Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Laser-induced forward transfer (LIFT) technique is an emerging micro additive manufacturing (AM) technique that has been widely used to print a variety of materials. Distinguished from other nozzle-based AM techniques, LIFT operates without the existence o ...
Polymer-derived ceramics are known for their resistance to high temperatures and harsh environments as well as property tunability and compatibility with various shaping techniques. We demonstrate here a new hierarchical micro-manufacturing process combini ...
Purpose: To develop a scan-specific model that estimates and corrects k-space errors made when reconstructing accelerated MRI data. Methods: Scan-specific artifact reduction in k-space (SPARK) trains a convolutional-neural-network to estimate and correct k ...
Methods of topological data analysis have been successfully applied in a wide range of fields to provide useful summaries of the structure of complex data sets in terms of topological descriptors, such as persistence diagrams. While there are many powerfu ...
Inspired by nature, a common way to create hydrophobic surfaces is by introducing hierarchical and fractal microstructures on surface. While plenty of studies have demonstratedcreating PDC (polymer derived ceramic) for several applications include SiC-fibe ...
We used to say “seeing is believing": this is no longer true. The digitization is changing all aspects of life and business. One of the more noticeable impacts is in how business documents are being authored, exchanged and processed. Many documents such as ...
We consider three-dimensional cubic barcodes, consisting of smaller cubes, each built from one of two possible materials and carry one bit of information. To retrieve the information stored in the barcode, we measure a 2-D projection of the barcode using a ...
Real-world applications of authenticated encryption often require the encryption to be computable online, e.g. to compute the ith block of ciphertext after having processed the first i blocks of plaintext. A significant line of research was dedicated to id ...
The massive parallelism and resource sharing embodying today’s cloud business model not only exacerbate the security challenge of timing channels, but also undermine the viability of defenses based on resource partitioning. We propose hypervisor-enforced t ...
The mobility patterns of the population are the basis of most analyses in the transportation field. We aim to extract these patterns from smartphone traces. The following thesis proposes a Bayesian approach based on smartphone location records, land use in ...