Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Energy efficiency is a major design issue in the context of Wireless Sensor Networks (WSN). If the acquired data is to be sent to a far-away base station, collaborative beamforming performed by the sensors may help to distribute the communication load amon ...
Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing ...
Wireless communication relies on high-frequency signal transmission between communication nodes. The signals are at the same time the message and the infrastructure for communication. Questioning the current wireless signals space occupancy in a playful wa ...
Compute-and-Forward (CF), also known as reliable physical layer network coding, is a technique that provides the possibility of exploiting the features of broadcast and superposition in wireless networks. It has been shown that the throughput for multiple ...
Institute of Electrical and Electronics Engineers2014
Mobile devices and wireless networks have a prominent place in our interaction with the environment and with each other. Like every new technology, it has been a subject to inflated expectations. Scholars, writers, artists and architects have explored how ...
Small antennas, or more specifically, electrically small antennas, are passive radiating elements whose size is much smaller than the operating wavelength. The current wireless application systems usually have size constraints that, for the most common ope ...
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secr ...
We develop a formal framework for the analysis of security protocols in wireless networks. The framework captures characteristics necessary to reason about neighbor discovery protocols, such as the neighbor relation, device location, and message propagatio ...
Wireless multi-hop local area networks use in general scheduling schemes that assume the network capacity to be known. Indeed in most of the throughput-optimal algorithms the sources are assumed to send at a rate within the capacity region. However, measur ...
Real-time monitoring of the temperature in supermarket refrigerators, testing air quality, detecting presence or position of a person indoors, monitoring the structural integrity of bridges, and measuring soil humidity for precision agriculture are only a ...