Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Changes in building design during the twentieth and twenty-first centuries have been largely focussed on driving safety and reducing capital expenditure, with less attention given to improvements in building energy efficiency. However, energy efficiency in ...
Villigen PSI, World Resources Forum, printed by Paul Scherrer Institute2015
Software packet-processing platforms--network devices running on general-purpose servers--are emerging as a compelling alternative to the traditional high-end switches and routers running on specialized hardware. Their promise is to enable the fast dep ...
Almost all research work in computational neuroscience involves software. As researchers try to understand ever more complex systems, there is a continual need for software with new capabilities. Because of the wide range of questions being investigated, n ...
A computer-implemented method for generating a user profile of a user of an online platform, a computer-implemented method for providing a first user with targeted information and a computer-implemented method for providing a user of an online platform wit ...
This paper presents an important step forward towards increasing the independence of people with severe motor disabilities, by using brain-computer interfaces (BCI) to harness the power of the Internet of Things. We analyze the stability of brain signals a ...
Relevant and readily available information is a crucial basis for decision making, problem solving or performing knowledge-intensive work. The motivation for this thesis lays in the fact that in certain situations not all information provided by an applica ...
Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. We argue that many of these failures can be avoided for users of the new version of the software by exploiting the characteristics of the upgrade and feedback fro ...
A computer implemented method for encrypting one or more files and wrapping them in an HTML document. The HTML document contains the encrypted files, the necessary code to decrypt the files, as well as user interface code to receive a passphrase input from ...
By the end of 2013, the number of internet-connected mobile devices is expected to exceed that of humans. Omnipresent and context-aware, mobile devices enable people to communicate and exchange data anytime and almost anywhere. The myriad of ”digital footp ...
Software bugs are inevitable in software-defined networking control software, and troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve control software troubleshooting by presenting a technique for automatically identi ...