Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The morphological transition in ultrathin palladium (Pd) films around the percolation threshold and the related transition in hydrogen sensing behavior is investigated.We find that besides the transition from continuous to discontinuous Pd, an intermediate ...
Top-k query processing is a fundamental building block for efficient ranking in a large number of applications. Efficiency is a central issue, especially for distributed settings, when the data is spread across different nodes in a network. This paper intr ...
Highly lethal pathogens (e.g., hantaviruses, hendra virus, anthrax, or plague) pose unique public-health problems, because they seem to periodically flare into outbreaks before disappearing into long quiescent phases. A key element to their possible contro ...
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Ins ...
In this thesis we address the description of electrical transport properties of disordered conductor-insulator composites, mostly by numerical Monte Carlo simulations and analytical study of realistic tunnelling-percolation models. Such composites are basi ...
We evaluate the percolation threshold values for a realistic model of continuum segregated systems, where random spherical inclusions forbid the percolating objects, modellized by hard-core spherical particles surrounded by penetrable shells, to occupy lar ...
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a contractual partner, a domain must resort to ad-hoc monitoring using probes. Ins ...
In this paper, we combine network coding and tomographic techniques for topology inference. Our goal is to infer the topology of a network by sending probes between a given set of multiple sources and multiple receivers and by having intermediate nodes per ...
Airlines schedules are built such as to maximize expected profit. Such schedules turn out to be more sensitive to delays and are hence unstable. The trend has thus evolved towards robust schedules, trading off between sensitivity with respect to disruption ...
Despite many advantages that could be gained through belonging to enterprise networks, only a few networks continue running businesses after the governments stop their funding. One of the reasons is the lack of a model that evaluates the benefits from the ...