Search
Results
-
-
-
Free Surface Water Flows – Modeling, Simulation and Control
(2017)Upstream and downstream channels are the key subsystems for the design of level/ flow control loops in run-of-river hydropower plants. Their dynamic response is notoriously complex, exhibiting low frequency resonance with weak damping, travelling waves, both sub- and supercritical flow, hydraulic jumps, etc. Part one of this report provides mathematical models derived from the basic physical conservation laws of mass and momentum (Reynolds ...Report -
Auf dem Weg zu einem energie-effizienten und klimafreundlichen Schweizer Mobilitätssystem
(2017)White PaperDieses Dokument fasst die wichtigsten Ergebnisse eines aktuellen Forschungsberichtes zusammen, der sich mit der heutigen Situation und den Zukunftsperspektiven des Schweizer Mobilitätssystems auseinandersetzt. Der Bericht wurde von einer Arbeitsgruppe des Schweizer Kompetenzzentrums für Energieforschung auf dem Gebiet der Mobilität (SCCER Mobility) mit dem Ziel erarbeitet, Entwicklungen für eine zukünftige Mobilität aufzuzeigen, die in ...Report -
-
-
AVETH follow-up survey on salary and duties of ETH doctoral students
(2017)The present survey was conducted as a follow-up of the AVETH survey in 2014. Based on 1′052 completed answers this report summarizes the current employment situation and the corresponding opinion of doctoral students at ETH Zurich about their salary rate and additional duties.Report -
-
Ratio Buckets: A Numeric Method for k-fold Tight Differential Privacy
(2017)Cryptology ePrint ArchivePrivacy guarantees of a privacy-enhancing system have to be robust against thousands of observations for many realistic application scenarios, such as anonymous communication systems, privacy-enhancing database queries, or privacy-enhancing machine-learning methods. The notion of r-fold Approximate Differential Privacy (ADP) offers a framework with clear privacy bounds and with composition theorems that capture how the ADP bounds evolve ...Report -
Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency—Choose Two
(2017)Cryptology ePrint ArchiveThis work investigates the fundamental constraints of anonymous communication (AC) protocols. We analyze the relationship between bandwidth overhead, latency overhead, and sender anonymity or recipient anonymity against the global passive (network-level) adversary. We confirm the trilemma that an AC protocol can only achieve two out of the following three properties: strong anonymity (i.e., anonymity up to a negligible chance), low bandwidth ...Report