Méthode de libération d'une pièce micromécanique et pièce micromécanique comprenant des attaches sacrificielles
Related publications (98)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We present Phantm, a static analyzer that uses a flow-sensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runtime information and procedure summaries for more precise results. Phantm foun ...
Over the past decades, an increasing number of integral bridges have been built. This type of bridge offers various advantages in comparison with standard bridges equipped with expansion joints and bearings. In particular, integral bridges require less mai ...
EPFL Doctoral conference in Mechanics - EDCM20102010
Human behaviour plays an important role in the spread of infectious diseases, and understanding the influence of behaviour on the spread of diseases can be key to improving control efforts. While behavioural responses to the spread of a disease have often ...
We present Phantm, a static analyzer that uses a flow-sensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runtime information and procedure summaries for more precise results. Phantm foun ...
This work constitutes the first extended analysis of the spatial structure of Type-I ELM filament footprints on the JET outer limiters and upper dump plates. The data is obtained using a wide angle infrared diagnostic (with time resolution of 125 Hz) and c ...
Developing modern software applications typically involves composing functionality from existing libraries. This task is difficult because libraries may expose many methods to the developer. To help developers in such scenarios, we present a technique that ...
A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identities. Unfortunately, research in counter-measures to this type of attack have not kept-up - even if such threats have been known for nearly a decade, there se ...
In this paper, we present an application of RFIDs for supply-chain management. In our application, we consider two types of readers. On one part, we have readers that will mark tags at given points. After that, these tags can be checked by another type of ...
Developing modern software applications typically involves composing functionality from existing libraries. This task is difficult because libraries may expose many methods to the developer. To help developers in such scenarios, we present a technique that ...
Integrated circuit Hall sensor system comprising a plurality of elementary blocks (EB), each elementary block including a Hall cell (4), a differential pair (8) of an input stage of a Differential Difference Amplifier (DDA), and terminals (12a, 12b), where ...