Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
MULTI2 is the block cipher used in the ISDB standard for scrambling digital multimedia content. MULTI2 is used in Japan to se- cure multimedia broadcasting, including recent applications like HDTV and mobile TV. It is the only cipher specified in the 2007 J ...
Stream ciphers are fast cryptographic primitives to provide confidentiality of electronically transmitted data. They can be very suitable in environments with restricted resources, such as mobile devices or embedded systems. Practical examples are cell pho ...
This paper studies the specifications of gated-oscillator-based clock and data recovery circuits (GO CDRs) designed for short haul optical data communication systems. Jitter tolerance (JTOL) and frequency tolerance (FTOL) are analyzed and modeled as two ma ...
In this paper, we will show that a simple one dimension non-linear map allows generating symbolic sequences that have better statistical properties then classical pseudo random ones. Using performance criterion that is suitable for CDMA application, the pe ...
In some remote sensing applications, the functional relationship between the source being observed and the sensor readings may not be known. Because of communication constraints, this uncertainty may result in poor end-to-end distortion. If the sensors hav ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2005
It is shown that the capacity of the AWGN channel can be approached via a multilevel coding scheme with the output of each encoder mapped into an independent signal constellation. No active shaping is required in this scheme, regardless of the signal-to-no ...
There are mainly three well-known techniques to acquire a GNSS signal. The first, called Serial Search Acquisition, consist in correlating the Pseudo-Random Noise (PRN) codes for all the codes phases and all the frequency bins. The two others make use of t ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
A long-standing open question in information theory is to characterize the unicast capacity of a wireless relay network. The difficulty arises due to the complex signal interactions induced in the network, since the wireless channel inherently broadcasts t ...
This thesis, based on a project realised in cooperation with Électricité de France (EDF), proposes a new concept for a Decision Aid Function FOr Restoration (DAFFOR) of transmission power systems after a blackout. DAFFOR is an interactive computer tool whi ...
This paper provides a time-domain feedback analysis of the robustness performance of Gauss-Newton recursive methods that are often used in identification and control. These are recursive estimators that also involve updates of sample covariance matrices. S ...