Search result: Catalogue data in Autumn Semester 2014

Electrical Engineering and Information Technology Master Information
Major Courses
A total of 42 CP must be achieved during the Master Program. The individual study plan is subject to the tutor's approval.
Computers and Networks
Core Subjects
These core subjects are particularly recommended for the field of "Computers and Networks".
NumberTitleTypeECTSHoursLecturers
227-0575-00LAdvanced Topics in Communication Networks: Software-Defined NetworkingW6 credits4GB. Plattner, B. L. H. Ager, P. Georgopoulos, M. Happe, K. A. Hummel
AbstractThis lecture discusses a range of important advanced topics in communication networks. It covers state-of-the-art topics both related to wired and wireless networks and draws on current research. Lectures are presented by senior people of this group as well as external invited lecturers that are prominent researchers in some of the topics discussed.
ObjectiveThis lecture fills a gap between the introductory networking course offered in the bachelor study program (Communication Networks) and the doctoral level, and to prepare students to read and evaluate peer research work, as well as to produce their own. There is no similar course offered elsewhere at ETH (also considering the course offerings of D-INFK), therefore we anticipate that this course may also be chosen as an elective course by D-INFK students. The character of the course is research-oriented and thus should also be of interest to doctoral students.
ContentSoftware-defined networking (SDN) it an emerging hot topic in communication networks. In all networks, there is a distinction between the control plane, where configuration (and especially routing) decisions are communicated, and the data plane, where user data is transported.

The control and data planes are at present closely intertwined; interfaces between the control and data planes are presently closed, located within the internals of proprietary routers and switches. SDN separates the control from the data plane and introduces an open interface between them. The control plane is moved to a remote server and operates on top of a Network Operating System (NOS).

Opening up the interface between the control and data planes enables experimentation with new mechanisms that control how packets are routed. Innovative packet routing schemes, e.g., tailored for data center networks, are deployed as applications that run on top of the NOS without requiring changes to routers and switches. Networks therefore become much more programmable than today.

The SDN architecture has emerged in the last 2-3 years and it has attracted significant interest from the industry. It is already supported by a number of vendors, including Cisco and Juniper, and it is presently used in the data center network of Google.

This course will cover an introduction to SDN, including OpenFlow; network operating systems; virtualisation; software-defined hardware; SDN applications; SDN security; SDN use cases and much more. For details, see Link.

We will have a few lectures by distinguished guest speakers.

We provide hands-on experience with programming SDN networks through some of our exercises.
Lecture notesThe reading material for this course will be based on class notes, as well as research papers assigned as recommended reading material for each topic.
LiteratureResearch papers will be recommended as reading material for each topic.
Prerequisites / NoticePrerequisite: Communication Networks or equivalent.
Intended audience: master and doctoral students.
227-0577-00LNetwork SecurityW6 credits2V + 1U + 1PB. Plattner, T. P. Dübendorfer, S. Frei, A. Perrig
AbstractThis lecture discusses fundamental concepts and technologies in the area of network security. Several case studies illustrate the dark side of the Internet and explain how to protect against such threats. A hands-on computer lab that accompanies the lecture gives a deep dive on firewalls, penetration testing and intrusion detection.
Objective•Students are aware of current threats that Internet services and networked devices face and can explain appropriate countermeasures.
•Students can identify and assess known vulnerabilities in a software system that is connected to the Internet.
•Students know fundamental network security concepts.
•Students have an in-depth understanding of important security technologies.
•Students know how to configure a real firewall and know some penetration testing tools from their own experience.
ContentRisk management and the vulnerability lifecycle of software and networked services are discussed. Threats like denial of service, spam, worms, and viruses are studied in-depth. Fundamental security related concepts like identity, availability, authentication and secure channels are introduced. State of the art technologies like secure shell, network and transport layer security, intrusion detection and prevention systems, cross-site scripting, secure implementation techniques and more for securing the Internet and web applications are presented. Several case studies illustrate the dark side of the Internet and explain how to protect against current threats. A hands-on computer lab that accompanies the lecture gives a deep dive on firewalls, penetration testing and intrusion detection.
This lecture is intended for students with an interest in securing Internet services and networked devices. Students are assumed to have knowledge in networking as taught in the Communication Networks lecture. This lecture and the exam are held in English.
Prerequisites / NoticeKnowldedge in computer networking and Internet protocols (e.g. course Communication Networks (D-ITET) or Operating Systems and Networks (D-INFK).

Due to recent changes in the Swiss law, ETH requires each student of this course to sign a written declaration that he/she will not use the information given in this for illegal purposes. This declaration will have to be signed and submitted no later than at the begining of the second lesson.
227-0677-00LSpeech Processing I Information
"Speech Processing I" takes place for the last time in fall 2014.
W6 credits2V + 2UB. Pfister
AbstractFundamentals of speech signal processing and introduction to text-to-speech synthesis and speech recognition.
ObjectiveKnowledge of the basics in speech processing. Acquisition of practical experience in this field. Comprehension of the fundamental problems of text-to-speech synthesis and speech recognition and selected solutions.
ContentAnalysis, representation and properties of speech signals: Time and frequency domain representations, quasi-stationarity, formants, pitch, short-time analysis, spectrum, autocorrelation, linear prediction, homomorphic analysis.
Fundamental problems of speech synthesis: Relations between text and speech; methods of speech production; prosody control.
Fundamental problems of speech recognition: Variability of speech signals, speech features for speech recognition, pattern matching (distance measures, dynamic programming), and introduction to statistical speech recognition with hidden Markov models.
Lecture notesThe following textbook will be used: "Sprachverarbeitung - Grundlagen und Methoden der Sprachsynthese und Spracherkennung", B. Pfister und T. Kaufmann, Springer Verlag, ISBN: 978-3-540-75909-6
Prerequisites / NoticePrerequisites:
Knowledge in digital signal processing and digital filters is helpful.
227-0778-00LHardware/Software Codesign Information W6 credits2V + 2UL. Thiele
AbstractThe course provides advanced knowledge in the design of complex computer systems, in particular embedded systems. Models and methods are discussed that are fundamental for systems that consist of software and hardware components.
ObjectiveThe course provides advanced knowledge in the design of complex computer systems, in particular embedded systems. Models and methods are discussed that are fundamental for systems that consist of software and hardware components.
ContentThe course covers the following subjects: (a) Models for describing hardware and software components (specification), (b) Hardware-Software Interfaces (instruction set, hardware and software components, reconfigurable computing, heterogeneous computer architectures, System-on-Chip), (c) Application specific instruction sets, code generation and retargetable compilation, (d) Performance analysis and estimation techniques, (e) System design (hardware-software partitioning and design space exploration).
Lecture notesMaterial for exercises, copies of transparencies.
LiteraturePeter Marwedel, Embedded System Design, Springer, ISBN-13 978-94-007-0256-1, 2011.

Peter Marwedel, Eingebettete Systeme, Springer, ISBN-13 978-3-540-34048-53, 2007.

Wayne Wolf. Computers as Components. Morgan Kaufmann, ISBN-13: 978-0123884367, 2012.

G. DeMicheli, R. Ernst and W. Wolf, Readings in Hw/Sw Co-design, M. Kaufmann, 2003.
Prerequisites / NoticePrerequisites for the course is a basic knowledge in the following areas: computer architecture, digital design, software design, embedded systems
227-0781-00LLow-Power System DesignW6 credits2V + 2UJ. Beutel
AbstractIntroduction to low-power and low-energy design techniques from a systems perspective including aspects both from hard- and software. The focus of this lecture is on cutting across a number of related fields discussing architectural concepts, modeling and measurement techniques as well as software design mainly using the example of networked embedded systems.
ObjectiveKnowledge of the state-of-the-art in low power system design, understanding recent research results and their implication on industrial products.
ContentDesigning systems with a low energy footprint is an increasingly important. There are many applications for low-power systems ranging from mobile devices powered from batteries such as today's smart phones to energy efficient household appliances and datacenters. Key drivers are to be found mainly in the tremendous increase of mobile devices and the growing integration density requiring to carefully reason about power, both from a provision and consumption viewpoint. Traditional circuit design classes introduce low-power solely from a hardware perspective with a focus on the power performance of a single or at most a hand full of circuit elements. Similarly, low-power aspects are touched in a multitude of other classes, mostly as a side topic. However in successfully designing systems with a low energy footprint it is not sufficient to only look at low-power as an aspect of second class. In modern low-power system design advanced CMOS circuits are of course a key ingredient but successful low-power integration involves many more disciplines such as system architecture, different sources of energy as well as storage and most importantly software and algorithms. In this lecture we will discuss aspects of low-power design as a first class citizen introducing key concepts as well as modeling and measurement techniques focusing mainly on the design of networked embedded systems but of course equally applicable to many other classes of systems. The lecture is further accompanied by a reading seminar as well as exercises and lab sessions.
Lecture notesExercise and lab materials, copies of lecture slides.
LiteratureA detailed reading list will be made available in the lecture.
Prerequisites / NoticeKnowledge in embedded systems, system software, (wireless) networking, possibly integrated circuits, and hardware software codesign.
252-1414-00LSystem SecurityW5 credits2V + 2US. Capkun, A. Perrig
AbstractThe first part of the lecture covers individual system's aspects starting with tamperproof or tamperresistant hardware in general over operating system related security mechanisms to application software systems, such as host based intrusion detection systems. In the second part, the focus is on system design and methodologies for large projects.
ObjectiveIn this lecture, students learn about the security requirements and capabilities that are expected from modern hardware, operating systems and other software environments. An overview of available technologies, algorithms and standards is given, with which these requirements can be met.
ContentThe first part of the lecture covers individual system's aspects starting with tamperproof or tamperresistant hardware in general over operating system related security mechanisms to application software systems such as host based intrusion detetction systems. The main topics covered are: tamper resistant hardware, CPU support for security, protection mechanisms in the kernel, file system security (permissions / ACLs / network filesystem issues), IPC Security, mechanisms in more modern OS, such as Capabilities and Zones, Libraries and Software tools for security assurance, etc.

In the second part, the focus is on system design and methodologies for large projects. The main question answered is how to get a large secure system. Topics include: patch management, common software faults (buffer overflows, etc.), writing secure software (design, architecture, QA, testing), compiler-supported security, langauge-supported security (java...), logging and auditing (BSM audit, dtrace, ...), cryptographic support, TCG, secure file systems, dos/windows/ windowsXP security issues.

Along the lectures, model cases will be elaborated and evaluated in the exercises.
Recommended Subjects
These courses are recommended, but you are free to choose courses from any other special field. Please consult your tutor.
NumberTitleTypeECTSHoursLecturers
227-0101-00LDiscrete-Time and Statistical Signal ProcessingW6 credits4GH.‑A. Loeliger
AbstractThe course introduces some fundamental topics of digital signal processing with a bias towards applications in communications: discrete-time linear filters, equalization, DFT, discrete-time stochastic processes, elements of detection theory and estimation theory, LMMSE estimation and LMMSE filtering, LMS algorithm, Viterbi algorithm.
ObjectiveThe course introduces some fundamental topics of digital signal processing with a bias towards applications in communications. The two main themes are "linearity" and "probability". In the first part of the course, we deepen our understanding of discrete-time linear filters. In the second part of the course, we review the basics of probability theory and discrete-time stochastic processes. We then discuss some basic concepts of detection theory and estimation theory, as well as some practical methods including LMMSE estimation
and LMMSE filtering, the LMS algorithm, and the Viterbi algorithm.
ContentDiscrete-time linear systems and the z-transform.
Discrete time and continuous time: forth and back.
Digital filters.
DFT.
Elements of probability theory.
Discrete-time stochastic processes.
Elements of detection theory and estimation theory.
Linear estimation and filtering.
Wiener filter.
LMS algorithm.
Viterbi algorithm.
Lecture notesLecture Notes.
227-0103-00LControl Systems Information W6 credits2V + 2UM. Morari
AbstractStudy of concepts and methods for the mathematical description and analysis of dynamical systems. The concept of feedback. Design of control systems for single input - single output and multivariable systems.
ObjectiveStudy of concepts and methods for the mathematical description and analysis of dynamical systems. The concept of feedback. Design of control systems for single input - single output and multivariable systems.
ContentProcess automation, concept of control. Modelling of dynamical systems - examples, state space description, linearisation, analytical/numerical solution. Laplace transform, system response for first and second order systems - effect of additional poles and zeros. Closed-loop control - idea of feedback. PID control, Ziegler - Nichols tuning. Stability, Routh-Hurwitz criterion, root locus, frequency response, Bode diagram, Bode gain/phase relationship, controller design via "loop shaping", Nyquist criterion. Feedforward compensation, cascade control. Multivariable systems (transfer matrix, state space representation), multi-loop control, problem of coupling, Relative Gain Array, decoupling, sensitivity to model uncertainty. State space representation (modal description, controllability, control canonical form, observer canonical form), state feedback, pole placement - choice of poles. Observer, observability, duality, separation principle. LQ Regulator, optimal state estimation.
LiteratureG.F. Franklin, J.D. Powell, A. Emami-Naeini. Feedback Control of Dynamic Systems. 6th edition, Prentice Hall, Version 2009, Reading, ISBN 978-0-1350-150-9.Softcover student's edition ca. CHF 110.-. (Spring 2013)
Prerequisites / NoticePrerequisites: Signal and Systems Theory II.

MATLAB is used for system analysis and simulation.
227-0197-00LWearable Systems IW6 credits4GG. Tröster, U. Blanke
AbstractContext recognition in mobile communication systems like mobile phone and wearable computer will be studied using advanced methods from sensor data fusion, pattern recognition, statistics, data mining and machine learning.
Context comprises the behavior of individuals and of groups, their activites as well as the local and social environment.
ObjectiveFuture mobile systems will act as personal and cooperative assistant by providing the appropriate information and services. The systems consist of a smart phone which communicates with sensors on-body and in the environment. Context comprises user's behavior, his activities, his local and social environment.

In the data path from the sensor level to signal segmentation to the classification of the context, advanced methods of signal processing, pattern recognition and machine learning will be applied. Sensor data generated by crowdsouring methods are integrated. The validation using MATLAB is followed by implementation and testing on a smart phone.
Context recognition as the crucial function of mobile systems is the main focus of the course. Using MatLab the participants implement and verify the discussed methods also using a smart phone.
ContentThe next generation of mobile communication systems are integrated in our clothes and act as personal and cooperative assistant providing information we need just now (see Link). Context recognition - what is the situation of the user, his activity, his environment, how is he doing, what are his needs - as the central functionality of mobile systems constitutes the focus of the course.

The main topics of the course include
Sensor nets, sensor signal processing, data fusion, segmentation, Bayes Decision Theory, Decision Trees, Random Forest, kNN-Methods, Support Vector Machine, Hidden Markov Models, Adaboost, Crowdsourcing, SOM and clustering.

The exercises show concrete design problems like motion and gesture recognition using distributed sensors, detection of activity patterns and identification of the local environment.

Presentations of the PhD students and the visit at the Wearable Computing Lab introduce in current research topics and international research projects.

Language: german/english (depending on the participants)
Lecture notesLecture notes for all lessons, assignments and solutions.
Link
LiteratureLiterature will be announced during the lessons.
Prerequisites / NoticeNo special prerequisites
227-0377-00LPhysics of Failure and Failure Analysis of Electronic Devices and EquipmentW3 credits2VU. Sennhauser
AbstractFailures have to be avoided by proper design, material selection and manufacturing. Properties, degradation mechanisms, and expected lifetime of materials are introduced and the basics of failure analysis and analysis equipment are presented. Failures will be demonstrated experimentally and the opportunity is offered to perform a failure analysis with advanced equipment in the laboratory.
ObjectiveIntroduction to the degradation and failure mechanisms and causes of electronic components, devices and systems as well as to methods and tools of reliability testing, characterization and failure analysis.
ContentSummary of reliability and failure analysis terminology; physics of failure: materials properties, physical processes and failure mechanisms; failure analysis of ICs, PCBs, opto-electronics, discrete and other components and devices; basics and properties of instruments; application in circuit design and reliability analysis
Lecture notesComprehensive copy of transparencies
252-0437-00LDistributed Algorithms Information W4 credits3VF. Mattern
AbstractModels of distributed computations, time space diagrams, virtual time, logical clocks and causality, wave algorithms, parallel and distributed graph traversal, consistent snapshots, mutual exclusion, election and symmetry breaking, distributed termination detection, garbage collection in distributed systems, monitoring distributed systems, global predicates.
ObjectiveBecome acquainted with models and algorithms for distributed systems.
ContentVerteilte Algorithmen sind Verfahren, die dadurch charakterisiert sind, dass mehrere autonome Prozesse gleichzeitig Teile eines gemeinsamen Problems in kooperativer Weise bearbeiten und der dabei erforderliche Informationsaustausch ausschliesslich über Nachrichten erfolgt. Derartige Algorithmen kommen im Rahmen verteilter Systeme zum Einsatz, bei denen kein gemeinsamer Speicher existiert und die Übertragungszeit von Nachrichten i.a. nicht vernachlässigt werden kann. Da dabei kein Prozess eine aktuelle konsistente Sicht des globalen Zustands besitzt, führt dies zu interessanten Problemen.
Im einzelnen werden u.a. folgende Themen behandelt:
Modelle verteilter Berechnungen; Raum-Zeit Diagramme; Virtuelle Zeit; Logische Uhren und Kausalität; Wellenalgorithmen; Verteilte und parallele Graphtraversierung; Berechnung konsistenter Schnappschüsse; Wechselseitiger Ausschluss; Election und Symmetriebrechung; Verteilte Terminierung; Garbage-Collection in verteilten Systemen; Beobachten verteilter Systeme; Berechnung globaler Prädikate.
Literature- F. Mattern: Verteilte Basisalgorithmen, Springer-Verlag
- G. Tel: Topics in Distributed Algorithms, Cambridge University Press
- G. Tel: Introduction to Distributed Algorithms, Cambridge University Press, 2nd edition
- A.D. Kshemkalyani, M. Singhal: Distributed Computing, Cambridge University Press
- N. Lynch: Distributed Algorithms, Morgan Kaufmann Publ
227-0447-00LImage Analysis and Computer Vision Information W6 credits3V + 1UG. Székely, O. Göksel, L. Van Gool
AbstractLight and perception. Digital image formation. Image enhancement and feature extraction. Unitary transformations. Color and texture. Image segmentation and deformable shape matching. Motion extraction and tracking. 3D data extraction. Invariant features. Specific object recognition and object class recognition.
ObjectiveOverview of the most important concepts of image formation, perception and analysis, and Computer Vision. Gaining own experience through practical computer and programming exercises.
ContentThe first part of the course starts off from an overview of existing and emerging applications that need computer vision. It shows that the realm of image processing is no longer restricted to the factory floor, but is entering several fields of our daily life. First it is investigated how the parameters of the electromagnetic waves are related to our perception. Also the interaction of light with matter is considered. The most important hardware components of technical vision systems, such as cameras, optical devices and illumination sources are discussed. The course then turns to the steps that are necessary to arrive at the discrete images that serve as input to algorithms. The next part describes necessary preprocessing steps of image analysis, that enhance image quality and/or detect specific features. Linear and non-linear filters are introduced for that purpose. The course will continue by analyzing procedures allowing to extract additional types of basic information from multiple images, with motion and depth as two important examples. The estimation of image velocities (optical flow) will get due attention and methods for object tracking will be presented. Several techniques are discussed to extract three-dimensional information about objects and scenes. Finally, approaches for the recognition of specific objects as well as object classes will be discussed and analyzed.
Lecture notesCourse material Script, computer demonstrations, exercises and problem solutions
Prerequisites / NoticePrerequisites:
Basic concepts of mathematical analysis and linear algebra. The computer exercises are based on Linux and C.
The course language is English.
227-0555-00LFault Tolerance in Distributed Systems Restricted registration - show details W4 credits3GR. Wattenhofer
AbstractFault-tolerance (failure models, consensus, agreement), replication (primary copy, 2PC, 3PC, Paxos, quorum systems), shared memory (spin locks, concurrency)
ObjectiveBecome acquainted with pertinent technologies and architectures of fault-tolerant distributed systems.
ContentWe discuss fault-tolerance issues (models, consensus, agreement) as well as replication issues (primary copy, 2PC, 3PC, Paxos, quorum systems, distributed storage) and problems with asynchronous multiprocessing (shared memory, spin locks, concurrency).
Prerequisites / NoticeThis lecture takes place in the second half of the semester; the lecture is the second part of the lecture "Verteilte Systeme" (Distributed Systems, 252-0213-00L). Students may attend at most one of the two lectures.
227-0627-00LApplied Computer ArchitectureW6 credits4GA. Gunzinger
AbstractThis lecture gives an overview of the requirements and the architecture of parallel computer systems, performance, reliability and costs.
ObjectiveUnderstand the function, the design and the performance modeling of parallel computer systems.
ContentThe lecture "Applied Computer Architecture" gives technical and corporate insights in the innovative Computer Systems/Architectures (CPU, GPU, FPGA, special processors) and their real implementations and applications. Often the designs have to deal with technical limits.
Which computer architecture allows the control of the over 1000 magnets at the Swiss Light Source (SLS)?
Which architecture is behind the alarm center of the Swiss Railway (SBB)?
Which computer architectures are applied for driver assistance systems?
Which computer architecture is hidden behind a professional digital audio mixing desk?
How can data volumes about 30 TB/s, produced by a protone accelerator, be processed in real time?
Can the weather forecast also be processed with GPUs?
How can a good computer architecture be found?
Which are the driving factors in succesful computer architecture design?
Lecture notesScript and exercices sheets.
Prerequisites / NoticePrerequisites:
Basics of computer architecture.
151-0593-00LEmbedded Control SystemsW4 credits6GJ. S. Freudenberg, L. Guzzella, M. Schmid Daners
AbstractThis course provides a comprehensive overview of embedded control systems. The concepts introduced are implemented and verified on a microprocessor-controlled haptic device.
ObjectiveFamiliarize students with main architectural principles and concepts of embedded control systems.
ContentAn embedded system is a microprocessor used as a component in another piece of technology, such as cell phones or automobiles. In this intensive two-week block course the students are presented the principles of embedded digital control systems using a haptic device as an example for a mechatronic system. A haptic interface allows for a human to interact with a computer through the sense of touch.

Subjects covered in lectures and practical lab exercises include:
- The application of C-programming on a microprocessor
- Digital I/O and serial communication
- Quadrature decoding for wheel position sensing
- Queued analog-to-digital conversion to interface with the analog world
- Pulse width modulation
- Timer interrupts to create sampling time intervals
- System dynamics and virtual worlds with haptic feedback
- Introduction to rapid prototyping
Lecture notesLecture notes, lab instructions, supplemental material
Prerequisites / NoticePrerequisite courses are Control Systems I and Informatics I.

This course is restricted to 33 students due to limited lab infrastructure. Interested students please contact Marianne Schmid (E-Mail: Link)
After your reservation has been confirmed please register online at Link.

Detailed information can be found on the course website Link
252-1411-00LSecurity of Wireless NetworksW5 credits2V + 1U + 1AS. Capkun, C. Soriente
AbstractCore Elements: Wireless communication channel, Wireless network architectures and protocols, Attacks on wireless networks, Protection techniques.
ObjectiveAfter this course, the students should be able to: describe and classify security goals and attacks in wireless networks; describe security architectures of the following wireless systems and networks: 802.11, GSM/UMTS, RFID, ad hoc/sensor networks; reason about security protocols for wireless network; implement mechanisms to secure
802.11 networks.
ContentWireless channel basics. Wireless electronic warfare: jamming and target tracking. Basic security protocols in cellular, WLAN and
multi-hop networks. Recent advances in security of multi-hop networks; RFID privacy challenges and solutions.
  •  Page  1  of  1