | ||||
Gene Expression Profiling and Pathway Scoring | D | Eckart Zitzler | WS 04 | DA-2004-09 | ||||
Gossiping | D | Ruedi Arnold | WS 04 | Dirk Maier | DA-2004-44 | |||
Reconfigurable Hardware OS Prototype - Part FPGA | D | Herbert Walder | WS 04 | DA-2004-05 | ||||
High-Performance Computing mit TIKDIMM | D | Christian Plessl | WS 04 | DA-2004-06 | ||||
Implementierung eines verteilten Dateisystems für “CLIPPEE” | D | Keno Albrecht, Ruedi Arnold |
WS 04 | Kliment Stojanov | DA-2004-45 | |||
Interference and Topology Control in Ad-Hoc Networks | M | Aaron Zollinger | WS 04 | Pascal von Rickenbach | MA-2004-42 | |||
Internet Topology Comparing different approaches of inferring AS relationships | M | Regina ODell -Bischoff | WS 04 | Beatrice Huber | MA-2004-43 | |||
Kosten- Nutzenanalyse des Neptun Projekts | S | Bernhard Plattner | WS 04 | SA-2004-20 | ||||
TinyOS meets BTnode | S | Jan Beutel | WS 04 |
, |
SA-2004-16 | |||
MultiSweeper Ein fesselndes Multiplayer-Spiel auf P2P-Basis | S | Keno Albrecht | WS 04 | Bernhard Stähli | SA-2004-45 | |||
Optimizing the Ranking in Google | S | Keno Albrecht | WS 04 | SA-2004-46 | ||||
P2P Filesharing Systems: Real World NetFlow Traffic Characterization | B | Arno Wagner | WS 04 | BA-2004-01 | ||||
Parallel distributed filesystem with metadata database | D | Bernhard Plattner | WS 04 |
, |
DA-2004-11 | |||
Phonem-Graphem Konversion für deutsche Wörter | S | René Beutler | WS 04 | SA-2004-15 | ||||
Plug-ins for DDoS Attack Detection in Realtime | S | Thomas Dübendorfer | WS 04 | SA-2004-19 | ||||
Signal Processing Tasks for RHWOS | S | Herbert Walder | WS 04 |
, |
SA-2004-11 | |||
Reconfigurable Hardware OS Prototype - Part CPU | D | Herbert Walder | WS 04 | DA-2004-04 | ||||
Rekonstruktion von Graphen | D | Thomas Erlebach | WS 04 | DA-2004-02 | ||||
Resource Controlled Interprocessor Communication On NP-based Active Network Nodes | D | Lukas Ruf | WS 04 | DA-2004-17 | ||||
Secure Multicast for Virtual Private Converencing | M | Reto Strobel | WS 04 | MA-2004-41 | ||||
Active Network Service mit Netlink | S | Matthias Bossardt | WS 04 | SA-2004-17 | ||||
Spamato | D | Keno Albrecht | WS 04 | Nicolas Burri | DA-2004-43 | |||
Survey of Mobile Ad-hoc Routing Algorithms | D | Regina ODell -Bischoff | WS 04 | Marc Schiely | DA-2004-46 | |||
System Self-Test for RHWOS Platform | S | Herbert Walder | WS 04 | SA-2004-10 | ||||
A Framework for the Analysis of Gene Expression Data | S | Amela Prelic | WS 04 | SA-2004-18 | ||||
Towards Resilience Against Node Failures in Overlay Multicast Schemes | S | Kostas Katrinis | WS 04 | SA-2004-14 | ||||
Uhrensynchronisation in einem Ad-Hoc-Netz von BTnodes | S | Lennart Meier | WS 04 | SA-2004-06 | ||||
Video Playback Tasks for RHWOS | D | Herbert Walder | WS 04 | DA-2004-07 | ||||
Ähnlichkeitsmass für gesprochene Einzelwörter | S | René Beutler | WS 04 | SA-2004-13 | ||||
Integrity Protection for Secure Networked Storage | Network Security | D | Marcel Waldvogel | WS 04 | DA-2004-16 | |||
Wireless LAN IPAQ (report, bait) | S | Aaron Zollinger | FS 03 | Nicolas Burri | SA-2003-49 | |||
A Distributed Monitoring System for large, heterogeneous WLANs | D | Vincent Lenders | SS 03 | DA-2003-30 | ||||
Analysis of Interference in Ad-Hoc Networks | D | Aaron Zollinger | SS 03 | Martin Burkhart | DA-2003-37 | |||
Ant Based Routing System | S | Placi Flury | SS 03 |
, |
SA-2003-21 | |||
Aufbau und Betrieb eines Konferenzplanungssystems für die WWW2003 | S | Erik Wilde | SS 03 |
, |
SA-2003-33 | |||
Clippee’s Monitoring & Testing Tool | S | Keno Albrecht | SS 03 | Guido Hager | SA-2003-41 | |||
Configuration of SIP-based Conference Servers | S | Kostas Katrinis | SS 03 | SA-2003-32 | ||||
DDoS Attack Detection Based on Netflow Logs | S | Thomas Dübendorfer | SS 03 | SA-2003-35 | ||||
Distributed Content-based Accounting and Charging in P2P | D | David Hausheer | SS 03 | DA-2003-33 | ||||
Evolving the Ultimate Processor | D | Stefan Bleuler | SS 03 | DA-2003-31 | ||||
Grundlagen für das Mapping des Internet-Graphen | S | Thomas Erlebach | SS 03 | SA-2003-30 | ||||
HW-Tasks for Reconfigurable OS | S | Herbert Walder | SS 03 |
, |
SA-2003-23 | |||
Bluetella: A Java Application for New Mobile Phones | S | Matthias Bossardt | SS 03 | SA-2003-19 | ||||
Java on the iPAQ | S | Aaron Zollinger | SS 03 | Nicolas Burri | SA-2003-38 | |||
Join in Peer-to-Peer Systems: The Steady State Statistics Service Approach | D | Ruedi Arnold | SS 03 | Michael Gähwiler | DA-2003-39 | |||
Lookup in Peer-to-Peer Networks | S | Jan Mischke | SS 03 | SA-2003-29 | ||||
Mapping the Gnutella Network | S | Keno Albrecht | SS 03 | Charly Wilhelm | SA-2003-46 | |||
Messungen in Ad-Hoc-Netzwerken | S | Aaron Zollinger | SS 03 | André Bayer | SA-2003-36 | |||
Minimum Stretch Spanning Trees | D | Fabian Kuhn | SS 03 | Philipp Boksberger | DA-2003-40 | |||
Optimierungsmethoden für einen personalisierten Informationsservice | D | Thomas Erlebach | SS 03 | DA-2003-29 | ||||
Optimierung der Kommunikation in einer Peer-to-Peer Echtzeitanwendung | S | Keno Albrecht | SS 03 | Micha Trautweiler | SA-2003-47 | |||
Positioning Algorithms | S | Ruedi Arnold, Regina ODell -Bischoff |
SS 03 | Christina Pöpper | SA-2003-42 | |||
Prototype Board for Reconfigurable OS | S | Herbert Walder | SS 03 | SA-2003-22 | ||||
Design and implementation of a modular emulator for Topsy | D | Lukas Ruf | SS 03 | DA-2003-25 | ||||
Realisierung eines professionellen Audio-Netzwerkes mit IEEE1394 | S | Philipp Blum | SS 03 | SA-2003-31 | ||||
Realtime UDP NetFlow Processing Framework | D | Thomas Dübendorfer | SS 03 | DA-2003-26 | ||||
Reputation and Trust Management in Ad Hoc Networks with Misbehaving Nodes | D | Vincent Lenders | SS 03 | DA-2003-27 | ||||
Running Time Analysis of Evolutionary Algorithms | D | Marco Laumanns | SS 03 | DA-2003-28 | ||||
Satzübergreifende Einflüsse auf die Prosodie | D | Harald Romsdorfer | SS 03 | DA-2003-32 | ||||
Search in Peer-to-Peer Networks | S | Jan Mischke | SS 03 | SA-2003-34 | ||||
ShaDoW | D | Ruedi Arnold | SS 03 | Martin Meier | DA-2003-43 | |||
Simulation-Based Analysis of Internet Worm Characteristics | S | Thomas Dübendorfer | SS 03 | SA-2003-26 | ||||
Strukturierung, Navigation und Suche in semantischen Netzen | S | Placi Flury | SS 03 | SA-2003-24 | ||||
Text Independent Speaker Recognition | S | Beat Pfister | SS 03 |
, |
SA-2003-18 | |||
Report On the Approximation of Unit Disk Graph | S | Fabian Kuhn | SS 03 | Thomas Rusterholz | SA-2003-45 | |||
Wearable Presenter | S | Matthias Dyer | SS 03 |
, |
SA-2003-25 | |||
Wireless Stereo Speakers | S | Philipp Blum | SS 03 |
, |
SA-2003-20 | |||
Wirtschaftliche Auswirkungen von DDoS Attacken auf Backbone-Provider | S | Thomas Dübendorfer | SS 03 |
, |
SA-2003-27 | |||
A Simulation Framework for Multiprocessor SoC | S | Alexandre Maxiaguine | WS 03 | SA-2003-15 | ||||
Ad-Hoc Services | S | Aaron Zollinger | WS 03 | Marc Schiely, |
SA-2003-44 | |||
Adhoc Game | S | Aaron Zollinger | WS 03 | Christian Gegenschatz | SA-2003-43 | |||
Pattern-based service deployment in active networks | S | Matthias Bossardt | WS 03 |
, |
SA-2003-13 | |||
Analyzing MorphMix - a Peer-to-Peer based System for Anonymous Internet Access | S | Marc Rennhard | WS 03 | SA-2003-12 | ||||
Database-driven XML-anabled Bibliography Management System | D | Erik Wilde | WS 03 |
, |
DA-2003-05 | |||
Comparison of Centralized (Client/Server) and Decentralized (Peer-to-peer) Networking | S | Jan Mischke | WS 03 | SA-2003-16 | ||||
Design and implementation of a Presentation Tool for an Educational Delivery Platform | S | Georgios Parissidis | WS 03 | SA-2003-08 | ||||
Desktop Firewalls and Intrunsion Detection | D | Marc Rennhard | WS 03 | DA-2003-22 | ||||
Evaluation von Arbitrierungsschemen in Netzwerkprozessoren | D | Simon Künzli | WS 03 |
, |
DA-2003-17 | |||
Einsatz und Programmierung des IBM NP4GS3 Netzwerkprozessors fuer AktiveNetzwerkknoten unter Linux | D | Lukas Ruf | WS 03 | DA-2003-12 | ||||
Inter-Task-Communication in Reconfigurable Operating Systems | D | Herbert Walder | WS 03 |
, |
DA-2003-15 | |||
Improved GOAFR Algorithm for Geometric Ad-Hoc Routing | S | Fabian Kuhn | WS 03 | Yan Zhang | SA-2003-48 | |||
Integration of a Proof of Delivery in a WAP Content Billing Architecture for Third Party Services | D | Burkhard Stiller | WS 03 | DA-2003-18 | ||||
Java basierter Lexicon Editor | S | Harald Romsdorfer | WS 03 |
, |
SA-2003-07 | |||
Key Exchange (KX) - A Next Generation Protocol to Synchronise PGP Keyservers | S | Keno Albrecht | WS 03 | SA-2003-04 | ||||
Lautmodellierung mit neuronalen Netzen | S | René Beutler | WS 03 |
, |
SA-2003-05 | |||
PromethOS v2.0 - Memory Resource Control in the Linux 2.4 Kernel | D | Lukas Ruf | WS 03 | DA-2003-24 | ||||
BTNode FPGA Mobiler FPGA mit Bluetooth Kommunikation | D | Matthias Dyer | WS 03 | DA-2003-08 | ||||
MPEG-4 FGS Codec | D | Kostas Katrinis | WS 03 | DA-2003-20 | ||||
Network Troubleshooting Expert System | D | Marc Rennhard | WS 03 | DA-2003-21 | ||||
Non-Repudiation of Service Consumption in MobyDick Networks | D | Hasan Hasan | WS 03 | DA-2003-01 | ||||
Online-Matching | D | Ruedi Arnold | WS 03 | Christian Schlup | DA-2003-45 | |||
Paralinguistische Sprachtransformationen | S | Ulrike Glavitsch | WS 03 | SA-2003-06 | ||||
Personenerkennung anhand des Sprachsignals | S | Beat Pfister | WS 03 | SA-2003-03 | ||||
Real-World Interface for Evolutionary Algorithms | S | Marco Laumanns | WS 03 | SA-2003-02 | ||||
Reconfigurable Computing auf einem DIMM Modul | D | Christian Plessl | WS 03 | DA-2003-10 | ||||
Reconfigurable Computing on a DIMM Module | D | Christian Plessl | WS 03 | DA-2003-10 | ||||
Reconfigurable OS Prototype | D | Herbert Walder | WS 03 | DA-2003-11 | ||||
Routing and Wavelength Assignment in All-Optical Ring Networks | S | Stamatis Stefanakos | WS 03 | SA-2003-14 | ||||
Simulation of a Data Centric Routing Protocol for Mobile Ad Hoc Networks | D | Vincent Lenders | WS 03 | DA-2003-07 | ||||
Secure E-MAIL | D | Nathalie Weiler | WS 03 | DA-2003-13 | ||||
Service Composition for Active Networks | D | Matthias Bossardt | WS 03 |
, |
DA-2003-06 | |||
Simulative Performance Optimization for TCP over UMTS | D | Burkhard Stiller | WS 03 | DA-2003-19 | ||||
Topology and Position Estimation in Buetooth Ad-hoc Networks | D | Jan Beutel | WS 03 | DA-2003-09 | ||||
Trace QoS A tool for locating QoS failures on an Internet path | D | Placi Flury | WS 03 | DA-2003-16 | ||||
Virtual Private Network Provisioning in the Hose Model | D | Thomas Erlebach | WS 03 | DA-2003-02 | ||||
Toolkit für Konferenzprogrammverwaltung und -personalisierung | D | Erik Wilde | WS 03 |
, |
DA-2003-03 | |||
A Compact Syntax for XML Schema | D | Erik Wilde | WS 03 | DA-2003-04 | ||||
Chord/CFS | S | Keno Albrecht | SS 02 | David Baer | SA-2002-50 | |||
Efficient Airplane Boarding | S | Aaron Zollinger | SS 02 | Andreas Westhoff | SA-2002-49 | |||
Routing in Ad-Hoc-Netzen | S | Aaron Zollinger | SS 02 | Björn Glaus | SA-2002-48 |