Microcolumn with variable axis lens for large scan fields and pixel numbers
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Web services resource framework (WS-RF) and the Web services notification (WS-N) specifications are a crucial component of grid infrastructures. They provide a standardized interface to stateful services so that they can be managed remotely. There are ...
PSI is interested in developing an X-FEL as a companion radiation source to the existing Swiss Light Source. In order to achieve radiation wavelengths as low as 1 Å, the X-FEL requires excellent electron beam quality and high beam energy. The energy requir ...
With the latest developments in video coding technology and fast deployment of end-user broadband internet connections, real-time media applications become increasingly interesting for both private users and businesses. However, the internet remains a best ...
Wurtzite GaN/AlN quantum dots (QDs) are studied by time-resolved photoluminescence. Careful measurements allow us to reach the regime of a single electron-hole pair per dot, evidenced by a monoexponential decay of the luminescence and a stop of the time-de ...
In this work, we address the security of VANETs. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implica ...
Due to the limited number of available IP addresses most computers on the Internet use dynamic IP addresses which causes problems for applications that have to maintain rout-ing tables, for example, peer-to-peer systems. To overcome this we propose unique ...
The content of this thesis is two-fold. The first part takes the form of an essay while the second part presents a theoretical project for an architectural installation. Using these two modes as different ways to address similar issues, the present work pr ...
McGill University, Post-Graduate Masters (M.Arch) Theory of Architecture1999
The success of new service provision platforms will largely depend on their ability to blend with existing technologies. The advent of Internet telephony, although impressive, is unlikely to make telephone customers suddenly turn in favor of computers. Rat ...
We develop three functions around the MAC layer: (1) Pseudo broadcast is a technique used to improve throughput of broadcast transmissions in case of congested networks. The mechanism consists in sending a packet in unicast to a station using RTS/CTS. Othe ...
Ad hoc networks are expected to be used in many different situations. A common characteristic among these situations is that the nodes have to cooperate with each other. This problem is particularly crucial, if each node is its own authority. Reckoning the ...