Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Synopsis: Implement a new way of interacting with your computer via voice control instead of the mouse and keyboard. Level:BS, MS Description: Google Home and Amazon Alexa are quickly rev ...
In this paper, a complete system is presented which mimics a QWERTY keyboard on an arbitrary surface. The system consists of a pattern projector and a true-3D range camera for detecting the typing events. We exploit depth information acquired with the 3D r ...
Humans rely on the sense of touch in almost every aspect of daily life, whether to tie shoelaces, place fingertips on a computer keyboard or find keys inside a bag. With robots moving into human-centered environment, tactile exploration becomes more and mo ...
Nowadays, customers have legitimate requirements as regards quality that marketing and consumers departments attempt to satisfy. The sound is well-known to enhance or detract from our pleasure in possessing or using a product. Sound quality engineering is ...
A ergonomic handle that can be added to existing haptic devices, composed by a spherical mechanism providing hand orientation and a grasping mechanism is shown. Both the proposed spherical mechanism and the handle have been ergonomically designed to avoid ...
The poor acoustic comfort of usual commercial products is often perceived as annoying. Today, more and more companies have realized that sound can be an important component of product attributes and image. They are interested in having acoustic guidelines ...
In this dissertation, we study the security of cryptographic protocols and cryptosystems from the mathematical definition of the primitives, up to their physical implementations in the real world. We propose a representation of the chronological design usi ...
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The techni ...
A large amount of knowledge has to be absorbed by students following courses in microprocessor systems design. Making the students experience every subject by themselves activates the learning process and enables them to cope with new concepts. A semester ...
Presents an open testbed for controlling facial animation. The adopted controlling means can act at different levels of abstraction (specification). These means of control can be associated with different interactive devices and media, thereby allowing a g ...