Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
With ever-increasing computational power, and improved sensing and communication capabilities, smart devices have altered and enhanced the way we process, perceive and interact with information. Personal and contextual data is tracked and stored extensivel ...
The advent of the Web reshaped the way in which humans memorize information, arguably unlike any other technological advance of the last decades. Rather than remembering the information itself, people are primed to find the needed information through Web s ...
Public-key distance bounding protocols are well suited to defeat relay attacks in proximity access control systems when the author assume no prior shared key. At AsiaCCS 2014, Gambs, Onete, and Robert designed such a protocol with privacy protection for th ...
Self-recognition is an intimate act performed by people. Inspired by Paul Ricoeur, we reflect upon the action of self-recognition, especially when data visualization represents the observer itself. Along the article, the reader is invited to think about th ...
This paper describes EPFL privacy protection tool for the MediaEval 2014 Visual Privacy task. The goal of the task is to obscure faces, body silhouettes, and personal items of people in the provided surveillance clips to preserve their personal privacy. Th ...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
RDF Stream Processing (RSP) bridges the gap between semantic technologies and data stream systems. Although a number of RSP systems have been recently proposed, no RDF streams are actually made publicly available on the Web. To cope with this, RSP engines ...
Location check-ins contain both geographical and semantic information about the visited venues, in the form of tags (e.g., “restaurant”). Such data might reveal some personal information about users beyond what they actually want to disclose, hence their p ...
According to many scientists and clinicians, genomics is taking on a key role in the field of medicine. Impressive advances in genome sequencing have opened the way to a variety of revolutionary applications in modern healthcare. In particular, the increas ...
By the end of 2013, the number of internet-connected mobile devices is expected to exceed that of humans. Omnipresent and context-aware, mobile devices enable people to communicate and exchange data anytime and almost anywhere. The myriad of ”digital footp ...