Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper, we investigate federated contextual linear bandit learning within a wireless system that comprises a server and multiple devices. Each device interacts with the environment, selects an action based on the received reward, and sends model upd ...
In confidential computing, the view of the system software is Manichean: the host operating system is untrusted and the TEE runtime system is fully trusted. However, the runtime system is often as complex as a full operating system, and thus is not free fr ...
With the purpose of reducing the heating energy in buildings, it is common practice to install energy-efficient windows to increase the thermal insulation of a façade. These insulating glass units (IGIJ) include a thin silver coating acting as an infrared ...
IOP2022
,
Over a five-month time window between March and July 2020, scientists deployed two small uncrewed aircraft systems (sUAS) to the central Arctic Ocean as part of legs three and four of the MOSAiC expedition. These sUAS were flown to measure the thermodynami ...
NATURE PORTFOLIO2022
The introduction of fresh air by means of natural ventilation is a technique that can improve indoor environmental quality in an energy-efficient manner. Nevertheless, recent studies revealed that the window opening during the summer months, even though it ...
2022
, ,
Double-fetch bugs are a plague across all major operating system kernels. They occur when data is fetched twice across the user/kernel trust boundary while allowing concurrent modification. Such bugs enable an attacker to illegally access memory, cause den ...
2022
,
In this paper, we propose and compare personalized models for Productive Engagement (PE) recognition. PE is defined as the level of engagement that maximizes learning. Previously, in the context of robot-mediated collaborative learning, a framework of prod ...
2022
radiance scene files and metric results generated from high quality referece images for an office building near LAX. contents of lci_tempate.tar.gz: ALLSKIES: 4294 sky conditions generated by write_skydefs.py based on LAX.epw, all ...
Zenodo2022
, ,
The paper presents a novel DAG-aware Boolean rewriting algorithm for restructuring combinational logic before technology mapping. The algorithm, called window rewriting, repeatedly selects small parts of the logic and replaces them with more compact implem ...
IEEE2022
, , , ,
The use of attributed quotes is the most direct and least filtered pathway of information propagation in news. Consequently, quotes play a central role in the conception, reception, and analysis of news stories. Since quotes provide a more direct window in ...