Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We consider the problem of localizing wireless devices in an ad-hoc network embedded in a d-dimensional Euclidean space. Obtaining a good estimation of where wireless devices are located is crucial in wireless network applications including environment m ...
Sequence data are increasingly shared to enable mining applications, in various domains such as marketing, telecommunications, and healthcare. This, however, may expose sensitive sequential patterns, which lead to intrusive inferences about individuals or ...
In this paper we investigate the degrees of freedom of layered two unicast Gaussian networks with destination-to-source feedback. The feedback model allows the destinations to feedback their received signals to their respective sources perfectly. Based upo ...
Social media have transformed the Web into an interactive sharing platform where users upload data and media, comment on, and share this content within their social circles. Each content item is associated with an abundance of metadata and related informat ...
Models of computational trust support users in taking decisions. They are commonly used to guide users' judgements in online auction sites; or to determine quality of contributions in Web 2.0 sites. However, most existing systems require historical informa ...
Remarkable progress has been made in diagnosing energetic particle instabilities on present-day machines and in establishing a theoretical framework for describing them. This overview describes the much improved diagnostics of Alfven instabilities and mode ...
This paper investigates robust privacy-sensitive audio features for speaker diarization in multiparty conversations: ie., a set of audio features having low linguistic information for speaker diarization in a single and multiple distant microphone scenario ...
We study the problem of decentralized spectrum sensing in the presence of selfish secondary users. We employ diffusion strategies to guide the estimation process and a reputation mechanism to encourage secondary users to participate in the sharing of infor ...
Assessing customer trust in suppliers with regards to its influencing factors is an important open issue in supply chain management literature. In this paper, a customer trust index is designed as the trust level arising from the information sharing degree ...
The Data Center is the most definitive and yet invisible typology of our contemporary world. It is the densest spot in our digital universe, a physically invisible space virtually visited by many. In a time when the collective spirit of the net itself is m ...