Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We propose and validate a model for pedestrian walking behavior, based on discrete choice modeling. Two main types of behavior are identified: unconstrained and constrained. By unconstrained, we refer to behavior patterns which are independent from other i ...
In this case study, we apply a recently developed method to systematically predict the linear dependencies in concentration profiles and identify minimum requirements to enable optimisation of rate constants and pure component spectra via direct multivaria ...
We propose and validate a model for pedestrian walking behavior, based on discrete choice modeling. Two main types of behavior are identified: unconstrained and constrained. By unconstrained, we refer to behavior patterns which are independent from other i ...
A method to estimate from multivariate measurements the dependences within a network of coupled dynamical systems is proposed. The method is non-parametric and resorts to a statistics of the eigen-spectrums of the time series partial correlation matrices. ...
We present a novel, automated way to find differential paths for MD5. As an application we have shown how, at an approximate expected cost of 2 50 calls to the MD5 compression function, for any two chosen message prefixes P and P′, suffixe ...
Our main motivation is to design more user-friendly security protocols. Indeed, if the use of the protocol is tedious, most users will not behave correctly and, consequently, security issues occur. An example is the actual behavior of a user in front of an ...
We present a refined chosen-prefix collision construction for MD5 that allowed creation of a rogue Certification Authority (CA) certificate, based on a collision with a regular end-user website certificate provided by a commercial CA. Compared to the previ ...
We have developed a model for pedestrian walking behavior, based on discrete choice modeling. The model is estimated by maximum likelihood estimation on a real data set of pedestrian trajectories, manually tracked from video sequences filmed in Japan. The ...
2009
, , ,
To better understand the relationship between tumor-host interactions and the efficacy of chemotherapy, we have developed an analytical approach to quantify several biological processes observed in gene expression data sets. We tested the approach on tumor ...
Nature Publishing Group2009
, ,
This paper addresses mask deformation phenomenon that frequently occurs but is highly undesirable in stencil lithography. Previously, a technique for mechanical stabilisation of stencils was proposed [M.A.F. van den Boogaart, et al., Corrugated membranes f ...