Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Cloud computing is a new computing paradigm, combining diverse client devices -- PCs, smartphones, sensors, single-function, and embedded -- with computation and data storage in the cloud. As with every advance in computing, programming is a fundamental ch ...
In automatic software verification, we have observed a theoretical convergence of model checking and program analysis. In practice, however, model checkers, on one hand, are still mostly concerned with precision, e.g., the removal of spurious counterexampl ...
In a recent article, we described the edxia framework, a user-friendly framework to analyse the microstructure of cementitious materials using SEM-EDS hypermaps. The manual approach presented was shown to be efficient to answer the relevant scientific ques ...
Eusocial life is characterized by division of labour, collective decision making and self organization, and regarded as the highest form of social organisation in groups. Ants are a model organism for research in collective behavior and the evolution of eu ...
An overview of the recent works on proportional integral derivative (PID) controller tuning methods based on specifications on the infinity-norm of the sensitivity functions is presented. The presented approach is very flexible relative to the controller s ...
Programming languages and systems have failed to address the security implications of the increasingly frequent use of public libraries to construct modern software. Most languages provide tools and online repositories to publish, import, and use libraries ...
Secure retrieval of data requires integrity, confidentially, transparency, and metadata-privacy of the process. Existing protection mechanisms, however, provide only partially these properties: encryption schemes still expose cleartext metadata, protocols ...
Social networks today are great source of data which can be used and analyzed in different ways. In our project the main goal is to predict the behavior of the users, more accurately said: we try to predict what will a particular user tweet in the future, ...