Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We present a technique for automatically verifying cryptographic protocols specified in the mainstream specification language CAPSL. Our work is based on model checking multi-agent systems against properties given in AI logics. We present PC2IS, a compiler ...
The synthesis of existing fonts with characters represented by parameterized structure elements requires determination of a set of font-specific global and local parameters. Parameters comprise, for example, the widths of vertical stems, horizontal bars an ...
In this paper we present a solution for eye gaze detection from a wireless head mounted camera designed for children aged between 6 months and 18 months. Due to the constraints of working with very young children, the system does not seek to be as accurate ...
In this paper we explore the concept of informal innovation by investigating it both on the input (activities) and output (impact) side of the innovation process. Informal innovation is defined as innovation that is not explicitly planned and budgeted and ...
As opposed to database transactional systems, transactional memory (TM) systems are constrained by real-time while treating their input workload. Nevertheless, there is no clear formalization of how a TM should react regarding to a specific input. While TM ...
This paper investigates the shear strength of beams and one-way slabs without stirrups based on the opening of a critical shear crack. The shear-carrying mechanisms after the development of this crack are investigated. On this basis, a rational model is de ...
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever revealing any input to a curious adversary. We show that any computable predic ...
This paper examines the identification of multi-input systems. Motivated by an experiment design problem (should one excite the various inputs simultaneously or separately), we examine the effect of an additional input on the variance of the estimated coef ...
This paper examines the identification of a single-output two-input system. Motivated by an experiment design problem(should one excite the two inputs simultaneously or separately), we examine the effect of the (second) input signal on the variance of the ...
A few years ago, a perceptually-tuned grayscale character generation technique was developed in order to automatically synthesize grayscale characters looking like manually-tuned pixmap characters. Weight and contrast controlled grayscale characters are ob ...