Suchergebnis: Katalogdaten im Frühjahrssemester 2022
Elektrotechnik und Informationstechnologie Master | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Master-Studium (Studienreglement 2008) | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Fächer der Vertiefung Insgesamt 42 KP müssen im Masterstudium aus Vertiefungsfächern erreicht werden. Der individuelle Studienplan unterliegt der Zustimmung eines Tutors. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Computers and Networks | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Empfohlene Fächer Diese Fächer sind eine Empfehlung. Sie können Fächer aus allen Vertiefungsrichtungen wählen. Sprechen Sie mit Ihrem Tutor. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Nummer | Titel | Typ | ECTS | Umfang | Dozierende | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
101-0178-01L | Uncertainty Quantification in Engineering | W | 3 KP | 2G | B. Sudret | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | Uncertainty quantification aims at studying the impact of aleatory and epistemic uncertainty onto computational models used in science and engineering. The course introduces the basic concepts of uncertainty quantification: probabilistic modelling of data (copula theory), uncertainty propagation techniques (Monte Carlo simulation, polynomial chaos expansions), and sensitivity analysis. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | After this course students will be able to properly pose an uncertainty quantification problem, select the appropriate computational methods and interpret the results in meaningful statements for field scientists, engineers and decision makers. The course is suitable for any master/Ph.D. student in engineering or natural sciences, physics, mathematics, computer science with a basic knowledge in probability theory. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | The course introduces uncertainty quantification through a set of practical case studies that come from civil, mechanical, nuclear and electrical engineering, from which a general framework is introduced. The course in then divided into three blocks: probabilistic modelling (introduction to copula theory), uncertainty propagation (Monte Carlo simulation and polynomial chaos expansions) and sensitivity analysis (correlation measures, Sobol' indices). Each block contains lectures and tutorials using Matlab and the in-house software UQLab (www.uqlab.com). | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | Detailed slides are provided for each lecture. A printed script gathering all the lecture slides may be bought at the beginning of the semester. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | A basic background in probability theory and statistics (bachelor level) is required. A summary of useful notions will be handed out at the beginning of the course. A good knowledge of Matlab is required to participate in the tutorials and for the mini-project. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-0126-00L | Advanced Topics in Networked Embedded Systems | W | 2 KP | 1S | L. Thiele | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | The seminar will cover advanced topics in networked embedded systems. A particular focus are cyber-physical systems, internet of things, and sensor networks in various application domains. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | The goal is to get a deeper understanding on leading edge technologies in the discipline, on classes of applications, and on current as well as future research directions. In addition, participants will improve their presentation, reading and reviewing skills. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | The seminar enables Master students, PhDs and Postdocs to learn about latest breakthroughs in wireless sensor networks, networked embedded systems and devices, and energy-harvesting in several application domains, including environmental monitoring, tracking, smart buildings and control. Participants are requested to actively participate in the organization and preparation of the seminar. In particular, they review all presented papers using a standard scientific reviewing system, they present one of the papers orally and they lead the corresponding discussion session. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-0420-00L | Information Theory II Findet dieses Semester nicht statt. | W | 6 KP | 4G | A. Lapidoth | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | This course builds on Information Theory I. It introduces additional topics in single-user communication, connections between Information Theory and Statistics, and Network Information Theory. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | The course's objective is to introduce the students to additional information measures and to equip them with the tools that are needed to conduct research in Information Theory as it relates to Communication Networks and to Statistics. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | Sanov's Theorem, Rényi entropy and guessing, differential entropy, maximum entropy, the Gaussian channel, the entropy-power inequality, the broadcast channel, the multiple-access channel, Slepian-Wolf coding, the Gelfand-Pinsker problem, and Fisher information. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | n/a | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | T.M. Cover and J.A. Thomas, Elements of Information Theory, second edition, Wiley 2006 | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | Basic introductory course on Information Theory. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-0436-00L | Digital Communication and Signal Processing Findet dieses Semester nicht statt. | W | 6 KP | 2V + 2U | A. Wittneben | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | A comprehensive presentation of modern digital modulation, detection and synchronization schemes and relevant aspects of signal processing enables the student to analyze, simulate, implement and research the physical layer of advanced digital communication schemes. The course both covers the underlying theory and provides problem solving and hands-on experience. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | Digital communication systems are characterized by ever increasing requirements on data rate, spectral efficiency and reliability. Due to the huge advances in very large scale integration (VLSI) we are now able to implement extremely complex digital signal processing algorithms to meet these challenges. As a result the physical layer (PHY) of digital communication systems has become the dominant function in most state-of-the-art system designs. In this course we discuss the major elements of PHY implementations in a rigorous theoretical fashion and present important practical examples to illustrate the application of the theory. In Part I we treat discrete time linear adaptive filters, which are a core component to handle multiuser and intersymbol interference in time-variant channels. Part II is a seminar block, in which the students develop their analytical and experimental (simulation) problem solving skills. After a review of major aspects of wireless communication we discuss, simulate and present the performance of novel cooperative and adaptive multiuser wireless communication systems. As part of this seminar each students has to give a 15 minute presentation and actively attends the presentations of the classmates. In Part III we cover parameter estimation and synchronization. Based on the classical discrete detection and estimation theory we develop maximum likelihood inspired digital algorithms for symbol timing and frequency synchronization. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | Part I: Linear adaptive filters for digital communication • Finite impulse response (FIR) filter for temporal and spectral shaping • Wiener filters • Method of steepest descent • Least mean square adaptive filters Part II: Seminar block on cooperative wireless communication • review of the basic concepts of wireless communication • multiuser amplify&forward relaying • performance evaluation of adaptive A&F relaying schemes and student presentations Part III: Parameter estimation and synchronization • Discrete detection theory • Discrete estimation theory • Synthesis of synchronization algorithms • Frequency estimation • Timing adjustment by interpolation | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | Lecture notes. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | [1] Oppenheim, A. V., Schafer, R. W., "Discrete-time signal processing", Prentice-Hall, ISBN 0-13-754920-2. [2] Haykin, S., "Adaptive filter theory", Prentice-Hall, ISBN 0-13-090126-1. [3] Van Trees, H. L., "Detection , estimation and modulation theory", John Wiley&Sons, ISBN 0-471-09517-6. [4] Meyr, H., Moeneclaey, M., Fechtel, S. A., "Digital communication receivers: synchronization, channel estimation and signal processing", John Wiley&Sons, ISBN 0-471-50275-8. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | Formal prerequisites: none Recommended: Communication Systems or equivalent | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-0559-00L | Seminar in Deep Neural Networks Number of participants limited to 25. | W | 2 KP | 2S | R. Wattenhofer, P. Belcák, B. Egressy | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | In this seminar participating students present and discuss recent research papers in the area of deep neural networks. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | We aim at giving the students an in depth view on the current advances in the area by discussing recent papers as well as discussing current issues and difficulties surrounding deep neural networks. The students will learn to read, evaluate and challenge research papers, prepare coherent scientific presentations and lead a discussion on their topic. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | The seminar will cover a range of research directions, with a focus on Graph Neural Networks, Algorithmic Learning, Reinforcement Learning and Natural Language Processing. It will be structured in blocks with each focus area being briefly introduced before presenting and discussing recent research papers. Papers will be allocated to the students based on their preferences. For more information see www.disco.ethz.ch/courses.html. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | Slides of presentations will be made available. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | The paper selection can be found on www.disco.ethz.ch/courses.html. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | It is expected that students have prior knowledge and interest in machine and deep learning, for instance by having attended appropriate courses. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
252-0408-00L | Cryptographic Protocols | W | 6 KP | 2V + 2U + 1A | M. Hirt | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | Indroduction to a very active research area with many gems and paradoxical results. Spark interest in fundamental problems. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | The course presents a selection of hot research topics in cryptography. The choice of topics varies and may include provable security, interactive proofs, zero-knowledge protocols, secret sharing, secure multi-party computation, e-voting, etc. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | We provide short lecture notes and handouts of the slides. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | A basic understanding of fundamental cryptographic concepts (as taught for example in the course Information Security or in the course Cryptography Foundations) is useful, but not required. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-0559-10L | Seminar in Communication Networks Findet dieses Semester nicht statt. Number of participants limited to 12. | W | 2 KP | 2S | L. Vanbever | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | In this seminar, students review, present, and discuss recent research papers in the area of computer networks. The seminar also includes a small experimental group project. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | By the end of the seminar, students will be able to 1. Read efficiently and assess critically scientific papers; 2. Discuss technical topics with an audience of peers; 3. Design and conduct simple networking experiments. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | The seminar will start with one introductory lecture. Starting from the second week, participating students will start reviewing, presenting, and discussing research papers. Two papers will be discussed each week. Each student must choose a paper from a given list, prepare and give a (short) presentation on the paper's topic, and lead the follow-up discussion. In addition, all students submit one (short) review for the two papers presented every week in-class. During the last weeks of the seminar, students will work on a small group project, which consists in trying to replicate one experiment (freely chosen) from the research papers discussed in the seminar. Students will be evaluated based on their reviews, their presentation, their leadership of and participation in the paper discussions, as well as their group project. The exact course content varies over time. For details, refers to the course website: https://seminar-net.ethz.ch/ | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | The slides of each presentation will be made available on the website. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | The paper selection will be made available on the course website. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | Communication Networks (227-0120-00L) or equivalents. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kompetenzen |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
252-0312-00L | Mobile Health and Activity Monitoring Previously Ubiquitous Computing, now with a focused and technical scope. | W | 6 KP | 2V + 3A | C. Holz | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | Health and activity monitoring has become a key purpose of mobile & wearable devices, e.g., phones, watches, and rings. We will cover the phenomena they capture, i.e., user behavior and actions, basic human physiology, as well as the sensors, signals, and methods for processing and analysis. For the exercise, students will receive a wristband to stream and analyze activity and health signals. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | The course comprises a series of introductions to the cross-disciplinary area of mobile health with technical follow-up lectures. * Introduction to the basic (digital) health ecosystem * Introduction to basic cardiovascular function and processes * Overview of sensors and signal modalities (PPG, ECG, camera-based/remote PPG, BCG, PTT) * Introduction to affective computing, psychological states, basic personalities, emotions * Overview of motion sensors, signals, sampling, filters * Overview of basic signal processing specific to the metrics related to mobile health * Introduction to user studies: controlled in-lab vs. outside the lab * Introduction to sleep physiology and neurological conditions * Overview of device platforms: components of wearables, design, communication The course will combine high-level concepts with low-level technical methods needed to sense, detect, and understand them. High-level: – sensing modalities for interactive systems – "activities" and "events" (exercises and other mechanical activities such as movements and resulting vibrations) – health monitoring (basic cardiovascular physiology) – affective computing (emotions, mood, personality) Lower-level: – sampling and filtering, time and frequency domains – cross-modal sensor systems, signal synchronization and correlation – event detection, classification, prediction using basic signal processing as well as learning-based methods – sensor types: optical, mechanical/acoustic, electromagnetic ------------------------------------------------------------ The course was previously called "Ubiquitous Computing", but has been redesigned to focus solely on the technical aspects of Ubicomp, particularly those related to mobile health, activity monitoring, data analysis, interpretation and insights. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | Health and activity monitoring has become a key purpose of mobile and wearable devices, including phones, (smart) watches, (smart) rings, (smart) belts, and other trackers (e.g., shoe clips, pendants). In this course, we will cover the fundamental aspects that these devices observe, i.e., user behavior, actions, and physiological dynamics of the human body, as well as the sensors, signals, and methods to capture, process, and analyze them. We will then cover methods for pattern extraction and classification on such data. The course will therefore touch on aspects of human activities, cardiovascular and pulmonary physiology, affective computing (recognizing, interpreting, and processing emotions), corresponding lower-level sensing systems (e.g., inertial sensing, optical sensing, photoplethysmography, eletrodermal activity, electrocardiograms) and higher-level computer vision-based sensing (facial expressions, motions, gestures), as well as processing methods for these types of data. The course will be accompanied by a group exercise project, in which students will apply the concepts and methods taught in class. Students will receive a wearable wristband device that streams IMU data to a mobile phone (code will be provided for receiving, storing, visualizing on the phone). Throughout the course and exercises, we will collect data of various human activities from the band, annotate them, analyze, classify, and interpret them. For this, existing and novel processing methods will be developed (plenty of related work exists), based on the collected data as well as existing datasets. We will also combine the band with signals obtained from the mobile phone to holistically capture and analyze health and activity data. Full details: https://teaching.siplab.org/mobile_health_activity_monitoring/2022/ Note: All lectures will be streamed live and recorded for later replay. Hybrid participation will be possible even if ETH should return to full presence teaching. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | Copies of slides will be made available Lectures will be streamed live as well as recorded and made available online. More information on the course site: https://teaching.siplab.org/mobile_health_activity_monitoring/2022/ Note: All lectures will be streamed live and recorded for later replay. Hybrid participation will be possible even if ETH should return to full presence teaching. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | Will be provided in the lecture | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kompetenzen |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
227-2211-00L | Seminar in Computer Architecture Number of participants limited to 22. The deadline for deregistering expires at the end of the second week of the semester. Students who are still registered after that date, but do not attend the seminar, will officially fail the seminar. | W | 2 KP | 2S | O. Mutlu, M. H. K. Alser, J. Gómez Luna | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Kurzbeschreibung | This seminar course covers fundamental and cutting-edge research papers in computer architecture. It has multiple components that are aimed at improving students' (1) technical skills in computer architecture, (2) critical thinking and analysis abilities on computer architecture concepts, as well as (3) technical presentation of concepts and papers in both spoken and written forms. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Lernziel | The main objective is to learn how to rigorously analyze and present papers and ideas on computer architecture. We will have rigorous presentation and discussion of selected papers during lectures and a written report delivered by each student at the end of the semester. This course is for those interested in computer architecture. Registered students are expected to attend every meeting, participate in the discussion, and create a synthesis report at the end of the course. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Inhalt | Topics will center around computer architecture. We will, for example, discuss papers on hardware security; accelerators for key applications like machine learning, graph processing and bioinformatics; memory systems; interconnects; processing in memory; various fundamental and emerging paradigms in computer architecture; hardware/software co-design and cooperation; fault tolerance; energy efficiency; heterogeneous and parallel systems; new execution models; predictable computing, etc. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Skript | All materials will be posted on the course website: https://safari.ethz.ch/architecture_seminar/ Past course materials, including the synthesis report assignment, can be found in the Fall 2020 website for the course: https://safari.ethz.ch/architecture_seminar/fall2020/doku.php | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Literatur | Key papers and articles, on both fundamentals and cutting-edge topics in computer architecture will be provided and discussed. These will be posted on the course website. | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Voraussetzungen / Besonderes | Design of Digital Circuits. Students should (1) have done very well in Design of Digital Circuits and (2) show a genuine interest in Computer Architecture. |
- Seite 1 von 1