Search
Results
-
Multilevel Monte-Carlo front-tracking for random scalar conservation laws
(2012)SAM Research ReportWe consider random scalar hyperbolic conservation laws (RSCLs) in spatial dimension $d\ge 1$ with bounded random flux functions which are $\mathbb{P}$-a.s. Lipschitz continuous with respect to the state variable, for which there exists a unique random entropy solution (i.e., a measurable mapping from the probability space into $C(0,T;L^1(\mathbb{R}^d))$ with finite second moments). We present a convergence analysis of a Multi-Level ...Report -
Approximation by harmonic polynomials in star-shaped domains and exponential convergence of Trefftz hp-DGFEM
(2012)SAM Research ReportWe study the approximation of harmonic functions by means of harmonic polynomials in twodimensional, bounded, star-shaped domains. Assuming that the functions possess analytic extensions to a $\delta$-neighbourhood of the domain, we prove exponential convergence of the approximation error with respect to the degree of the approximating harmonic polynomial. All the constants appearing in the bounds are explicit and depend only on the ...Report -
SUPat - Sustainable Urban Patterns. "Nachhaltige Siedlungsmuster": Zweiter Zwischenbericht vom 1. Juni 2012 (Deutsche Übersetzung)
(2012)Nationales Forschungsprogramm NFP 65 "Neue Urbane Qualität"Report -
VisAsim – Visual-Acoustic Simulation for landscape impact assessment of wind farms
(2012)SNF Project, First Progress ReportReport -
A Discipline for Program Verification based on Backpointers and its Use in Observational Disjointness
(2012)Technical Report / ETH Zurich, Department of Computer ScienceReport -
How to talk new computers into working harder
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIn their 2008 Swiss Computer Science Challenge Award competition, the Hasler Foundation asks applicants to identify current grand challenges in computer science. In this current submission, we discuss how novel hybrid, heterogeneous high performance computing architectures as exemplified by IBM’s Roadrunner pose enormous usability and productivity problems to programmers and users. We argue that addressing these difficulties is important ...Report -
Physical-layer identification of wireless sensor nodes
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIdentification of wireless sensor nodes based on the physical characteristics of their radio transmissions can potentially provide additional layer of security in all-wireless multi-hop sensor networks. Reliable identification can be means for detection and/or prevention of wormhole, Sybil and replication attacks, and for complementing cryptographic message authentication protocols. In this paper, we propose an improved method for capturing ...Report -
Checking well-formedness of pure-method specifications
(2012)Technical Report / ETH Zurich, Department of Computer ScienceReport -
iPhone and iPod Location Spoofing
(2012)Technical Report / ETH Zurich, Department of Computer ScienceIn this work, we study the security of public WLAN-based positioning systems. Specifically, we investigate the Skyhook positioning system [41], available on PCs and used on a number of mobile platforms, including Apple’s iPod touch and iPhone [1]. We demonstrate that this system is vulnerable to location spoofing and location database manipulation attacks. We further discuss approaches for securing Skyhook and similar WLAN-based positioning ...Report -
The allure and risks of a deployable software engineering project
(2012)Technical Report / ETH Zurich, Department of Computer ScienceThe student project is a key component of a software engineering course. What exact goals should the project have, and how should the instructors focus it? While in most cases projects are artificially designed for the course, we use a deployable, realistic project. This paper presents the rationale for such an approach and assesses our experience with it, drawing on this experience to present guidelines for choosing the theme and scope ...Report