Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This article presents the design, implementation, and evaluation of IO -Lite, a unified I/O buffering and caching system for general-purpose operating systems. IO-Lite unifies all buffering and caching in the system, to the extent permitted by the hardware ...
For years research has focused on ways to allow remote access via standard communication networks to unique or expensive structures. With the growth of the Internet, one finds more and more devices connected to it. Despite the fact that one may spy on othe ...
Presents a new architecture for simulating virtual humans in complex urban environments. The approach is based on the integration of six modules. Four key modules are used in order to manage environmental data, simulate human crowds, control interactions b ...
This paper describes experiments of a text-independent speaker verification method that has been evaluated on two laboratory databases (M2VTS and XM2VTS) and on one field test database (LoCoMic). This work has been performed within the European ACTS-M2VTS ...
This paper presents the design, implementation and evaluation of IO-Lite, a unified I/O buffering and caching system for general-purpose operating systems. IO-Lite unifies all buffering and caching in the system, to the extent permitted by the hardware. In ...
The paper presents the European ACTS project “M2VTS” which stands for Multi Modal Verification for Teleservices and Security Applications. The primary goal of this project is to address the issue of secured access to local and centralised services in a mul ...
We address the problem of protecting the privacy of individuals in the information society. Our goal is to devise technical means that allow users to actively participate in the management and use of information related to them. The advent of the informati ...
One of the most publicized goals of modern computer society is to provide flexible access to information for everybody, anywhere, anytime. To make data management systems successful in satisfying user quest for information, an abstractolute requirement is ...
We propose a protocol that controls the members of a multicast group that send periodically status reports to all members. The protocol, called Multicast Access Protocol (MAP), limits the number of concurrent multicast reports as the group size becomes lar ...
The paper presents a model for end-user directed access control to services in Internet service centres that, beside the classical Internet services (e.g., e-mail), offer a multitude of new services (e.g., on-line conferencing and auctioning) over the Inte ...