Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In the present study, we are interested in verifying how the progressive addition of constraints on communication and localization impact the performance of a swarm of small robots in shape formation tasks. Identified to be of importance in a swarm-user in ...
Coupled inductors can be used as tunable inductances. Employing coupled inductors in the output impedance matching network of an RF power amplifier leads to superior performance when operating in more than one frequency band. As proof of this concept, the ...
Near-lattice-matched GaN/AlInN multiple quantum wells (MQWs) are investigated by means of the diamond anvil cell high-pressure technique. The hydrostatic pressure dependence of the photoluminescence dE(PL)/dp and the variation in the PL peak energy with th ...
The quality of the laser point cloud georeferencing in airborne laser scanning missions is largely related to the quality of the GPS solution. The latter is obtained by post- processing the differential carrier-phase measurements in order to reach the requ ...
We apply a model construction methodology to TinyOS-based networks, using the Behavior-Interaction-Priority (BIP) component framework. The methodology consists in building the model of a node as the composition of a model extracted from a nesC program desc ...
Due to their very nature, wireless sensor networks are probably the category of wireless networks most vulnerable to “radio channel jamming”-based Denial-of-Service (DoS) attacks. An adversary can easily mask the events that the sensor network should detec ...
Cognitive radio technology has been proposed to improve spectrum efficiency by having the cognitive radios act as secondary users to opportunistically access under-utilized frequency bands. Spectrum sensing, as a key enabling functionality in cognitive rad ...
We study a problem motivated by cognitive radio in which the primary is a packet system that employs ARQ feedback. A secondary system is allowed to transmit in the same frequency band provided it ensures that the primary attains a specified target rate. Th ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2007
Reflectarray antennas have attracted significant attention due to a number of attractive properties, such as low cost, and conformal deployment capability. In addition, the drive towards flexible radio transceivers, enabling beamforming and multi-beam oper ...
We study the problem of secure communication in a multi-channel, single-hop radio network with a malicious adversary that can cause collisions and spoof messages. We assume no pre-shared secrets or trusted-third-party infrastructure. The main contribution ...