Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The minimum amount of shear reinforcement to be provided in reinforced concrete members has been a topic of debate and research for decades without reaching a consensus. Defining such values is however instrumental to build in an economic manner and to saf ...
Modern programmers routinely use third-party code, and infrastructure operators deploy software they did not write. This would not be possible without semantic interfaces---documentation, header files, specifications---that succinctly describe what that th ...
In this thesis, timing is everything. In the first part, we mean this literally, as we tackle systems that encode information using timing alone. In the second part, we adopt the standard, metaphoric interpretation of this saying and show the importance of ...
These documents guide researchers in writing a README file for their datasets (data and code), through best practices and an example template. The template is also available as a separate .txt file. ...
Systems and methods for data storage and readout using hybrid nucleic acid- polymeric molecules are herein disclosed. A molecular data storage medium is presented comprising a header and a footer, each comprising or consisting of at least one unit of a fir ...
General three-dimensional toroidal ideal magnetohydrodynamic equilibria with a continuum of nested flux surfaces are susceptible to forming singular current sheets when resonant perturbations are applied. The presence of singular current sheets indicates t ...
This paper investigates the problem of secret key generation from correlated Gaussian random variables in the short blocklength regime. Short blocklengths are commonly employed in massively connected IoT sensor networks in 5G and beyond wireless systems. P ...
Homomorphic encryption, which enables the execution of arithmetic operations directly on ciphertexts, is a promising solution for protecting privacy of cloud-delegated computations on sensitive data. However, the correctness of the computation result is no ...
2022
We strengthen the results from a recent work by the second author, achieving bounds on the weight distribution of binary linear codes that are successful under block-MAP (as well as bit-MAP) decoding on the BEC. We conclude that a linear code that is succe ...
ASSOC COMPUTING MACHINERY2021
These data files containg code sources for dataset creation & model learning (Joint-Space-SCA.zip) and collected synthetic dataset of free & collided postures for humanoid robot iCub (raw_binary_data.zip). Follow the Readme.MD files to launch the code if n ...