Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Computer systems rely heavily on abstraction to manage the exponential growth of complexity across hardware and software. Due to practical considerations of compatibility between components of these complex systems across generations, developers have favou ...
Disaggregated memory can address resource provisioning inefficiencies in current datacenters. Multiple software runtimes for disaggregated memory have been proposed in an attempt to make disaggregated memory practical. These systems rely on the virtual mem ...
Blockchain systems need to solve consensus despite the presence of rational users and failures. The notion of (k, t)-robustness is key to derive impossibility results with k rational players and t faulty players. However, these t faulty players are always ...
IEEE2021
, ,
This paper presents demonstration of a protection scheme integrated into marine DC power distribution networks to investigate the coordination between each protection action. The integrated protection scheme is based on three different time-frame protectio ...
2020
, ,
Double-fetch bugs are a plague across all major operating system kernels. They occur when data is fetched twice across the user/kernel trust boundary while allowing concurrent modification. Such bugs enable an attacker to illegally access memory, cause den ...
The existing Electromagnetic Time Reversal (EMTR)-based fault location methods generally leverage the features of the signals simulated in the EMTR reversed-time stage (relative to the direct-time stage wherein a fault occurs and its originated transient s ...
Performance and power constraints come together with Complementary Metal Oxide Semiconductor technology scaling in future Exascale systems. Technology scaling makes each individual transistor more prone to faults and, due to the exponential increase in the ...
The fault cores of extensional faults in Mesozoic limestones and dolostones are examined by mean of combined microstructural, ultrasonic and petrophysical analyses. Grain-supported fault rocks commonly localize in the outer fault cores, whereas matrix-supp ...
Real-time control systems use controllers that compute and issue setpoints within stringent delay constraints. Failure to do so, due to a crash or delay as a result of software and/or hardware faults, can cause failure of the controlled resources. Recently ...
This project presents a pre-State Estimation method for the detection of Bad Data (BD) in Phasor Measurement Units (PMUs) using correlation analysis and a Neural Network Classifier. Presented in this paper is the algorithm design, the steps for generating ...