Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Symbolic execution is a powerful technique for analyzing program behavior, finding bugs, and generating tests, but suffers from severely limited scalability: the largest programs that can be symbolically executed today are on the order of thousands of line ...
With the world turning its eyes to a new tomorrow, and with America reshaping and greening its infrastructure, The School of The Art Institute of Chicago, Department of Architecture, Interior Architecture and Designed Objects, is proud to host "reForm()" - ...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver’s logic, and synthesizes new device driver code that implements the exact same ...
Byzantine fault tolerant (BFT) protocols are replication-based solutions to the problem of tolerating the arbitrary failures of software and hardware components. The essential assumption for replication is independence of failures. In this paper, we catego ...
European funding under framework 7 (FP7) for the virtual physiological human (VPH) project has been in place now for nearly 2 years. The VPH network of excellence (NoE) is helping in the development of common standards, open-source software, freely accessi ...
To fix a bug, software developers have to examine the bug-gy execution to locate defects. They employ different ap-proaches (e.g., setting breakpoints, inserting printing statements in the code) to navigate over buggy execution and inspect program state at ...
This paper uses a two-country, sticky-price model with non-atomistic wage setters to study the role of collective wage bargaining in the propagation of monetary shocks. I find that the welfare transmissions of a monetary expansion are reinforced by differe ...
The system comprises at least three anchors (2, 2', 2") intended to be attached to the patient and equipped with markers (5, 5', 5"), an insertion guide device (6) with an insertion guide (7) intended to be attached to said anchors (2, 2', 2"), an external ...
Despite the abundance of daylighting design software, there are few tools which focus on annually comprehensive and climate-realistic data, and fewer which give performance as a function of time. Lightsolve, a tool under development, emphasizes the importa ...
The first chapter of this thesis, coauthored with Annamaria Conti, seeks to add an economic contribution to the current debate on using university licensing contracts to improve access to medicines in developing countries. We build a simple model in which ...