Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Calcareous fly ashes are high-potential reactive supplementary cementitious materials, which present an interesting alternative to slowly reacting siliceous fly ashes and to slags, which availability is more and more limited. Themain factor against an accu ...
Innovation is one of the many challenges raised by the digitalization of business and economy. In the current competitive environment, businesses are characterized by radical transformations through digitalization of services and products and their ability ...
Chromatin regulatory processes, like all biological reactions, are dynamic and stochastic in nature but can give rise to stable and inheritable changes in gene expression patterns. A molecular understanding of those processes is key for fundamental biologi ...
We prove that the critical Wave Maps equation with target S2 and origin ℝ2+1 admits energy class blow up solutions of the form [ u(t, r) = Q(\lambda(t)r) + \epsilon(t, r) ] where Q:R2→S2 is the ground state harmonic map and $\lambda ...
Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been aggravating the potential conseque ...
Since Gentry’s breakthrough result was introduced in the year 2009, the homomorphic encryption has become a very popular topic. The main contribution of Gentry’s thesis was, that it has proven, that it actually is possible to design a fully homomorphic enc ...
Secure storage of genomic data is of great and increasing importance. The scientific community's improving ability to interpret individuals' genetic materials and the growing size of genetic database populations have been aggravating the potential conseque ...
We show how any pair of authenticated users can on-the-fly agree on an elliptic curve group that is unique to their communication session, unpredictable to outside observers, and secure against known attacks. Our proposal is suitable for deployment on cons ...
Deterministic symmetric encryption is widely used in many cryptographic applications. The security of deterministic block and stream ciphers is evaluated using cryptanalysis. Cryptanalysis is divided into two main categories: statistical cryptanalysis and ...
We here present a study on the influence of metal electrodes on the anchor losses in Contour Mode Resonators (CMRs). Our Finite Element Modelling (FEM) simulation results show that electrode material is key to determine the acoustic losses, and therefore t ...