Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
What-if analysis is a data-intensive exploration to inspect how changes in a set of input parameters of a model influence some outcomes. It is motivated by a user trying to understand the sensitivity of a model to a certain parameter in order to reach a se ...
Electric mobility is now a reality, and services based on electric vehicles, such as electric car-sharing and electric buses, are becoming part of urban mobility.
These new modes bring new challenges for the design and operations of the systems that requir ...
One-way electric vehicle carsharing systems are receiving increasing attention due to their mobility, environmental, and societal benefits. One of the major issues faced by the operators of these systems is the optimization of the relocation operations of ...
We use a strategic household survey to study the sensitivity of intended homeownership decisions to financing constraints. We find that the average stated likelihood of buying a home is strongly sensitive to the size of the required down payment, which we ...
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time require ...
Reducing global emissions of greenhouse gases while promoting social and economicdevelopment is one of the toughest challenges ever faced in the history of human kind.This challenge is affecting all sectors of human activities: process plants, land-basedtr ...
Today, security can no longer be treated as a secondary issue in embedded and cyber-physical systems. Therefore, one of the main challenges in these domains is the design of secure embedded systems under stringent resource constraints and real-time require ...
We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes on “pr ...
In this paper we present a new approach to implementing causal consistency in geo-replicated data stores, which we call Optimistic Causal Consistency (OCC). The optimism in our approach lies in that updates from a remote data center are immediately made vi ...
Performance and reliability are important yet conflicting properties of systems software. Software today often crashes, has security vulnerabilities and data loss, while many techniques that could address such issues remain unused due to performance concer ...