Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The characteristics of vehicular communication environments and their networking and application requirements have led to the development of unique networking protocols. They enable vehicle-to-vehicle and vehicle-to-infrastructure communication based on th ...
Tourism is one of the main sources of income in many Swiss Alpine regions. But this industry is highly sensitive to climate conditions. Then, tourism in the Alpine region is effectively affected (both positively and negatively) by climate change and people ...
How is vulnerability to climate change spatially distributed? Which are its causes and its effects? Which are the major climate change vulnerability hotspots in which the implementation of adaptation ...
Climate change is a global phenomenon, but its effects occur on a local scale. An example is provided by tourism. Tourism is closely interlinked with climate change both as culprit and as victim. On the one hand, it is responsible for a large portion of GH ...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver’s logic, and synthesizes new device driver code that implements the exact same ...
An ephemeral network is usually defined by the very short-lived and heterogeneous nature of interactions among self-organizing wireless devices. The wide penetration in everyday gadgets of radio technologies operating in unlicensed frequency spectrum, such ...
An increasing number of mobile applications and services require that devices are aware of their location. Global navigation satellite systems (GNSS) are the predominant enabling technology. But location information provided by commercial GNSS is not secur ...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative ...
Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy- to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of th ...