Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Significant progress has been made towards making ad hoc networks secure and DoS resilient. However, little attention has been focused on quantifying DoS resilience: Do ad hoc networks have sufficiently redundant paths and counter-DoS mechanisms to make Do ...
P2P data management systems provide a scalable alternative to centralized architectures. Their adoption, however, is limited by the lack of possibility to control the access on the resources stored in the system. We address the problem of access control fo ...
We discuss interesting properties of a general technique for inferring polynomial invariants for a subfamily of imperative loops, called the P-solvable loops, with assignments only. The approach combines algorithmic combinatorics, polynomial algebra and co ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2008
The success of software verification depends on the ability to find a suitable abstraction of a program automatically. We propose a method for automated abstraction refinement which overcomes some limitations of current predicate discovery schemes. In curr ...
Model Predictive Control has been implemented on a large drainage canal system in the Netherlands. This water system can be represented as a reservoir with uncertain inflow due to rainfall runoff and a water level that has to be kept within a certain range ...
The paper introduces an advanced multilevel-based power converter structure for flexible power management of future electricity networks. The structure is then analysed so that appropriate control approaches are proposed in order to overcome technical chal ...
The search for proof and the search for counterexamples (bugs) are complementary activities that need to be pursued concurrently in order to maximize the practical success rate of verification tools. While this is well-understood in safety verification, th ...
SpiderCrane is a three-dimensional crane, whose main particularity lies in the absence of large inertial moving parts. This paper presents experimental results obtained with the novel jet-scheduling control methodology that is based on differential flatnes ...
Software transactional memory (STM) offers a disciplined concurrent programming model for exploiting the parallelism of modern processor architectures. This paper presents the first \emph{deterministic} specification automata for strict serializability and ...
Even though a large variety of innovative façade technologies has been developed to refine the control of solar radiation and increase the amount of useful natural illumination, their effective implementation in buildings is still uncommon. Increasing the ...