Related publications (113)

To Infinity, and Beyond (Coverage)

Ahmad Hazimeh

The pursuit of software security and reliability hinges on the identification and elimination of software vulnerabilities, a challenge compounded by the vast and evolving complexity of modern systems. Fuzzing has emerged as an indispensable technique for b ...
EPFL2024

Annealing and Etching Processes for Hafnium Carbide MEMS

Nicolas Andres Avellan Marin

HfC has been very under-investigated due to its rarity and synthesising difficulty. Its potential for MEMS and NEMS applications has been recognized and is the object of an ongoing feasibility study for production since 2022. We continue on this impulse by ...
2023

Time-Resolved Hanbury Brown-Twiss Interferometry of On-Chip Biphoton Frequency Combs Using Vernier Phase Modulation

Tobias Kippenberg, Junqiu Liu

Biphoton frequency combs (BFCs) are promising quantum sources for large-scale and high-dimensional quantum information and networking systems. In this context, the spectral purity of individual frequency bins will be critical for realizing quantum networki ...
AMER PHYSICAL SOC2023

Photochemical [2+2] Cycloaddition of Alkynyl Boronates

Jérôme Waser, Oleksandr Liashuk

A photochemical [2+2] cycloaddition of alkynyl boronates and maleimides is reported. The developed protocol provided 35–70 % yield of maleimide-derived cyclobutenyl boronates and demonstrated wide compatibility with various functional groups. The synthetic ...
2023

An optimized protocol for assessing changes in mouse whole-brain activity using opto-fMRI

Valerio Zerbi, Christina Maria Grimm

Functional magnetic resonance imaging (fMRI) in mouse brain, paired with spatially and temporally defined manipulations, offers a powerful tool to causally explain the effect of specific neuronal activity on brain network dynamics. Here, we present an opti ...
ELSEVIER2022

Protecting privacy through metadata analysis

Sandra Deepthy Siby

Although encryption hides the content of communications from third parties, metadata, i.e., the information attached to the content (such as the size or timing of communication) can be a rich source of details and context. In this dissertation, we demonstr ...
EPFL2022

A Rosetta-based protein design protocol converging to natural sequences

Bruno Emanuel Ferreira De Sousa Correia, Zander Harteveld, Stéphane Rosset, Giulia Sormani

Computational protein design has emerged as a powerful tool capable of identifying sequences compatible with pre-defined protein structures. The sequence design protocols, implemented in the Rosetta suite, have become widely used in the protein engineering ...
AMER INST PHYSICS2021

Integrity and Metadata Protection in Data Retrieval

Kirill Nikitin

Secure retrieval of data requires integrity, confidentially, transparency, and metadata-privacy of the process. Existing protection mechanisms, however, provide only partially these properties: encryption schemes still expose cleartext metadata, protocols ...
EPFL2021

Development of collapse-consistent loading protocols for experimental testing of steel columns

Dimitrios Lignos

In order to effectively utilize results from quasi-static cyclic testing on structural components for the earthquake-induced collapse risk quantification of structures, the need exists to establish collapse-consistent loading protocols representing the asy ...
2020

Tractostorm: The what, why, and how of tractography dissection reproducibility

Gabriel Girard, David Paul Roger Romascano, Alessandro Daducci, Muhamed Barakovic, Maxime Descoteaux

Investigative studies of white matter (WM) brain structures using diffusion MRI (dMRI) tractography frequently require manual WM bundle segmentation, often called "virtual dissection." Human errors and personal decisions make these manual segmentations har ...
2020

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.