Suchergebnis: Katalogdaten im Frühjahrssemester 2022

Informatik Bachelor Information
Basisprüfung
Basisprüfungsblock 1
Die Fächer des Blocks 1 werden im Herbstsemester angeboten.
Basisprüfungsblock 2
NummerTitelTypECTSUmfangDozierende
401-0212-16LAnalysis I Information O7 KP4V + 2UÖ. Imamoglu
KurzbeschreibungFunktionen, Grenzwerte, Folgen, Reihen, Potenzreihen, Differential- und Integralrechnung einer Variablen,
LernzielFunktionen, Grenzwerte, Folgen, Reihen, Potenzreihen, Differential- und Integralrechnung einer Variablen,
InhaltFunktionen, Grenzwerte, Folgen, Reihen, Potenzreihen, Differential- und Integralrechnung einer Variablen,
SkriptAnalysis I, Marc Burger
Das skript wird auf der webseite der Vorlesung erhaeltlich sein.
LiteraturTom Apostol: Mathematical Analysis
Lernmaterialien und weitere Informationen werden auf der Webseite des Kurses erhältlich sein.
252-0028-00LDigital Design and Computer Architecture Information O7 KP4V + 2UO. Mutlu, F. K. Gürkaynak
KurzbeschreibungDiese Lehrveranstaltung ist eine erste Einführung in das Design digitaler Schaltungen und die Computerarchitektur. Sie deckt die technischen Grundlagen wie eine Computerplattform von Grund auf entworfen wird ab. Sie stellt verschiedene Ausführungsparadigmen, Hardwarebeschreibungssprachen und Prinzipien im digitalen Design und der Computerarchitektur vor.
LernzielDiese Lehrveranstaltung ist eine erste Annäherung an die Computerarchitektur. Die Studenten lernen das Design digitaler Schaltkreise, um:
- die Grundlagen,
- die (Design-)Prinzipien,
- und die Präzedenzfälle (in der Computerarchitektur) zu verstehen.
Auf der Grundlage dieses Verständnisses wird von den Studierenden erwartet, dass sie:
- lernen wie ein moderner Computer intern von Grund auf funktioniert,
- die Kompromisse verschiedener Designs und Ideen bewerten können,
- ein fundiertes Design (eines einfachen Mikroprozessors) implementieren können,
- immer komplexere Systeme systematisch austesten können,
- hoffentlich darauf vorbereitet sind, neuartige Out-of-the-Box-Designs zu entwickeln.
Der Fokus liegt auf Grundlagen, Prinzipien, Präzedenzfällen und deren Verwendung um gute Designs zu erstellen/umzusetzen.
InhaltDie Lehrveranstaltung besteht aus den folgenden Hauptblöcken:
- Aktuelle Hauptthemen der Computerarchitektur: Prinzipien, Mysterien, motivierende Fallstudien und Beispiele.
- Digital Logic Design: Kombinationslogik, sequentielle Logik, Hardwarebeschreibungssprachen, FPGAs, Timing und Verifikation.
- Grundlagen der Computerarchitektur: Von Neumann-Computermodell, Befehlssatzarchitektur, Assembly-Programmierung, Mikroarchitektur, Mikroprogrammierung.
- Grundlagen des Prozessordesigns: Pipelining, Out-of-Order-Ausführung, Verzweigungsvorhersage.
- Verarbeitungs-Paradigmen: Out-of-Order-Ausführung, Datenfluss, superskalare Ausführung, Decoupled Access/Execute, VLIW, SIMD-Prozessoren, GPUs, systolische Arrays, Multithreading.
- Speichersystem: Speicherorganisation, Speichertechnologien, Speicherhierarchie, Caches, Prefetching, virtueller Speicher.
SkriptAlle Unterlagen (inklusive Vorlesungsfolien) werden auf der Website der Lehrveranstaltung zur Verfügung gestellt: http://safari.ethz.ch/digitaltechnik/
Die Videoaufzeichnung der Vorlesung wird voraussichtlich bereitgestellt. Es kann dabei zu Verzögerungen kommen.
LiteraturDie offiziellen Lehrbücher dieser Lehrveranstaltung sind “Introduction to Computing Systems” von Patt und Patel, und “Digital Design and Computer Architecture” von Harris und Harris.
Da dieser Kurs auf dem neuesten Stand ist, gibt es kein Lehrbuch das alle Themen abdeckt. Deswegen werden wir die Pflichtlektüre und die empfohlene Literatur für jede Vorlesung bereitstellen. Diese besteht hauptsächlich aus zwei Lehrbüchern und wichtigen Artikeln, die für das Verständnis aktueller Computerarchitekturen essentiell sind.
252-0029-00LParallele Programmierung Information O7 KP4V + 2UT. Hoefler, B. Solenthaler
KurzbeschreibungEinfuehrung in das parallele Programmieren: nicht-deterministische und deterministische Programme, Modelle fuer parallele Programme, Synchronization, Kommunikation und Fairness.
LernzielEinfuehrung in das parallele Programmieren: nicht-deterministische und deterministische Programme, Modelle fuer parallele Programme, Synchronization, Kommunikation und Fairness. Uebungen beschaeftigen sich mit Threads in moderne Programmiersprachen
(Java, C#) und die Ausfuehrung von parallelen Programmen auf
Multi-Prozessor/Multi-Core basierten Systemen.
252-0030-00LAlgorithmen und Wahrscheinlichkeit Information Belegung eingeschränkt - Details anzeigen O7 KP4V + 2UA. Steger, E. Welzl
KurzbeschreibungEs werden klassische Algorithmen aus verschiedenen Anwendungsbereichen vorgestellt. In die diskrete Wahrscheinlichkeitstheorie wird eingeführt und das Konzept randomisierter Algorithmen an verschiedenen Beispielen vorgestellt.
LernzielVerständnis des Entwurfs und der Analyse von Algorithmen. Grundlagen der diskreten Wahrscheinlichkeitstheorie und ihrer Anwendung in der Algorithmik.
InhaltFortsetzung der Vorlesung Algorithmen und Datenstrukturen des ersten Semesters.
Grundlagenfächer
NummerTitelTypECTSUmfangDozierende
252-0058-00LFormal Methods and Functional Programming Information O7 KP4V + 2UP. Müller, C. Sprenger
KurzbeschreibungIn this course, participants will learn about new ways of specifying, reasoning about, and developing programs and computer systems. The first half will focus on using functional programs to express and reason about computation. The second half presents methods for developing and verifying programs represented as discrete transition systems.
LernzielIn this course, participants will learn about new ways of specifying,
reasoning about, and developing programs and computer systems. Our objective is to help students raise their level of abstraction in modeling and implementing systems.
InhaltThe first part of the course will focus on designing and reasoning
about functional programs. Functional programs are mathematical
expressions that are evaluated and reasoned about much like ordinary
mathematical functions. As a result, these expressions are simple to
analyze and compose to implement large-scale programs. We will cover the mathematical foundations of functional programming, the lambda calculus, as well as higher-order programming, typing, and proofs of correctness.

The second part of the course will focus on deductive and algorithmic validation of programs modeled as transition systems. As an example of deductive verification, students will learn how to formalize the semantics of imperative programming languages and how to use a formal semantics to prove properties of languages and programs. As an example of algorithmic validation, the course will introduce model checking and apply it to programs and program designs.
252-0063-00LData Modelling and Databases Information O7 KP4V + 2UC. Zhang
KurzbeschreibungData modelling (Entity Relationship), relational data model, relational design theory (normal forms), SQL, database integrity, transactions and advanced database engines
LernzielIntroduction to relational databases and data management. Basics of SQL programming and transaction management.
InhaltThe course covers the basic aspects of the design and implementation of databases and information systems. The courses focuses on relational databases as a starting point but will also cover data management issues beyond databases such as: transactional consistency, replication, data warehousing, other data models, as well as SQL.
LiteraturKemper, Eickler: Datenbanksysteme: Eine Einführung. Oldenbourg Verlag, 7. Auflage, 2009.

Garcia-Molina, Ullman, Widom: Database Systems: The Complete Book. Pearson, 2. Auflage, 2008.
252-0064-00LComputer Networks Information O7 KP4V + 2UA. Perrig, M. Legner
KurzbeschreibungThis introductory course on computer networking covers essential network technologies from every layer of the networking stack, ranging from networked applications over transport protocols and routing paradigms all through the physical layer.
LernzielStudents will get a comprehensive overview of the key protocols and the architecture of the Internet, as one example of more general principles in network design. Students will also acquire hands-on experience in programming different aspects of a computer networks. Apart from the state-of-the-art in networking practice, students will explore the rationale for the design choices that networks in the past have made, and where applicable, why these choices may no longer be ideal.
SkriptThe slides for each lecture will be made available through the course Web page, along with additional reference material.
LiteraturComputer Networking: A Top-Down Approach, James F. Kurose and Keith W. Ross. Pearson; 7th edition (May 6, 2016)
Voraussetzungen / BesonderesThe bonus projects use programming in C and Python. ETH courses in the Bachelor track before this course already cover this. For other students, e.g., exchange, please take note of this requirement: you can still take the course and get a good (even 6/6) grade, but if you don't fulfill this prerequisite, you are disadvantaged compared to others who can get the bonus points.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggeprüft
Medien und digitale Technologiengeprüft
Problemlösunggeprüft
Projektmanagementgeprüft
Soziale KompetenzenKommunikationgefördert
Kooperation und Teamarbeitgefördert
Kundenorientierunggefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Sensibilität für Vielfalt gefördert
Verhandlunggefördert
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengeprüft
Kritisches Denkengeprüft
Integrität und Arbeitsethikgeprüft
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement geprüft
401-0614-00LWahrscheinlichkeit und Statistik Information O5 KP2V + 2UV. Tassion
KurzbeschreibungEinführung in die Wahrscheinlichkeitstheorie und Statistik
Lernziela) Fähigkeit, die behandelten wahrscheinlichkeitstheoretischen Methoden zu verstehen und anzuwenden

b) Probabilistisches Denken und stochastische Modellierung

c) Fähigkeit, einfache statistische Tests selbst durchzuführen und die Resultate zu interpretieren
InhaltWahrscheinlichkeitsraum, Wahrscheinlichkeitsmass, Zufallsvariablen, Verteilungen, Dichten, Unabhängigkeit, bedingte Wahrscheinlichkeiten, Erwartungswert, Varianz, Kovarianz, Gesetz der grossen Zahlen, Zentraler Grenzwertsatz, grosse Abweichungen, Chernoff-Schranken, Maximum-Likelihood-Schätzer, Momentenschätzer, Tests, Neyman-Pearson Lemma, Konfidenzintervalle
Kernfächer
Vertiefung Systems and Software Engineering
NummerTitelTypECTSUmfangDozierende
252-0216-00LRigorous Software Engineering Information O8 KP4V + 2U + 1AM. Schwerhoff, M. Vechev
KurzbeschreibungThe course provides an overview of techniques to build correct software, with a strong focus on testing and program analysis.
LernzielThe course has two main objectives:

- Understand the core techniques for building correct software.
- Understand how to apply these techniques in practice.
InhaltThe course presents an overview of techniques to build correct software, including:
- Code documentation
- Modularity and coupling (Design patterns)
- Dynamic program analysis (Testing, fuzzing, concolic execution)
- Static program analysis (Numerical abstract interpretation, pointer analysis, symbolic execution)
- Formal modeling (Alloy)

In addition, students apply the learned techniques to solve a group project in the area of program analysis.
LiteraturWill be announced in the lecture.
Vertiefung Information and Data Processing
NummerTitelTypECTSUmfangDozierende
252-0220-00LIntroduction to Machine Learning Information Belegung eingeschränkt - Details anzeigen
Limited number of participants. Preference is given to students in programmes in which the course is being offered. All other students will be waitlisted. Please do not contact Prof. Krause for any questions in this regard. If necessary, please contact studiensekretariat@inf.ethz.ch
O8 KP4V + 2U + 1AA. Krause, F. Yang
KurzbeschreibungThe course introduces the foundations of learning and making predictions based on data.
LernzielThe course will introduce the foundations of learning and making predictions from data. We will study basic concepts such as trading goodness of fit and model complexitiy. We will discuss important machine learning algorithms used in practice, and provide hands-on experience in a course project.
Inhalt- Linear regression (overfitting, cross-validation/bootstrap, model selection, regularization, [stochastic] gradient descent)
- Linear classification: Logistic regression (feature selection, sparsity, multi-class)
- Kernels and the kernel trick (Properties of kernels; applications to linear and logistic regression); k-nearest neighbor
- Neural networks (backpropagation, regularization, convolutional neural networks)
- Unsupervised learning (k-means, PCA, neural network autoencoders)
- The statistical perspective (regularization as prior; loss as likelihood; learning as MAP inference)
- Statistical decision theory (decision making based on statistical models and utility functions)
- Discriminative vs. generative modeling (benefits and challenges in modeling joint vy. conditional distributions)
- Bayes' classifiers (Naive Bayes, Gaussian Bayes; MLE)
- Bayesian approaches to unsupervised learning (Gaussian mixtures, EM)
LiteraturTextbook: Kevin Murphy, Machine Learning: A Probabilistic Perspective, MIT Press
Voraussetzungen / BesonderesDesigned to provide a basis for following courses:
- Advanced Machine Learning
- Deep Learning
- Probabilistic Artificial Intelligence
- Seminar "Advanced Topics in Machine Learning"
Vertiefung Theoretical Computer Science
NummerTitelTypECTSUmfangDozierende
252-0211-00LInformation Security Information O8 KP4V + 3UD. Hofheinz, S. Krstic, K. Paterson, J. L. Toro Pozo
KurzbeschreibungThis course provides an introduction to Information Security. The focus
is on fundamental concepts and models, basic cryptography, protocols and system security, and privacy and data protection. While the emphasis is on foundations, case studies will be given that examine different realizations of these ideas in practice.
LernzielMaster fundamental concepts in Information Security and their
application to system building. (See objectives listed below for more details).
Inhalt1. Introduction and Motivation (OBJECTIVE: Broad conceptual overview of information security) Motivation: implications of IT on society/economy, Classical security problems, Approaches to
defining security and security goals, Abstractions, assumptions, and trust, Risk management and the human factor, Course verview. 2. Foundations of Cryptography (OBJECTIVE: Understand basic
cryptographic mechanisms and applications) Introduction, Basic concepts in cryptography: Overview, Types of Security, computational hardness, Abstraction of channel security properties, Symmetric
encryption, Hash functions, Message authentication codes, Public-key distribution, Public-key cryptosystems, Digital signatures, Application case studies, Comparison of encryption at different layers, VPN, SSL, Digital payment systems, blind signatures, e-cash, Time stamping 3. Key Management and Public-key Infrastructures (OBJECTIVE: Understand the basic mechanisms relevant in an Internet context) Key management in distributed systems, Exact characterization of requirements, the role of trust, Public-key Certificates, Public-key Infrastructures, Digital evidence and non-repudiation, Application case studies, Kerberos, X.509, PGP. 4. Security Protocols (OBJECTIVE: Understand network-oriented security, i.e.. how to employ building blocks to secure applications in (open) networks) Introduction, Requirements/properties, Establishing shared secrets, Principal and message origin authentication, Environmental assumptions, Dolev-Yao intruder model and
variants, Illustrative examples, Formal models and reasoning, Trace-based interleaving semantics, Inductive verification, or model-checking for falsification, Techniques for protocol design,
Application case study 1: from Needham-Schroeder Shared-Key to Kerberos, Application case study 2: from DH to IKE. 5. Access Control and Security Policies (OBJECTIVES: Study system-oriented security, i.e., policies, models, and mechanisms) Motivation (relationship to CIA, relationship to Crypto) and examples Concepts: policies versus models versus mechanisms, DAC and MAC, Modeling formalism, Access Control Matrix Model, Roll Based Access Control, Bell-LaPadula, Harrison-Ruzzo-Ullmann, Information flow, Chinese Wall, Biba, Clark-Wilson, System mechanisms: Operating Systems, Hardware Security Features, Reference Monitors, File-system protection, Application case studies 6. Anonymity and Privacy (OBJECTIVE: examine protection goals beyond standard CIA and corresponding mechanisms) Motivation and Definitions, Privacy, policies and policy languages, mechanisms, problems, Anonymity: simple mechanisms (pseudonyms, proxies), Application case studies: mix networks and crowds. 7. Larger application case study: GSM, mobility
Wahlfächer
Es können auch Lehrveranstaltungen aus dem Master-Studiengang in Informatik gewählt werden. Es liegt in der Verantwortung der Studierenden, sicherzustellen, dass sie die Voraussetzungen für diese Lehrveranstaltungen erfüllen.
NummerTitelTypECTSUmfangDozierende
252-0341-01LInformation Retrieval Information W4 KP2V + 1UG. Fourny
KurzbeschreibungThis course gives an introduction to information retrieval with a focus on text documents and unstructured data.

Main topics comprise document modelling, various retrieval techniques, indexing techniques, query frameworks, optimization, evaluation and feedback.
LernzielWe keep accumulating data at an unprecedented pace, much faster than we can process it. While Big Data techniques contribute solutions accounting for structured or semi-structured shapes such as tables, trees, graphs and cubes, the study of unstructured data is a field of its own: Information Retrieval.

After this course, you will have in-depth understanding of broadly established techniques in order to model, index and query unstructured data (aka, text), including the vector space model, boolean queries, terms, posting lists, dealing with errors and imprecision.

You will know how to make queries faster and how to make queries work on very large datasets. You will be capable of evaluating the quality of an information retrieval engine.

Finally, you will also have knowledge about alternate models (structured data, probabilistic retrieval, language models) as well as basic search algorithms on the web such as Google's PageRank.
Inhalt1. Introduction

2. Boolean retrieval: the basics of how to index and query unstructured data.

3. Term vocabulary: pre-processing the data prior to indexing: building the term vocabulary, posting lists.

4. Tolerant retrieval: dealing with spelling errors: tolerant retrieval.

5. Index construction: scaling up to large datasets.

6. Index compression: how to improve performance by compressing the index in various ways.

7. Ranked retrieval: how to ranking results with scores and the vector space model

8. Scoring in a bigger picture: taking ranked retrieval to the next level with various improvements, including inexact retrieval

9. Probabilistic information retrieval: how to leverage Bayesian techniques to build an alternate, probabilistic model for information retrieval

10. Language models: another alternate model based on languages, automata and document generation

11. Evaluation: precision, recall and various other measurements of quality

12. Web search: PageRank

13. Wrap-up.

The lecture structure will follow the pedagogical approach of the book (see material).

The field of information retrieval also encompasses machine learning aspects. However, we will make a conscious effort to limit overlaps, and be complementary with, the Introduction to Machine Learning lecture.
LiteraturC. D. Manning, P. Raghavan, H. Schütze, Introduction to Information Retrieval, Cambridge University Press.
Voraussetzungen / BesonderesPrior knowledge in elementary set theory, logics, linear algebra, data structures, abstract data types, algorithms, and probability theory (at the Bachelor's level) is required, as well as programming skills (we will use Python).
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Entscheidungsfindunggefördert
Medien und digitale Technologiengefördert
Problemlösunggeprüft
Projektmanagementgefördert
Soziale KompetenzenKommunikationgeprüft
Kooperation und Teamarbeitgefördert
Kundenorientierunggefördert
Menschenführung und Verantwortunggefördert
Selbstdarstellung und soziale Einflussnahmegefördert
Sensibilität für Vielfalt geprüft
Verhandlunggeprüft
Persönliche KompetenzenAnpassung und Flexibilitätgefördert
Kreatives Denkengeprüft
Kritisches Denkengeprüft
Integrität und Arbeitsethikgefördert
Selbstbewusstsein und Selbstreflexion gefördert
Selbststeuerung und Selbstmanagement gefördert
252-0820-00LInformation Technology in PracticeW5 KP2V + 1U + 1AM. Brandis
KurzbeschreibungThe course is designed to provide students with an understanding of "real-life" computer science challenges in business settings and teach them how to address these.
LernzielStudents will learn important considerations of companies when applying information technology in practice, including costs, economic value and risks of information technology use, or impact of information technology on business strategy and vice versa. They will get insight into how companies have used or are using information technology to be successful. Students will also learn how to assess information technology decisions from different viewpoints, including technical experts, IT managers, business users, and business top managers.

The course will equip participants to understand the role computer science and information technology plays in different companies and to contribute to respective decisions as they enter into practice.
InhaltThe course consists of multiple lectures on economics of information technology, business and IT strategy, and how they are interlinked, and a set of relevant case studies. They address how companies become more successful using information technology, how bad information technology decisions can hurt them, and they look into a number of current challenges companies face regarding their information technology.

The cases are taken both from documented international case studies as well as from Swiss companies participating in the course.

The learned concepts will be applied in exercises, which form a key component of the course.
Voraussetzungen / BesonderesThe course builds on the earlier "Case Studies from Practice" course, with a stronger focus on learning key concepts of information technology use in practice and applying them in exercises, and only a limited number of case studies.
The course prepares students for participation in the subsequent "Case Studies from Practice Seminar", which provides deeper insights into actual cases and how to solve them.
151-0116-10LHigh Performance Computing for Science and Engineering (HPCSE) for Engineers II Information W4 KP4GP. Koumoutsakos, S. M. Martin
KurzbeschreibungThis course focuses on programming methods and tools for parallel computing on multi and many-core architectures. Emphasis will be placed on practical and computational aspects of Uncertainty Quantification and Propagation including the implementation of relevant algorithms on HPC architectures.
LernzielThe course will teach
- programming models and tools for multi and many-core architectures
- fundamental concepts of Uncertainty Quantification and Propagation (UQ+P) for computational models of systems in Engineering and Life Sciences
InhaltHigh Performance Computing:
- Advanced topics in shared-memory programming
- Advanced topics in MPI
- GPU architectures and CUDA programming

Uncertainty Quantification:
- Uncertainty quantification under parametric and non-parametric modeling uncertainty
- Bayesian inference with model class assessment
- Markov Chain Monte Carlo simulation
Skripthttps://www.cse-lab.ethz.ch/teaching/hpcse-ii_fs22/
Class notes, handouts
Literatur- Class notes
- Introduction to High Performance Computing for Scientists and Engineers, G. Hager and G. Wellein
- CUDA by example, J. Sanders and E. Kandrot
- Data Analysis: A Bayesian Tutorial, D. Sivia and J. Skilling
- An introduction to Bayesian Analysis - Theory and Methods, J. Gosh, N. Delampady and S. Tapas
- Bayesian Data Analysis, A. Gelman, J. Carlin, H. Stern, D. Dunson, A. Vehtari and D. Rubin
- Machine Learning: A Bayesian and Optimization Perspective, S. Theodorides
Voraussetzungen / BesonderesStudents must be familiar with the content of High Performance Computing for Science and Engineering I (151-0107-20L)
151-0306-00LVisualization, Simulation and Interaction - Virtual Reality I Information W4 KP4GA. Kunz
KurzbeschreibungTechnologie der virtuellen Realität. Menschliche Faktoren, Erzeugung virtueller Welten, Beleuchtungsmodelle, Display- und Beschallungssysteme, Tracking, haptische/taktile Interaktion, Motion Platforms, virtuelle Prototypen, Datenaustausch, VR-Komplettsysteme, Augmented Reality; Kollaborationssysteme; VR und Design; Umsetzung der VR in der Industrie; Human COmputer Interfaces (HCI).
LernzielDie Studierenden erhalten einen Überblick über die virtuelle Realität, sowohl aus technischer als auch aus informationstechnologischer Sicht. Sie lernen unterschiedliche Software- und Hardwareelemente kennen sowie deren Einsatzmöglichkeiten im Geschäftsprozess. Die Studierenden entwickeln eine Kenntnis darüber, wo sich heute die virtuelle Realität nutzbringend einsetzen lässt und wo noch weiterer Forschungsbedarf besteht. Anhand konkreter Programme und Systeme erfahren die Teilnehmer den Umgang mit den erlernten neuen Technologien.
Studierende sind in der Lage:
• gängige VR-Technologien zu evaluieren und die geeignetste für eine gegebene Aufgabe auszuwählen bezüglich der folgenden Gesichtspunkte:
o Visualisierungsmöglichkeiten: Monitore, Projektionssysteme, Datenbrillen
o Positionserfassungssystemen (optisch/elektromagnetisch/mechanisch)
o Interaktionstechnologien: Datenhandschuhe, Möglichkeit des echten Laufens/Erfassung der Augenbewegung/manuelle Interaktion, usw.
• eine VR-Anwendung selbstständig zu entwickeln,
• die VR-Technologie auf industrielle Anforderungen anzuwenden,
• das erlernte Wissen in einer praktischen Anwendung zu vertiefen.
• grundlegende Unterschiede in Anwendung digitaler Welten zu vergleichen (VR/AR/MR/XR)
InhaltDiese Vorlesung gibt eine Einführung in die Technologie der virtuellen Realität als neues Tool zur Bewältigung komplexer Geschäftsprozesse. Es sind die folgenden Themen vorgesehen: Einführung und Geschichte der VR; Eingliederung der VR in die Produktentwicklung; Nutzen von VR für die Industrie; menschliche Faktoren als Grundlage der virtuellen Realität; Einführung in die Erzeugung (Modellierung) virtueller Welten; Beleuchtungsmodelle; Kollisionserkennung; Displaysysteme; Projektionssysteme; Beschallungssysteme; Trackingssysteme; Interaktionsgeräte für die virtuelle Umgebung; haptische und taktile Interaktion; Motion Platforms; Datenhandschuh; physikalisch basierte Simulation; virtuelle Prototypen; Datenaustausch und Datenkommunikation; VR-Komplettsysteme; Augmented Reality; Kollaborationssysteme; VR zur Unterstützung von Designaufgaben; Umsetzung der VR in der Industrie; Ausblick in die laufende Forschung im Bereich VR.

Lehrmodule:
- Geschichte der VR und Definition der wichtigsten Begriffe
- Einordnung der VR in Geschäftsprozesse
- Die Erzeugung virtueller Welten
- Geräte und Technologien für die immersive virtuelle Realität
- Anwendungen der VR in unterschiedlichsten Gebieten
SkriptDie Durchführung der Lehrveranstaltung erfolgt gemischt mit Vorlesungs- und Übungsanteilen.
Die Vorlesung kann auf Wunsch in Englisch erfolgen. Das Skript ist ebenfalls in Englisch verfügbar.
Skript, Handout; Kosten SFr.30.-
Voraussetzungen / BesonderesVoraussetzungen: keine
Vorlesung geeignet für D-MAVT, D-ITET, D-MTEC und D-INF

Testat/ Kredit-Bedingungen/ Prüfung:
–Teilnahme an Vorlesung und Kolloquien
–Erfolgreiche Durchführung von Übungen in Teams
401-0674-00LNumerical Methods for Partial Differential Equations
Nicht für Studierende BSc/MSc Mathematik
W10 KP2G + 2U + 2P + 4AR. Hiptmair
KurzbeschreibungDerivation, properties, and implementation of fundamental numerical methods for a few key partial differential equations: convection-diffusion, heat equation, wave equation, conservation laws. Implementation in C++ based on a finite element library.
LernzielMain skills to be acquired in this course:
* Ability to implement fundamental numerical methods for the solution of partial differential equations efficiently.
* Ability to modify and adapt numerical algorithms guided by awareness of their mathematical foundations.
* Ability to select and assess numerical methods in light of the predictions of theory
* Ability to identify features of a PDE (= partial differential equation) based model that are relevant for the selection and performance of a numerical algorithm.
* Ability to understand research publications on theoretical and practical aspects of numerical methods for partial differential equations.
* Skills in the efficient implementation of finite element methods on unstructured meshes.

This course is neither a course on the mathematical foundations and numerical analysis of methods nor an course that merely teaches recipes and how to apply software packages.
Inhalt1.2.1 Elastic Membranes
1.2.2 Electrostatic Fields
1.2.3 Quadratic Minimization Problems
1.3 Sobolev spaces
1.4 Linear Variational Problems
1.5 EquilibriumModels: Boundary Value Problems
1.6 Diffusion Models: Stationary Heat Conduction
1.7 Boundary Conditions
1.8 Second-Order Elliptic Variational Problems
1.9 Essential and Natural Boundary Conditions
2.2 Principles of Galerkin Discretization
2.3 Case Study: Linear FEMfor Two-Point Boundary Value Problems
2.4 Case Study: Triangular Linear FEMin Two Dimensions I
2.4 Case Study: Triangular Linear FEMin Two Dimensions II
2.5 Building Blocks of General Finite Element Methods
2.6 Lagrangian Finite Element Methods
2.7.2 Mesh Information and Mesh Data Structures
2.7.4 Assembly Algorithms
2.7.5 Local Computations
2.7.6 Treatment of Essential Boundary Conditions
2.8 Parametric Finite Element Methods I
2.8 Parametric Finite Element Methods II
3.1 Abstract Galerkin Error Estimates
3.2 Empirical (Asymptotic) Convergence of Lagrangian FEM
3.3 A Priori (Asymptotic) Finite Element Error Estimates I
3.3 A Priori (Asymptotic) Finite Element Error Estimates II
3.3 A Priori (Asymptotic) Finite Element Error Estimates III
3.4 Elliptic Regularity Theory
3.5 Variational Crimes
3.6.1 Linear Output Functionals
3.6.2 Case Study: Computation of Boundary Fluxes with FEM
3.6.3 Lagrangian FEM: L2-Estimates
3.7 Discrete Maximum Principle
3.8 Validation and Debugging of Finite Element Codes
4.1 Finite Difference Methods (FDM)
4.2 Finite Volume Methods (FVM)
4.3 Spectral Galerkin Methods
4.4 Collocation Methods
6.1 Initial-Value Problems (IVPs) for Ordinary Differential Equations (ODEs)
6.2 Introduction: Polygonal Approximation Methods
6.3.2 (Asymptotic) Convergence of Single-Step Methods
6.3 General Single-Step Methods
6.4 Explicit Runge-Kutta Single-Step Methods (RKSSMs)
6.5 Adaptive Stepsize Control
7.1 Model Problem Analysis
7.2 Stiff Initial-Value Problems
7.3 Implicit Runge-Kutta Single-Step Methods
7.4 Semi-Implicit Runge-Kutta Methods
7.5 Splitting Methods
9.2.1 Heat Equation
9.2.2 Heat Equation: Spatial Variational Formulation
9.2.3 Stability of Parabolic Evolution Problems
9.2.4 Spatial Semi-Discretization: Method of Lines
9.2.7 Timestepping for Method-of-Lines ODE
9.2.8 Fully Discrete Method of Lines: Convergence
9.3.1 Models for Vibrating Membrane
9.3.2 Wave Propagation
9.3.3 Method of Lines for Wave Propagation
9.3.4 Timestepping for Semi-Discrete Wave Equations
9.3.5 The Courant-Friedrichs-Levy (CFL) Condition
10.1.1 Modeling Fluid Flow
10.1.2 Heat Convection and Diffusion
10.1.3 Incompressible Fluids
10.1.4 Time-Dependent (Transient) Heat Flow in a Fluid
10.2.1 Singular Perturbation
10.2.2 Upwinding
10.2.2.1 Upwind Quadrature
10.2.2.2 Streamline Diffusion
10.3.1 Method of Lines
10.3.2 Transport Equation
10.3.3 Lagrangian Split-Step Method
10.3.4 Semi-Lagrangian Method
SkriptThe lecture will be taught in flipped classroom format:
- Video tutorials for all thematic units will be published online.
- Tablet notes accompanying the videos will be made available to the audience as PDF.
- A comprehensive lecture document will cover all aspects of the course.
LiteraturChapters of the following books provide supplementary reading
(detailed references in course material):

* D. Braess: Finite Elemente,
Theorie, schnelle Löser und Anwendungen in der Elastizitätstheorie, Springer 2007 (available online).
* S. Brenner and R. Scott. Mathematical theory of finite element methods, Springer 2008 (available online).
* A. Ern and J.-L. Guermond. Theory and Practice of Finite Elements, volume 159 of Applied Mathematical Sciences. Springer, New York, 2004.
* Ch. Großmann and H.-G. Roos: Numerical Treatment of Partial Differential Equations, Springer 2007.
* W. Hackbusch. Elliptic Differential Equations. Theory and Numerical Treatment, volume 18 of Springer Series in Computational Mathematics. Springer, Berlin, 1992.
* P. Knabner and L. Angermann. Numerical Methods for Elliptic and Parabolic Partial Differential Equations, volume 44 of Texts in Applied Mathematics. Springer, Heidelberg, 2003.
* S. Larsson and V. Thomée. Partial Differential Equations with Numerical Methods, volume 45 of Texts in Applied Mathematics. Springer, Heidelberg, 2003.
* R. LeVeque. Finite Volume Methods for Hyperbolic Problems. Cambridge Texts in Applied Mathematics. Cambridge University Press, Cambridge, UK, 2002.

However, study of supplementary literature is not important for for following the course.
Voraussetzungen / BesonderesMastery of basic calculus and linear algebra is taken for granted.
Familiarity with fundamental numerical methods (solution methods for linear systems of equations, interpolation, approximation, numerical quadrature, numerical integration of ODEs) is essential.

Important: Coding skills and experience in C++ are essential.

Homework assignments involve substantial coding, partly based on a C++ finite element library. The written examination will be computer based and will comprise coding tasks.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Seminar
Es kann auch ein Seminar aus dem Master in Informatik gewählt werden. Es liegt in der Verantwortung der Studierenden, sicherzustellen, dass sie die Voraussetzungen für diese Lehrveranstaltung erfüllen.
NummerTitelTypECTSUmfangDozierende
252-2310-00LUnderstanding Context-Free Parsing Algorithms Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.

Number of participants limited to 24.
W2 KP2SR. Cotterell
KurzbeschreibungParsing context-free grammars is a fundamental problem in natural language processing and computer science more broadly. This seminar will explore a classic text that unifies many algorithms for parsing in one framework.
LernzielSikkel's notion of parsing schemata is explored in depth. The students should take away an understanding and fluency with these ideas.
InhaltParsing Schemata: A Framework for Specification and Analysis of Parsing Algorithms
252-2603-00LSeminar on Systems Security Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 22.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SS. Shinde
KurzbeschreibungThe seminar focuses on critical thinking and critique of fundamental as well as recent advances in systems security.
LernzielThe learning objective is to analyze selected research papers
published at top systems+security venues and then identify open
problems in this space. The seminar will achieve this via several
components: reading papers, technical presentations, writing analysis
and critique summaries, class discussions, and exploring potential
research topics.
InhaltEach student will pick one paper from the selected list, present it in
the class, and lead the discussion for that paper.

During the semester, all students will select, read, and submit
critique summaries for at least 8 research papers from the list.
Voraussetzungen / BesonderesStudents who are either interested in security research or are
exploring thesis topics are highly encouraged to take this course.
Students with systems/architecture/verification/PL expertise and basic
security understanding are welcome.
KompetenzenKompetenzen
Fachspezifische KompetenzenKonzepte und Theoriengeprüft
Verfahren und Technologiengeprüft
Methodenspezifische KompetenzenAnalytische Kompetenzengeprüft
Problemlösunggeprüft
Soziale KompetenzenKommunikationgeprüft
Menschenführung und Verantwortunggeprüft
Selbstdarstellung und soziale Einflussnahmegeprüft
Persönliche KompetenzenKreatives Denkengeprüft
Kritisches Denkengeprüft
252-3510-00LComputing Platforms Information Belegung eingeschränkt - Details anzeigen
The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SG. Alonso, M. J. Giardino
KurzbeschreibungThe seminar covers core concepts and ideas in the general area of computer systems, ranging from software and hardware architectures to system design for operating systems, data processing systems, and distributed systems.
LernzielThe seminar will cover core concepts and ideas in the general area of computer systems, ranging from software and hardware architectures to system design for operating systems, data processing systems, and distributed systems. The focus will be on fundamental ideas that apply across systems and application areas but with an emphasis on those ideas that apply to cloud platforms and hardware acceler
InhaltThe seminar will consist on student presentations based on a list of papers that will be provided at the beginning of the course. Presentations will be done in teams. Presentations will be arranged in slots of 30 minutes talk plus 15 minutes questions. Grades will be assigned based on quality of the presentation, coverage of the topic including material not in the original papers, participation during the seminar, and ability to understand, present, and criticize the underlying technology.
252-3800-00LAdvanced Topics in Mixed Reality Information Belegung eingeschränkt - Details anzeigen
Number of participants limited to 24.

The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar.
W2 KP2SC. Holz
KurzbeschreibungIn the recent years, there have been major technological advances in commercial virtual and augmented reality systems. Those advancements lead to many open challenges in terms of perception and interaction as well as technical challenges. In this course, students present and discuss papers from relevant top-tier research venues to extract techniques and insights from MR research.
LernzielThe objective of the seminar is for participants to collectively learn about the state-of-the-art research in Mixed Reality (primarily augmented and virtual reality) and closely related areas.
This includes the ability to concisely present results of pioneering as well as state-of-the-art research.
Another objective is to collectively discuss open issues in the field and developing a feeling for what constitutes research questions and outcomes in the field of technical Human-Computer Interaction.
InhaltThe seminar format is as follows: attendees individually read one full-paper publication, working through its content in detail and possibly covering some of the background if necessary, and present the approach, methodology, research question and implementation as well as the evaluation and discussion in a 20–25 min talk in front of the others. Each presenter will then lead a short discussion about the paper, which is also guided by questions posed to the audience.
Literatur24 papers will be provided by the lecturer and distributed in the first seminar on a first-come, first-served basis according to participants' preferences. The lecturer will also give a brief run-down across all 24 papers in a fast-forward style, covering each paper in a single-minute presentation, and outline the difficulties of each project. The schedule is fixed throughout the term with easier papers being presented earlier and more comprehensive papers presented later in the term.
Voraussetzungen / BesonderesAll students (including students on waiting list) are welcome in the first seminar to see the overview over the papers we will discuss. After assigning papers, the seminar will be limited to 24 attendees, i.e., only enrolled students can participate in the presentations and discussions.
  •  Seite  1  von  3 Nächste Seite Letzte Seite     Alle