Lower-level publication types

Recent Submissions 

  1. Monitoring des Testträgers für die Wildtierquerung Koppigen 

    Muster, Marcel; Rimle, Jonathan (2022)
    Conference Paper
  2. Full-waveform inversion of ultrasonic echo signals to evaluate grouting quality of tendon ducts in post-tensioned concrete structures 

    Krischer, Lion; Strobach, Elmar; Boehm, Christian; et al. (2022)
    Other Conference Item
  3. To Share or Not to Share: On Location Privacy in IoT Sensor Data 

    Papst, Franz; Stricker, Naomi; Entezari, Rahim; et al. (2022)
    Data sharing is crucial for building large datasets which in return are essential for developing and training accurate models in many contexts including smart cities, agriculture, and medical applications. However, shared data may leak private information, such as personal identifiers or location. Past research provides evidence that solely removing these identifiers through pseudonymization is not enough to ensure data privacy protection, ...
    Conference Paper
  4. DoCile: Taming Denial-of-Capability Attacks in Inter-Domain Communications 

    Wyss, Marc; Giuliari, Giacomo; Legner, Markus; et al. (2022)
    In recent years, much progress has been made in the field of Internet bandwidth reservation systems. While early designs were neither secure nor scalable, newer proposals promise attack resilience and Internet-wide scalability by using cryptographic access tokens (capabilities) that represent permissions to send at a guaranteed rate. Once a capability-based bandwidth reservation is established, the corresponding traffic is protected from ...
    Conference Paper
  5. Active learning for system reliability analysis using PC-Kriging, subset simulation and sensitivity analysis 

    Parisi, Pietro; Moustapha, Maliki; Marelli, Stefano; et al. (2022)
    Structural reliability analysis aims at assessing the safety of structures which often operate under uncertain conditions. Approximation-, simulation- or surrogate-based methods are used in this context to estimate the failure probability. Surrogate-based methods are the least computationally intensive and consist in building a cheaper proxy of the original limit-state function, which is calibrated using a limited set of samples known as ...
    Conference Paper
  6. Multi-Criteria Decision Making in Digital Participation: A framework to evaluate participation in urban design processes 

    Ataman, Cem; Herthogs, Pieter; Tunçer, Bige; et al. (2022)
    Co-creating the Future: Inclusion in and through Design
    Data-driven urban design processes consist of iterative actions of many stakeholders, which require digital participatory approaches for collecting data from a high number of participants to make informed decisions. It is important to evaluate such processes to justify the necessary costs and efforts while continuously improving digital participation. Nevertheless, such evaluation remains a challenge due to the involvement of different ...
    Conference Paper
  7. Introducing latent variables in polynomial chaos expansions to surrogate stochastic simulators 

    Zhu, Xujia; Broccardo, Marco; Sudret, Bruno (2022)
    Stochastic simulators are computational models that produce different results when evaluated repeatedly with the same input parameters. In this respect, the model response conditional on the input is a random variable, and thus it is necessary to run the model many times to fully characterize the associated response. Due to the large number of necessary model runs, performing uncertainty quantification or optimization of a costly stochastic ...
    Conference Paper
  8. The effective width of cross‐laminated timber rib panels in fire 

    Kleinhenz, Miriam; Frangi, Andrea; Just, Alar (2022)
    The composite structure of cross‐laminated timber rib panels consists of cross‐laminated timber (CLT) plates connected to glued‐laminated timber (glulam) ribs. Full composite action is provided by a rigid connection between the composite components by means of screw‐press gluing. For ribbed cross‐sections, the assumption that the cross‐section remains plane is incorrect. The simple beam theory according to Euler‐Bernoulli is not applicable ...
    Conference Paper
  9. Robust Control Design for Flexible Guidance of the Aerodynamic Descent of Reusable Launchers 

    Iannelli, Andrea; Gkouletsos, Dimitris; Smith, Roy (2023)
    Rocket reusability is a key-factor for a sustainable and cost-effective future of space missions. Despite successes in this technology, some of the open problems remain an impediment to further development. For example, the descent phase presents important challenges from a guidance and control perspective, because, due to model and environment uncertainty, the optimal re-entry trajectory is often unknown a priori. As a result, the ...
    Conference Paper
  10. Unlocking Urban Simulation Data with a Semantic City Planning System 

    Grisiute, Ayda; Silvennoinen, Heidi; Li, Shiying; et al. (2022)
    Co-creating the Future: Inclusion in and through Design
    Simulation models generate an abundance of rich raw data that remains difficult to access for non-experts. However, such data could be unlocked and utilised with a Semantic City Planning System that improves data accessibility and transparency. This paper describes a process of ontologically representing mobility simulation output data using Semantic Web technologies and storing it in a dynamic geospatial knowledge graph. Our work presents ...
    Conference Paper
  11. Two Year Exposure of 3D Printed Cementitious Columns in a High Alpine Environment 

    Wangler, Timothy; Aguilar Sanchez, Asel Maria; Anton, Ana; et al. (2022)
    RILEM Bookseries ~ Third RILEM International Conference on Concrete and Digital Fabrication
    While digital fabrication technologies with concrete have focused primarily on process development and compressive strength in terms of performance, more recently studies evaluating the durability performance of 3D printed cementitious materials have started to appear. To date, however, no field performance assessments have been published regarding 3D printed cementitious materials. In this study, we present the condition of bespoke 3D ...
    Conference Paper
  12. Modeling of In-chip Current-Temperature Distribution of SiC Power MOSFETs during Fast Switching Events 

    Race, Salvatore; Kovacevic-Badstuebner, Ivana; Stark, Roger; et al. (2022)
    This paper presents a modeling approach that allows the prediction of both current and temperature distribution within a SiC MOSFET die during a fast switching event in Spice circuit simulations. It is based on an equivalent model developed including the 3-D gate layout parasitics and a 3-D R-C network for the thermal die model. The gate layout parasitics are modeled by an analytical R-L model extracted from a 3-D layout geometry, so that ...
    Conference Paper
  13. Understanding RowHammer Under Reduced Wordline Voltage: An Experimental Study Using Real DRAM Devices 

    Yaglikci, A. Giray; Luo, Haocong; de Oliviera, Geraldo F.; et al. (2022)
    RowHammer is a circuit-level DRAM vulnerability, where repeatedly activating and precharging a DRAM row, and thus alternating the voltage of a row's wordline between low and high voltage levels, can cause bit flips in physically nearby rows. Recent DRAM chips are more vulnerable to RowHammer: with technology node scaling, the minimum number of activate-p recharge cycles to induce a RowHammer bit flip reduces and the RowHammer bit error ...
    Conference Paper
  14. XFVM Modelling of Fracture Aperture induced by Shear and Tensile Opening 

    Conti, G.; Matthaï, S.; Jenny, P. (2022)
    ECMOR 2022
    Conference Paper
  15. A Stochastic Particle-Based Framework for Multiphase Flows in Fractured Porous Media 

    Monga, R.; Meyer, D.W.; Jenny, P. (2022)
    ECMOR 2022
    Conference Paper
  16. BLAP: Bluetooth Link Key Extraction and Page Blocking Attacks 

    Koh, Chang Seok; Kwon, Jonghoon; Hur, Junbeom (2022)
    2022 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
    Secure Simple Pairing (SSP) and Link Manager Protocol (LMP) authentication are two main authentication mechanisms in Bluetooth specification. In this paper, we present two novel attacks, called link key extraction and page blocking attacks, breaking LMP authentication and SSP authentication, respectively. Link key extraction attack allows attackers to extract link keys of Bluetooth devices generated during the SSP procedure by exploiting ...
    Conference Paper
  17. Predicting Hard Disk Failures in Data Centers Using Temporal Convolutional Neural Networks 

    Burrello, Alessio; Pagliari, Daniele Jahier; Bartolini, Andrea; et al. (2021)
    In modern data centers, storage system failures are major contributors to downtimes and maintenance costs. Predicting these failures by collecting measurements from disks and analyzing them with machine learning techniques can effectively reduce their impact, enabling timely maintenance. While there is a vast literature on this subject, most approaches attempt to predict hard disk failures using either classic machine learning solutions, ...
    Conference Paper
  18. Fabrication of Se-Fe2O3-based Schottky Diode Using Cantilever-based Ag-contact Printing Technology 

    Palathinkal, Joshua Roy; Majumder, Sumit; Daniel, Thomas T.; et al. (2022)
    The fabrication of a sub-10 mu m Se-Fe2O3 channel Schottky diode built using cantilever-based Ag-contact printing technology is discussed in this work. There are two phases to the fabrication process. In the first phase, the Ag electrodes are produced using a state-of-the-art micro-girder (mu G) cantileverbased in-house printing system. The second phase involves dropcasting the dispersion of leaf-structured Se-Fe2O3 in deionized (DI) water ...
    Conference Paper
  19. A Client-Side Seat to TLS Deployment 

    Birghan, Moritz; van der Merwe, Thyla (2022)
    The official release of the latest version of the Transport Layer Security (TLS) protocol, namely TLS 1.3, has been accompanied by rapid adoption across the Web. In 2019, Holz et al. set out to measure this adoption, i.e., deployment and uptake of the protocol (CoRR 2019). Whilst informative and undeniably useful for the TLS community, Holz et al. note that they were unable to measure some of the newer features of TLS 1.3, including zero ...
    Conference Paper

View more