Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
An approach to the synthesis of polyhydroxyazepane derivatives from sugar-based epoxyamides or epoxyalcohols, in which the total regioselective epoxide opening by nitrogen nucleophiles is the key step, is described. Thus, novel polyhydroxyazepane carboxami ...
The automatic discovery of group conversational behavior is a relevant problem in social computing. In this paper, we present an approach to address this problem by defining a novel group descriptor called bag of group-nonverbal-patterns defined on brief o ...
The atomic structure and composition of a catalyst's surface have a major influence on its performance regarding activity and selectivity. In this respect, intermetallic compounds are promising future catalyst materials, as their surfaces exhibit small and ...
This paper presents the design, manufacture and test of a low-cost reflectarray antenna that provides a sectored-cosecant squared beam. The bandwidth limitation of single-layer reflectarrays is overcome by using three parallel dipoles in each cell. First, ...
Institute of Electrical and Electronics Engineers2013
Location privacy has been extensively studied over the last few years, especially in the context of location-based services where users purposely disclose their location to benefit from convenient context-aware services. To date, however, little attention ...
We evaluate, by measurements on a real testbed, the performance of networking services required for spot applications. We call a “spot application” an application for smartphones (such as “Ad-hoc Flash Sales”) that disseminates information in a local neigh ...
The properties of the cluster HenV, an iron vacancy with an increasing number of He atoms, is studied with molecular statics and molecular dynamics simulations. A study of the binding energy of the self-interstitial atom (SIA) and the He, shows that from n ...
Networked computing environments are subject to configuration errors, unauthorized users, undesired activities and attacks by malicious software. These can be detected by monitoring network traffic, but network administrators are overwhelmed by the amount ...
Wireless technology is one of the revolutionary ad- vancements providing users with ubiquitous data and telephony access anywhere and anytime without any physical connection. The nowadays deployed wireless networks named WiFi, World- wide Interoperability ...
Institute of Electrical and Electronics Engineers2013
The characteristics of vehicular communication environments and their networking and application requirements have led to the development of unique networking protocols. They enable vehicle-to-vehicle and vehicle-to-infrastructure communication based on th ...