Publication

Utility and privacy effects of a user action in a communication system

Related publications (49)

Spherical Clustering of Users Navigating 360° Content

Pascal Frossard, Francesca De Simone, Laura Toni

In Virtual Reality (VR) applications, understanding how users explore the omnidirectional content is important to optimize content creation, to develop user-centric services, or even to detect disorders in medical applications. Clustering users based on th ...
IEEE2019

A Framework for Adaptive User Interface Generation based on User Behavioural Patterns

The concept of adaptivity is crucial in enterprise software systems with a large user base. Adaptive user interfaces (AUI) is an emerging research area that enables customized user experience based on user activities. Most of the existing studies that are ...
IEEE2019

Wearable Technologies for Embodied Human-Robot Interaction

Carine Rognon

Robotic teleoperation is fundamental to augment the resilience, precision, and force of robots with the cognition of the operator. However, current interfaces, such as joysticks and remote controllers, are often complicated to handle since they require cog ...
EPFL2019

A dashboard for controlling polarization in personalization

Nisheeth Vishnoi, Laura Elisa Celis, Farnood Salehi, Vijay Keswani, Sayash Kapoor

Personalization is pervasive in the online space as it leads to higher efficiency for the user and higher revenue for the platform by individualizing the most relevant content for each user. However, recent studies suggest that such personalization can lea ...
IOS PRESS2019

Towards Scalable Personalization

Rhicheek Patra

The ever-growing amount of online information calls for Personalization. Among the various personalization systems, recommenders have become increasingly popular in recent years. Recommenders typically use collaborative filtering to suggest the most releva ...
EPFL2018

Learning adaptive dressing assistance from human demonstration

Sylvain Calinon, Emmanuel Pignat

For tasks such as dressing assistance, robots should be able to adapt to different user morphologies, preferences and requirements. We propose a programming by demonstration method to efficiently learn and adapt such skills. Our method encodes sensory info ...
2017

Information-Theoretic Caching: The Multi-User Case

Michael Christoph Gastpar, Sung Hoon Lim, Chien-Yi Wang

In this paper, we consider a cache aided network in which each user is assumed to have individual caches, while upon users’ requests, an update message is sent through a common link to all users. First, we formulate a general information theoretic setting ...
Institute of Electrical and Electronics Engineers2017

CLEO - Workshop on Contextual Learning Analytics Enforcing data Ownership. Building Interactive Learning Dashboards with Logstash, Elasticsearch and Kibana (ELK)

Denis Gillet, Maria Jesus Rodriguez Triana, Andrii Vozniuk

Educational data continues to grow in volume, velocity and variety. Making sense of the educational data in such conditions requires deployment and usage of appropriate scalable, real-time processing tools supporting a flexible data schema. Elasticsearch i ...
2016

Natural user interface for lighting control: Case study on desktop lighting using modular robots

Auke Ijspeert, Mehmet Hasan Mutlu, Massimo Vespignani, Simon Lukas Hauser, Stéphane Bonardi, Alexandre Bernardino

Roombots (RB) are self-reconfigurable modular robots designed to explore physical structure change by robotic reconfiguration and adaptive locomotion on structured grid environment or unstructured environment. The primary goal of RB is to create adaptive f ...
Ieee2016

Method for Generating an HTML Document that Contains Encrypted Files and the Code Necessary for Decrypting Them When a Valid Passphrase is Provided

Radhakrishna Achanta, Thomas Lochmatter

A computer implemented method for encrypting one or more files and wrapping them in an HTML document. The HTML document contains the encrypted files, the necessary code to decrypt the files, as well as user interface code to receive a passphrase input from ...
2015

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.