Lower-level publication types

Recent Submissions 

  1. National Cybersecurity Strategies in Comparison – Challenges for Switzerland 

    Baezner, Marie; Cordey, Sean (2019)
    CSS Cyber Defense Hotspot Analysis
    In 2018, Switzerland released its second national cybersecurity strategy. To put the Swiss approach into perspective, this CSS study compares the strategies, policies and governmental structures of Germany, Finland, France, Israel, Italy and the Netherland to highlight similarities and differences and to discuss the relevant challenges and further implications for Switzerland. The results show that, despite their national idiosyncrasies ...
    Report
  2. Anthropogenic Heat Sources in Singapore 

    Kayanan, David Roman; Resende Santos, Luis Guilherme; Ivanchev, Jordan; et al. (2019)
    This report describes the sources of anthropogenic heat (AH) in Singapore for the year 2016. The objective of this report is two-fold: first, to deliver a Sankey diagram of the main sources of AH in Singapore; and second, to explain all the definitions, assumptions, methods and outstanding uncertainties. We also provide our definition of AH in the context of Cooling Singapore 1.5. This is important for both Cooling Singapore and its ...
    Report
  3. Bayesian elastic Full-Waveform Inversion using Hamiltonian Monte Carlo 

    Gebraad, Lars; Boehm, Christian; Fichtner, Andreas (2019)
    EarthArXiv
    Working Paper
  4. Im internationalen Vergleich starke Konzentration der F&E-Aktivitäten in der Schweiz 

    Spescha, Andrin; Wörter, Martin (2019)
    KOF Studies
    Trotz der der nach wie vor guten Rahmenbedingungen für Innovationsaktivitäten verringert sich der Anteil innovativer Unternehmen in der Schweiz. Eine ähnliche Entwicklung beobachten wir auch in Deutschland und Schweden. Insgesamt hat sich der Anteil der Unternehmen mit Produktinnovationen in den untersuchten Ländern im Zeitablauf angeglichen. Nur Finnland entzieht sich diesem Trend. Im Gegensatz dazu hat der Anteil von Unternehmen mit ...
    Report
  5. Das afrikanische Rätsel: Wer weiss mehr? 

    Bruderer, Herbert (2019)
    Der 20 000 Jahre alte Ishango-Knochen wurde 1950 in Afrika gefunden. Bis heute rätselt die Fachwelt über die Bedeutung der Einkerbungen. Es gibt mehrere Vermutungen, die aber nicht überzeugend sind. Helfen Sie mit, das Problem zu lösen. Der Kerbknochen gehört zu den ältesten digitalen Speichern. Digital sind auch der Abakus und das seit Menschengedenken bekannte Fingerrechnen und -zählen. Die Digitalisierung begann schon in der Steinzeit ...
    Report
  6. Attenuation Imaging with Pulse-Echo Ultrasound based on an Acoustic Reflector 

    Rau, Richard; Unal, Ozan; Schweizer, Dieter; et al. (2019)
    arXiv
    Working Paper
  7. Deep Variational Networks with Exponential Weighting for Learning Computed Tomography 

    Vishnevskiy, Valery; Rau, Richard; Göksel, Orcun (2019)
    arXiv
    Working Paper
  8. Yemen 

    Palik, Julia (2019)
    Ceasefire Country Reports
    Between 1989 and 2018, there were 60 ceasefires in Yemen. 12 of these were related to the conflict over territory between the Government of Yemen (GoY) and the Democratic Republic of Yemen. 8 were declared unilaterally and 4 bilaterally. 30 ceasefires were related to incompatibility fought over government. Among these, 2 were declared unilaterally, 26 bilaterally, and 2 multilaterally. 18 ceasefires were concluded between non-state actors. ...
    Report
  9. Somalia 

    Catena, Rafaela (2019)
    Ceasefire Country Reports
    In Somalia, there were 133 ceasefires between 1989 and 2017. 32 concerned the government incompatibility. 101 were between non-state actors (NSA). The majority (29 out of 32) of government ceasefires were related to the peace process, while six were (also) humanitarian. 49 of the NSA ceasefires were related to the peace process, six were (also) humanitarian and 53 due to “other” reasons. Ten ceasefires have been declared unilaterally, 11 ...
    Report
  10. Burundi 

    Wiehler, Claudia (2019)
    Ceasefire Country Reports
    Between 1989 and 2017, there were 31 ceasefires in Burundi, all related to conflict fought over the government incompatibility. 27 ceasefires were related to the peace process. 9 ceasefires were declared unilaterally, 18 were bilateral, and 4 multilateral. 20 of the 31 ceasefires involved external mediators, mainly Tanzania and South Africa. The high fragmentation of the non-state armed groups resulted in several phases of ceasefire ...
    Report
  11. Liberia 

    Lieberherr, Boas (2019)
    Ceasefire Country Reports
    Between 1990 and 2003, there were 37 ceasefires in Liberia, all related to the conflict fought over the government incompatibility. 27 ceasefires were related to the peace processes. 16 ceasefires were declared unilaterally, 6 were bilateral, and 13 multilateral. 29 of the 37 ceasefires involved various external mediators.
    Report
  12. Zur klimatischen Grenzlage der Buche anhand ausgewählter Standorte der Schweizer Alpen 

    Janßen, Martha (1981)
    Die Grenze des jeweiligen Buchenvorkommens ist Ausdruck der regionalen standortlichen Eigenheiten. Diese sind in den Untersuchungsräumen in erster Linie klimatisch, zum Teil anthropogen bedingt. Es wurde versucht, den lokal begrenzenden Faktoren auf verschiedenen, sich ergänzenden Wegen näher zu kommen: - Angaben zur Vegetationsgeschichte und zur Nutzung der Wälder sowie Angaben aus der Literatur über Buchenvorkommen in der Schweiz. - ...
    Report
  13. Valuing meteorological services in resource-constrained settings: Application to smallholder farmers in the Peruvian Altiplano 

    Brausmann, Alexandra; Flubacher, Moritz; Lechthaler, Filippo (2019)
    Economics Working Paper Series
    Working Paper
  14. First Order Methods For Distributed Control: Unique Stationarity Beyond Quadratic Invariance 

    Furieri, Luca; Kamgarpour, Maryam (2019)
    We study the distributed Linear Quadratic Gaussian (LQG) control problem in finite-horizon, where the controller depends linearly on the history of the outputs and it is required to possess a given sparsity pattern. It is well-known that a convex formulation of this problem in terms of disturbance-feedback control policies is only possible when a condition known as Quadratic Invariance (QI) holds. In this paper, we first show that given ...
    Working Paper
  15. Brick: Asynchronous State Channels 

    Avarikioti, Georgia; Kokoris Kogias, Eleftherios; Wattenhofer, Roger (2019)
    arXiv
    Working Paper
  16. Short-Time Work and Unemployment in and after the Great Recession 

    Kopp, Daniel; Siegenthaler, Michael (2019)
    KOF Working Papers
    Can governmental policies mitigate the effects of recessions on unemployment? We study whether the Swiss short-time work (STW) program reduced unemployment in the 2009–2015 period using quarterly establishment-level panel data linking several administrative data sources. We compare changes in permanent layoffs into unemployment, hiring from unemployment, establishment survival and size between establishments that applied successfully to ...
    Working Paper
  17. Morocco's Female Islamic State Migrants: A Neglected Aspect of the Foreign Fighter Problem 

    Watanabe, Lisa (2019)
    Socio-Economic Development and Violent Extremism in Morocco: Morocco's Regional Policy, Migration and (De-)Radicalization Radicalization – Perspectives from the Region and Europe
    This article contends that Moroccan women were heavily represented amongst female migrants to the Islamic State. Despite this, the drivers of female migration to the Islamic State as well the specific challenges related to their return remain understudied, with research tending to focus on male Moroccan foreign fighters. In response, the text’s author argues that more gender-conscious research is needed to enhance the understanding of ...
    Report
  18. TEEvil: Identity Lease via Trusted Execution Environments 

    Puddu, Ivan; Lain, Daniele; Schneider, Moritz; et al. (2019)
    arXiv
    We investigate identity lease, a new type of service in which users lease their identities to third parties by providing them with full or restricted access to their online accounts or credentials. We discuss how identity lease could be abused to subvert the digital society, facilitating the spread of fake news and subverting electronic voting by enabling the sale of votes. We show that the emergence of Trusted Execution Environments and ...
    Working Paper
  19. ETH-Bibliothek Jahresbericht 2018 

    ETH-Bibliothek (2019)
    ETH-Bibliothek Jahresbericht
    Report

View more