Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We investigate how various treatments of exact exchange affect defect charge transition levels and band edges in hybrid functional schemes for a variety of systems. We distinguish the effects of long-range vs short-range exchange and of local vs nonlocal e ...
The first cool-down of the EDIPO (European DIPOle) test facility is foreseen to take place in 2011 by means of the existing 1.2 kW cryoplant at EPFL-CRPP Villigen. In this work, the thermo-hydraulic analysis of the EDIPO cool-down is performed in order bot ...
In this paper, we analyze the first known provably secure Radio Frequency Identification (RFID) authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in th ...
The subject of real-time, steady-state optimization under significant uncertainty is addressed in this paper. Specifically, the use of constraint-adaptation schemes is reviewed, and it is shown that, in general, such schemes cannot guarantee process feasib ...
Dynamic optimization can be used to determine optimal input profiles for dynamic processes. Due to plant-model mismatch and disturbances, the optimal inputs determined through model-based optimization will, in general, not be optimal for the plant. Modifie ...
In the context of the thesis we are studying the notions of broadcast encryption and traitor tracing in an industrial framework of conditional access systems related to Pay-TV. Broadcast encryption represents a cryptographic primitive which allows confiden ...
Superconducting magnets submitted to large heat loads, as the low-β quadrupoles for the LHC luminosity upgrade, need the development of new concepts of cable electrical insulation featuring a He-II porous wrapping scheme. This paper reports and discusses r ...
Various schemes for correcting the finite-size supercell errors in the case of charged defect calculations are analyzed and their performance for a series of defect systems is compared. We focus on the schemes proposed by Makov and Payne (MP), Freysoldt, N ...
In this work we deal with the numerical solution of the fluid-structure interaction problem arising in the haemodynamic environment. In particular, we consider BDF and Newmark time discretization schemes, and we study different methods for the treatment of ...
We introduce the notion of forgery-resilience for digital signature schemes, a new paradigm for digital signature schemes exhibiting desirable legislative properties. It evolves around the idea that, for any message, there can only be a unique valid signat ...