Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Many applications of wireless ad hoc sensor and actuator networks (WSANs) rely on the knowledge of node locations. These are challenging to obtain when nodes are mobile and are not equipped with any expensive positioning hardware. In this paper, we are int ...
Channel allocation has been extensively studied in the framework of cellular networks, but the emergence of new system concepts, such as cognitive radio systems, bring this topic into the focus of research again. In this paper, we provide a formal analysis ...
Inspired by unidirectional error detecting codes that are used in situations where only one kind of bit errors are possible (e.g., it is possible to change a bit “0” into a bit “1”, but not the contrary), we propose integrity codes (I-codes) for a radio co ...
The Laboratoire d’Electronique Industrielle has realized an active noise controller. The system is designed to efficiently attenuate low frequency transformer noise where passive methods are either ineffective or tend to be very expensive. This paper descr ...
A key problem in transporting multimedia traffic across wireless networks is a controlled sharing of the wireless link by different packet streams. So far this problem has been treated as that of providing support for quality of service in time division mu ...
The behavior of a given wireless station may affect the communication capabilities of a neighboring one, notably because the radio communication channel is usually shared in wireless networks. In this tutorial, we carefully explain how situations of this k ...
Security is at the core of any communication system and, in particular, of wireless (radio) networks. In this thesis, we focus on three important security aspects in the framework of wireless networks: selfish (noncooperative) behavior at the Medium Access ...
Feasibility studies performed in the last years have shown that the use of the low voltage distribution network can be used for data transmission. The main problem is the possible radiation of electromagnetic field and the disturbances which can affect rad ...
Non-invasive brain-computer interfaces are traditionally based on mu rhythms, beta rhythms, slow cortical potentials or P300 event-related potentials. However, there is mounting evidence that neural oscillations up to 200 Hz play important roles in process ...
Feasibility studies performed in the last years have shown that the low voltage distribution network can be used for data transmission. The main problem is the possible radiation of electromagnetic field representing a the disturbance which can affect radi ...