Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Discontinuities, including fractures and joint sets, modify the fluid transport properties and strength of rock masses. While open fractures and joints increase rock mass permeability and decrease rock mass strength, fluid flow within these structures can ...
Hydraulic stimulation of enhanced deep geothermal reservoirs commonly targets pre-existing joint networks with the goal of increasing reservoir permeability. Here, we study the permeability and strength of joint-free and jointed Buntsandstein sandstones fr ...
Rock masses are often criss-crossed by generations of discontinuities, including veins, fractures, and joints. The presence of fractures and joints can increase rock mass permeability and decrease rock mass strength. However, fluid flow within rock masses ...
We report on the characterization of micro-fabricated alkali vapor cells, sealed by low-temperature thin-film metallic bonding. The low sealing temperatures ≤ 140°C are of high interest in view of future micro-fabricated cells using anti-relaxation wall co ...
The distribution of terrestrial surface runoff to Ilulissat Icefjord, west Greenland, is simulated for the period 2009-13 to better emphasize the spatiotemporal variability in freshwater flux and the link between runoff spikes and observed hydrographic con ...
Many ecological studies rely on count data and involve manual counting of objects of interest, which is time-consuming and especially disadvantageous when time in the field or lab is limited. However, an increasing number of works uses digital imagery, whi ...
Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar li ...