Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Complex visual tasks may be tackled with remarkably simple neural architectures generated by a co-evolutionary process of active vision and feature selection. This hypothesis has recently been tested in several robotic applications such as shape discrimina ...
We study the behavior of users in a classical Additive White Gaussian Noise Multiple Access Channel. We model users as rational entities whose only interest is to maximize their own communication rate, and we model their interaction as a noncooperative one ...
Looking across a tidal landscape, can one foresee the signs of impending shifts among different geomorphological structures? This is a question of paramount importance considering the ecological, cultural and socio-economic relevance of tidal environments ...
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect locat ...
If a network is to operate successfully, its users need to collaborate. Collaboration takes the form of following a network protocol and involves some resource expenditure on the part of the user. Therefore, users cannot automatically be expected to follow ...
Institute of Electrical and Electronics Engineers2008
The IEEE 802.22 standard is the first proposed standard for the cognitive radio networks in which a set of base stations (BSs) make opportunistic spectrum access to provide wireless access to the customer-premise equipments (CPE) within their cells in wire ...
We consider the problem of peer selection for multimedia trans- mission over a peer-to-peer (P2P) network to find a strategy model for peer selection for each lost packet. Our problem consists of two parts one related to the P2P network that is a peer sele ...
Unstructured networks (like ad-hoc or peer-to-peer networks) are networks without centralized control of their operation. Users make local decisions regarding whether to follow the network protocol or not. While providing scalability benefits, this degrade ...
Information transfer plays a central role in the biology of most organisms, particularly social species [1, 2]. Although the neurophysiological processes by which signals are produced, conducted, perceived, and interpreted are well understood, the conditio ...
Despite the rigour and ability of game theory to cope with oligopolistic electric markets, it fails to model many existing behaviours in the real-world circumstances. The traditional models such as statistical extrapolation or econometrics are not capable ...