Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Connectivity is an important key performance indicator and a focal point of research in large-scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct wireless connectivity is limited to proximate devices. Nevertheless, connec ...
Despite the high costs of acquisition and maintenance of modern data centers, machine resource utilization is often low. Servers running online interactive services are over-provisioned to support peak load (which only occurs for a fraction of the time), d ...
EPFL2019
CubeSats are a type of small satellites (< 500 kg) that weigh several kilograms and consist of multiple Units (U) measuring 100 × 100 × 113.5 mm3. CubeSats emerged as a low-cost alternative to conventional large satellites, and have since demonstrated capa ...
EPFL2020
With the prevalence of smartphones, watches, and Internet of Things (IoT) devices, the abilityto track their positions is becoming increasingly important. For many indoor positioningsystems (IPSs), providing an uninterrupted flow of information in real-tim ...
EPFL2023
,
Supply Chain Finance (SCF) refers to the financial service in which banks rely on core enterprises to manage the capital flow and logistics of upstream and downstream enterprises. SCF adopts a self-testing and closed-loop credit model to control funds and ...
KEAI PUBLISHING LTD2022
,
While the number of IoT devices grows at an exhilarating pace their security remains stagnant. Imposing secure coding standards across all vendors is infeasible. Testing individual devices allows an analyst to evaluate their security post deployment. Any d ...
The intelligent building, a major smart city research and development domain, has grown beyond the scope of automation, currently focusing on the occupant centered approaches and the ancillary services offered to the power grid. The Internet of Things (IoT ...
Internet of Things (IoT), which is one of the main talking points in the electronics industry today, consists of a number of highly miniaturized sensors and actuators which sense the physical environment around us and communicate that information to a cent ...
As IoT applications gain widespread adoption, it becomes important to design and implement IoT protocols with security. Existing research in protocol security reveals that the majority of disclosed protocol vulnerabilities are caused by incorrectly impleme ...
Attacks against IoT systems are increasing at an alarming pace. Many IoT systems are and will be built using low-cost micro-controllers (IoT-pCs). Different security mechanisms have been proposed for IoT-mu Cs with different trade-offs. To guarantee a real ...