Related publications (24)

P3LI5: Practical and confidEntial Lawful Interception on the 5G core

Apostolos Pyrgelis, Francesco Intoci

Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., ne ...
New York2023

Quantum conformance test

Elena Losero, Marco Genovese

We introduce a protocol addressing the conformance test problem, which consists in determining whether a process under test conforms to a reference one. We consider a process to be characterized by the set of end products it produces, which is generated ac ...
AMER ASSOC ADVANCEMENT SCIENCE2021

Who Started This Rumor? Quantifying the Natural Differential Privacy of Gossip Protocols

Rachid Guerraoui, Hadrien Hendrikx

Gossip protocols (also called rumor spreading or epidemic protocols) are widely used to disseminate information in massive peer-to-peer networks. These protocols are often claimed to guarantee privacy because of the uncertainty they introduce on the node t ...
Schloss Dagstuhl, Leibniz-Zentrum2020

Analysis and Enhancement of CSMA/CA With Deferral in Power-Line Communications

Patrick Thiran, Julien Pierre Sacha Herzen, Christina Vlachou

Power-line communications are employed in home networking to provide easy and high-throughput connectivity. The IEEE 1901, the MAC protocol for power-line networks, employs a CSMA/CA protocol similar to that of 802.11, but is substantially more complex, wh ...
Ieee-Inst Electrical Electronics Engineers Inc2016

Making BFT Protocols Really Adaptive

Rachid Guerraoui

Many state-machine Byzantine Fault Tolerant (BFT) protocols have been introduced so far. Each protocol addressed a different subset of conditions and use-cases. However, if the underlying conditions of a service span different subsets, choosing a single pr ...
IEEE2015

Analyzing and Boosting the Performance of Power-Line Communication Networks

Patrick Thiran, Julien Pierre Sacha Herzen, Christina Vlachou

Power-line communications are employed in home networking to provide easy and high-throughput connectivity. IEEE 1901, the MAC protocol for power-line networks, employs a CSMA/CA protocol similar to that of 802.11, but is substantially more complex, which ...
2014

Large Micromirror Array Based on a Scalable Technology for Astronomical Instrumentation

Michael David Canonica

Understanding the formation of galaxies and studying the expansion of the Universe, need the spectral characterization of faint astronomical objects such as stars or galaxies. From these spectra, the distance, the velocity and the chemical composition of t ...
EPFL2012

Concurrency and dynamic protocol update for group communication middleware

Olivier Rütti

The last three decades have seen computers invading our society: computers are now present at work to improve productivity and at home to enlarge the scope of our hobbies and to communicate. Furthermore, computers have been involved in many critical system ...
EPFL2009

A Predicate-Based Approach to Dynamic Protocol Update in Group Communication

André Schiper, Olivier Rütti

In this paper we study dynamic protocol updates (DPU), which consist in replacing, without interruption, a given protocol during execution. We focus especially on group communication protocols. The paper proposes a methodology to conveniently describe whic ...
2008

Optimal PHY and MAC Protocols for Wide-Band Ad-Hoc Networks

Jean-Yves Le Boudec

We consider a wide-band ad-hoc network with coherent radios in a slow-fading environment, and we analyze the performance of different physical layer (PHY) and medium access (MAC) schemes in such a network. Most of the existing analysis assume that PHY is b ...
2007

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.