Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This document proposes a new serialization format for typed syntax trees of Scala programs. It aims to be ● compact: All numbers and references are length encoded, trees are inlined by default but may be shared. ● lazy: Trees can be explored from the top, ...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
This dissertation describes a set of research projects that were conducted between 2012 and 2014 in order to answer the question how do computational ideas alter our understanding of place? Each project was produced in the context of the performing arts an ...
We propose an efficient remote biometric authentication protocol that gives strong protection to the user’s biometric data in case of two common kinds of security breaches: (1) loss or theft of the user’s token (smart card, handheld device, etc.), giving t ...
While more accurate and reliable than ever, the trustworthiness of biometric verification systems is compromised by the emergence of spoofing attacks. Responding to this threat, numerous research publications address isolated spoofing detection, resulting ...
We address the task of identifying people appearing in TV shows. The target persons are all people whose identity is said or written, like the journalists and the well known people, as politicians, athletes, celebrities, etc. In our approach, overlaid name ...
Laminated glass components are usually realized bonding glass plates by means of interlayer polymers that develop adhesion forces during lamination. Recently, these adhesion forces have been used also to realize adhesive connections for structural glass co ...
In this work we study periocular biometrics in a challenging scenario: a mobile environment, where person recognition can take place on a mobile device. The proposed technique, that models session variability, is evaluated for the authentication task on th ...
The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (pre ...
This paper proposes a novel type of RFID application, i.e., RFID seeking. Several existing types of RFID applications such as monitoring, searching, locating/navigating, are similar with RFID seeking. However, they are either inapplicable or vulnerable for ...