Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Nowadays, the most popular public-key cryptosystems are based on either the integer factorization or the discrete logarithm problem. The feasibility of solving these mathematical problems in practice is studied and techniques are presented to speed-up the ...
Recent advances in mobile device technology have freed augmented reality (AR) applications from the constraints of desktops, laptops and head-mounted displays. But they are met with a lack of guidelines on the design and user interactions of mobile device- ...
Content Based Image Retrieval (CBIR) has gained a lot of interest over the last two decades. The need to search and retrieve images from databases, based on information (“features”) extracted from the image itself, is becoming increasingly important. CBIR ...
This thesis is devoted to theoretically study the systems of single quantum dots (QDs) embedded in various photonic nanostructures, in close relation with experimental data. The word single is essential: due to their nanometer size, QDs have mainly been st ...
Re-configurability is one of the key features in modern wireless communications. Indeed, the increase of services provided imply an optimized management of the electromagnetic spectrum, along with strong miniaturization in order to allow for the cohabitati ...
User-generated podcasting service over human-centric opportunistic network can facilitate user-generated content sharing while humans are on the move beyond the coverage of infrastructure networks. We focus on the aspects of designing efficient forwarding ...
With process technology providing more and more transistors per chip, still following Moore's \law", processor designers have used a number of techniques to make those transistors useful. Lately they have started placing multiple processor cores on each ch ...
Mobile communication devices now available on the market, such as so-called smartphones, are far more advanced than the first cellular phones that became very popular one decade ago. In addition to their historical purpose, namely enabling wireless vocal c ...
Portable electronic devices operate at varying power demand levels. This variability of power demand must be considered explicitly in the design of man-portable power generation systems for acceptable performance and portability. In this regard, a mathemat ...
A method and computing system are proposed for producing an authenticable security device with two sides. The verso side is covered with a luminescent emissive variable intensity layer formed for example by invisible luminescent ink halftones and the recto ...