Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper we show that the topologies of most logarithmic-style P2P systems like Pastry, Tapestry or P-Grid resemble small-world graphs. Inspired by Kleinberg’s small-world model [6] we extend the model of building “routing-efficient” small-world graph ...
The invention relates to human O6-alkylguanine-DNA alkyltransferase (hAGT) mutants showing, when compared to the wild type human AGT, two or more advantageous properties selected from (a) reduced DNA interaction; (b) localization of the expressed protein i ...
(EPFL Ecole Polytechnique Federale de Lausanne, Switz.).2005
This paper presents two main contributions: semi-passive replication and Lazy Consensus. The former is a replication technique with parsimonious processing. It is based on the latter; a variant of Consensus allowing the lazy evaluation of proposed values. ...
Oligomers with well-defined chain lengths are of interest as foldamers, are important as model compounds for high-molecular-weight polymers and find application in electrooptic and sensory devices. This account presents an overview of the strategies that a ...
The invention relates to a device for dispensing droplets comprising a first channel (8, 10), known as the main channel, for circulating a first liquid flow, a second channel (12, 13) for circulating fluid, forming an intersection area (27) with the first ...
This paper studies the use of bytecode instruction counting (BIC) to estimate the CPU load due to the execution of Java programs in different environments. BIC is the basis of the J-RAF2 framework to monitor and control the resource consumption of Java cod ...
This article revisits the original designated confirmer signature scheme of Chaum. Following the same spirit we naturally extend the Chaum's construction in a more general setting and analyze its security in a formal way. We prove its security in the rando ...
We consider regression problems with piecewise affine maps. In particular, we focus on the sub-problem of classifying the datapoints, i.e. correctly attributing a datapoint to the affine submodel that most likely generated it. Then, we analyze the regressi ...
There has been a recent trend towards the miniaturization of analytical tools, but what are the advantages of microfluidic devices and when is their use appropriate? Recent advances in the field of micro-analytical systems can be classified according to in ...
The degree of visibility of any kind of stimulus is largely determined by the background on which it is shown, a property commonly known as masking. Many psychophysical experiments have been carried out to date to understand masking of sinusoids or Gabor t ...