Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This paper presents the research activities carried out within the scope of the Liaison project. Most of the work has been performed on WiFi location. WiFi is nowadays widely deployed in buildings such as hotels, hospitals, airports, train stations, public ...
We propose a complete design for a scope limited, multi-hop broadcast middleware, which is adapted to the variability of the ad-hoc environment and works in unlimited ad-hoc networks such as a crowd in a city, or car passengers in a busy highway system. We ...
Wireless routing based on an embedding of the connectivity graph is a very promising technique to overcome shortcomings of geographic routing and topology-based routing. This is of particular interest when either absolute coordinates for geographic routing ...
Ultrawideband (UWB) radio is a promising solution for high-rate wireless communications over short ranges. In this paper, the performance of multiband orthogonal frequency division multiplexing (MB-OFDM) UWB systems is analyzed using the Saleh-Valenzuela c ...
In this paper, an architecture for code-empowered optical CDMA (OCDMA) lightwave networks is presented. The architecture is based on reconfigurable optically transparent paths among users of the network to provide high-bandwidth optical connections on dema ...
Aerial Robotics are interesting and useful tools because they have some intrinsic advantages over ground and water based systems, like the possibility to observe things from above or to locomote without being perturbed by obstacles and rough terrain. Howev ...
Wireless ad hoc networks are so vulnerable to passive attacks and eavesdropping adversaries due to their shared medium which makes network traffic easy to capture and analyze. Therefore, security and privacy protections are of extreme importance for protoc ...
The focus of this thesis is on the study of decentralized wireless multi-hop networks. We are particularly interested in establishing bounds on the traffic-carrying capabilities of wireless ad hoc networks and conditions on the scalability of such networks ...
We propose a single source reliable broadcasting algorithm for linear grid-based networks where a message is guaranteed to be delivered to all the nodes of the network. The nodes are mobile and can move from one grid point to another. The solution does not ...
So far, the problem of positioning in wireless networks has been studied mainly in a nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to position and distance spoofing attacks. We propose a mechanism for secure pos ...