Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Modeling the immune system (IS) means putting together a set of assumptions about its components (cells and organs) and their interactions. Simulations of a model show joint behavior of the components, which for complex realistic models is often impossible ...
We outline a procedure for using pseudorandom generators to construct binary codes with good properties, assuming the existence of sufficiently hard functions. Specifically, we give a polynomial time algorithm, which for every integers n and k, constru ...
Efficiently handling reputation is important in dealing with free-riding, malicious attacks and random failures in self-organized communication systems. At the same time, work in this context is often found to be relevant in many other disciplines, in part ...
In this paper, we address the problem of scrambling regions of interest in a video sequence for the purpose of preserving privacy in video surveillance. We propose an efficient solution based on transform-domain scrambling. More specifically, the sign of s ...
Human papillomavirus (HPV) begins its life cycle by infecting the basal cells of the epithelium. Within these proliferating cells, the viral genomes are replicated, maintained, and passed on to the daughter cells. Using HPV episome-containing cell lines th ...
Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection i.e. insertion of random data into input files, buffers or protocol packets, combi ...
The reliability of computer predictions of physical events depends on several factors: the mathematical model of the event, the numerical approximation of the model, and the random nature of data characterizing the model. This paper addresses the mathemati ...
The consumption of resources within an urban neighbourhood depends on the behaviour of its occupants. To understand the randomness of this behaviour and its effect on the demand of resources calls for the development of a set of stochastic models which are ...
This dissertation is concerned with cryptanalysis of E0, the stream cipher used in the short-range wireless radio standard Bluetooth, and of its generalization by means of correlation attacks. It consists of three parts. In the first part, we propose an E0 ...
Phase of the interference fringe pattern is known to convey important information in optical metrology. Typically, phase measurement using temporal techniques involves incorporating a piezoelectric device (PZT) in one arm of the interferometer for shifting ...