Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We present the design and implementation of SafetyPin, a system for encrypted mobile-device backups. Like existing cloud-based mobile-backup systems, including those of Apple and Google, SafetyPin requires users to remember only a short PIN and defends aga ...
Nonequilibrium phenomena are ubiquitous in nature and in a wide range of systems, including cold atomic gases and solid-state materials. While these phenomena are challenging to describe both theoretically and experimentally, they are essential for the fun ...
We present the design and implementation of SafetyPin, a system for encrypted mobile-device backups. Like existing cloud-based mobile-backup systems, including those of Apple and Google, SafetyPin requires users to remember only a short PIN and defends aga ...
DC power distribution systems in marine applications are in the process of being established as the preferred solution for shipboard power distribution systems. This paper presents a bus-tie switch topology for the protection of such systems. The device is ...
The entropy production is one of the most essential features for systems operating out of equilibrium. The formulation for discrete-state systems goes back to the celebrated Schnakenberg's work and hitherto can be carried out when for each transition betwe ...
Physical systems with material properties modulated in time provide versatile routes for designing magnetless nonreciprocal devices. Traditionally, nonreciprocity in such systems is achieved exploiting both temporal and spatial modulations, which inevitabl ...
With face-recognition (FR) increasingly replacing fingerprint sensors for user-authentication on mobile devices, presentation attacks (PA) have emerged as the single most significant hurdle for manufacturers of FR systems. Current machine-learning based pr ...
A method and system for deriving particle characteristics is described. The method comprises imaging the movement of at least one free-floating particle in a liquid environment at at least one moment in time, determining for at least one moment in time a m ...
In this paper, we discuss our recent works on the null-controllability, the exact controllability, and the stabilization of linear hyperbolic systems in one dimensional space using boundary controls on one side for the optimal time. Under precise and gener ...
This Special Issue of the IEEE Journal on Emerging and Selected Topics in Circuits and Systems (JETCAS) is dedicated to demonstrating the latest research progress on artificial intelligence for 5G and beyond 5G (B5G) with respect to implementations, algori ...