Suchergebnis: Katalogdaten im Frühjahrssemester 2023

Informatik Master Information
Vertiefungen
Vertiefung in Data Management Systems
Kernfächer
NummerTitelTypECTSUmfangDozierende
263-3855-00LCloud Computing Architecture Information W9 KP3V + 2U + 3AG. Alonso, A. Klimovic
KurzbeschreibungCloud computing hosts a wide variety of online services that we use on a daily basis, including web search, social networks, and video streaming. This course will cover how datacenter hardware, systems software, and application frameworks are designed for the cloud.
LernzielAfter successful completion of this course, students will be able to: 1) reason about performance, energy efficiency, and availability tradeoffs in the design of cloud system software, 2) describe how datacenter hardware is organized and explain why it is organized as such, 3) implement cloud applications as well as analyze and optimize their performance.
InhaltIn this course, we study how datacenter hardware, systems software, and applications are designed at large scale for the cloud. The course covers topics including server design, cluster management, large-scale storage systems, serverless computing, data analytics frameworks, and performance analysis.
SkriptLecture slides will be available on the course website.
Voraussetzungen / BesonderesUndergraduate courses in 1) computer architecture and 2) operating systems, distributed systems, and/or database systems are strongly recommended.
Wahlfächer
NummerTitelTypECTSUmfangDozierende
263-3800-00LAdvanced Operating Systems Information Belegung eingeschränkt - Details anzeigen W7 KP2V + 2U + 2AD. Cock, T. Roscoe
KurzbeschreibungThis course is intended to give students a thorough understanding of design and implementation issues for modern operating systems, with a particular emphasis on the challenges of modern hardware features. We will cover key design issues in implementing an operating system, such as memory management, scheduling, protection, inter-process communication, device drivers, and file systems.
LernzielThe goals of the course are, firstly, to give students:

1. A broader perspective on OS design than that provided by knowledge of Unix or Windows, building on the material in a standard undergraduate operating systems class

2. Practical experience in dealing directly with the concurrency, resource management, and abstraction problems confronting OS designers and implementers

3. A glimpse into future directions for the evolution of OS and computer hardware design
InhaltThe course is based on practical implementation work, in C and assembly language, and requires solid knowledge of both. The work is mostly carried out in teams of 3-4, using real hardware, and is a mixture of team milestones and individual projects which fit together into a complete system at the end. Emphasis is also placed on a final report which details the complete finished artifact, evaluates its performance, and discusses the choices the team made while building it.
Voraussetzungen / BesonderesThe course is based around a milestone-oriented project, where students work in small groups to implement major components of a microkernel-based operating system. The final assessment will be a combination grades awarded for milestones during the course of the project, a final written report on the work, and a set of test cases run on the final code.
227-0558-00LPrinciples of Distributed Computing Information W7 KP2V + 2U + 2AR. Wattenhofer
KurzbeschreibungWe study the fundamental issues underlying the design of distributed systems: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques.
LernzielDistributed computing is essential in modern computing and communications systems. Examples are on the one hand large-scale networks such as the Internet, and on the other hand multiprocessors such as your new multi-core laptop. This course introduces the principles of distributed computing, emphasizing the fundamental issues underlying the design of distributed systems and networks: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques, basically the "pearls" of distributed computing. We will cover a fresh topic every week.
InhaltDistributed computing models and paradigms, e.g. message passing, shared memory, synchronous vs. asynchronous systems, time and message complexity, peer-to-peer systems, small-world networks, social networks, sorting networks, wireless communication, and self-organizing systems.

Distributed algorithms, e.g. leader election, coloring, covering, packing, decomposition, spanning trees, mutual exclusion, store and collect, arrow, ivy, synchronizers, diameter, all-pairs-shortest-path, wake-up, and lower bounds
SkriptAvailable.
LiteraturLecture Notes By Roger Wattenhofer. These lecture notes are taught at about a dozen different universities through the world.

Mastering Distributed Algorithms
Roger Wattenhofer
Inverted Forest Publishing, 2020. ISBN 979-8628688267

Distributed Computing: Fundamentals, Simulations and Advanced Topics
Hagit Attiya, Jennifer Welch.
McGraw-Hill Publishing, 1998, ISBN 0-07-709352 6

Introduction to Algorithms
Thomas Cormen, Charles Leiserson, Ronald Rivest.
The MIT Press, 1998, ISBN 0-262-53091-0 oder 0-262-03141-8

Disseminatin of Information in Communication Networks
Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, Walter Unger.
Springer-Verlag, Berlin Heidelberg, 2005, ISBN 3-540-00846-2

Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes
Frank Thomson Leighton.
Morgan Kaufmann Publishers Inc., San Francisco, CA, 1991, ISBN 1-55860-117-1

Distributed Computing: A Locality-Sensitive Approach
David Peleg.
Society for Industrial and Applied Mathematics (SIAM), 2000, ISBN 0-89871-464-8
Voraussetzungen / BesonderesCourse pre-requisites: Interest in algorithmic problems. (No particular course needed.)
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
Vertiefung in Machine Intelligence
Kernfächer
NummerTitelTypECTSUmfangDozierende
261-5110-00LOptimization for Data Science Information W10 KP3V + 2U + 4AB. Gärtner, N. He
KurzbeschreibungThis course provides an in-depth theoretical treatment of optimization methods that are relevant in data science.
LernzielUnderstanding the guarantees and limits of relevant optimization methods used in data science. Learning theoretical paradigms and techniques to deal with optimization problems arising in data science.
InhaltThis course provides an in-depth theoretical treatment of classical and modern optimization methods that are relevant in data science.

After a general discussion about the role that optimization has in the process of learning from data, we give an introduction to the theory of (convex) optimization. Based on this, we present and analyze algorithms in the following four categories: first-order methods (gradient and coordinate descent, Frank-Wolfe, subgradient and mirror descent, stochastic and incremental gradient methods); second-order methods (Newton and quasi Newton methods); non-convexity (local convergence, provable global convergence, cone programming, convex relaxations); min-max optimization (extragradient methods).

The emphasis is on the motivations and design principles behind the algorithms, on provable performance bounds, and on the mathematical tools and techniques to prove them. The goal is to equip students with a fundamental understanding about why optimization algorithms work, and what their limits are. This understanding will be of help in selecting suitable algorithms in a given application, but providing concrete practical guidance is not our focus.
Voraussetzungen / BesonderesA solid background in analysis and linear algebra; some background in theoretical computer science (computational complexity, analysis of algorithms); the ability to understand and write mathematical proofs.
263-3710-00LMachine Perception Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2AO. Hilliges, J. Song
KurzbeschreibungRecent developments in neural networks have drastically advanced the performance of machine perception systems in a variety of areas including computer vision, robotics, and human shape modeling This course is a deep dive into deep learning algorithms and architectures with applications to a variety of perceptual and generative tasks.
LernzielStudents will learn about fundamental aspects of modern deep learning approaches for perception and generation. Students will learn to implement, train and debug their own neural networks and gain a detailed understanding of cutting-edge research in learning-based computer vision, robotics, and shape modeling. The optional final project assignment will involve training a complex neural network architecture and applying it to a real-world dataset.

The core competency acquired through this course is a solid foundation in deep-learning algorithms to process and interpret human-centric signals. In particular, students should be able to develop systems that deal with the problem of recognizing people in images, detecting and describing body parts, inferring their spatial configuration, performing action/gesture recognition from still images or image sequences, also considering multi-modal data, among others.
InhaltWe will focus on teaching: how to set up the problem of machine perception, the learning algorithms, network architectures, and advanced deep learning concepts in particular probabilistic deep learning models.

The course covers the following main areas:
I) Foundations of deep learning.
II) Advanced topics like probabilistic generative modeling of data (latent variable models, generative adversarial networks, auto-regressive models, invertible neural networks, diffusion models).
III) Deep learning in computer vision, human-computer interaction, and robotics.

Specific topics include:
I) Introduction to Deep Learning:
a) Neural Networks and training (i.e., backpropagation)
b) Feedforward Networks
c) Timeseries modelling (RNN, GRU, LSTM)
d) Convolutional Neural Networks
II) Advanced topics:
a) Latent variable models (VAEs)
b) Generative adversarial networks (GANs)
c) Autoregressive models (PixelCNN, PixelRNN, TCN, Transformer)
d) Invertible Neural Networks / Normalizing Flows
e) Coordinate-based networks (neural implicit surfaces, NeRF)
f) Diffusion models
III) Applications in machine perception and computer vision:
a) Fully Convolutional architectures for dense per-pixel tasks (i.e., instance segmentation)
b) Pose estimation and other tasks involving human activity
c) Neural shape modeling (implicit surfaces, neural radiance fields)
d) Deep Reinforcement Learning and Applications in Physics-Based Behavior Modeling
LiteraturDeep Learning
Book by Ian Goodfellow and Yoshua Bengio
Voraussetzungen / BesonderesThis is an advanced grad-level course that requires a background in machine learning. Students are expected to have a solid mathematical foundation, in particular in linear algebra, multivariate calculus, and probability. The course will focus on state-of-the-art research in deep learning and will not repeat the basics of machine learning

Please take note of the following conditions:
1) Students must have taken the exam in Machine Learning (252-0535-00) or have acquired equivalent knowledge
2) All practical exercises will require basic knowledge of Python and will use libraries such as Pytorch, scikit-learn, and scikit-image. We will provide introductions to Pytorch and other libraries that are needed but will not provide introductions to basic programming or Python.

The following courses are strongly recommended as prerequisites:
* "Visual Computing" or "Computer Vision"

The course will be assessed by a final written examination in English. No course materials or electronic devices can be used during the examination. Note that the examination will be based on the contents of the lectures, the associated reading materials, and the exercises.

The exam will be a 3-hour end-of-term exam and take place at the end of the teaching period.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Selbststeuerung und Selbstmanagement gefördert
Wahlfächer
NummerTitelTypECTSUmfangDozierende
252-0526-00LStatistical Learning Theory Information W8 KP3V + 2U + 2AJ. M. Buhmann
KurzbeschreibungThe course covers advanced methods of statistical learning:

- Variational methods and optimization.
- Deterministic annealing.
- Clustering for diverse types of data.
- Model validation by information theory.
LernzielThe course surveys recent methods of statistical learning. The fundamentals of machine learning, as presented in the courses "Introduction to Machine Learning" and "Advanced Machine Learning", are expanded from the perspective of statistical learning.
Inhalt- Variational methods and optimization. We consider optimization approaches for problems where the optimizer is a probability distribution. We will discuss concepts like maximum entropy, information bottleneck, and deterministic annealing.

- Clustering. This is the problem of sorting data into groups without using training samples. We discuss alternative notions of "similarity" between data points and adequate optimization procedures.

- Model selection and validation. This refers to the question of how complex the chosen model should be. In particular, we present an information theoretic approach for model validation.

- Statistical physics models. We discuss approaches for approximately optimizing large systems, which originate in statistical physics (free energy minimization applied to spin glasses and other models). We also study sampling methods based on these models.
SkriptA draft of a script will be provided. Lecture slides will be made available.
LiteraturHastie, Tibshirani, Friedman: The Elements of Statistical Learning, Springer, 2001.

L. Devroye, L. Gyorfi, and G. Lugosi: A probabilistic theory of pattern recognition. Springer, New York, 1996
Voraussetzungen / BesonderesKnowledge of machine learning (introduction to machine learning and/or advanced machine learning)
Basic knowledge of statistics.
252-0579-00L3D Vision Information W5 KP3G + 1AM. Pollefeys, D. B. Baráth
KurzbeschreibungThe course covers camera models and calibration, feature tracking and matching, camera motion estimation via simultaneous localization and mapping (SLAM) and visual odometry (VO), epipolar and mult-view geometry, structure-from-motion, (multi-view) stereo, augmented reality, and image-based (re-)localization.
LernzielAfter attending this course, students will:
1. understand the core concepts for recovering 3D shape of objects and scenes from images and video.
2. be able to implement basic systems for vision-based robotics and simple virtual/augmented reality applications.
3. have a good overview over the current state-of-the art in 3D vision.
4. be able to critically analyze and asses current research in this area.
InhaltThe goal of this course is to teach the core techniques required for robotic and augmented reality applications: How to determine the motion of a camera and how to estimate the absolute position and orientation of a camera in the real world. This course will introduce the basic concepts of 3D Vision in the form of short lectures, followed by student presentations discussing the current state-of-the-art. The main focus of this course are student projects on 3D Vision topics, with an emphasis on robotic vision and virtual and augmented reality applications.
261-5120-00LMachine Learning for Health Care Information Belegung eingeschränkt - Details anzeigen W5 KP2V + 2AV. Boeva, J. Vogt, M. Kuznetsova
KurzbeschreibungThe course will review the most relevant methods and applications of Machine Learning in Biomedicine, discuss the main challenges they present and their current technical problems.
LernzielDuring the last years, we have observed a rapid growth in the field of Machine Learning (ML), mainly due to improvements in ML algorithms, the increase of data availability and a reduction in computing costs. This growth is having a profound impact in biomedical applications, where the great variety of tasks and data types enables us to get benefit of ML algorithms in many different ways. In this course we will review the most relevant methods and applications of ML in biomedicine, discuss the main challenges they present and their current technical solutions.
InhaltThe course will consist of four topic clusters that will cover the most relevant applications of ML in Biomedicine:
1) Structured time series: Temporal time series of structured data often appear in biomedical datasets, presenting challenges as containing variables with different periodicities, being conditioned by static data, etc.
2) Medical notes: Vast amount of medical observations are stored in the form of free text, we will analyze stategies for extracting knowledge from them.
3) Medical images: Images are a fundamental piece of information in many medical disciplines. We will study how to train ML algorithms with them.
4) Genomics data: ML in genomics is still an emerging subfield, but given that genomics data are arguably the most extensive and complex datasets that can be found in biomedicine, it is expected that many relevant ML applications will arise in the near future. We will review and discuss current applications and challenges.
Voraussetzungen / BesonderesData Structures & Algorithms, Introduction to Machine Learning, Statistics/Probability, Programming in Python, Unix Command Line

Relation to Course 261-5100-00 Computational Biomedicine: This course is a continuation of the previous course with new topics related to medical data and machine learning. The format of Computational Biomedicine II will also be different. It is helpful but not essential to attend Computational Biomedicine before attending Computational Biomedicine II.
263-5000-00LComputational Semantics for Natural Language Processing Information W6 KP2V + 1U + 2AM. Sachan
KurzbeschreibungThis course presents an introduction to Natural language processing (NLP) with an emphasis on computational semantics i.e. the process of constructing and reasoning with meaning representations of natural language text.
LernzielThe objective of the course is to learn about various topics in computational semantics and its importance in natural language processing methodology and research. Exercises and the project will be key parts of the course so the students will be able to gain hands-on experience with state-of-the-art techniques in the field.
InhaltWe will take a modern view of the topic, and focus on various statistical and deep learning approaches for computation semantics. We will also overview various primary areas of research in language processing and discuss how the computational semantics view can help us make advances in NLP.
SkriptLecture slides will be made available at the course Web site.
LiteraturNo textbook is required, but there will be regularly assigned readings from research literature, linked to the course website.
Voraussetzungen / BesonderesThe student should have successfully completed a graduate level class in machine learning (252-0220-00L), deep learning (263-3210-00L) or natural language processing (252-3005-00L) before. Similar courses from other universities are acceptable too.
263-5051-00LAI Center Projects in Machine Learning Research Information Belegung eingeschränkt - Details anzeigen
Last cancellation/deregistration date for this ungraded semester performance: Friday, 17 March 2023! Please note that after that date no deregistration will be accepted and the course will be considered as "fail".
W4 KP2V + 1AA. Ilic, N. Davoudi, M. El-Assady, F. Engelmann, S. Gashi, T. Kontogianni, A. Marx, B. Moseley, G. Ramponi, X. Shen, M. Sorbaro Sindaci
KurzbeschreibungThe course will give students an overview of selected topics in advanced machine learning that are currently subjects of active research. The course concludes with a final project.
LernzielThe overall objective is to give students a concrete idea of what working in contemporary machine learning research is like and inform them about current research performed at ETH.

In this course, students will be able to get an overview of current research topics in different specialized areas. In the final project, students will be able to build experience in practical aspects of machine learning research, including research literature, aspects of implementation, and reproducibility challenges.
InhaltThe course will be structured as sections taught by different postdocs specialized in the relevant fields. Each section will showcase an advanced research topic in machine learning, first introducing it and motivating it in the context of current technological or scientific advancement, then providing practical applications that students can experiment with, ideally with the aim of reproducing a known result in the specific field.

A tentative list of topics for this year:
- fully supervised 3D scene understanding
- weakly supervised 3D scene understanding
- causal discovery
- biological and artificial neural networks
- reinforcement learning
- visual text analytics
- human-centered AI
- representation learning.

The last weeks of the course will be reserved for the implementation of the final project. The students will be assigned group projects in one of the presented areas, based on their preferences. The outcomes will be made into a scientific poster and students will be asked to present the projects to the other groups in a joint poster session.
Voraussetzungen / BesonderesParticipants should have basic knowledge about machine learning and statistics (e.g. Introduction to Machine Learning course or equivalent) and programming.
263-5052-00LInteractive Machine Learning: Visualization & Explainability Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AM. El-Assady
KurzbeschreibungVisual Analytics supports the design of human-in-the-loop interfaces that enable human-machine collaboration. In this course, will go through the fundamentals of designing interactive visualizations, later applying them to explain and interact with machine leaning models.
LernzielThe goal of the course is to introduce techniques for interactive information visualization and to apply these on understanding, diagnosing, and refining machine learning models.
InhaltInteractive, mixed-initiative machine learning promises to combine the efficiency of automation with the effectiveness of humans for a collaborative decision-making and problem-solving process. This can be facilitated through co-adaptive visual interfaces.

This course will first introduce the foundations of information visualization design based on data charecteristics, e.g., high-dimensional, geo-spatial, relational, temporal, and textual data.

Second, we will discuss interaction techniques and explanation strategies to enable explainable machine learning with the tasks of understanding, diagnosing, and refining machine learning models.

Tentative list of topics:
1. Visualization and Perception
2. Interaction and Explanation
3. Systems Overview
SkriptCourse material will be provided in form of slides.
LiteraturWill be provided during the course.
Voraussetzungen / BesonderesBasic understanding of machine learning as taught at the Bachelor's level.
263-5255-00LFoundations of Reinforcement Learning Information Belegung eingeschränkt - Details anzeigen W7 KP3V + 3AN. He
KurzbeschreibungReinforcement learning (RL) has been in the limelight of many recent breakthroughs in artificial intelligence. This course focuses on theoretical and algorithmic foundations of reinforcement learning, through the lens of optimization, modern approximation, and learning theory. The course targets M.S. students with strong research interests in reinforcement learning, optimization, and control.
LernzielThis course aims to provide students with an advanced introduction of RL theory and algorithms as well as bring them near the frontier of this active research field.

By the end of the course, students will be able to
- Identify the strengths and limitations of various reinforcement learning algorithms;
- Formulate and solve sequential decision-making problems by applying relevant reinforcement learning tools;
- Generalize or discover “new” applications, algorithms, or theories of reinforcement learning towards conducting independent research on the topic.
InhaltBasic topics include fundamentals of Markov decision processes, approximate dynamic programming, linear programming and primal-dual perspectives of RL, model-based and model-free RL, policy gradient and actor-critic algorithms, Markov games and multi-agent RL. If time allows, we will also discuss advanced topics such as batch RL, inverse RL, causal RL, etc. The course keeps strong emphasis on in-depth understanding of the mathematical modeling and theoretical properties of RL algorithms.
SkriptLecture notes will be posted on Moodle.
LiteraturDynamic Programming and Optimal Control, Vol I & II, Dimitris Bertsekas
Reinforcement Learning: An Introduction, Second Edition, Richard Sutton and Andrew Barto.
Algorithms for Reinforcement Learning, Csaba Czepesvári.
Reinforcement Learning: Theory and Algorithms, Alekh Agarwal, Nan Jiang, Sham M. Kakade.
Voraussetzungen / BesonderesStudents are expected to have strong mathematical background in linear algebra, probability theory, optimization, and machine learning.
263-5351-00LMachine Learning for Genomics Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the third week of the semester. Students who are still registered after that date, but do not provide project work, do not participate in paper presentation sessions and/or do not show up for the exam, will officially fail the course.
W5 KP2V + 1U + 1AV. Boeva
KurzbeschreibungThe course reviews solutions that machine learning provides to the most challenging questions in human genomics.
LernzielOver the last few years, the parallel development of machine learning methods and molecular profiling technologies for human cells, such as sequencing, created an extremely powerful tool to get insights into the cellular mechanisms in healthy and diseased contexts. In this course, we will discuss the state-of-the-art machine learning methodology solving or attempting to solve common problems in human genomics. At the end of the course, you will be familiar with (1) classical and advanced machine learning architectures used in genomics, (2) bioinformatics analysis of human genomic and transcriptomic data, and (3) data types used in this field.
Inhalt- Short introduction to major concepts of molecular biology: DNA, genes, genome, central dogma, transcription factors, epigenetic code, DNA methylation, signaling pathways
- Prediction of transcription factor binding sites, open chromatin, histone marks, promoters, nucleosome positioning (convolutional neural networks, position weight matrices)
- Prediction of variant effects and gene expression (hidden Markov models, topic models)
- Deconvolution of mixed signal
- DNA, RNA and protein folding (RNN, LSTM, transformers)
- Data imputation for single cell RNA-seq data, clustering and annotation (diffusion and methods on graphs)
- Batch correction (autoencoders, optimal transport)
- Survival analysis (Cox proportional hazard model, regularization penalties, multi-omics, multi-tasking)
Voraussetzungen / BesonderesIntroduction to Machine Learning, Statistics/Probability, Programming in Python, Unix Command Line
263-5352-00LAdvanced Formal Language Theory Information W6 KP4G + 1AR. Cotterell
KurzbeschreibungThis course serves as an introduction to various advanced topics in formal language theory.
LernzielThe objective of the course is to learn and understand a variety of topics in advanced formal language theory.
InhaltThis course serves as an introduction to various advanced topics in formal language theory. The primary focus of the course is on weighted formalisms, which can easily be applied in machine learning. Topics include finite-state machines as well as the algorithms that are commonly used for their manipulation. We will also cover weighted context-free grammars, weighted tree automata, and weighted mildly context-sensitive formalisms.
263-5353-10LPhilosophy of Language and Computation II (with Case Study) Information W5 KP2V + 1U + 1AR. Cotterell, J. L. Gastaldi
KurzbeschreibungUnderstand the philosophical underpinnings of language-based artificial intelligence.
LernzielThis graduate class, taught like a seminar, is designed to help you understand the philosophical underpinnings of modern work in natural language processing (NLP), most of which is centered around statistical machine learning applied to natural language data.
InhaltThis graduate class, taught like a seminar, is designed to help you understand the philosophical underpinnings of modern work in natural language processing (NLP), most of which is centered around statistical machine learning applied to natural language data. The course is a year-long journey, but the second half (Spring 2023) does not depend on the first (Fall 2022) and thus either half may be taken independently. In each semester, we divide the class time into three modules. Each module is centered around a philosophical topic. After discussing logical, structuralist, and generative approaches to language in the first semester, in the second semester we will focus on information, language games, and pragmatics. The modules will be four weeks long. During the first two weeks of a module, we will read and discuss original texts and supplementary criticism. During the second two weeks, we will read recent NLP papers and discuss how the authors of those works are building on philosophical insights into our conception of language—perhaps implicitly or unwittingly.
LiteraturThe literature will be provided by the instructors on the class website
263-5354-00LLarge Language Models Information W8 KP3V + 2U + 2AR. Cotterell, M. Sachan, F. Tramèr, C. Zhang
KurzbeschreibungLarge language models have become one of the most commonly deployed NLP inventions. In the past half-decade, their integration into core natural language processing tools has dramatically increased the performance of such tools, and they have entered the public discourse surrounding artificial intelligence.
LernzielTo understand the mathematical foundations of large language models as well as how to implement them.
InhaltWe start with the probabilistic foundations of language models, i.e., covering what constitutes a language model from a formal, theoretical perspective. We then discuss how to construct and curate training corpora, and introduce many of the neural-network architectures often used to instantiate language models at scale. The course covers aspects of systems programming, discussion of privacy and harms, as well as applications of language models in NLP and beyond.
LiteraturThe lecture notes will be supplemented with various readings from the literature.
227-0434-10LMathematics of Information Information W8 KP3V + 2U + 2AH. Bölcskei
KurzbeschreibungThe class focuses on mathematical aspects of

1. Information science: Sampling theorems, frame theory, compressed sensing, sparsity, super-resolution, spectrum-blind sampling, subspace algorithms, dimensionality reduction

2. Learning theory: Approximation theory, greedy algorithms, uniform laws of large numbers, Rademacher complexity, Vapnik-Chervonenkis dimension
LernzielThe aim of the class is to familiarize the students with the most commonly used mathematical theories in data science, high-dimensional data analysis, and learning theory. The class consists of the lecture and exercise sessions with homework problems.
InhaltMathematics of Information

1. Signal representations: Frame theory, wavelets, Gabor expansions, sampling theorems, density theorems

2. Sparsity and compressed sensing: Sparse linear models, uncertainty relations in sparse signal recovery, super-resolution, spectrum-blind sampling, subspace algorithms (ESPRIT), estimation in the high-dimensional noisy case, Lasso

3. Dimensionality reduction: Random projections, the Johnson-Lindenstrauss Lemma

Mathematics of Learning

4. Approximation theory: Nonlinear approximation theory, best M-term approximation, greedy algorithms, fundamental limits on compressibility of signal classes, Kolmogorov-Tikhomirov epsilon-entropy of signal classes, optimal compression of signal classes

5. Uniform laws of large numbers: Rademacher complexity, Vapnik-Chervonenkis dimension, classes with polynomial discrimination
SkriptDetailed lecture notes will be provided at the beginning of the semester.
Voraussetzungen / BesonderesThis course is aimed at students with a background in basic linear algebra, analysis, statistics, and probability.

We encourage students who are interested in mathematical data science to take both this course and "401-4944-20L Mathematics of Data Science" by Prof. A. Bandeira. The two courses are designed to be complementary.

H. Bölcskei and A. Bandeira
401-3632-00LComputational StatisticsW8 KP3V + 1UM. Mächler
KurzbeschreibungWe discuss modern statistical methods for data analysis, including methods for data exploration, prediction and inference. We pay attention to algorithmic aspects, theoretical properties and practical considerations. The class is hands-on and methods are applied using the statistical programming language R.
LernzielThe student obtains an overview of modern statistical methods for data analysis, including their algorithmic aspects and theoretical properties. The methods are applied using the statistical programming language R.
InhaltSee the class website
Voraussetzungen / BesonderesAt least one semester of (basic) probability and statistics.

Programming experience is helpful but not required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Medien und digitale Technologiengeprüft
Problemlösunggeprüft
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
Vertiefung in Secure and Reliable Systems
Kernfächer
NummerTitelTypECTSUmfangDozierende
263-2815-00LAutomated Software Testing Information Belegung eingeschränkt - Details anzeigen
Last cancellation/deregistration date for this graded semester performance: 17 March 2023! Please note that after that date no deregistration will be accepted and the course will be considered as "fail".
W7 KP2V + 1U + 3AZ. Su
KurzbeschreibungThis course introduces students to classic and modern techniques for the automated testing and analysis of software systems for reliability, security, and performance. It covers both techniques and their applications in various domains (e.g., compilers, databases, theorem provers, operating systems, machine/deep learning, and mobile applications), focusing on the latest, important results.
Lernziel* Learn fundamental and practical techniques for software testing and analysis

* Understand the challenges, open issues and opportunities across a variety of domains (security/systems/compilers/databases/mobile/AI/education)

* Understand how latest automated testing and analysis techniques work

* Gain conceptual and practical experience in techniques/tools for reliability, security, and performance

* Learn how to perform original and impactful research in this area
InhaltThe course will be organized into the following components: (1) classic and modern testing and analysis techniques (coverage metrics, mutation testing, metamorphic testing, combinatorial testing, symbolic execution, fuzzing, static analysis, etc.), (2) latest results on techniques and applications from diverse domains, and (3) open challenges and opportunities.

A major component of this course is a class project. All students (individually or two-person teams) are expected to select and complete a course project. Ideally, the project is original research related in a broad sense to automated software testing and analysis. Potential project topics will also be suggested by the teaching staff.

Students must select a project and write a one or two pages proposal describing why what the proposed project is interesting and giving a work schedule. Students will also write a final report describing the project and prepare a 20-30 minute presentation at the end of the course.

The due dates for the project proposal, final report, and project presentation will be announced.

The course will cover results from the Advanced Software Technologies (AST) Lab at ETH as well as notable results elsewhere, providing good opportunities for potential course project topics as well as MSc project/thesis topics.
SkriptLecture notes/slides and other lecture materials/handouts will be available online.
LiteraturReading material and links to tools will be published on the course website.
Voraussetzungen / BesonderesThe prerequisites for this course are some programming and algorithmic experience. Background and experience in software engineering, programming languages/compilers, and security (as well as operating systems and databases) can be beneficial.
263-2925-00LProgram Analysis for System Security and Reliability Information
Findet dieses Semester nicht statt.
W7 KP2V + 1U + 3AM. Vechev
KurzbeschreibungSecurity issues in modern systems (blockchains, datacenters, deep learning, etc.) result in billions of losses due to hacks and system downtime. This course introduces fundamental techniques (ranging over automated analysis, machine learning, synthesis, zero-knowledge, differential privacy, and their combinations) that can be applied in practice so to build more secure and reliable modern systems.
Lernziel* Understand the fundamental techniques used to create modern security and reliability analysis engines that are used worldwide.

* Understand how symbolic techniques are combined with machine learning (e.g., deep learning, reinforcement learning) so to create new kinds of learning-based analyzers.

* Understand how to quantify and fix security and reliability issues in modern deep learning models.

* Understand open research questions from both theoretical and practical perspectives.
InhaltPlease see: https://www.sri.inf.ethz.ch/teaching/pass2022 for detailed course content.
263-4660-00LApplied Cryptography Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2PK. Paterson, F. Günther
KurzbeschreibungThis course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems.
LernzielThe goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so.
InhaltBasic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications.
LiteraturTextbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”, http://toc.cryptobook.us/book.pdf.
Voraussetzungen / BesonderesStudents should have taken the D-INFK Bachelor's course “Information Security" (252-0211-00) or an alternative first course covering cryptography at a similar level. / In this course, we will use Moodle for content delivery: https://moodle-app2.let.ethz.ch/course/view.php?id=19644.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Medien und digitale Technologiengeprüft
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Wahlfächer
NummerTitelTypECTSUmfangDozierende
252-0408-00LCryptographic Protocols Information W6 KP2V + 2U + 1AM. Hirt
KurzbeschreibungIn a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
LernzielTo know and understand a selection of cryptographic protocols and to
be able to analyze and prove their security and efficiency.
InhaltThe selection of considered protocols varies. Currently, we consider
multi-party computation, secret-sharing, broadcast and Byzantine
agreement. We look at both the synchronous and the asynchronous
communication model, and focus on simple protocols as well as on
highly-efficient protocols.
SkriptWe provide handouts of the slides. For some of the topics, we also
provide papers and/or lecture notes.
Voraussetzungen / BesonderesA basic understanding of fundamental cryptographic concepts (as taught
for example in the course Information Security) is useful, but not
required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
263-2812-00LProgram Verification Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AP. Müller, M. Eilers
KurzbeschreibungA hands-on introduction to the theory and construction of deductive program verifiers, covering both powerful techniques for formal program reasoning, and a perspective over the tool stack making up modern verification tools.
LernzielStudents will earn the necessary skills for designing, developing, and applying deductive verification tools that enable the modular verification of complex software, including features challenging for reasoning such as heap-based mutable data and concurrency. Students will learn both a variety of fundamental reasoning principles, and how these reasoning ideas can be made practical via automatic tools.

By the end of the course, students should have a good working understanding and decisions involved with designing and building practical verification tools, including the underlying theory. They will also be able to apply such tools to develop formally-verified programs.
InhaltThe course will cover verification techniques and ways to automate them by introducing a verifier for a small core language and then progressively enriching the language with advanced features such as a mutable heap and concurrency. For each language extension, the course will explain the necessary reasoning principles, specification techniques, and tool support. In particular, it will introduce SMT solvers to prove logical formulas, intermediate verification languages to encode verification problems, and source code verifiers to handle feature-rich languages. The course will intermix technical content with hands-on experience.
SkriptThe slides will be available online.
LiteraturWill be announced in the lecture.
Voraussetzungen / BesonderesA basic familiarity with propositional and first-order logic will be assumed. Courses with an emphasis on formal reasoning about programs (such as Formal Methods and Functional Programming) are advantageous background, but are not a requirement.
263-4600-00LFormal Methods for Information Security Information
Findet dieses Semester nicht statt.
W5 KP2V + 1U + 1A
KurzbeschreibungThe course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.
LernzielThe students will learn the key ideas and theoretical foundations of formal modeling and analysis of security protocols. The students will complement their theoretical knowledge by solving practical exercises, completing a small project, and using state-of-the-art tools. The students also learn the fundamentals of non-interference and runtime monitoring.
InhaltThe course treats formal methods mainly for the modeling and analysis of security protocols. Cryptographic protocols (such as SSL/TLS, SSH, Kerberos, SAML single-sign on, and IPSec) form the basis for secure communication and business processes. Numerous attacks on published protocols show that the design of cryptographic protocols is extremely error-prone. A rigorous analysis of these protocols is therefore indispensable, and manual analysis is insufficient. The lectures cover the theoretical basis for the (tool-supported) formal modeling and analysis of such protocols. Specifically, we discuss their operational semantics, the formalization of security properties, and techniques and algorithms for their verification.

The second part of this course will cover a selection of advanced topics in security protocols such as abstraction techniques for efficient verification, secure communication with humans, the link between symbolic protocol models and cryptographic models as well as RFID protocols (a staple of the Internet of Things) and electronic voting protocols, including the relevant privacy properties.

Moreover, we will give an introduction to two additional topics: non-interference as a general notion of secure systems, both from a semantic and a programming language perspective (type system), and runtime verification/monitoring to detect violations of security policies expressed as trace properties.
263-4656-00LDigital Signatures Information W5 KP2V + 2AD. Hofheinz
KurzbeschreibungDigital signatures as one central cryptographic building block. Different security goals and security definitions for digital signatures, followed by a variety of popular and fundamental signature schemes with their security analyses.
LernzielThe student knows a variety of techniques to construct and analyze the security of digital signature schemes. This includes modularity as a central tool of constructing secure schemes, and reductions as a central tool to proving the security of schemes.
InhaltWe will start with several definitions of security for signature schemes, and investigate the relations among them. We will proceed to generic (but inefficient) constructions of secure signatures, and then move on to a number of efficient schemes based on concrete computational hardness assumptions. On the way, we will get to know paradigms such as hash-then-sign, one-time signatures, and chameleon hashing as central tools to construct secure signatures.
LiteraturJonathan Katz, "Digital Signatures."
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course "Information Security" or an equivalent course at Bachelors level.
Vertiefung in Theoretical Computer Science
Kernfächer
NummerTitelTypECTSUmfangDozierende
261-5110-00LOptimization for Data Science Information W10 KP3V + 2U + 4AB. Gärtner, N. He
KurzbeschreibungThis course provides an in-depth theoretical treatment of optimization methods that are relevant in data science.
LernzielUnderstanding the guarantees and limits of relevant optimization methods used in data science. Learning theoretical paradigms and techniques to deal with optimization problems arising in data science.
InhaltThis course provides an in-depth theoretical treatment of classical and modern optimization methods that are relevant in data science.

After a general discussion about the role that optimization has in the process of learning from data, we give an introduction to the theory of (convex) optimization. Based on this, we present and analyze algorithms in the following four categories: first-order methods (gradient and coordinate descent, Frank-Wolfe, subgradient and mirror descent, stochastic and incremental gradient methods); second-order methods (Newton and quasi Newton methods); non-convexity (local convergence, provable global convergence, cone programming, convex relaxations); min-max optimization (extragradient methods).

The emphasis is on the motivations and design principles behind the algorithms, on provable performance bounds, and on the mathematical tools and techniques to prove them. The goal is to equip students with a fundamental understanding about why optimization algorithms work, and what their limits are. This understanding will be of help in selecting suitable algorithms in a given application, but providing concrete practical guidance is not our focus.
Voraussetzungen / BesonderesA solid background in analysis and linear algebra; some background in theoretical computer science (computational complexity, analysis of algorithms); the ability to understand and write mathematical proofs.
263-4400-00LAdvanced Graph Algorithms and Optimization Information W10 KP3V + 3U + 3AR. Kyng, M. Probst
KurzbeschreibungThis course will cover a number of advanced topics in optimization and graph algorithms.
LernzielThe course will take students on a deep dive into modern approaches to
graph algorithms using convex optimization techniques.

By studying convex optimization through the lens of graph algorithms,
students should develop a deeper understanding of fundamental
phenomena in optimization.

The course will cover some traditional discrete approaches to various graph
problems, especially flow problems, and then contrast these approaches
with modern, asymptotically faster methods based on combining convex
optimization with spectral and combinatorial graph theory.
InhaltStudents should leave the course understanding key
concepts in optimization such as first and second-order optimization,
convex duality, multiplicative weights and dual-based methods,
acceleration, preconditioning, and non-Euclidean optimization.

Students will also be familiarized with central techniques in the
development of graph algorithms in the past 15 years, including graph
decomposition techniques, sparsification, oblivious routing, and
spectral and combinatorial preconditioning.
Voraussetzungen / BesonderesThis course is targeted toward masters and doctoral students with an
interest in theoretical computer science.

Students should be comfortable with design and analysis of algorithms, probability, and linear algebra.

Having passed the course Algorithms, Probability, and Computing (APC) is highly recommended, but not formally required. If you are not
sure whether you're ready for this class or not, please consult the
instructor.
263-4508-00LAlgorithmic Foundations of Data Science Information W10 KP3V + 2U + 4AD. Steurer
KurzbeschreibungThis course provides rigorous theoretical foundations for the design and mathematical analysis of efficient algorithms that can solve fundamental tasks relevant to data science.
LernzielWe consider various statistical models for basic data-analytical tasks, e.g., (sparse) linear regression, principal component analysis, matrix completion, community detection, and clustering.

Our goal is to design efficient (polynomial-time) algorithms that achieve the strongest possible (statistical) guarantees for these models.

Toward this goal we learn about a wide range of mathematical techniques from convex optimization, linear algebra (especially, spectral theory and tensors), and high-dimensional statistics.

We also incorporate adversarial (worst-case) components into our models as a way to reason about robustness guarantees for the algorithms we design.
InhaltStrengths and limitations of efficient algorithms in (robust) statistical models for the following (tentative) list of data analysis tasks:

- (sparse) linear regression
- principal component analysis and matrix completion
- clustering and Gaussian mixture models
- community detection
SkriptTo be provided during the semester
LiteraturHigh-Dimensional Statistics
A Non-Asymptotic Viewpoint
by Martin J. Wainwright
Voraussetzungen / BesonderesMathematical and algorithmic maturity at least at the level of the course "Algorithms, Probability, and Computing".

Important: Optimization for Data Science 2018--2021
This course was created after a reorganization of the course "Optimization for Data Science" (ODS).
A significant portion of the material for this course has previously been taught as part of ODS.
Consequently, it is not possible to earn credit points for both this course and ODS as offered in 2018--2021.
This restriction does not apply to ODS offered in 2022 or afterwards and you can earn credit points for both courses in this case.
Wahlfächer
NummerTitelTypECTSUmfangDozierende
252-0408-00LCryptographic Protocols Information W6 KP2V + 2U + 1AM. Hirt
KurzbeschreibungIn a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
LernzielTo know and understand a selection of cryptographic protocols and to
be able to analyze and prove their security and efficiency.
InhaltThe selection of considered protocols varies. Currently, we consider
multi-party computation, secret-sharing, broadcast and Byzantine
agreement. We look at both the synchronous and the asynchronous
communication model, and focus on simple protocols as well as on
highly-efficient protocols.
SkriptWe provide handouts of the slides. For some of the topics, we also
provide papers and/or lecture notes.
Voraussetzungen / BesonderesA basic understanding of fundamental cryptographic concepts (as taught
for example in the course Information Security) is useful, but not
required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
252-1424-00LModels of ComputationW6 KP2V + 2U + 1AM. Cook
KurzbeschreibungThis course surveys many different models of computation: Turing Machines, Cellular Automata, Finite State Machines, Graph Automata, Circuits, Tilings, Lambda Calculus, Fractran, Chemical Reaction Networks, Hopfield Networks, String Rewriting Systems, Tag Systems, Diophantine Equations, Register Machines, Primitive Recursive Functions, and more.
LernzielThe goal of this course is to become acquainted with a wide variety of models of computation, to understand how models help us to understand the modeled systems, and to be able to develop and analyze models appropriate for new systems.
InhaltThis course surveys many different models of computation: Turing Machines, Cellular Automata, Finite State Machines, Graph Automata, Circuits, Tilings, Lambda Calculus, Fractran, Chemical Reaction Networks, Hopfield Networks, String Rewriting Systems, Tag Systems, Diophantine Equations, Register Machines, Primitive Recursive Functions, and more.
263-4509-00LComplex Network ModelsW5 KP2V + 2AJ. Lengler
KurzbeschreibungComplex network models are random graphs that feature one or several properties observed in real-world networks (e.g., social networks, internet graph, www). Depending on the application, different properties are relevant, and different complex network models are useful. This course gives an overview over some relevant models and the properties they do and do not cover.
LernzielThe students get familiar with a portfolio of network models, and they know their features and shortcomings. For a given application, they can identify relevant properties for this applications and can select an appropriate network model.
InhaltNetwork models: Erdös-Renyi random graphs, Chung-Lu graphs, configuration model, Kleinberg model, geometric inhomogeneous random graphs
Properties: degree distribution, structure of giant and smaller components, clustering coefficient, small-world properties, community structures, weak ties
SkriptThe script is available in moodle or at https://as.inf.ethz.ch/people/members/lenglerj/CompNetScript.pdf

It will be updated during the semester.
LiteraturLatora, Nikosia, Russo: "Complex Networks: Principles, Methods and Applications"
van der Hofstad: "Random Graphs and Complex Networks. Volume 1"
Voraussetzungen / BesonderesThe students must be familiar with the basics of graph theory and of probability theory (e.g. linearity of expectation, inequalities of Markov, Chebyshev, Chernoff). The course "Randomized Algorithms and Probabilistic Methods" is helpful, but not required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
263-4510-00LIntroduction to Topological Data Analysis Information W8 KP3V + 2U + 2AP. Schnider
KurzbeschreibungTopological Data Analysis (TDA) is a relatively new subfield of computer sciences, which uses techniques from algebraic topology and computational geometry and topology to analyze and quantify the shape of data. This course will introduce the theoretical foundations of TDA.
LernzielThe goal is to make students familiar with the fundamental concepts, techniques and results in TDA. At the end of the course, students should be able to read and understand current research papers and have the necessary background knowledge to apply methods from TDA to other projects.
InhaltMathematical background (Topology, Simplicial complexes, Homology), Persistent Homology, Complexes on point clouds (Čech complexes, Vietoris-Rips complexes, Delaunay complexes, Witness complexes), the TDA pipeline, Reeb Graphs, Mapper
LiteraturMain reference:

Tamal K. Dey, Yusu Wang: Computational Topology for Data Analysis, 2021
https://www.cs.purdue.edu/homes/tamaldey/book/CTDAbook/CTDAbook.html


Other references:

Herbert Edelsbrunner, John Harer: Computational Topology: An Introduction, American Mathematical Society, 2010
https://bookstore.ams.org/mbk-69

Gunnar Carlsson, Mikael Vejdemo-Johansson: Topological Data Analysis with Applications, Cambridge University Press, 2021
Link

Robert Ghrist: Elementary Applied Topology, 2014
https://www2.math.upenn.edu/~ghrist/notes.html

Allen Hatcher: Algebraic Topology, Cambridge University Press, 2002
https://pi.math.cornell.edu/~hatcher/AT/ATpage.html
Voraussetzungen / BesonderesThe course assumes knowledge of discrete mathematics, algorithms and data structures and linear algebra, as supplied in the first semesters of Bachelor Studies at ETH.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgefördert
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengefördert
263-4656-00LDigital Signatures Information W5 KP2V + 2AD. Hofheinz
KurzbeschreibungDigital signatures as one central cryptographic building block. Different security goals and security definitions for digital signatures, followed by a variety of popular and fundamental signature schemes with their security analyses.
LernzielThe student knows a variety of techniques to construct and analyze the security of digital signature schemes. This includes modularity as a central tool of constructing secure schemes, and reductions as a central tool to proving the security of schemes.
InhaltWe will start with several definitions of security for signature schemes, and investigate the relations among them. We will proceed to generic (but inefficient) constructions of secure signatures, and then move on to a number of efficient schemes based on concrete computational hardness assumptions. On the way, we will get to know paradigms such as hash-then-sign, one-time signatures, and chameleon hashing as central tools to construct secure signatures.
LiteraturJonathan Katz, "Digital Signatures."
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course "Information Security" or an equivalent course at Bachelors level.
272-0300-00LAlgorithmik für schwere Probleme Information
Diese Lerneinheit beinhaltet die Mentorierte Arbeit Fachwissenschaftliche Vertiefung mit pädagogischem Fokus Informatik A n i c h t !
W5 KP2V + 1U + 1AH.‑J. Böckenhauer, D. Komm
KurzbeschreibungDiese Lerneinheit beschäftigt sich mit algorithmischen Ansätzen zur Lösung schwerer Probleme, insbesondere mit exakten Algorithmen mit moderat exponentieller Laufzeit und parametrisierten Algorithmen.

Eine umfassende Reflexion über die Bedeutung der vorgestellten Ansätze für den Informatikunterricht an Gymnasien begleitet den Kurs.
LernzielAuf systematische Weise eine Übersicht über die Methoden zur Lösung schwerer Probleme kennen lernen. Vertiefte Kenntnisse im Bereich exakter und parameterisierter Algorithmen erwerben.
InhaltZuerst wird der Begriff der Berechnungsschwere erläutert (für die Informatikstudierenden wiederholt). Dann werden die Methoden zur Lösung schwerer Probleme systematisch dargestellt. Bei jeder Algorithmenentwurfsmethode wird vermittelt, was sie uns garantiert und was sie nicht sichern kann und womit wir für die gewonnene Effizienz bezahlen. Ein Schwerpunkt liegt auf exakten Algorithmen mit moderat exponentieller Laufzeit und auf parametrisierten Algorithmen.
SkriptUnterlagen und Folien werden zur Verfügung gestellt.
LiteraturJ. Hromkovic: Algorithmics for Hard Problems, Springer 2004.

R. Niedermeier: Invitation to Fixed-Parameter Algorithms, 2006.

M. Cygan et al.: Parameterized Algorithms, 2015.

F. Fomin et al.: Kernelization, 2019.

F. Fomin, D. Kratsch: Exact Exponential Algorithms, 2010.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
272-0302-00LApproximations- und Online-Algorithmen Information
Findet dieses Semester nicht statt.
W5 KP2V + 1U + 1AD. Komm
KurzbeschreibungDiese Lerneinheit behandelt approximative Verfahren für schwere Optimierungsprobleme und algorithmische Ansätze zur Lösung von Online-Problemen sowie die Grenzen dieser Ansätze.
LernzielAuf systematische Weise einen Überblick über die verschiedenen Entwurfsmethoden von approximativen Verfahren für schwere Optimierungsprobleme und Online-Probleme zu gewinnen. Methoden kennenlernen, die Grenzen dieser Ansätze aufweisen.
InhaltApproximationsalgorithmen sind einer der erfolgreichsten Ansätze zur Behandlung schwerer Optimierungsprobleme. Dabei untersucht man die sogenannte Approximationsgüte, also das Verhältnis der Kosten einer berechneten Näherungslösung und der Kosten einer (nicht effizient berechenbaren) optimalen Lösung.
Bei einem Online-Problem ist nicht die gesamte Eingabe von Anfang an bekannt, sondern sie erscheint stückweise und für jeden Teil der Eingabe muss sofort ein entsprechender Teil der endgültigen Ausgabe produziert werden. Die Güte eines Algorithmus für ein Online-Problem misst man mit der competitive ratio, also dem Verhältnis der Kosten der berechneten Lösung und der Kosten einer optimalen Lösung, wie man sie berechnen könnte, wenn die gesamte Eingabe bekannt wäre.

Inhalt dieser Lerneinheit sind
- die Klassifizierung von Optimierungsproblemen nach der erreichbaren Approximationsgüte,
- systematische Methoden zum Entwurf von Approximationsalgorithmen (z. B. Greedy-Strategien, dynamische Programmierung, LP-Relaxierung),
- Methoden zum Nachweis der Nichtapproximierbarkeit,
- klassische Online-Probleme wie Paging oder Scheduling-Probleme und Algorithmen zu ihrer Lösung,
- randomisierte Online-Algorithmen,
- Entwurfs- und Analyseverfahren für Online-Algorithmen,
- Grenzen des "competitive ratio"- Modells und Advice-Komplexität als eine Möglichkeit, die Komplexität von Online-Problemen genauer zu messen.
LiteraturDie Vorlesung orientiert sich teilweise an folgenden Büchern:

J. Hromkovic: Algorithmics for Hard Problems, Springer, 2004

D. Komm: An Introduction to Online Computation: Determinism, Randomization, Advice, Springer, 2016

Zusätzliche Literatur:

A. Borodin, R. El-Yaniv: Online Computation and Competitive Analysis, Cambridge University Press, 1998
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
401-3052-10LGraph TheoryW10 KP4V + 1UB. Sudakov
KurzbeschreibungBasics, trees, Caley's formula, matrix tree theorem, connectivity, theorems of Mader and Menger, Eulerian graphs, Hamilton cycles, theorems of Dirac, Ore, Erdös-Chvatal, matchings, theorems of Hall, König, Tutte, planar graphs, Euler's formula, Kuratowski's theorem, graph colorings, Brooks' theorem, 5-colorings of planar graphs, list colorings, Vizing's theorem, Ramsey theory, Turán's theorem
LernzielThe students will get an overview over the most fundamental questions concerning graph theory. We expect them to understand the proof techniques and to use them autonomously on related problems.
SkriptLecture will be only at the blackboard.
LiteraturWest, D.: "Introduction to Graph Theory"
Diestel, R.: "Graph Theory"

Further literature links will be provided in the lecture.
Voraussetzungen / BesonderesStudents are expected to have a mathematical background and should be able to write rigorous proofs.
401-3902-21LNetwork & Integer Optimization: From Theory to ApplicationW6 KP3GR. Zenklusen
KurzbeschreibungThis course covers various topics in Network and (Mixed-)Integer Optimization. It starts with a rigorous study of algorithmic techniques for some network optimization problems (with a focus on matching problems) and moves to key aspects of how to attack various optimization settings through well-designed (Mixed-)Integer Programming formulations.
LernzielOur goal is for students to both get a good foundational understanding of some key network algorithms and also to learn how to effectively employ (Mixed-)Integer Programming formulations, techniques, and solvers, to tackle a wide range of discrete optimization problems.
InhaltKey topics include:
- Matching problems;
- Integer Programming techniques and models;
- Extended formulations and strong problem formulations;
- Solver techniques for (Mixed-)Integer Programs;
- Decomposition approaches.
Literatur- Bernhard Korte, Jens Vygen: Combinatorial Optimization. 6th edition, Springer, 2018.
- Alexander Schrijver: Combinatorial Optimization: Polyhedra and Efficiency. Springer, 2003. This work has 3 volumes.
- Vanderbeck François, Wolsey Laurence: Reformulations and Decomposition of Integer Programs. Chapter 13 in: 50 Years of Integer Programming 1958-2008. Springer, 2010.
- Alexander Schrijver: Theory of Linear and Integer Programming. John Wiley, 1986.
Voraussetzungen / BesonderesSolid background in linear algebra. Preliminary knowledge of Linear Programming is ideal but not a strict requirement. Prior attendance of the course Linear & Combinatorial Optimization is a plus.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgeprüft
Persönliche KompetenzenKreatives Denkengeprüft
402-0448-01LQuantum Information Processing I: Concepts
Dieser theoretisch ausgerichtete Teil QIP I bildet zusammen mit dem experimentell ausgerichteten Teil 402-0448-02L QIP II, die beide im Frühjahrssemester angeboten werden, im Master-Studiengang Physik das experimentelle Kernfach "Quantum Information Processing" mit total 10 ECTS-Kreditpunkten.
W5 KP2V + 1UJ. Home
KurzbeschreibungThe course covers the key concepts of quantum information processing, including quantum algorithms which give the quantum computer the power to compute problems outside the reach of any classical supercomputer.
Key concepts such as quantum error correction are discussed in detail. They provide fundamental insights into the nature of quantum states and measurements.
LernzielBy the end of the course students are able to explain the basic mathematical formalism of quantum mechanics and apply them to quantum information processing problems. They are able to adapt and apply these concepts and methods to analyse and discuss quantum algorithms and other quantum information-processing protocols.
InhaltThe topics covered in the course will include quantum circuits, gate decomposition and universal sets of gates, efficiency of quantum circuits, quantum algorithms (Shor, Grover, Deutsch-Josza,..), quantum error correction, fault-tolerant designs, and quantum simulation.
SkriptWill be provided.
LiteraturQuantum Computation and Quantum Information
Michael Nielsen and Isaac Chuang
Cambridge University Press
Voraussetzungen / BesonderesA good understanding of finite dimensional linear algebra is recommended.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Vertiefung in Visual and Interactive Computing
Kernfächer
NummerTitelTypECTSUmfangDozierende
252-0538-00LShape Modeling and Geometry Processing Information W8 KP2V + 1U + 4AO. Sorkine Hornung
KurzbeschreibungThis course covers the fundamentals and developments in geometric modeling and geometry processing. Topics include surface modeling based on point clouds and polygonal meshes, mesh generation, surface reconstruction, mesh fairing and parameterization, discrete differential geometry, interactive shape editing, topics in digital shape fabrication.
LernzielThe students will learn how to design, program and analyze algorithms and systems for interactive 3D shape modeling and geometry processing.
InhaltRecent advances in 3D geometry processing have created a plenitude of novel concepts for the mathematical representation and interactive manipulation of geometric models. This course covers the fundamentals and some of the developments in geometric modeling and geometry processing. Topics include surface modeling based on point clouds and triangle meshes, mesh generation, surface reconstruction, mesh fairing and parameterization, discrete differential geometry, interactive shape editing and digital shape fabrication.
SkriptSlides and course notes
Voraussetzungen / BesonderesPrerequisites:
Visual Computing, Computer Graphics or an equivalent class. Experience with C++ programming. Solid background in linear algebra and analysis. Some knowledge of differential geometry, computational geometry and numerical methods is helpful but not a strict requirement.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenProblemlösunggeprüft
263-3710-00LMachine Perception Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2AO. Hilliges, J. Song
KurzbeschreibungRecent developments in neural networks have drastically advanced the performance of machine perception systems in a variety of areas including computer vision, robotics, and human shape modeling This course is a deep dive into deep learning algorithms and architectures with applications to a variety of perceptual and generative tasks.
LernzielStudents will learn about fundamental aspects of modern deep learning approaches for perception and generation. Students will learn to implement, train and debug their own neural networks and gain a detailed understanding of cutting-edge research in learning-based computer vision, robotics, and shape modeling. The optional final project assignment will involve training a complex neural network architecture and applying it to a real-world dataset.

The core competency acquired through this course is a solid foundation in deep-learning algorithms to process and interpret human-centric signals. In particular, students should be able to develop systems that deal with the problem of recognizing people in images, detecting and describing body parts, inferring their spatial configuration, performing action/gesture recognition from still images or image sequences, also considering multi-modal data, among others.
InhaltWe will focus on teaching: how to set up the problem of machine perception, the learning algorithms, network architectures, and advanced deep learning concepts in particular probabilistic deep learning models.

The course covers the following main areas:
I) Foundations of deep learning.
II) Advanced topics like probabilistic generative modeling of data (latent variable models, generative adversarial networks, auto-regressive models, invertible neural networks, diffusion models).
III) Deep learning in computer vision, human-computer interaction, and robotics.

Specific topics include:
I) Introduction to Deep Learning:
a) Neural Networks and training (i.e., backpropagation)
b) Feedforward Networks
c) Timeseries modelling (RNN, GRU, LSTM)
d) Convolutional Neural Networks
II) Advanced topics:
a) Latent variable models (VAEs)
b) Generative adversarial networks (GANs)
c) Autoregressive models (PixelCNN, PixelRNN, TCN, Transformer)
d) Invertible Neural Networks / Normalizing Flows
e) Coordinate-based networks (neural implicit surfaces, NeRF)
f) Diffusion models
III) Applications in machine perception and computer vision:
a) Fully Convolutional architectures for dense per-pixel tasks (i.e., instance segmentation)
b) Pose estimation and other tasks involving human activity
c) Neural shape modeling (implicit surfaces, neural radiance fields)
d) Deep Reinforcement Learning and Applications in Physics-Based Behavior Modeling
LiteraturDeep Learning
Book by Ian Goodfellow and Yoshua Bengio
Voraussetzungen / BesonderesThis is an advanced grad-level course that requires a background in machine learning. Students are expected to have a solid mathematical foundation, in particular in linear algebra, multivariate calculus, and probability. The course will focus on state-of-the-art research in deep learning and will not repeat the basics of machine learning

Please take note of the following conditions:
1) Students must have taken the exam in Machine Learning (252-0535-00) or have acquired equivalent knowledge
2) All practical exercises will require basic knowledge of Python and will use libraries such as Pytorch, scikit-learn, and scikit-image. We will provide introductions to Pytorch and other libraries that are needed but will not provide introductions to basic programming or Python.

The following courses are strongly recommended as prerequisites:
* "Visual Computing" or "Computer Vision"

The course will be assessed by a final written examination in English. No course materials or electronic devices can be used during the examination. Note that the examination will be based on the contents of the lectures, the associated reading materials, and the exercises.

The exam will be a 3-hour end-of-term exam and take place at the end of the teaching period.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Selbststeuerung und Selbstmanagement gefördert
263-5806-00LDigital Humans Information
Previously Computational Models of Motion and Virtual Humans
W8 KP3V + 2U + 2AS. Coros, S. Tang
KurzbeschreibungThis course covers the core technologies required to model and simulate motions for digital humans and robotic characters. Topics include kinematic modeling, physics-based simulation, trajectory optimization, reinforcement learning, feedback control for motor skills, motion capture, data-driven motion synthesis, and ML-based generative models. They will be richly illustrated with examples.
LernzielStudents will learn how to estimate human pose, shape, and motion from videos and create basic human avatars from various visual inputs. Students will also learn how to represent and algorithmically generate motions for digital characters and their real-life robotic counterparts. The lectures are accompanied by four programming assignments (written in python or C++) and a capstone project.

The deadline to cancel/deregister from the course is May 1st. Deregistration after the deadline will lead to fail.
Inhalt- Basic concept of 3D representations
- Human body/hand models
- Human motion capture;
- Non-​rigid surface tracking and reconstruction
- Neural rendering
- Optimal control and trajectory optimization
- Physics-based modeling for multibody systems
- Forward and inverse kinematics
- Rigging and keyframing
- Reinforcement learning for locomotion
Voraussetzungen / BesonderesExperience with python and C++ programming, numerical linear algebra, multivariate calculus and probability theory. Some background in deep learning, computer vision, physics-based modeling, kinematics, and dynamics is preferred.
KompetenzenKompetenzen
Fachspezifische KompetenzenVerfahren und Technologiengeprüft
Wahlfächer
NummerTitelTypECTSUmfangDozierende
252-0312-00LMobile Health and Activity Monitoring Information W6 KP2V + 3AC. Holz
KurzbeschreibungHealth and activity monitoring has become a key purpose of mobile & wearable devices, e.g., phones, watches, and rings. We will cover the phenomena they capture, i.e., user behavior, actions, and human physiology, as well as the sensors, signals, and methods for processing and analysis.

For the exercise, students will receive a wristband to stream and analyze activity and health signals.
LernzielThe course will combine high-level concepts with low-level technical methods needed to sense, detect, and understand them.

High-level:
– sensing modalities for interactive systems
– "activities" and "events" (exercises and other mechanical activities such as movements and resulting vibrations)
– health monitoring (basic cardiovascular physiology)
– affective computing (emotions, mood, personality)

Lower-level:
– sampling and filtering, time and frequency domains
– cross-modal sensor systems, signal synchronization and correlation
– event detection, classification, prediction using basic signal processing as well as learning-based methods
– sensor types: optical, mechanical/acoustic, electromagnetic
InhaltHealth and activity monitoring has become a key purpose of mobile and wearable devices, including phones, (smart) watches, (smart) rings, (smart) belts, and other trackers (e.g., shoe clips, pendants). In this course, we will cover the fundamental aspects that these devices observe, i.e., user behavior, actions, and physiological dynamics of the human body, as well as the sensors, signals, and methods to capture, process, and analyze them. We will then cover methods for pattern extraction and classification on such data. The course will therefore touch on aspects of human activities, cardiovascular and pulmonary physiology, affective computing (recognizing, interpreting, and processing emotions), corresponding lower-level sensing systems (e.g., inertial sensing, optical sensing, photoplethysmography, eletrodermal activity, electrocardiograms) and higher-level computer vision-based sensing (facial expressions, motions, gestures), as well as processing methods for these types of data.

The course will be accompanied by a group exercise project, in which students will apply the concepts and methods taught in class. Students will receive a wearable wristband device that streams IMU data to a mobile phone (code will be provided for receiving, storing, visualizing on the phone). Throughout the course and exercises, we will collect data of various human activities from the band, annotate them, analyze, classify, and interpret them. For this, existing and novel processing methods will be developed (plenty of related work exists), based on the collected data as well as existing datasets. We will also combine the band with signals obtained from the mobile phone to holistically capture and analyze health and activity data.

Full details: https://teaching.siplab.org/mobile_health_activity_monitoring/2023/

Note: All lectures will be streamed live and recorded for later replay. Hybrid participation will be possible.
SkriptCopies of slides will be made available
Lectures will be streamed live as well as recorded and made available online.

More information on the course site: https://teaching.siplab.org/mobile_health_activity_monitoring/2023/

Note: All lectures will be streamed live and recorded for later replay. Hybrid participation will be possible.
LiteraturWill be provided in the lecture
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Medien und digitale Technologiengeprüft
Problemlösunggeprüft
Soziale KompetenzenKooperation und Teamarbeitgeprüft
Sensibilität für Vielfalt geprüft
Persönliche KompetenzenAnpassung und Flexibilitätgeprüft
Kreatives Denkengeprüft
Kritisches Denkengeprüft
252-0579-00L3D Vision Information W5 KP3G + 1AM. Pollefeys, D. B. Baráth
KurzbeschreibungThe course covers camera models and calibration, feature tracking and matching, camera motion estimation via simultaneous localization and mapping (SLAM) and visual odometry (VO), epipolar and mult-view geometry, structure-from-motion, (multi-view) stereo, augmented reality, and image-based (re-)localization.
LernzielAfter attending this course, students will:
1. understand the core concepts for recovering 3D shape of objects and scenes from images and video.
2. be able to implement basic systems for vision-based robotics and simple virtual/augmented reality applications.
3. have a good overview over the current state-of-the art in 3D vision.
4. be able to critically analyze and asses current research in this area.
InhaltThe goal of this course is to teach the core techniques required for robotic and augmented reality applications: How to determine the motion of a camera and how to estimate the absolute position and orientation of a camera in the real world. This course will introduce the basic concepts of 3D Vision in the form of short lectures, followed by student presentations discussing the current state-of-the-art. The main focus of this course are student projects on 3D Vision topics, with an emphasis on robotic vision and virtual and augmented reality applications.
252-5706-00LMathematical Foundations of Computer Graphics and Vision Information W5 KP2V + 1U + 1AT. Aydin, A. Djelouah
KurzbeschreibungThis course presents the fundamental mathematical tools and concepts used in computer graphics and vision. Each theoretical topic is introduced in the context of practical vision or graphic problems, showcasing its importance in real-world applications.
LernzielThe main goal is to equip the students with the key mathematical tools necessary to understand state-of-the-art algorithms in vision and graphics. In addition to the theoretical part, the students will learn how to use these mathematical tools to solve a wide range of practical problems in visual computing. After successfully completing this course, the students will be able to apply these mathematical concepts and tools to practical industrial and academic projects in visual computing.
InhaltThe theory behind various mathematical concepts and tools will be introduced, and their practical utility will be showcased in diverse applications in computer graphics and vision. The course will cover topics in sampling, reconstruction, approximation, optimization, robust fitting, differentiation, quadrature and spectral methods. Applications will include 3D surface reconstruction, camera pose estimation, image editing, data projection, character animation, structure-aware geometry processing, and rendering.
263-5052-00LInteractive Machine Learning: Visualization & Explainability Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AM. El-Assady
KurzbeschreibungVisual Analytics supports the design of human-in-the-loop interfaces that enable human-machine collaboration. In this course, will go through the fundamentals of designing interactive visualizations, later applying them to explain and interact with machine leaning models.
LernzielThe goal of the course is to introduce techniques for interactive information visualization and to apply these on understanding, diagnosing, and refining machine learning models.
InhaltInteractive, mixed-initiative machine learning promises to combine the efficiency of automation with the effectiveness of humans for a collaborative decision-making and problem-solving process. This can be facilitated through co-adaptive visual interfaces.

This course will first introduce the foundations of information visualization design based on data charecteristics, e.g., high-dimensional, geo-spatial, relational, temporal, and textual data.

Second, we will discuss interaction techniques and explanation strategies to enable explainable machine learning with the tasks of understanding, diagnosing, and refining machine learning models.

Tentative list of topics:
1. Visualization and Perception
2. Interaction and Explanation
3. Systems Overview
SkriptCourse material will be provided in form of slides.
LiteraturWill be provided during the course.
Voraussetzungen / BesonderesBasic understanding of machine learning as taught at the Bachelor's level.
263-5701-00LScientific Visualization Information W5 KP2V + 1U + 1AM. Gross, T. Günther
KurzbeschreibungThis lecture provides an introduction into visualization of scientific and abstract data.
LernzielThis lecture provides an introduction into the visualization of scientific and abstract data. The lecture introduces into the two main branches of visualization: scientific visualization and information visualization. The focus is set onto scientific data, demonstrating the usefulness and necessity of computer graphics in other fields than the entertainment industry. The exercises contain theoretical tasks on the mathematical foundations such as numerical integration, differential vector calculus, and flow field analysis, while programming exercises familiarize with the Visualization Tool Kit (VTK). In a course project, the learned methods are applied to visualize one real scientific data set. The provided data sets contain measurements of volcanic eruptions, galaxy simulations, fluid simulations, meteorological cloud simulations and asteroid impact simulations.
InhaltThis lecture opens with human cognition basics, and scalar and vector calculus. Afterwards, this is applied to the visualization of air and fluid flows, including geometry-based, topology-based and feature-based methods. Further, the direct and indirect visualization of volume data is discussed. The lecture ends on the viualization of abstract, non-spatial and multi-dimensional data by means of information visualization.
Voraussetzungen / BesonderesFundamentals of differential calculus. Knowledge on numerical mathematics, computer algebra systems, as well as ordinary and partial differential equations is an asset, but not required.
Seminar
NummerTitelTypECTSUmfangDozierende
252-2603-00LSeminar on Systems Security Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SS. Shinde
KurzbeschreibungThe seminar focuses on critical thinking and critique of fundamental as well as recent advances in systems security.
LernzielThe learning objective is to analyze selected research papers
published at top systems+security venues and then identify open
problems in this space. The seminar will achieve this via several
components: reading papers, technical presentations, writing analysis
and critique summaries, class discussions, and exploring potential
research topics.
InhaltEach student will pick one paper from the selected list, present it in
the class, and lead the discussion for that paper.

During the semester, all students will select, read, and submit
critique summaries for at least 8 research papers from the list.
Voraussetzungen / BesonderesStudents who are either interested in security research or are
exploring thesis topics are highly encouraged to take this course.
Students with systems/architecture/verification/PL expertise and basic
security understanding are welcome.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgeprüft
Menschenführung und Verantwortunggeprüft
Selbstdarstellung und soziale Einflussnahmegeprüft
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
252-4102-00LSeminar on Randomized Algorithms and Probabilistic Methods Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SA. Steger
KurzbeschreibungThe aim of the seminar is to study papers which bring the students to the forefront of today's research topics. This semester we will study selected papers of the conference Symposium on Discrete Algorithms (SODA22).
LernzielRead papers from the forefront of today's research; learn how to give a scientific talk.
Voraussetzungen / BesonderesThe seminar is open for both students from mathematics and students from computer science. As prerequisite we require that you passed the course Randomized Algorithms and Probabilistic Methods (or equivalent, if you come from abroad).
252-5704-00LAdvanced Methods in Computer Graphics Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SM. Gross, O. Sorkine Hornung
KurzbeschreibungThis seminar covers advanced topics in computer graphics with a focus on the latest research results. Topics include modeling, rendering, visualization,
animation, physical simulation, computational photography, and others.
LernzielThe goal is to obtain an in-depth understanding of actual problems and
research topics in the field of computer graphics as well as improve
presentation and critical analysis skills.
261-5113-00LComputational Challenges in Medical Genomics Information Belegung eingeschränkt - Details anzeigen W2 KP2SA. Kahles
KurzbeschreibungThis seminar discusses recent relevant contributions to the fields of computational genomics, algorithmic bioinformatics, statistical genetics and related areas. Each participant will hold a presentation and lead the subsequent discussion.
LernzielPreparing and holding a scientific presentation in front of peers is a central part of working in the scientific domain. In this seminar, the participants will learn how to efficiently summarize the relevant parts of a scientific publication, critically reflect its contents, and summarize it for presentation to an audience. The necessary skills to succesfully present the key points of existing research work are the same as needed to communicate own research ideas.
In addition to holding a presentation, each student will both contribute to as well as lead a discussion section on the topics presented in the class.
InhaltThe topics covered in the seminar are related to recent computational challenges that arise from the fields of genomics and biomedicine, including but not limited to genomic variant interpretation, genomic sequence analysis, compressive genomics tasks, single-cell approaches, privacy considerations, statistical frameworks, etc.
Both recently published works contributing novel ideas to the areas mentioned above as well as seminal contributions from the past are amongst the list of selected papers.
Voraussetzungen / BesonderesKnowledge of algorithms and data structures and interest in applications in genomics and computational biomedicine.
KompetenzenKompetenzen
Fachspezifische KompetenzenVerfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Medien und digitale Technologiengeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgeprüft
Persönliche KompetenzenKreatives Denkengeprüft
Integrität und Arbeitsethikgeprüft
Selbstbewusstsein und Selbstreflexion geprüft
263-2100-00LResearch Topics in Software Engineering Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SZ. Su, M. Vechev, R. Jung
KurzbeschreibungThis seminar is an opportunity to become familiar with current research in software engineering and more generally with the methods and challenges of scientific research.
LernzielEach student will be asked to study some papers from the recent software engineering literature and review them. This is an exercise in critical review and analysis. Active participation is required (a presentation of a paper as well as participation in discussions).
InhaltThe aim of this seminar is to introduce students to recent research results in the area of programming languages and software engineering. To accomplish that, students will study and present research papers in the area as well as participate in paper discussions. The papers will span topics in both theory and practice, including papers on program verification, program analysis, testing, programming language design, and development tools.
LiteraturThe publications to be presented will be announced on the seminar home page at least one week before the first session.
Voraussetzungen / BesonderesPapers will be distributed during the first lecture.
263-2926-00LDeep Learning for Big Code Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SV. Raychev
KurzbeschreibungThe seminar covers some of the latest and most exciting developments (industrial and research) in the field of Deep Learning for Code, including new methods and latest systems, as well as open challenges and opportunities.
LernzielThe objective of the seminar is to:

- Introduce students to the field of Deep Learning for Big Code.

- Learn how machine learning models can be used to solve practical challenges in software engineering and programming beyond traditional methods.

- Highlight the latest research and work opportunities in industry and academia available on this topic.
InhaltThe last 5 years have seen increased interest in applying advanced machine learning techniques such as deep learning to new kind of data: program code. As the size of open source code increases dramatically (over 980 billion lines of code written by humans), so comes the opportunity for new kind of deep probabilistic methods and commercial systems that leverage this data to revolutionize software creation and address hard problems not previously possible. Examples include: machines writing code, program de-obfuscation for security, code search, and many more.

Interestingly, this new type of data, unlike natural language and images, introduces technical challenges not typically encountered when working with standard datasets (e.g., images, videos, natural language), for instance, finding the right representation over which deep learning operates. This in turn has the potential to drive new kinds of machine learning models with broad applicability.

Because of this, there has been substantial interest over the last few years in both industry (e.g., companies such as Facebook starting, various start-ups in the space such as http://deepcode.ai), academia (e.g., http://plml.ethz.ch) and government agencies (e.g., DARPA) on using machine learning to automate various programming tasks.

In this seminar, we will cover some of the latest and most exciting developments in the field of Deep Learning for Code, including new methods and latest systems, as well as open challenges and opportunities.

The seminar is carried out as a set of presentations chosen from a list of available papers. The grade is determined as a function of the presentation, handling questions and answers, and participation.
Voraussetzungen / BesonderesThe seminar is carried out as a set of presentations chosen from a list of available papers. The grade is determined as a function of the presentation, handling questions and answers, and participation.

The seminar is ideally suited for M.Sc. students in Computer Science.
263-3600-00LHeterogeneous Systems Seminar Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SM. J. Giardino
KurzbeschreibungThe seminar covers heterogeneous systems, those that make use of different types of computing (GPUs, FPGA, ASICs, etc.) and/or memory (NVM/SCM). Our focus will be the systems and architectures that use these devices.
LernzielThe objective of this course is to familiarize students with important topics in heterogeneous systems, past, present, and future: the devices, the architectures, and their uses.
InhaltThe seminar consists of student presentations based upon a list of papers provided at the beginning of the course. Presentations will be done in teams. Students will be allotted a 45 minute time slot consisting of a 30 minute presentation and 15
minutes for questions. Grading is based upon the quality of the presentation, the coverage of the paper including necessary background and follow-on work, and the ability to understand and critique the paper and technology.
263-3712-00LAdvanced Seminar on Computational Haptics Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SJ. J. Zarate
KurzbeschreibungHaptic rendering technologies stimulate the user’s senses of touch and motion just as felt when interacting with physical objects. Actuation techniques need to address three questions: 1) What to actuate, 2) How to actuate it and 3) When to actuate it. We will approach each of these questions from a heavily technical perspective, with a focus on optimization and machine learning to find answers.
LernzielThe goal of the seminar is to familiarize students with exciting new research topics in this important area, but also to teach basic scientific writing and oral presentation skills.
InhaltHaptics rendering is the use of technology that stimulates the senses of touch and motion that would be felt by a user interacting directly with physical objects. This usually involves hardware that is capable of delivering these senses. Three questions arise here: 1) What to actuate, 2) How to actuate it and 3) When to actuate. We will approach these questions from a heavy technical perspective that usually have an optimization or machine learning focus. Papers from scientific venues such as CHI, UIST & SIGGRAPH will be examined in-depth that answer these questions (partially). Students present and discuss the papers to extract techniques and insights that can be applied to software & hardware projects. Topics revolve around computational design, sensor placement, user state interference (through machine learning), and actuation as an optimization problem.


The seminar will have a different structure from regular seminars to encourage more discussion and a deeper learning experience. We will use a case-study format where all students read the same paper each week but fulfill different roles and hence prepare with different viewpoints in mind ( "presenter", "historian", "PhD", and “Journalist”).

The final deliverables include:
20 Minute presentation as presenter
5 Minute presentation as historian
1 A4 research proposal as the PhD
1 A4 summary of the discussion as the Journalist.

Example papers are:
Tactile Rendering Based on Skin Stress Optimization - (http://mslab.es/projects/TactileRenderingSkinStress/) SIGGRAPH 2020
SimuLearn: Fast and Accurate Simulator to Support Morphing Materials Design and Workflows - (https://dl.acm.org/doi/10.1145/3379337.3415867) UIST 2019
Fabrication-in-the-Loop Co-Optimization of Surfaces and Styli for Drawing Haptics -(https://www.pdf.inf.usi.ch/projects/SurfaceStylusCoOpt/index.html) SIGGRAPH 2020

For each topic, a paper will be chosen that represents the state of the art of research or seminal work that inspired and fostered future work. Students will learn how to incorporate computational methods into systems that involve software, hardware, and, very importantly, users.
LiteraturComputational Interaction, Edited by Antti Oulasvirta, Per Ola Kristensson, Xiaojun Bi, and Andrew Howes, 2018. PDF Freely available through the ETH Network.

Link
263-4203-00LGeometry: Combinatorics and Algorithms Information
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SB. Gärtner, M. Hoffmann, E. Welzl, P. Schnider
KurzbeschreibungThis seminar complements the course Geometry: Combinatorics & Algorithms. Students of the seminar will present original research papers, some classic and some of them very recent.
LernzielEach student is expected to read, understand, and elaborate on a selected research paper. To this end, (s)he should give a 45-min. presentation about the paper. The process includes

* getting an overview of the related literature;
* understanding and working out the background/motivation:
why and where are the questions addressed relevant?
* understanding the contents of the paper in all details;
* selecting parts suitable for the presentation;
* presenting the selected parts in such a way that an audience
with some basic background in geometry and graph theory can easily understand and appreciate it.
InhaltThis seminar is held once a year and complements the course Geometry: Combinatorics & Algorithms. Students of the seminar will present original research papers, some classic and some of them very recent. The seminar is a good preparation for a master, diploma, or semester thesis in the area.
Voraussetzungen / BesonderesPrerequisite: Successful participation in the course "Geometry: Combinatorics & Algorithms" (takes place every HS) is required.
263-4651-00LCurrent Topics in Cryptography Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SD. Hofheinz, U. Maurer, K. Paterson
KurzbeschreibungIn this seminar course, students present and discuss a variety of recent research papers in Cryptography.
LernzielIndependent study of scientific literature and assessment of its contributions as well as learning and practicing presentation techniques.
InhaltThe course lecturers will provide a list of papers from which students will select.
LiteraturThe reading list will be published on the course website.
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course “Information Security" or an equivalent course at Bachelors level. Ideally, they will have attended or will attend in parallel the Masters course in "Applied Cryptography”.
263-5002-00LGenerative Visual Models Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W4 KP2S + 2AT. Hofmann
KurzbeschreibungThis seminar investigates generative models for image synthesis, which can be controlled via language prompts and visual seeding. The relevant methods will be explained in a few initial classes. Participants will study the research literature and develop project ideas in small groups, which will then be implemented. Presentation of research papers, project ideas, and results is a key component.
LernzielThe goal of this class is for participants to find, read, understand and critically assess research literature in order to reach the current state of knowledge in the field. Moreover, the project work aims to enrich these readings by hands-on experience and allows for student to develop creative ideas of their own. This is meant to provide a wholistic research experience in small teams.
InhaltPhase 1: Introduction & Background
During the first weeks of the semester lectures will provide the technical background to understand visual generative models. This includes a historic overview as well as technical deep dives into specialized topics such as stable diffusion and contrastive learning.
There will also be a tutorial on suitable software framework to explore and fine-tune such models.

Each participant will do a graded pen & paper exercise in order to check on progress. 20% of the grade, correctness of questions.

Phase 2: Reading & Planning
In the second phase, participants will split up in teams (ideal size 3) and will perform independent reading and planning towards a project idea. Paper suggestions and project sketches will be distributed to provide guidance and inspiration. During this time, participants are also expected to familiarize themselves with the experimental setup (we will locally host models on our GPU servers) and perform some simple warm-up or proof-of-concept experiments to inform the project definition.

Each group will give a 15+5 min project pitch and will give/receive feedback from other teams. 30% of the grade, creativity of the idea, clarity of project articulation, recognition of existing work.

Phase 3: Project Execution & Presentation
In the third phase, teams will implement their project and run the designed experiments to answer the articulated research questions or goals. Participants will have (limited) access to local GPU servers.
Each group will produce a written project report and will deliver a presentation. 50% of the grade, success of the project, quality of the experiments, quality of the slides/presentation.
Voraussetzungen / BesonderesThis hybrid course unit is open to master students enrolled in the
Computer Science or Data Science Master program. Enrollement is limited to 20 students. A sufficient background in machine learning (e.g. 252-0220-00L Intro ML, 252-0535-00L Advanced ML) is assumed. The work load during Phase 1-2 will be moderate, but during Phase 3, we expect more intense team work.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengefördert
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengefördert
Entscheidungsfindunggeprüft
Medien und digitale Technologiengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgeprüft
Kundenorientierunggefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegeprüft
Sensibilität für Vielfalt gefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengeprüft
Kritisches Denkengeprüft
Integrität und Arbeitsethikgeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
263-5225-00LAdvanced Topics in Machine Learning and Data Science Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the fourth week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SF. Perez Cruz
KurzbeschreibungIn this seminar, recent papers of the machine learning and data science literature are presented and discussed. Possible topics cover statistical models, machine learning algorithms and its applications.
LernzielThe seminar “Advanced Topics in Machine Learning and Data Science” familiarizes students with recent developments in machine learning and data science. Recently published articles, as well as influential papers, have to be presented and critically reviewed. The students will learn how to structure a scientific presentation, which covers the motivation, key ideas and main results of a scientific paper. An important goal of the seminar presentation is to summarize the essential ideas of the paper in sufficient depth for the audience to be able to follow its main conclusion, especially why the article is (or is not) worth attention. The presentation style will play an important role and should reach the level of professional scientific presentations.
InhaltThe seminar will cover a number of recent papers which have emerged as important contributions to the machine learning and data science literatures. The topics will vary from year to year but they are centered on methodological issues in machine learning and its application, not only to text or images, but other scientific
domains like medicine, climate or physics.
LiteraturThe papers will be presented in the first session of the seminar.
263-5904-00LDeep Learning for Computer Vision: Seminal Work Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the first week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SI. Armeni, H. Blum
KurzbeschreibungThis seminar covers seminal papers on the topic of deep learning for computer vision. The students will present and discuss the papers and gain an understanding of the most influential research in this area - both past and present.
LernzielThe objectives of this seminar are two-fold. Firstly, the aim is to provide a solid understanding of key contributions to the field of deep learning for vision (including a historical perspective as well as recent work). Secondly, the students will learn to critically read and analyse original research papers and judge their impact, as well as how to give a scientific presentation and lead a discussion on their topic.
InhaltThe seminar will start with introductory lectures to provide (1) a compact overview of challenges and relevant machine learning and deep learning research, and (2) a tutorial on critical analysis and presentation of research papers. Each student then chooses one paper from the provided collection to present during the remainder of the seminar. The students will be supported in the preparation of their presentation by the seminar assistants.
SkriptThe selection of research papers will be presented at the beginning of the semester.
LiteraturThe course "Machine Learning" is recommended.
227-0559-00LSeminar in Deep Neural Networks Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 25.
W2 KP2SR. Wattenhofer
KurzbeschreibungIn this seminar participating students present and discuss recent research papers in the area of deep neural networks.
LernzielWe aim at giving the students an in depth view on the current advances in the area by discussing recent papers as well as discussing current issues and difficulties surrounding deep neural networks. The students will learn to read, evaluate and challenge research papers, prepare coherent scientific presentations and lead a discussion on their topic.
InhaltThe seminar will cover a range of research directions, with a focus on Graph Neural Networks, Algorithmic Learning, Reinforcement Learning and Natural Language Processing. It will be structured in blocks with each focus area being briefly introduced before presenting and discussing recent research papers. Papers will be allocated to the students based on their preferences.

For more information see www.disco.ethz.ch/courses.html.
SkriptSlides of presentations will be made available.
LiteraturThe paper selection can be found on www.disco.ethz.ch/courses.html.
Voraussetzungen / BesonderesIt is expected that students have prior knowledge and interest in machine and deep learning, for instance by having attended appropriate courses.
227-0559-10LSeminar in Sustainable Networking Information Belegung eingeschränkt - Details anzeigen W2 KP2SL. Vanbever, R. Jacob
KurzbeschreibungIn this seminar, students review, present, and discuss recent research papers on computer networks, with a focus on sustainable networking.
LernzielBy the end of the seminar, students will be able to

1. Read efficiently and assess critically scientific papers;
2. Discuss technical topics with an audience of peers;
3. Discuss the challenges of sustainable computing and networking.
InhaltThe seminar will start with one introductory session. Starting from the third week, participating students will start reviewing, presenting, and discussing research papers. Two papers will be discussed every two weeks. Each student must choose a paper from a given list, prepare and give a (short) presentation on the paper's topic, and lead the follow-up discussion. In addition, all students submit one (short) review for the two papers presented every week in class.

Students will be evaluated based on their reviews, their presentation, and their leadership of and participation in the paper discussions.

The exact course content varies over time. For details, refers to the course website: https://seminar-net.ethz.ch/
SkriptThe slides of each presentation will be made available on the website.
LiteraturThe paper selection will be made available on the course website.
Voraussetzungen / BesonderesCommunication Networks (227-0120-00L) or equivalents.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengefördert
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Medien und digitale Technologiengefördert
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgeprüft
Menschenführung und Verantwortunggeprüft
Selbstdarstellung und soziale Einflussnahmegefördert
Sensibilität für Vielfalt geprüft
Verhandlunggefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kritisches Denkengeprüft
Integrität und Arbeitsethikgeprüft
Selbstbewusstsein und Selbstreflexion gefördert
401-3900-16LAdvanced Topics in Discrete Optimization Belegung eingeschränkt - Details anzeigen
Number of participants limited to 12.
W4 KP2SR. Zenklusen, D. E. K. Hershkowitz, R. Santiago Torres
KurzbeschreibungIn this seminar we will discuss selected topics in discrete optimization. The main focus is on mostly recent research papers in the field of Combinatorial Optimization.
LernzielThe goal of the seminar is twofold. First, we aim at improving students' presentation and communication skills. In particular, students are to present a research paper to their peers and the instructors in a clear and understandable way. Second, students learn a selection of recent cutting-edge approaches in the field of Combinatorial Optimization by attending the other students' talks. A very active participation in the seminar helps students to build up the necessary skills for parsing and digesting advanced technical texts on a significantly higher complexity level than usual textbooks.

A key goal is that students prepare their presentations in a concise and accessible way to make sure that other participants get a clear idea of the presented results and techniques.

Students intending to do a project in optimization are strongly encouraged to participate.
InhaltThe selected topics will cover various classical and modern results in Combinatorial Optimization.

Contrary to prior years, a very significant component of the seminar will be interactive discussions where active participation of the students is required.
LiteraturThe learning material will be in the form of scientific papers.
Voraussetzungen / BesonderesRequirements: We expect students to have a thorough understanding of topics covered in the course "Linear & Combinatorial Optimization".
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Soziale KompetenzenKommunikationgeprüft
851-0740-00LBig Data, Law, and Policy Belegung eingeschränkt - Details anzeigen W3 KP2SS. Bechtold
KurzbeschreibungThis course introduces students to societal perspectives on the big data revolution. Discussing important contributions from machine learning and data science, the course explores their legal, economic, ethical, and political implications in the past, present, and future.
LernzielThis course is intended both for students of machine learning and data science who want to reflect on the societal implications of their field, and for students from other disciplines who want to explore the societal impact of data sciences. The course will first discuss some of the methodological foundations of machine learning, followed by a discussion of research papers and real-world applications where big data and societal values may clash. Potential topics include the implications of big data for privacy, liability, insurance, health systems, voting, and democratic institutions, as well as the use of predictive algorithms for price discrimination and the criminal justice system. Guest speakers, weekly readings and reaction papers ensure a lively debate among participants from various backgrounds.
Praktische Arbeit
NummerTitelTypECTSUmfangDozierende
252-0570-00LGame Programming Laboratory Information Belegung eingeschränkt - Details anzeigen W10 KP9PB. Sumner
KurzbeschreibungDas Ziel dieses Kurses ist ein vertieftes Verständnis der Technologie und der Programmierung von Computer-Spielen. Die Studierenden entwerfen und entwickeln in kleinen Gruppen ein Computer-Spiel und machen sich so vertraut mit der Kunst des Spiel-Programmierens.
LernzielDas Ziel dieses neuen Kurses ist es, die Studenten mit der Technologie und der Kunst des Programmierens von modernen dreidimensionalen Computerspielen vertraut zu machen.
InhaltDies ist ein Kurs, der auf die Technologie von modernen dreidimensionalen Computerspielen eingeht. Während des Kurses werden die Studenten in kleinen Gruppen ein Computerspiel entwerfen und entwickeln. Der Schwerpunkt des Kurses wird auf technischen Aspekten der Spielentwicklung wie Rendering, Kinematographie, Interaktion, Physik, Animation und KI liegen. Zusätzlich werden wir aber auch Wert auf kreative Ideen für fortgeschrittenes Gameplay und visuelle Effekte legen.

Der Kurs wird als Labor durchgeführt. Zusätzlich zu Vorträgen und Übungen wird der Kurs in einen praktischen, hands-on Ansatz durchgeführt. Wir treffen uns einmal wöchentlich um technische Aspekte zu besprechen und den Fortschritt der Entwicklung zu verfolgen. Für die Enwicklung verwenden wir MonoGames. Dies ist eine Ansammlung von Bibliotheken und Werkzeugen um die Spieleentwicklung zu erleichtern. Die Entwicklung wird zunächst auf dem PC stattfinden, das Spiel wird dann im weiteren Verlauf auf der Xbox One Konsole eingesetzt.

Am Ende des Kurses werden die Resultate öffentlich präsentiert.
SkriptGame Design Workshop: A Playcentric Approach to Creating Innovative Games by Tracy Fullerton
Voraussetzungen / BesonderesDie Anzahl der Teilnehmer ist begrenzt.

Voraussetzung für die Teilnahme sind:

- Gute Programmierkenntnisse (Java, C++, C#, o.ä.)

- Erfahrung in Computergrafik: Teilnehmer sollten mindestens die Vorlesung Visual Computing besucht haben. Wir empfehlen auch noch die weiterführenden Kurse Introduction to Computer Graphics, Surface Representations and Geometric Modeling, und Physically-based Simulation in Computer Graphics.
252-0817-00LDistributed Systems Laboratory Information W10 KP9PG. Alonso, T. Hoefler, A. Klimovic, T. Roscoe, R. Wattenhofer, C. Zhang
KurzbeschreibungEntwicklung und / oder Evaluation eines umfangreicheren praktischen Systems mit Technologien aus dem Gebiet der verteilten Systeme. Das Projekt kann aus unterschiedlichen Teilbereichen (von Web-Services bis hin zu ubiquitären Systemen) stammen; typische Technologien umfassen drahtlose Ad-hoc-Netze oder Anwendungen auf Mobiltelefonen.
LernzielErwerb praktischer Kenntnisse bei Entwicklung und / oder Evaluation eines umfangreicheren praktischen Systems mit Technologien aus dem Gebiet der verteilten Systeme.
InhaltEntwicklung und / oder Evaluation eines umfangreicheren praktischen Systems mit Technologien aus dem Gebiet der verteilten Systeme. Das Projekt kann aus unterschiedlichen Teilbereichen (von Web-Services bis hin zu ubiquitären Systemen) stammen; typische Technologien umfassen drahtlose Ad-hoc-Netze oder Anwendungen auf Mobiltelefonen. Zu diesem Praktikum existiert keine Vorlesung. Bei Interesse bitte einen der beteiligten Professoren oder einen Assistenten der Forschungsgruppen kontaktieren.
263-4630-00LComputer-Aided Modelling and Reasoning Information Belegung eingeschränkt - Details anzeigen W8 KP7PC. Sprenger
KurzbeschreibungThe "computer-aided modelling and reasoning" lab is a hands-on course about using an interactive theorem prover to construct formal models of algorithms, protocols, and programming languages and to reason about their properties. The lab has two parts: The first introduces various modelling and proof techniques. The second part consists of a project in which the students apply these techniques
LernzielThe students learn to effectively use a theorem prover to create unambiguous models and rigorously analyse them. They learn how to write precise and concise specifications, to exploit the theorem prover as a tool for checking and analysing such models and for taming their complexity, and to extract certified executable implementations from such specifications.
InhaltThe "computer-aided modelling and reasoning" lab is a hands-on course about using an interactive theorem prover to construct formal models of algorithms, protocols, and programming languages and to reason about their properties. The focus is on applying logical methods to concrete problems supported by a theorem prover. The course will demonstrate the challenges of formal rigor, but also the benefits of machine support in modelling, proving and validating.

The lab will have two parts: The first part introduces basic and advanced modelling techniques (functional programs, inductive definitions, modules), the associated proof techniques (term rewriting, resolution, induction, proof automation), and compilation of the models to certified executable code. In the second part, the students work in teams of two on a project assignment in which they apply these techniques: they build a formal model and prove its desired properties. The project lies in the area of programming languages, model checking, or information security.
LiteraturTextbook: Tobias Nipkow, Gerwin Klein. Concrete Semantics, part 1 (www.concrete-semantics.org)
Voraussetzungen / BesonderesLast cancellation/deregistration date for this ungraded semester performance: 31 March 2023! Please note that after that date no deregistration will be accepted and the course will be considered as "fail".
263-0650-00LPraktische Arbeit Information W8 KP17ABetreuer/innen
KurzbeschreibungPractical work shall foster the student's ability to solve technological scientific problems by applying acquired knowledge and social competencies.
Lernzielsee above
InhaltPractical work refers either to a semester project or a lab course, which is conducted under the supervision of a professor of the department of computer science.
Ergänzungen
Ergänzung in Computer Graphics
NummerTitelTypECTSUmfangDozierende
252-0538-00LShape Modeling and Geometry Processing Information W8 KP2V + 1U + 4AO. Sorkine Hornung
KurzbeschreibungThis course covers the fundamentals and developments in geometric modeling and geometry processing. Topics include surface modeling based on point clouds and polygonal meshes, mesh generation, surface reconstruction, mesh fairing and parameterization, discrete differential geometry, interactive shape editing, topics in digital shape fabrication.
LernzielThe students will learn how to design, program and analyze algorithms and systems for interactive 3D shape modeling and geometry processing.
InhaltRecent advances in 3D geometry processing have created a plenitude of novel concepts for the mathematical representation and interactive manipulation of geometric models. This course covers the fundamentals and some of the developments in geometric modeling and geometry processing. Topics include surface modeling based on point clouds and triangle meshes, mesh generation, surface reconstruction, mesh fairing and parameterization, discrete differential geometry, interactive shape editing and digital shape fabrication.
SkriptSlides and course notes
Voraussetzungen / BesonderesPrerequisites:
Visual Computing, Computer Graphics or an equivalent class. Experience with C++ programming. Solid background in linear algebra and analysis. Some knowledge of differential geometry, computational geometry and numerical methods is helpful but not a strict requirement.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenProblemlösunggeprüft
252-5706-00LMathematical Foundations of Computer Graphics and Vision Information W5 KP2V + 1U + 1AT. Aydin, A. Djelouah
KurzbeschreibungThis course presents the fundamental mathematical tools and concepts used in computer graphics and vision. Each theoretical topic is introduced in the context of practical vision or graphic problems, showcasing its importance in real-world applications.
LernzielThe main goal is to equip the students with the key mathematical tools necessary to understand state-of-the-art algorithms in vision and graphics. In addition to the theoretical part, the students will learn how to use these mathematical tools to solve a wide range of practical problems in visual computing. After successfully completing this course, the students will be able to apply these mathematical concepts and tools to practical industrial and academic projects in visual computing.
InhaltThe theory behind various mathematical concepts and tools will be introduced, and their practical utility will be showcased in diverse applications in computer graphics and vision. The course will cover topics in sampling, reconstruction, approximation, optimization, robust fitting, differentiation, quadrature and spectral methods. Applications will include 3D surface reconstruction, camera pose estimation, image editing, data projection, character animation, structure-aware geometry processing, and rendering.
263-5701-00LScientific Visualization Information W5 KP2V + 1U + 1AM. Gross, T. Günther
KurzbeschreibungThis lecture provides an introduction into visualization of scientific and abstract data.
LernzielThis lecture provides an introduction into the visualization of scientific and abstract data. The lecture introduces into the two main branches of visualization: scientific visualization and information visualization. The focus is set onto scientific data, demonstrating the usefulness and necessity of computer graphics in other fields than the entertainment industry. The exercises contain theoretical tasks on the mathematical foundations such as numerical integration, differential vector calculus, and flow field analysis, while programming exercises familiarize with the Visualization Tool Kit (VTK). In a course project, the learned methods are applied to visualize one real scientific data set. The provided data sets contain measurements of volcanic eruptions, galaxy simulations, fluid simulations, meteorological cloud simulations and asteroid impact simulations.
InhaltThis lecture opens with human cognition basics, and scalar and vector calculus. Afterwards, this is applied to the visualization of air and fluid flows, including geometry-based, topology-based and feature-based methods. Further, the direct and indirect visualization of volume data is discussed. The lecture ends on the viualization of abstract, non-spatial and multi-dimensional data by means of information visualization.
Voraussetzungen / BesonderesFundamentals of differential calculus. Knowledge on numerical mathematics, computer algebra systems, as well as ordinary and partial differential equations is an asset, but not required.
263-5806-00LDigital Humans Information
Previously Computational Models of Motion and Virtual Humans
W8 KP3V + 2U + 2AS. Coros, S. Tang
KurzbeschreibungThis course covers the core technologies required to model and simulate motions for digital humans and robotic characters. Topics include kinematic modeling, physics-based simulation, trajectory optimization, reinforcement learning, feedback control for motor skills, motion capture, data-driven motion synthesis, and ML-based generative models. They will be richly illustrated with examples.
LernzielStudents will learn how to estimate human pose, shape, and motion from videos and create basic human avatars from various visual inputs. Students will also learn how to represent and algorithmically generate motions for digital characters and their real-life robotic counterparts. The lectures are accompanied by four programming assignments (written in python or C++) and a capstone project.

The deadline to cancel/deregister from the course is May 1st. Deregistration after the deadline will lead to fail.
Inhalt- Basic concept of 3D representations
- Human body/hand models
- Human motion capture;
- Non-​rigid surface tracking and reconstruction
- Neural rendering
- Optimal control and trajectory optimization
- Physics-based modeling for multibody systems
- Forward and inverse kinematics
- Rigging and keyframing
- Reinforcement learning for locomotion
Voraussetzungen / BesonderesExperience with python and C++ programming, numerical linear algebra, multivariate calculus and probability theory. Some background in deep learning, computer vision, physics-based modeling, kinematics, and dynamics is preferred.
KompetenzenKompetenzen
Fachspezifische KompetenzenVerfahren und Technologiengeprüft
Ergänzung in Computer Vision
NummerTitelTypECTSUmfangDozierende
252-0579-00L3D Vision Information W5 KP3G + 1AM. Pollefeys, D. B. Baráth
KurzbeschreibungThe course covers camera models and calibration, feature tracking and matching, camera motion estimation via simultaneous localization and mapping (SLAM) and visual odometry (VO), epipolar and mult-view geometry, structure-from-motion, (multi-view) stereo, augmented reality, and image-based (re-)localization.
LernzielAfter attending this course, students will:
1. understand the core concepts for recovering 3D shape of objects and scenes from images and video.
2. be able to implement basic systems for vision-based robotics and simple virtual/augmented reality applications.
3. have a good overview over the current state-of-the art in 3D vision.
4. be able to critically analyze and asses current research in this area.
InhaltThe goal of this course is to teach the core techniques required for robotic and augmented reality applications: How to determine the motion of a camera and how to estimate the absolute position and orientation of a camera in the real world. This course will introduce the basic concepts of 3D Vision in the form of short lectures, followed by student presentations discussing the current state-of-the-art. The main focus of this course are student projects on 3D Vision topics, with an emphasis on robotic vision and virtual and augmented reality applications.
263-3710-00LMachine Perception Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2AO. Hilliges, J. Song
KurzbeschreibungRecent developments in neural networks have drastically advanced the performance of machine perception systems in a variety of areas including computer vision, robotics, and human shape modeling This course is a deep dive into deep learning algorithms and architectures with applications to a variety of perceptual and generative tasks.
LernzielStudents will learn about fundamental aspects of modern deep learning approaches for perception and generation. Students will learn to implement, train and debug their own neural networks and gain a detailed understanding of cutting-edge research in learning-based computer vision, robotics, and shape modeling. The optional final project assignment will involve training a complex neural network architecture and applying it to a real-world dataset.

The core competency acquired through this course is a solid foundation in deep-learning algorithms to process and interpret human-centric signals. In particular, students should be able to develop systems that deal with the problem of recognizing people in images, detecting and describing body parts, inferring their spatial configuration, performing action/gesture recognition from still images or image sequences, also considering multi-modal data, among others.
InhaltWe will focus on teaching: how to set up the problem of machine perception, the learning algorithms, network architectures, and advanced deep learning concepts in particular probabilistic deep learning models.

The course covers the following main areas:
I) Foundations of deep learning.
II) Advanced topics like probabilistic generative modeling of data (latent variable models, generative adversarial networks, auto-regressive models, invertible neural networks, diffusion models).
III) Deep learning in computer vision, human-computer interaction, and robotics.

Specific topics include:
I) Introduction to Deep Learning:
a) Neural Networks and training (i.e., backpropagation)
b) Feedforward Networks
c) Timeseries modelling (RNN, GRU, LSTM)
d) Convolutional Neural Networks
II) Advanced topics:
a) Latent variable models (VAEs)
b) Generative adversarial networks (GANs)
c) Autoregressive models (PixelCNN, PixelRNN, TCN, Transformer)
d) Invertible Neural Networks / Normalizing Flows
e) Coordinate-based networks (neural implicit surfaces, NeRF)
f) Diffusion models
III) Applications in machine perception and computer vision:
a) Fully Convolutional architectures for dense per-pixel tasks (i.e., instance segmentation)
b) Pose estimation and other tasks involving human activity
c) Neural shape modeling (implicit surfaces, neural radiance fields)
d) Deep Reinforcement Learning and Applications in Physics-Based Behavior Modeling
LiteraturDeep Learning
Book by Ian Goodfellow and Yoshua Bengio
Voraussetzungen / BesonderesThis is an advanced grad-level course that requires a background in machine learning. Students are expected to have a solid mathematical foundation, in particular in linear algebra, multivariate calculus, and probability. The course will focus on state-of-the-art research in deep learning and will not repeat the basics of machine learning

Please take note of the following conditions:
1) Students must have taken the exam in Machine Learning (252-0535-00) or have acquired equivalent knowledge
2) All practical exercises will require basic knowledge of Python and will use libraries such as Pytorch, scikit-learn, and scikit-image. We will provide introductions to Pytorch and other libraries that are needed but will not provide introductions to basic programming or Python.

The following courses are strongly recommended as prerequisites:
* "Visual Computing" or "Computer Vision"

The course will be assessed by a final written examination in English. No course materials or electronic devices can be used during the examination. Note that the examination will be based on the contents of the lectures, the associated reading materials, and the exercises.

The exam will be a 3-hour end-of-term exam and take place at the end of the teaching period.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Selbststeuerung und Selbstmanagement gefördert
263-5052-00LInteractive Machine Learning: Visualization & Explainability Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AM. El-Assady
KurzbeschreibungVisual Analytics supports the design of human-in-the-loop interfaces that enable human-machine collaboration. In this course, will go through the fundamentals of designing interactive visualizations, later applying them to explain and interact with machine leaning models.
LernzielThe goal of the course is to introduce techniques for interactive information visualization and to apply these on understanding, diagnosing, and refining machine learning models.
InhaltInteractive, mixed-initiative machine learning promises to combine the efficiency of automation with the effectiveness of humans for a collaborative decision-making and problem-solving process. This can be facilitated through co-adaptive visual interfaces.

This course will first introduce the foundations of information visualization design based on data charecteristics, e.g., high-dimensional, geo-spatial, relational, temporal, and textual data.

Second, we will discuss interaction techniques and explanation strategies to enable explainable machine learning with the tasks of understanding, diagnosing, and refining machine learning models.

Tentative list of topics:
1. Visualization and Perception
2. Interaction and Explanation
3. Systems Overview
SkriptCourse material will be provided in form of slides.
LiteraturWill be provided during the course.
Voraussetzungen / BesonderesBasic understanding of machine learning as taught at the Bachelor's level.
Ergänzung in Data Management
NummerTitelTypECTSUmfangDozierende
227-0558-00LPrinciples of Distributed Computing Information W7 KP2V + 2U + 2AR. Wattenhofer
KurzbeschreibungWe study the fundamental issues underlying the design of distributed systems: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques.
LernzielDistributed computing is essential in modern computing and communications systems. Examples are on the one hand large-scale networks such as the Internet, and on the other hand multiprocessors such as your new multi-core laptop. This course introduces the principles of distributed computing, emphasizing the fundamental issues underlying the design of distributed systems and networks: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques, basically the "pearls" of distributed computing. We will cover a fresh topic every week.
InhaltDistributed computing models and paradigms, e.g. message passing, shared memory, synchronous vs. asynchronous systems, time and message complexity, peer-to-peer systems, small-world networks, social networks, sorting networks, wireless communication, and self-organizing systems.

Distributed algorithms, e.g. leader election, coloring, covering, packing, decomposition, spanning trees, mutual exclusion, store and collect, arrow, ivy, synchronizers, diameter, all-pairs-shortest-path, wake-up, and lower bounds
SkriptAvailable.
LiteraturLecture Notes By Roger Wattenhofer. These lecture notes are taught at about a dozen different universities through the world.

Mastering Distributed Algorithms
Roger Wattenhofer
Inverted Forest Publishing, 2020. ISBN 979-8628688267

Distributed Computing: Fundamentals, Simulations and Advanced Topics
Hagit Attiya, Jennifer Welch.
McGraw-Hill Publishing, 1998, ISBN 0-07-709352 6

Introduction to Algorithms
Thomas Cormen, Charles Leiserson, Ronald Rivest.
The MIT Press, 1998, ISBN 0-262-53091-0 oder 0-262-03141-8

Disseminatin of Information in Communication Networks
Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, Walter Unger.
Springer-Verlag, Berlin Heidelberg, 2005, ISBN 3-540-00846-2

Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes
Frank Thomson Leighton.
Morgan Kaufmann Publishers Inc., San Francisco, CA, 1991, ISBN 1-55860-117-1

Distributed Computing: A Locality-Sensitive Approach
David Peleg.
Society for Industrial and Applied Mathematics (SIAM), 2000, ISBN 0-89871-464-8
Voraussetzungen / BesonderesCourse pre-requisites: Interest in algorithmic problems. (No particular course needed.)
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
263-3855-00LCloud Computing Architecture Information W9 KP3V + 2U + 3AG. Alonso, A. Klimovic
KurzbeschreibungCloud computing hosts a wide variety of online services that we use on a daily basis, including web search, social networks, and video streaming. This course will cover how datacenter hardware, systems software, and application frameworks are designed for the cloud.
LernzielAfter successful completion of this course, students will be able to: 1) reason about performance, energy efficiency, and availability tradeoffs in the design of cloud system software, 2) describe how datacenter hardware is organized and explain why it is organized as such, 3) implement cloud applications as well as analyze and optimize their performance.
InhaltIn this course, we study how datacenter hardware, systems software, and applications are designed at large scale for the cloud. The course covers topics including server design, cluster management, large-scale storage systems, serverless computing, data analytics frameworks, and performance analysis.
SkriptLecture slides will be available on the course website.
Voraussetzungen / BesonderesUndergraduate courses in 1) computer architecture and 2) operating systems, distributed systems, and/or database systems are strongly recommended.
263-5354-00LLarge Language Models Information W8 KP3V + 2U + 2AR. Cotterell, M. Sachan, F. Tramèr, C. Zhang
KurzbeschreibungLarge language models have become one of the most commonly deployed NLP inventions. In the past half-decade, their integration into core natural language processing tools has dramatically increased the performance of such tools, and they have entered the public discourse surrounding artificial intelligence.
LernzielTo understand the mathematical foundations of large language models as well as how to implement them.
InhaltWe start with the probabilistic foundations of language models, i.e., covering what constitutes a language model from a formal, theoretical perspective. We then discuss how to construct and curate training corpora, and introduce many of the neural-network architectures often used to instantiate language models at scale. The course covers aspects of systems programming, discussion of privacy and harms, as well as applications of language models in NLP and beyond.
LiteraturThe lecture notes will be supplemented with various readings from the literature.
Ergänzung in Information Security
NummerTitelTypECTSUmfangDozierende
252-0408-00LCryptographic Protocols Information W6 KP2V + 2U + 1AM. Hirt
KurzbeschreibungIn a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
LernzielTo know and understand a selection of cryptographic protocols and to
be able to analyze and prove their security and efficiency.
InhaltThe selection of considered protocols varies. Currently, we consider
multi-party computation, secret-sharing, broadcast and Byzantine
agreement. We look at both the synchronous and the asynchronous
communication model, and focus on simple protocols as well as on
highly-efficient protocols.
SkriptWe provide handouts of the slides. For some of the topics, we also
provide papers and/or lecture notes.
Voraussetzungen / BesonderesA basic understanding of fundamental cryptographic concepts (as taught
for example in the course Information Security) is useful, but not
required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
263-2925-00LProgram Analysis for System Security and Reliability Information
Findet dieses Semester nicht statt.
W7 KP2V + 1U + 3AM. Vechev
KurzbeschreibungSecurity issues in modern systems (blockchains, datacenters, deep learning, etc.) result in billions of losses due to hacks and system downtime. This course introduces fundamental techniques (ranging over automated analysis, machine learning, synthesis, zero-knowledge, differential privacy, and their combinations) that can be applied in practice so to build more secure and reliable modern systems.
Lernziel* Understand the fundamental techniques used to create modern security and reliability analysis engines that are used worldwide.

* Understand how symbolic techniques are combined with machine learning (e.g., deep learning, reinforcement learning) so to create new kinds of learning-based analyzers.

* Understand how to quantify and fix security and reliability issues in modern deep learning models.

* Understand open research questions from both theoretical and practical perspectives.
InhaltPlease see: https://www.sri.inf.ethz.ch/teaching/pass2022 for detailed course content.
263-4600-00LFormal Methods for Information Security Information
Findet dieses Semester nicht statt.
W5 KP2V + 1U + 1A
KurzbeschreibungThe course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.
LernzielThe students will learn the key ideas and theoretical foundations of formal modeling and analysis of security protocols. The students will complement their theoretical knowledge by solving practical exercises, completing a small project, and using state-of-the-art tools. The students also learn the fundamentals of non-interference and runtime monitoring.
InhaltThe course treats formal methods mainly for the modeling and analysis of security protocols. Cryptographic protocols (such as SSL/TLS, SSH, Kerberos, SAML single-sign on, and IPSec) form the basis for secure communication and business processes. Numerous attacks on published protocols show that the design of cryptographic protocols is extremely error-prone. A rigorous analysis of these protocols is therefore indispensable, and manual analysis is insufficient. The lectures cover the theoretical basis for the (tool-supported) formal modeling and analysis of such protocols. Specifically, we discuss their operational semantics, the formalization of security properties, and techniques and algorithms for their verification.

The second part of this course will cover a selection of advanced topics in security protocols such as abstraction techniques for efficient verification, secure communication with humans, the link between symbolic protocol models and cryptographic models as well as RFID protocols (a staple of the Internet of Things) and electronic voting protocols, including the relevant privacy properties.

Moreover, we will give an introduction to two additional topics: non-interference as a general notion of secure systems, both from a semantic and a programming language perspective (type system), and runtime verification/monitoring to detect violations of security policies expressed as trace properties.
263-4656-00LDigital Signatures Information W5 KP2V + 2AD. Hofheinz
KurzbeschreibungDigital signatures as one central cryptographic building block. Different security goals and security definitions for digital signatures, followed by a variety of popular and fundamental signature schemes with their security analyses.
LernzielThe student knows a variety of techniques to construct and analyze the security of digital signature schemes. This includes modularity as a central tool of constructing secure schemes, and reductions as a central tool to proving the security of schemes.
InhaltWe will start with several definitions of security for signature schemes, and investigate the relations among them. We will proceed to generic (but inefficient) constructions of secure signatures, and then move on to a number of efficient schemes based on concrete computational hardness assumptions. On the way, we will get to know paradigms such as hash-then-sign, one-time signatures, and chameleon hashing as central tools to construct secure signatures.
LiteraturJonathan Katz, "Digital Signatures."
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course "Information Security" or an equivalent course at Bachelors level.
263-4660-00LApplied Cryptography Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2PK. Paterson, F. Günther
KurzbeschreibungThis course will introduce the basic primitives of cryptography, using rigorous syntax and game-based security definitions. The course will show how these primitives can be combined to build cryptographic protocols and systems.
LernzielThe goal of the course is to put students' understanding of cryptography on sound foundations, to enable them to start to build well-designed cryptographic systems, and to expose them to some of the pitfalls that arise when doing so.
InhaltBasic symmetric primitives (block ciphers, modes, hash functions); generic composition; AEAD; basic secure channels; basic public key primitives (encryption,signature, DH key exchange); ECC; randomness; applications.
LiteraturTextbook: Boneh and Shoup, “A Graduate Course in Applied Cryptography”, http://toc.cryptobook.us/book.pdf.
Voraussetzungen / BesonderesStudents should have taken the D-INFK Bachelor's course “Information Security" (252-0211-00) or an alternative first course covering cryptography at a similar level. / In this course, we will use Moodle for content delivery: https://moodle-app2.let.ethz.ch/course/view.php?id=19644.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Medien und digitale Technologiengeprüft
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Ergänzung in Machine Learning
NummerTitelTypECTSUmfangDozierende
252-0526-00LStatistical Learning Theory Information W8 KP3V + 2U + 2AJ. M. Buhmann
KurzbeschreibungThe course covers advanced methods of statistical learning:

- Variational methods and optimization.
- Deterministic annealing.
- Clustering for diverse types of data.
- Model validation by information theory.
LernzielThe course surveys recent methods of statistical learning. The fundamentals of machine learning, as presented in the courses "Introduction to Machine Learning" and "Advanced Machine Learning", are expanded from the perspective of statistical learning.
Inhalt- Variational methods and optimization. We consider optimization approaches for problems where the optimizer is a probability distribution. We will discuss concepts like maximum entropy, information bottleneck, and deterministic annealing.

- Clustering. This is the problem of sorting data into groups without using training samples. We discuss alternative notions of "similarity" between data points and adequate optimization procedures.

- Model selection and validation. This refers to the question of how complex the chosen model should be. In particular, we present an information theoretic approach for model validation.

- Statistical physics models. We discuss approaches for approximately optimizing large systems, which originate in statistical physics (free energy minimization applied to spin glasses and other models). We also study sampling methods based on these models.
SkriptA draft of a script will be provided. Lecture slides will be made available.
LiteraturHastie, Tibshirani, Friedman: The Elements of Statistical Learning, Springer, 2001.

L. Devroye, L. Gyorfi, and G. Lugosi: A probabilistic theory of pattern recognition. Springer, New York, 1996
Voraussetzungen / BesonderesKnowledge of machine learning (introduction to machine learning and/or advanced machine learning)
Basic knowledge of statistics.
261-5120-00LMachine Learning for Health Care Information Belegung eingeschränkt - Details anzeigen W5 KP2V + 2AV. Boeva, J. Vogt, M. Kuznetsova
KurzbeschreibungThe course will review the most relevant methods and applications of Machine Learning in Biomedicine, discuss the main challenges they present and their current technical problems.
LernzielDuring the last years, we have observed a rapid growth in the field of Machine Learning (ML), mainly due to improvements in ML algorithms, the increase of data availability and a reduction in computing costs. This growth is having a profound impact in biomedical applications, where the great variety of tasks and data types enables us to get benefit of ML algorithms in many different ways. In this course we will review the most relevant methods and applications of ML in biomedicine, discuss the main challenges they present and their current technical solutions.
InhaltThe course will consist of four topic clusters that will cover the most relevant applications of ML in Biomedicine:
1) Structured time series: Temporal time series of structured data often appear in biomedical datasets, presenting challenges as containing variables with different periodicities, being conditioned by static data, etc.
2) Medical notes: Vast amount of medical observations are stored in the form of free text, we will analyze stategies for extracting knowledge from them.
3) Medical images: Images are a fundamental piece of information in many medical disciplines. We will study how to train ML algorithms with them.
4) Genomics data: ML in genomics is still an emerging subfield, but given that genomics data are arguably the most extensive and complex datasets that can be found in biomedicine, it is expected that many relevant ML applications will arise in the near future. We will review and discuss current applications and challenges.
Voraussetzungen / BesonderesData Structures & Algorithms, Introduction to Machine Learning, Statistics/Probability, Programming in Python, Unix Command Line

Relation to Course 261-5100-00 Computational Biomedicine: This course is a continuation of the previous course with new topics related to medical data and machine learning. The format of Computational Biomedicine II will also be different. It is helpful but not essential to attend Computational Biomedicine before attending Computational Biomedicine II.
263-3710-00LMachine Perception Information Belegung eingeschränkt - Details anzeigen W8 KP3V + 2U + 2AO. Hilliges, J. Song
KurzbeschreibungRecent developments in neural networks have drastically advanced the performance of machine perception systems in a variety of areas including computer vision, robotics, and human shape modeling This course is a deep dive into deep learning algorithms and architectures with applications to a variety of perceptual and generative tasks.
LernzielStudents will learn about fundamental aspects of modern deep learning approaches for perception and generation. Students will learn to implement, train and debug their own neural networks and gain a detailed understanding of cutting-edge research in learning-based computer vision, robotics, and shape modeling. The optional final project assignment will involve training a complex neural network architecture and applying it to a real-world dataset.

The core competency acquired through this course is a solid foundation in deep-learning algorithms to process and interpret human-centric signals. In particular, students should be able to develop systems that deal with the problem of recognizing people in images, detecting and describing body parts, inferring their spatial configuration, performing action/gesture recognition from still images or image sequences, also considering multi-modal data, among others.
InhaltWe will focus on teaching: how to set up the problem of machine perception, the learning algorithms, network architectures, and advanced deep learning concepts in particular probabilistic deep learning models.

The course covers the following main areas:
I) Foundations of deep learning.
II) Advanced topics like probabilistic generative modeling of data (latent variable models, generative adversarial networks, auto-regressive models, invertible neural networks, diffusion models).
III) Deep learning in computer vision, human-computer interaction, and robotics.

Specific topics include:
I) Introduction to Deep Learning:
a) Neural Networks and training (i.e., backpropagation)
b) Feedforward Networks
c) Timeseries modelling (RNN, GRU, LSTM)
d) Convolutional Neural Networks
II) Advanced topics:
a) Latent variable models (VAEs)
b) Generative adversarial networks (GANs)
c) Autoregressive models (PixelCNN, PixelRNN, TCN, Transformer)
d) Invertible Neural Networks / Normalizing Flows
e) Coordinate-based networks (neural implicit surfaces, NeRF)
f) Diffusion models
III) Applications in machine perception and computer vision:
a) Fully Convolutional architectures for dense per-pixel tasks (i.e., instance segmentation)
b) Pose estimation and other tasks involving human activity
c) Neural shape modeling (implicit surfaces, neural radiance fields)
d) Deep Reinforcement Learning and Applications in Physics-Based Behavior Modeling
LiteraturDeep Learning
Book by Ian Goodfellow and Yoshua Bengio
Voraussetzungen / BesonderesThis is an advanced grad-level course that requires a background in machine learning. Students are expected to have a solid mathematical foundation, in particular in linear algebra, multivariate calculus, and probability. The course will focus on state-of-the-art research in deep learning and will not repeat the basics of machine learning

Please take note of the following conditions:
1) Students must have taken the exam in Machine Learning (252-0535-00) or have acquired equivalent knowledge
2) All practical exercises will require basic knowledge of Python and will use libraries such as Pytorch, scikit-learn, and scikit-image. We will provide introductions to Pytorch and other libraries that are needed but will not provide introductions to basic programming or Python.

The following courses are strongly recommended as prerequisites:
* "Visual Computing" or "Computer Vision"

The course will be assessed by a final written examination in English. No course materials or electronic devices can be used during the examination. Note that the examination will be based on the contents of the lectures, the associated reading materials, and the exercises.

The exam will be a 3-hour end-of-term exam and take place at the end of the teaching period.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengefördert
Kritisches Denkengefördert
Integrität und Arbeitsethikgefördert
Selbststeuerung und Selbstmanagement gefördert
263-5000-00LComputational Semantics for Natural Language Processing Information W6 KP2V + 1U + 2AM. Sachan
KurzbeschreibungThis course presents an introduction to Natural language processing (NLP) with an emphasis on computational semantics i.e. the process of constructing and reasoning with meaning representations of natural language text.
LernzielThe objective of the course is to learn about various topics in computational semantics and its importance in natural language processing methodology and research. Exercises and the project will be key parts of the course so the students will be able to gain hands-on experience with state-of-the-art techniques in the field.
InhaltWe will take a modern view of the topic, and focus on various statistical and deep learning approaches for computation semantics. We will also overview various primary areas of research in language processing and discuss how the computational semantics view can help us make advances in NLP.
SkriptLecture slides will be made available at the course Web site.
LiteraturNo textbook is required, but there will be regularly assigned readings from research literature, linked to the course website.
Voraussetzungen / BesonderesThe student should have successfully completed a graduate level class in machine learning (252-0220-00L), deep learning (263-3210-00L) or natural language processing (252-3005-00L) before. Similar courses from other universities are acceptable too.
263-5052-00LInteractive Machine Learning: Visualization & Explainability Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AM. El-Assady
KurzbeschreibungVisual Analytics supports the design of human-in-the-loop interfaces that enable human-machine collaboration. In this course, will go through the fundamentals of designing interactive visualizations, later applying them to explain and interact with machine leaning models.
LernzielThe goal of the course is to introduce techniques for interactive information visualization and to apply these on understanding, diagnosing, and refining machine learning models.
InhaltInteractive, mixed-initiative machine learning promises to combine the efficiency of automation with the effectiveness of humans for a collaborative decision-making and problem-solving process. This can be facilitated through co-adaptive visual interfaces.

This course will first introduce the foundations of information visualization design based on data charecteristics, e.g., high-dimensional, geo-spatial, relational, temporal, and textual data.

Second, we will discuss interaction techniques and explanation strategies to enable explainable machine learning with the tasks of understanding, diagnosing, and refining machine learning models.

Tentative list of topics:
1. Visualization and Perception
2. Interaction and Explanation
3. Systems Overview
SkriptCourse material will be provided in form of slides.
LiteraturWill be provided during the course.
Voraussetzungen / BesonderesBasic understanding of machine learning as taught at the Bachelor's level.
263-5255-00LFoundations of Reinforcement Learning Information Belegung eingeschränkt - Details anzeigen W7 KP3V + 3AN. He
KurzbeschreibungReinforcement learning (RL) has been in the limelight of many recent breakthroughs in artificial intelligence. This course focuses on theoretical and algorithmic foundations of reinforcement learning, through the lens of optimization, modern approximation, and learning theory. The course targets M.S. students with strong research interests in reinforcement learning, optimization, and control.
LernzielThis course aims to provide students with an advanced introduction of RL theory and algorithms as well as bring them near the frontier of this active research field.

By the end of the course, students will be able to
- Identify the strengths and limitations of various reinforcement learning algorithms;
- Formulate and solve sequential decision-making problems by applying relevant reinforcement learning tools;
- Generalize or discover “new” applications, algorithms, or theories of reinforcement learning towards conducting independent research on the topic.
InhaltBasic topics include fundamentals of Markov decision processes, approximate dynamic programming, linear programming and primal-dual perspectives of RL, model-based and model-free RL, policy gradient and actor-critic algorithms, Markov games and multi-agent RL. If time allows, we will also discuss advanced topics such as batch RL, inverse RL, causal RL, etc. The course keeps strong emphasis on in-depth understanding of the mathematical modeling and theoretical properties of RL algorithms.
SkriptLecture notes will be posted on Moodle.
LiteraturDynamic Programming and Optimal Control, Vol I & II, Dimitris Bertsekas
Reinforcement Learning: An Introduction, Second Edition, Richard Sutton and Andrew Barto.
Algorithms for Reinforcement Learning, Csaba Czepesvári.
Reinforcement Learning: Theory and Algorithms, Alekh Agarwal, Nan Jiang, Sham M. Kakade.
Voraussetzungen / BesonderesStudents are expected to have strong mathematical background in linear algebra, probability theory, optimization, and machine learning.
263-5351-00LMachine Learning for Genomics Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the third week of the semester. Students who are still registered after that date, but do not provide project work, do not participate in paper presentation sessions and/or do not show up for the exam, will officially fail the course.
W5 KP2V + 1U + 1AV. Boeva
KurzbeschreibungThe course reviews solutions that machine learning provides to the most challenging questions in human genomics.
LernzielOver the last few years, the parallel development of machine learning methods and molecular profiling technologies for human cells, such as sequencing, created an extremely powerful tool to get insights into the cellular mechanisms in healthy and diseased contexts. In this course, we will discuss the state-of-the-art machine learning methodology solving or attempting to solve common problems in human genomics. At the end of the course, you will be familiar with (1) classical and advanced machine learning architectures used in genomics, (2) bioinformatics analysis of human genomic and transcriptomic data, and (3) data types used in this field.
Inhalt- Short introduction to major concepts of molecular biology: DNA, genes, genome, central dogma, transcription factors, epigenetic code, DNA methylation, signaling pathways
- Prediction of transcription factor binding sites, open chromatin, histone marks, promoters, nucleosome positioning (convolutional neural networks, position weight matrices)
- Prediction of variant effects and gene expression (hidden Markov models, topic models)
- Deconvolution of mixed signal
- DNA, RNA and protein folding (RNN, LSTM, transformers)
- Data imputation for single cell RNA-seq data, clustering and annotation (diffusion and methods on graphs)
- Batch correction (autoencoders, optimal transport)
- Survival analysis (Cox proportional hazard model, regularization penalties, multi-omics, multi-tasking)
Voraussetzungen / BesonderesIntroduction to Machine Learning, Statistics/Probability, Programming in Python, Unix Command Line
263-5352-00LAdvanced Formal Language Theory Information W6 KP4G + 1AR. Cotterell
KurzbeschreibungThis course serves as an introduction to various advanced topics in formal language theory.
LernzielThe objective of the course is to learn and understand a variety of topics in advanced formal language theory.
InhaltThis course serves as an introduction to various advanced topics in formal language theory. The primary focus of the course is on weighted formalisms, which can easily be applied in machine learning. Topics include finite-state machines as well as the algorithms that are commonly used for their manipulation. We will also cover weighted context-free grammars, weighted tree automata, and weighted mildly context-sensitive formalisms.
263-5354-00LLarge Language Models Information W8 KP3V + 2U + 2AR. Cotterell, M. Sachan, F. Tramèr, C. Zhang
KurzbeschreibungLarge language models have become one of the most commonly deployed NLP inventions. In the past half-decade, their integration into core natural language processing tools has dramatically increased the performance of such tools, and they have entered the public discourse surrounding artificial intelligence.
LernzielTo understand the mathematical foundations of large language models as well as how to implement them.
InhaltWe start with the probabilistic foundations of language models, i.e., covering what constitutes a language model from a formal, theoretical perspective. We then discuss how to construct and curate training corpora, and introduce many of the neural-network architectures often used to instantiate language models at scale. The course covers aspects of systems programming, discussion of privacy and harms, as well as applications of language models in NLP and beyond.
LiteraturThe lecture notes will be supplemented with various readings from the literature.
Ergänzung in Networking
NummerTitelTypECTSUmfangDozierende
227-0558-00LPrinciples of Distributed Computing Information W7 KP2V + 2U + 2AR. Wattenhofer
KurzbeschreibungWe study the fundamental issues underlying the design of distributed systems: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques.
LernzielDistributed computing is essential in modern computing and communications systems. Examples are on the one hand large-scale networks such as the Internet, and on the other hand multiprocessors such as your new multi-core laptop. This course introduces the principles of distributed computing, emphasizing the fundamental issues underlying the design of distributed systems and networks: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques, basically the "pearls" of distributed computing. We will cover a fresh topic every week.
InhaltDistributed computing models and paradigms, e.g. message passing, shared memory, synchronous vs. asynchronous systems, time and message complexity, peer-to-peer systems, small-world networks, social networks, sorting networks, wireless communication, and self-organizing systems.

Distributed algorithms, e.g. leader election, coloring, covering, packing, decomposition, spanning trees, mutual exclusion, store and collect, arrow, ivy, synchronizers, diameter, all-pairs-shortest-path, wake-up, and lower bounds
SkriptAvailable.
LiteraturLecture Notes By Roger Wattenhofer. These lecture notes are taught at about a dozen different universities through the world.

Mastering Distributed Algorithms
Roger Wattenhofer
Inverted Forest Publishing, 2020. ISBN 979-8628688267

Distributed Computing: Fundamentals, Simulations and Advanced Topics
Hagit Attiya, Jennifer Welch.
McGraw-Hill Publishing, 1998, ISBN 0-07-709352 6

Introduction to Algorithms
Thomas Cormen, Charles Leiserson, Ronald Rivest.
The MIT Press, 1998, ISBN 0-262-53091-0 oder 0-262-03141-8

Disseminatin of Information in Communication Networks
Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, Walter Unger.
Springer-Verlag, Berlin Heidelberg, 2005, ISBN 3-540-00846-2

Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes
Frank Thomson Leighton.
Morgan Kaufmann Publishers Inc., San Francisco, CA, 1991, ISBN 1-55860-117-1

Distributed Computing: A Locality-Sensitive Approach
David Peleg.
Society for Industrial and Applied Mathematics (SIAM), 2000, ISBN 0-89871-464-8
Voraussetzungen / BesonderesCourse pre-requisites: Interest in algorithmic problems. (No particular course needed.)
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
Ergänzung in Programming Languages and Software Engineering
NummerTitelTypECTSUmfangDozierende
263-2812-00LProgram Verification Information Belegung eingeschränkt - Details anzeigen W5 KP3G + 1AP. Müller, M. Eilers
KurzbeschreibungA hands-on introduction to the theory and construction of deductive program verifiers, covering both powerful techniques for formal program reasoning, and a perspective over the tool stack making up modern verification tools.
LernzielStudents will earn the necessary skills for designing, developing, and applying deductive verification tools that enable the modular verification of complex software, including features challenging for reasoning such as heap-based mutable data and concurrency. Students will learn both a variety of fundamental reasoning principles, and how these reasoning ideas can be made practical via automatic tools.

By the end of the course, students should have a good working understanding and decisions involved with designing and building practical verification tools, including the underlying theory. They will also be able to apply such tools to develop formally-verified programs.
InhaltThe course will cover verification techniques and ways to automate them by introducing a verifier for a small core language and then progressively enriching the language with advanced features such as a mutable heap and concurrency. For each language extension, the course will explain the necessary reasoning principles, specification techniques, and tool support. In particular, it will introduce SMT solvers to prove logical formulas, intermediate verification languages to encode verification problems, and source code verifiers to handle feature-rich languages. The course will intermix technical content with hands-on experience.
SkriptThe slides will be available online.
LiteraturWill be announced in the lecture.
Voraussetzungen / BesonderesA basic familiarity with propositional and first-order logic will be assumed. Courses with an emphasis on formal reasoning about programs (such as Formal Methods and Functional Programming) are advantageous background, but are not a requirement.
263-2815-00LAutomated Software Testing Information Belegung eingeschränkt - Details anzeigen
Last cancellation/deregistration date for this graded semester performance: 17 March 2023! Please note that after that date no deregistration will be accepted and the course will be considered as "fail".
W7 KP2V + 1U + 3AZ. Su
KurzbeschreibungThis course introduces students to classic and modern techniques for the automated testing and analysis of software systems for reliability, security, and performance. It covers both techniques and their applications in various domains (e.g., compilers, databases, theorem provers, operating systems, machine/deep learning, and mobile applications), focusing on the latest, important results.
Lernziel* Learn fundamental and practical techniques for software testing and analysis

* Understand the challenges, open issues and opportunities across a variety of domains (security/systems/compilers/databases/mobile/AI/education)

* Understand how latest automated testing and analysis techniques work

* Gain conceptual and practical experience in techniques/tools for reliability, security, and performance

* Learn how to perform original and impactful research in this area
InhaltThe course will be organized into the following components: (1) classic and modern testing and analysis techniques (coverage metrics, mutation testing, metamorphic testing, combinatorial testing, symbolic execution, fuzzing, static analysis, etc.), (2) latest results on techniques and applications from diverse domains, and (3) open challenges and opportunities.

A major component of this course is a class project. All students (individually or two-person teams) are expected to select and complete a course project. Ideally, the project is original research related in a broad sense to automated software testing and analysis. Potential project topics will also be suggested by the teaching staff.

Students must select a project and write a one or two pages proposal describing why what the proposed project is interesting and giving a work schedule. Students will also write a final report describing the project and prepare a 20-30 minute presentation at the end of the course.

The due dates for the project proposal, final report, and project presentation will be announced.

The course will cover results from the Advanced Software Technologies (AST) Lab at ETH as well as notable results elsewhere, providing good opportunities for potential course project topics as well as MSc project/thesis topics.
SkriptLecture notes/slides and other lecture materials/handouts will be available online.
LiteraturReading material and links to tools will be published on the course website.
Voraussetzungen / BesonderesThe prerequisites for this course are some programming and algorithmic experience. Background and experience in software engineering, programming languages/compilers, and security (as well as operating systems and databases) can be beneficial.
263-2925-00LProgram Analysis for System Security and Reliability Information
Findet dieses Semester nicht statt.
W7 KP2V + 1U + 3AM. Vechev
KurzbeschreibungSecurity issues in modern systems (blockchains, datacenters, deep learning, etc.) result in billions of losses due to hacks and system downtime. This course introduces fundamental techniques (ranging over automated analysis, machine learning, synthesis, zero-knowledge, differential privacy, and their combinations) that can be applied in practice so to build more secure and reliable modern systems.
Lernziel* Understand the fundamental techniques used to create modern security and reliability analysis engines that are used worldwide.

* Understand how symbolic techniques are combined with machine learning (e.g., deep learning, reinforcement learning) so to create new kinds of learning-based analyzers.

* Understand how to quantify and fix security and reliability issues in modern deep learning models.

* Understand open research questions from both theoretical and practical perspectives.
InhaltPlease see: https://www.sri.inf.ethz.ch/teaching/pass2022 for detailed course content.
263-4600-00LFormal Methods for Information Security Information
Findet dieses Semester nicht statt.
W5 KP2V + 1U + 1A
KurzbeschreibungThe course focuses on formal methods for the modeling and analysis of security protocols for critical systems, ranging from authentication protocols for network security to electronic voting protocols and online banking. In addition, we will also introduce the notions of non-interference and runtime monitoring.
LernzielThe students will learn the key ideas and theoretical foundations of formal modeling and analysis of security protocols. The students will complement their theoretical knowledge by solving practical exercises, completing a small project, and using state-of-the-art tools. The students also learn the fundamentals of non-interference and runtime monitoring.
InhaltThe course treats formal methods mainly for the modeling and analysis of security protocols. Cryptographic protocols (such as SSL/TLS, SSH, Kerberos, SAML single-sign on, and IPSec) form the basis for secure communication and business processes. Numerous attacks on published protocols show that the design of cryptographic protocols is extremely error-prone. A rigorous analysis of these protocols is therefore indispensable, and manual analysis is insufficient. The lectures cover the theoretical basis for the (tool-supported) formal modeling and analysis of such protocols. Specifically, we discuss their operational semantics, the formalization of security properties, and techniques and algorithms for their verification.

The second part of this course will cover a selection of advanced topics in security protocols such as abstraction techniques for efficient verification, secure communication with humans, the link between symbolic protocol models and cryptographic models as well as RFID protocols (a staple of the Internet of Things) and electronic voting protocols, including the relevant privacy properties.

Moreover, we will give an introduction to two additional topics: non-interference as a general notion of secure systems, both from a semantic and a programming language perspective (type system), and runtime verification/monitoring to detect violations of security policies expressed as trace properties.
Ergänzung in Systems Software
NummerTitelTypECTSUmfangDozierende
227-0558-00LPrinciples of Distributed Computing Information W7 KP2V + 2U + 2AR. Wattenhofer
KurzbeschreibungWe study the fundamental issues underlying the design of distributed systems: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques.
LernzielDistributed computing is essential in modern computing and communications systems. Examples are on the one hand large-scale networks such as the Internet, and on the other hand multiprocessors such as your new multi-core laptop. This course introduces the principles of distributed computing, emphasizing the fundamental issues underlying the design of distributed systems and networks: communication, coordination, fault-tolerance, locality, parallelism, self-organization, symmetry breaking, synchronization, uncertainty. We explore essential algorithmic ideas and lower bound techniques, basically the "pearls" of distributed computing. We will cover a fresh topic every week.
InhaltDistributed computing models and paradigms, e.g. message passing, shared memory, synchronous vs. asynchronous systems, time and message complexity, peer-to-peer systems, small-world networks, social networks, sorting networks, wireless communication, and self-organizing systems.

Distributed algorithms, e.g. leader election, coloring, covering, packing, decomposition, spanning trees, mutual exclusion, store and collect, arrow, ivy, synchronizers, diameter, all-pairs-shortest-path, wake-up, and lower bounds
SkriptAvailable.
LiteraturLecture Notes By Roger Wattenhofer. These lecture notes are taught at about a dozen different universities through the world.

Mastering Distributed Algorithms
Roger Wattenhofer
Inverted Forest Publishing, 2020. ISBN 979-8628688267

Distributed Computing: Fundamentals, Simulations and Advanced Topics
Hagit Attiya, Jennifer Welch.
McGraw-Hill Publishing, 1998, ISBN 0-07-709352 6

Introduction to Algorithms
Thomas Cormen, Charles Leiserson, Ronald Rivest.
The MIT Press, 1998, ISBN 0-262-53091-0 oder 0-262-03141-8

Disseminatin of Information in Communication Networks
Juraj Hromkovic, Ralf Klasing, Andrzej Pelc, Peter Ruzicka, Walter Unger.
Springer-Verlag, Berlin Heidelberg, 2005, ISBN 3-540-00846-2

Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes
Frank Thomson Leighton.
Morgan Kaufmann Publishers Inc., San Francisco, CA, 1991, ISBN 1-55860-117-1

Distributed Computing: A Locality-Sensitive Approach
David Peleg.
Society for Industrial and Applied Mathematics (SIAM), 2000, ISBN 0-89871-464-8
Voraussetzungen / BesonderesCourse pre-requisites: Interest in algorithmic problems. (No particular course needed.)
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
263-2925-00LProgram Analysis for System Security and Reliability Information
Findet dieses Semester nicht statt.
W7 KP2V + 1U + 3AM. Vechev
KurzbeschreibungSecurity issues in modern systems (blockchains, datacenters, deep learning, etc.) result in billions of losses due to hacks and system downtime. This course introduces fundamental techniques (ranging over automated analysis, machine learning, synthesis, zero-knowledge, differential privacy, and their combinations) that can be applied in practice so to build more secure and reliable modern systems.
Lernziel* Understand the fundamental techniques used to create modern security and reliability analysis engines that are used worldwide.

* Understand how symbolic techniques are combined with machine learning (e.g., deep learning, reinforcement learning) so to create new kinds of learning-based analyzers.

* Understand how to quantify and fix security and reliability issues in modern deep learning models.

* Understand open research questions from both theoretical and practical perspectives.
InhaltPlease see: https://www.sri.inf.ethz.ch/teaching/pass2022 for detailed course content.
263-3800-00LAdvanced Operating Systems Information Belegung eingeschränkt - Details anzeigen W7 KP2V + 2U + 2AD. Cock, T. Roscoe
KurzbeschreibungThis course is intended to give students a thorough understanding of design and implementation issues for modern operating systems, with a particular emphasis on the challenges of modern hardware features. We will cover key design issues in implementing an operating system, such as memory management, scheduling, protection, inter-process communication, device drivers, and file systems.
LernzielThe goals of the course are, firstly, to give students:

1. A broader perspective on OS design than that provided by knowledge of Unix or Windows, building on the material in a standard undergraduate operating systems class

2. Practical experience in dealing directly with the concurrency, resource management, and abstraction problems confronting OS designers and implementers

3. A glimpse into future directions for the evolution of OS and computer hardware design
InhaltThe course is based on practical implementation work, in C and assembly language, and requires solid knowledge of both. The work is mostly carried out in teams of 3-4, using real hardware, and is a mixture of team milestones and individual projects which fit together into a complete system at the end. Emphasis is also placed on a final report which details the complete finished artifact, evaluates its performance, and discusses the choices the team made while building it.
Voraussetzungen / BesonderesThe course is based around a milestone-oriented project, where students work in small groups to implement major components of a microkernel-based operating system. The final assessment will be a combination grades awarded for milestones during the course of the project, a final written report on the work, and a set of test cases run on the final code.
Ergänzung in Theoretical Computer Science
NummerTitelTypECTSUmfangDozierende
252-0408-00LCryptographic Protocols Information W6 KP2V + 2U + 1AM. Hirt
KurzbeschreibungIn a cryptographic protocol, a set of parties wants to achieve some common goal, while some of the parties are dishonest. Most prominent example of a cryptographic protocol is multi-party computation, where the parties compute an arbitrary (but fixed) function of their inputs, while maintaining the secrecy of the inputs and the correctness of the outputs even if some of the parties try to cheat.
LernzielTo know and understand a selection of cryptographic protocols and to
be able to analyze and prove their security and efficiency.
InhaltThe selection of considered protocols varies. Currently, we consider
multi-party computation, secret-sharing, broadcast and Byzantine
agreement. We look at both the synchronous and the asynchronous
communication model, and focus on simple protocols as well as on
highly-efficient protocols.
SkriptWe provide handouts of the slides. For some of the topics, we also
provide papers and/or lecture notes.
Voraussetzungen / BesonderesA basic understanding of fundamental cryptographic concepts (as taught
for example in the course Information Security) is useful, but not
required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Persönliche KompetenzenKreatives Denkengefördert
Kritisches Denkengefördert
252-1424-00LModels of ComputationW6 KP2V + 2U + 1AM. Cook
KurzbeschreibungThis course surveys many different models of computation: Turing Machines, Cellular Automata, Finite State Machines, Graph Automata, Circuits, Tilings, Lambda Calculus, Fractran, Chemical Reaction Networks, Hopfield Networks, String Rewriting Systems, Tag Systems, Diophantine Equations, Register Machines, Primitive Recursive Functions, and more.
LernzielThe goal of this course is to become acquainted with a wide variety of models of computation, to understand how models help us to understand the modeled systems, and to be able to develop and analyze models appropriate for new systems.
InhaltThis course surveys many different models of computation: Turing Machines, Cellular Automata, Finite State Machines, Graph Automata, Circuits, Tilings, Lambda Calculus, Fractran, Chemical Reaction Networks, Hopfield Networks, String Rewriting Systems, Tag Systems, Diophantine Equations, Register Machines, Primitive Recursive Functions, and more.
261-5110-00LOptimization for Data Science Information W10 KP3V + 2U + 4AB. Gärtner, N. He
KurzbeschreibungThis course provides an in-depth theoretical treatment of optimization methods that are relevant in data science.
LernzielUnderstanding the guarantees and limits of relevant optimization methods used in data science. Learning theoretical paradigms and techniques to deal with optimization problems arising in data science.
InhaltThis course provides an in-depth theoretical treatment of classical and modern optimization methods that are relevant in data science.

After a general discussion about the role that optimization has in the process of learning from data, we give an introduction to the theory of (convex) optimization. Based on this, we present and analyze algorithms in the following four categories: first-order methods (gradient and coordinate descent, Frank-Wolfe, subgradient and mirror descent, stochastic and incremental gradient methods); second-order methods (Newton and quasi Newton methods); non-convexity (local convergence, provable global convergence, cone programming, convex relaxations); min-max optimization (extragradient methods).

The emphasis is on the motivations and design principles behind the algorithms, on provable performance bounds, and on the mathematical tools and techniques to prove them. The goal is to equip students with a fundamental understanding about why optimization algorithms work, and what their limits are. This understanding will be of help in selecting suitable algorithms in a given application, but providing concrete practical guidance is not our focus.
Voraussetzungen / BesonderesA solid background in analysis and linear algebra; some background in theoretical computer science (computational complexity, analysis of algorithms); the ability to understand and write mathematical proofs.
263-4400-00LAdvanced Graph Algorithms and Optimization Information W10 KP3V + 3U + 3AR. Kyng, M. Probst
KurzbeschreibungThis course will cover a number of advanced topics in optimization and graph algorithms.
LernzielThe course will take students on a deep dive into modern approaches to
graph algorithms using convex optimization techniques.

By studying convex optimization through the lens of graph algorithms,
students should develop a deeper understanding of fundamental
phenomena in optimization.

The course will cover some traditional discrete approaches to various graph
problems, especially flow problems, and then contrast these approaches
with modern, asymptotically faster methods based on combining convex
optimization with spectral and combinatorial graph theory.
InhaltStudents should leave the course understanding key
concepts in optimization such as first and second-order optimization,
convex duality, multiplicative weights and dual-based methods,
acceleration, preconditioning, and non-Euclidean optimization.

Students will also be familiarized with central techniques in the
development of graph algorithms in the past 15 years, including graph
decomposition techniques, sparsification, oblivious routing, and
spectral and combinatorial preconditioning.
Voraussetzungen / BesonderesThis course is targeted toward masters and doctoral students with an
interest in theoretical computer science.

Students should be comfortable with design and analysis of algorithms, probability, and linear algebra.

Having passed the course Algorithms, Probability, and Computing (APC) is highly recommended, but not formally required. If you are not
sure whether you're ready for this class or not, please consult the
instructor.
263-4508-00LAlgorithmic Foundations of Data Science Information W10 KP3V + 2U + 4AD. Steurer
KurzbeschreibungThis course provides rigorous theoretical foundations for the design and mathematical analysis of efficient algorithms that can solve fundamental tasks relevant to data science.
LernzielWe consider various statistical models for basic data-analytical tasks, e.g., (sparse) linear regression, principal component analysis, matrix completion, community detection, and clustering.

Our goal is to design efficient (polynomial-time) algorithms that achieve the strongest possible (statistical) guarantees for these models.

Toward this goal we learn about a wide range of mathematical techniques from convex optimization, linear algebra (especially, spectral theory and tensors), and high-dimensional statistics.

We also incorporate adversarial (worst-case) components into our models as a way to reason about robustness guarantees for the algorithms we design.
InhaltStrengths and limitations of efficient algorithms in (robust) statistical models for the following (tentative) list of data analysis tasks:

- (sparse) linear regression
- principal component analysis and matrix completion
- clustering and Gaussian mixture models
- community detection
SkriptTo be provided during the semester
LiteraturHigh-Dimensional Statistics
A Non-Asymptotic Viewpoint
by Martin J. Wainwright
Voraussetzungen / BesonderesMathematical and algorithmic maturity at least at the level of the course "Algorithms, Probability, and Computing".

Important: Optimization for Data Science 2018--2021
This course was created after a reorganization of the course "Optimization for Data Science" (ODS).
A significant portion of the material for this course has previously been taught as part of ODS.
Consequently, it is not possible to earn credit points for both this course and ODS as offered in 2018--2021.
This restriction does not apply to ODS offered in 2022 or afterwards and you can earn credit points for both courses in this case.
263-4509-00LComplex Network ModelsW5 KP2V + 2AJ. Lengler
KurzbeschreibungComplex network models are random graphs that feature one or several properties observed in real-world networks (e.g., social networks, internet graph, www). Depending on the application, different properties are relevant, and different complex network models are useful. This course gives an overview over some relevant models and the properties they do and do not cover.
LernzielThe students get familiar with a portfolio of network models, and they know their features and shortcomings. For a given application, they can identify relevant properties for this applications and can select an appropriate network model.
InhaltNetwork models: Erdös-Renyi random graphs, Chung-Lu graphs, configuration model, Kleinberg model, geometric inhomogeneous random graphs
Properties: degree distribution, structure of giant and smaller components, clustering coefficient, small-world properties, community structures, weak ties
SkriptThe script is available in moodle or at https://as.inf.ethz.ch/people/members/lenglerj/CompNetScript.pdf

It will be updated during the semester.
LiteraturLatora, Nikosia, Russo: "Complex Networks: Principles, Methods and Applications"
van der Hofstad: "Random Graphs and Complex Networks. Volume 1"
Voraussetzungen / BesonderesThe students must be familiar with the basics of graph theory and of probability theory (e.g. linearity of expectation, inequalities of Markov, Chebyshev, Chernoff). The course "Randomized Algorithms and Probabilistic Methods" is helpful, but not required.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
263-4510-00LIntroduction to Topological Data Analysis Information W8 KP3V + 2U + 2AP. Schnider
KurzbeschreibungTopological Data Analysis (TDA) is a relatively new subfield of computer sciences, which uses techniques from algebraic topology and computational geometry and topology to analyze and quantify the shape of data. This course will introduce the theoretical foundations of TDA.
LernzielThe goal is to make students familiar with the fundamental concepts, techniques and results in TDA. At the end of the course, students should be able to read and understand current research papers and have the necessary background knowledge to apply methods from TDA to other projects.
InhaltMathematical background (Topology, Simplicial complexes, Homology), Persistent Homology, Complexes on point clouds (Čech complexes, Vietoris-Rips complexes, Delaunay complexes, Witness complexes), the TDA pipeline, Reeb Graphs, Mapper
LiteraturMain reference:

Tamal K. Dey, Yusu Wang: Computational Topology for Data Analysis, 2021
https://www.cs.purdue.edu/homes/tamaldey/book/CTDAbook/CTDAbook.html


Other references:

Herbert Edelsbrunner, John Harer: Computational Topology: An Introduction, American Mathematical Society, 2010
https://bookstore.ams.org/mbk-69

Gunnar Carlsson, Mikael Vejdemo-Johansson: Topological Data Analysis with Applications, Cambridge University Press, 2021
Link

Robert Ghrist: Elementary Applied Topology, 2014
https://www2.math.upenn.edu/~ghrist/notes.html

Allen Hatcher: Algebraic Topology, Cambridge University Press, 2002
https://pi.math.cornell.edu/~hatcher/AT/ATpage.html
Voraussetzungen / BesonderesThe course assumes knowledge of discrete mathematics, algorithms and data structures and linear algebra, as supplied in the first semesters of Bachelor Studies at ETH.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Projektmanagementgefördert
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengefördert
263-4656-00LDigital Signatures Information W5 KP2V + 2AD. Hofheinz
KurzbeschreibungDigital signatures as one central cryptographic building block. Different security goals and security definitions for digital signatures, followed by a variety of popular and fundamental signature schemes with their security analyses.
LernzielThe student knows a variety of techniques to construct and analyze the security of digital signature schemes. This includes modularity as a central tool of constructing secure schemes, and reductions as a central tool to proving the security of schemes.
InhaltWe will start with several definitions of security for signature schemes, and investigate the relations among them. We will proceed to generic (but inefficient) constructions of secure signatures, and then move on to a number of efficient schemes based on concrete computational hardness assumptions. On the way, we will get to know paradigms such as hash-then-sign, one-time signatures, and chameleon hashing as central tools to construct secure signatures.
LiteraturJonathan Katz, "Digital Signatures."
Voraussetzungen / BesonderesIdeally, students will have taken the D-INFK Bachelors course "Information Security" or an equivalent course at Bachelors level.
272-0300-00LAlgorithmik für schwere Probleme Information
Diese Lerneinheit beinhaltet die Mentorierte Arbeit Fachwissenschaftliche Vertiefung mit pädagogischem Fokus Informatik A n i c h t !
W5 KP2V + 1U + 1AH.‑J. Böckenhauer, D. Komm
KurzbeschreibungDiese Lerneinheit beschäftigt sich mit algorithmischen Ansätzen zur Lösung schwerer Probleme, insbesondere mit exakten Algorithmen mit moderat exponentieller Laufzeit und parametrisierten Algorithmen.

Eine umfassende Reflexion über die Bedeutung der vorgestellten Ansätze für den Informatikunterricht an Gymnasien begleitet den Kurs.
LernzielAuf systematische Weise eine Übersicht über die Methoden zur Lösung schwerer Probleme kennen lernen. Vertiefte Kenntnisse im Bereich exakter und parameterisierter Algorithmen erwerben.
InhaltZuerst wird der Begriff der Berechnungsschwere erläutert (für die Informatikstudierenden wiederholt). Dann werden die Methoden zur Lösung schwerer Probleme systematisch dargestellt. Bei jeder Algorithmenentwurfsmethode wird vermittelt, was sie uns garantiert und was sie nicht sichern kann und womit wir für die gewonnene Effizienz bezahlen. Ein Schwerpunkt liegt auf exakten Algorithmen mit moderat exponentieller Laufzeit und auf parametrisierten Algorithmen.
SkriptUnterlagen und Folien werden zur Verfügung gestellt.
LiteraturJ. Hromkovic: Algorithmics for Hard Problems, Springer 2004.

R. Niedermeier: Invitation to Fixed-Parameter Algorithms, 2006.

M. Cygan et al.: Parameterized Algorithms, 2015.

F. Fomin et al.: Kernelization, 2019.

F. Fomin, D. Kratsch: Exact Exponential Algorithms, 2010.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
272-0302-00LApproximations- und Online-Algorithmen Information
Findet dieses Semester nicht statt.
W5 KP2V + 1U + 1AD. Komm
KurzbeschreibungDiese Lerneinheit behandelt approximative Verfahren für schwere Optimierungsprobleme und algorithmische Ansätze zur Lösung von Online-Problemen sowie die Grenzen dieser Ansätze.
LernzielAuf systematische Weise einen Überblick über die verschiedenen Entwurfsmethoden von approximativen Verfahren für schwere Optimierungsprobleme und Online-Probleme zu gewinnen. Methoden kennenlernen, die Grenzen dieser Ansätze aufweisen.
InhaltApproximationsalgorithmen sind einer der erfolgreichsten Ansätze zur Behandlung schwerer Optimierungsprobleme. Dabei untersucht man die sogenannte Approximationsgüte, also das Verhältnis der Kosten einer berechneten Näherungslösung und der Kosten einer (nicht effizient berechenbaren) optimalen Lösung.
Bei einem Online-Problem ist nicht die gesamte Eingabe von Anfang an bekannt, sondern sie erscheint stückweise und für jeden Teil der Eingabe muss sofort ein entsprechender Teil der endgültigen Ausgabe produziert werden. Die Güte eines Algorithmus für ein Online-Problem misst man mit der competitive ratio, also dem Verhältnis der Kosten der berechneten Lösung und der Kosten einer optimalen Lösung, wie man sie berechnen könnte, wenn die gesamte Eingabe bekannt wäre.

Inhalt dieser Lerneinheit sind
- die Klassifizierung von Optimierungsproblemen nach der erreichbaren Approximationsgüte,
- systematische Methoden zum Entwurf von Approximationsalgorithmen (z. B. Greedy-Strategien, dynamische Programmierung, LP-Relaxierung),
- Methoden zum Nachweis der Nichtapproximierbarkeit,
- klassische Online-Probleme wie Paging oder Scheduling-Probleme und Algorithmen zu ihrer Lösung,
- randomisierte Online-Algorithmen,
- Entwurfs- und Analyseverfahren für Online-Algorithmen,
- Grenzen des "competitive ratio"- Modells und Advice-Komplexität als eine Möglichkeit, die Komplexität von Online-Problemen genauer zu messen.
LiteraturDie Vorlesung orientiert sich teilweise an folgenden Büchern:

J. Hromkovic: Algorithmics for Hard Problems, Springer, 2004

D. Komm: An Introduction to Online Computation: Determinism, Randomization, Advice, Springer, 2016

Zusätzliche Literatur:

A. Borodin, R. El-Yaniv: Online Computation and Competitive Analysis, Cambridge University Press, 1998
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
401-3052-10LGraph TheoryW10 KP4V + 1UB. Sudakov
KurzbeschreibungBasics, trees, Caley's formula, matrix tree theorem, connectivity, theorems of Mader and Menger, Eulerian graphs, Hamilton cycles, theorems of Dirac, Ore, Erdös-Chvatal, matchings, theorems of Hall, König, Tutte, planar graphs, Euler's formula, Kuratowski's theorem, graph colorings, Brooks' theorem, 5-colorings of planar graphs, list colorings, Vizing's theorem, Ramsey theory, Turán's theorem
LernzielThe students will get an overview over the most fundamental questions concerning graph theory. We expect them to understand the proof techniques and to use them autonomously on related problems.
SkriptLecture will be only at the blackboard.
LiteraturWest, D.: "Introduction to Graph Theory"
Diestel, R.: "Graph Theory"

Further literature links will be provided in the lecture.
Voraussetzungen / BesonderesStudents are expected to have a mathematical background and should be able to write rigorous proofs.
401-3902-21LNetwork & Integer Optimization: From Theory to ApplicationW6 KP3GR. Zenklusen
KurzbeschreibungThis course covers various topics in Network and (Mixed-)Integer Optimization. It starts with a rigorous study of algorithmic techniques for some network optimization problems (with a focus on matching problems) and moves to key aspects of how to attack various optimization settings through well-designed (Mixed-)Integer Programming formulations.
LernzielOur goal is for students to both get a good foundational understanding of some key network algorithms and also to learn how to effectively employ (Mixed-)Integer Programming formulations, techniques, and solvers, to tackle a wide range of discrete optimization problems.
InhaltKey topics include:
- Matching problems;
- Integer Programming techniques and models;
- Extended formulations and strong problem formulations;
- Solver techniques for (Mixed-)Integer Programs;
- Decomposition approaches.
Literatur- Bernhard Korte, Jens Vygen: Combinatorial Optimization. 6th edition, Springer, 2018.
- Alexander Schrijver: Combinatorial Optimization: Polyhedra and Efficiency. Springer, 2003. This work has 3 volumes.
- Vanderbeck François, Wolsey Laurence: Reformulations and Decomposition of Integer Programs. Chapter 13 in: 50 Years of Integer Programming 1958-2008. Springer, 2010.
- Alexander Schrijver: Theory of Linear and Integer Programming. John Wiley, 1986.
Voraussetzungen / BesonderesSolid background in linear algebra. Preliminary knowledge of Linear Programming is ideal but not a strict requirement. Prior attendance of the course Linear & Combinatorial Optimization is a plus.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgeprüft
Persönliche KompetenzenKreatives Denkengeprüft
402-0448-01LQuantum Information Processing I: Concepts
Dieser theoretisch ausgerichtete Teil QIP I bildet zusammen mit dem experimentell ausgerichteten Teil 402-0448-02L QIP II, die beide im Frühjahrssemester angeboten werden, im Master-Studiengang Physik das experimentelle Kernfach "Quantum Information Processing" mit total 10 ECTS-Kreditpunkten.
W5 KP2V + 1UJ. Home
KurzbeschreibungThe course covers the key concepts of quantum information processing, including quantum algorithms which give the quantum computer the power to compute problems outside the reach of any classical supercomputer.
Key concepts such as quantum error correction are discussed in detail. They provide fundamental insights into the nature of quantum states and measurements.
LernzielBy the end of the course students are able to explain the basic mathematical formalism of quantum mechanics and apply them to quantum information processing problems. They are able to adapt and apply these concepts and methods to analyse and discuss quantum algorithms and other quantum information-processing protocols.
InhaltThe topics covered in the course will include quantum circuits, gate decomposition and universal sets of gates, efficiency of quantum circuits, quantum algorithms (Shor, Grover, Deutsch-Josza,..), quantum error correction, fault-tolerant designs, and quantum simulation.
SkriptWill be provided.
LiteraturQuantum Computation and Quantum Information
Michael Nielsen and Isaac Chuang
Cambridge University Press
Voraussetzungen / BesonderesA good understanding of finite dimensional linear algebra is recommended.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Vertiefungsübergreifende Fächer
NummerTitelTypECTSUmfangDozierende
263-0007-00LAdvanced Systems Lab Information Belegung eingeschränkt - Details anzeigen
Only for master students, otherwise a special permission by the study administration of D-INFK is required.
O8 KP3V + 2U + 2AM. Püschel
KurzbeschreibungThis course introduces the student to the foundations and state-of-the-art techniques in developing high performance software for mathematical functionality occurring in various fields in computer science. The focus is on optimizing for a single core and includes optimizing for the memory hierarchy, for special instruction sets, and the possible use of automatic performance tuning.
LernzielSoftware performance (i.e., runtime) arises through the complex interaction of algorithm, its implementation, the compiler used, and the microarchitecture the program is run on. The first goal of the course is to provide the student with an understanding of this "vertical" interaction, and hence software performance, for mathematical functionality. The second goal is to teach a systematic strategy how to use this knowledge to write fast software for numerical problems. This strategy will be trained in several homeworks and a semester-long group project.
InhaltThe fast evolution and increasing complexity of computing platforms pose a major challenge for developers of high performance software for engineering, science, and consumer applications: it becomes increasingly harder to harness the available computing power. Straightforward implementations may lose as much as one or two orders of magnitude in performance. On the other hand, creating optimal implementations requires the developer to have an understanding of algorithms, capabilities and limitations of compilers, and the target platform's architecture and microarchitecture.

This interdisciplinary course introduces the student to the foundations and state-of-the-art techniques in high performance mathematical software development using important functionality such as matrix operations, transforms, filters, and others as examples. The course will explain how to optimize for the memory hierarchy, take advantage of special instruction sets, and other details of current processors that require optimization. The concept of automatic performance tuning is introduced. The focus is on optimization for a single core; thus, the course complements others on parallel and distributed computing.

Finally a general strategy for performance analysis and optimization is introduced that the students will apply in group projects that accompany the course.
Voraussetzungen / BesonderesSolid knowledge of the C programming language and matrix algebra.
263-0008-00LComputational Intelligence Lab
Only for master students, otherwise a special permission by the study administration of D-INFK is required.
O8 KP2V + 2U + 3AT. Hofmann
KurzbeschreibungThis laboratory course teaches fundamental concepts in computational science and machine learning with a special emphasis on matrix factorization and representation learning. The class covers techniques like dimension reduction, data clustering, sparse coding, and deep learning as well as a wide spectrum of related use cases and applications.
LernzielStudents acquire fundamental theoretical concepts and methodologies from machine learning and how to apply these techniques to build intelligent systems that solve real-world problems. They learn to successfully develop solutions to application problems by following the key steps of modeling, algorithm design, implementation and experimental validation.

This lab course has a strong focus on practical assignments. Students work in groups of three to four people, to develop solutions to three application problems: 1. Collaborative filtering and recommender systems, 2. Text sentiment classification, and 3. Road segmentation in aerial imagery.

For each of these problems, students submit their solutions to an online evaluation and ranking system, and get feedback in terms of numerical accuracy and computational speed. In the final part of the course, students combine and extend one of their previous promising solutions, and write up their findings in an extended abstract in the style of a conference paper.

(Disclaimer: The offered projects may be subject to change from year to year.)
Inhaltsee course description
Freie Wahlfächer
Den Studierenden steht das gesamte Lehrangebot auf Master Level im Gebiet der Informatik (oder einem verwandten Bereich) der ETH Zürich, der EPF Lausanne, der Universität Zürich und - nach vorgängiger Genehmigung durch den Studiendirektor - der übrigen Schweizer Universitäten zur individuellen Auswahl offen.
NummerTitelTypECTSUmfangDozierende
252-0820-00LInformation Technology in PracticeW5 KP2V + 1U + 1AM. Brandis
KurzbeschreibungThe course is designed to provide students with an understanding of "real-life" computer science challenges in business settings and teach them how to address these.
LernzielStudents will learn important considerations of companies when applying information technology in practice, including costs, economic value and risks of information technology use, or impact of information technology on business strategy and vice versa. They will get insight into how companies have used or are using information technology to be successful. Students will also learn how to assess information technology decisions from different viewpoints, including technical experts, IT managers, business users, and business top managers.

The course will equip participants to understand the role computer science and information technology plays in different companies and to contribute to respective decisions as they enter into practice.
InhaltThe course consists of multiple lectures on economics of information technology, business and IT strategy, and how they are interlinked, and a set of relevant case studies. They address how companies become more successful using information technology, how bad information technology decisions can hurt them, and they look into a number of current challenges companies face regarding their information technology.

The cases are taken both from documented international case studies as well as from Swiss companies participating in the course.

The learned concepts will be applied in exercises, which form a key component of the course.
Voraussetzungen / BesonderesThe course builds on the earlier "Case Studies from Practice" course, with a stronger focus on learning key concepts of information technology use in practice and applying them in exercises, and only a limited number of case studies.
The course prepares students for participation in the subsequent "Case Studies from Practice Seminar", which provides deeper insights into actual cases and how to solve them.
263-0600-00LResearch in Computer Science Information Belegung eingeschränkt - Details anzeigen W5 KP11AProfessor/innen
KurzbeschreibungSelbständige Projektarbeit unter der Leitung eines Informatik-Professors / einer Informatik-Professorin.
LernzielProject done under supervision of a professor in the Department of Computer Science.
Voraussetzungen / BesonderesNur Studierende, die eine der folgenden Bedingungen erfüllen, können mit einem Research Projekt beginnen:
a) 1 Lab (Interfokus Kurs) und 1 Kernfokus Kurs
b) 2 Kernfokus Kurse
c) 2 Labs (Interfokus Kurse)

Eine Aufgabenbeschreibung muss zu Beginn des Projekts beim Studiensekretariat eingereicht werden.
263-5055-00LTalent Kick: From Student to Entrepreneur Information Belegung eingeschränkt - Details anzeigen W3 KP2GV. Gropengiesser, A. Ilic
KurzbeschreibungThe transfer of the latest research results into scalable start-ups creates the prerequisite forsuccessful innovations. An entrepreneurial spirit and mindset enables young leaders to navigate complex environments and bring their research into practice. Studies are the best time to develop an entrepreneurial mindset and explore the entrepreneurial career path.
LernzielThis seminar helps aspiring student/research entrepreneurs to gain hands-on entrepreneurial experience on the path from research into practice.
The examples and cases will be primarily from software, AI, and other deep-tech ventures.

The seminar was created with the support of ETH AI Center and University of St. Gallen and received competitive funding from the ETH Board, Fondation Botnar, Gebert Rüf Foundation, as well as support from the ETH Foundation.
InhaltAfter attending this course, students will be able to:
● Explain the importance and tools to form successful interdisciplinary teams
● Structure customer calls and sales pitchdecks
● Build their first prototypes and MVPs
● Find the right markets and customers to bring your research into practice
● Deal with complexity in bringing innovative / novel products into market
● Develop customer-centric business strategy
● Convince first supporters incl. Entrepreneurial mentors, first investors etc.
Voraussetzungen / BesonderesThe course is practically oriented and features guest speakers from leading start-ups. The course embraces a unique perspective combining technology and investor thinking.
The seminar is structured around ten days.
Wissenschaft im Kontext
Nicht mehr als sechs Kreditpunkte werden in dieser Kategorie akzeptiert.
» Empfehlungen aus Wissenschaft im Kontext (Typ B) für das D-INFK
» siehe Wissenschaft im Kontext: Sprachkurse ETH/UZH
» siehe Wissenschaft im Kontext: Typ A: Förderung allgemeiner Reflexionsfähigkeiten
Master-Arbeit
NummerTitelTypECTSUmfangDozierende
263-0800-00LMaster's Thesis Information Belegung eingeschränkt - Details anzeigen
Zur Master-Arbeit wird nur zugelassen, wer:
a. das Bachelor-Studium erfolgreich abgeschlossen hat;
b. allfällige Auflagen für die Zulassung zum Master-Studiengang erfüllt hat;
c. in der Kategorie "Vertiefungsübergreifende Fächer" sind 16 KP;
d. und in der Kategorie "Vertiefung" sind 26 KP erarbeitet, wovon mindestens 16 KP in der Unterkategorie «Kernfächer Vertiefung»;
e. und in der Kategore "Praktische Arbeit" mindestens 8 KP erworben hat.
f. In allen anderen Kategorien, mit Ausnahme der «Master-Arbeit», insgesamt noch maximal 8 KP ausstehend sind.
O30 KP64DProfessor/innen
KurzbeschreibungThe Master's thesis concludes the study programme. Thesis work should prove the students' ability to independent, structured and scientific working.
LernzielTo work independently and to produce a scientifically structured work under the supervision of a Computer Science Professor.
InhaltIndependent project work supervised by a Computer Science professor.
The duration of the MT is 28 weeks (full-time), where the 28 weeks are composed of 26 weeks of actual processing time and 2 weeks to
compensate for public holidays, sick days and other short-term absences.
Voraussetzungen / BesonderesSupervisor must be a professor at D-INFK or affiliated,
see https://inf.ethz.ch/people/faculty.html