SOWER: Self-Organizing Wireless Network for Messaging
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This dataset complements the article "Frequency regulation with storage: On losses and profits" by Dirk Lauinger, François Vuille, and Daniel Kuhn, available at https://arxiv.org/abs/2306.02987. The dataset contains the following files: 1.
We introduce a new measure of the price charged by financial intermediaries for con-necting mortgage borrowers with capital market investors. Based on administrativelender pricing data, we document that the price of intermediation reacts stronglyto variatio ...
Connectivity is an important key performance indicator and a focal point of research in large-scale wireless networks. Due to path-loss attenuation of electromagnetic waves, direct wireless connectivity is limited to proximate devices. Nevertheless, connec ...
Atom is an anonymous messaging system that protects against traffic-analysis attacks. Unlike many prior systems, each Atom server touches only a small fraction of the total messages routed through the network. As a result, the system’s capacity scales near ...
In this thesis, I investigate wireless communication from an architectural perspective. I am using design prototypes to explore possibilities for interaction and designing with wirelessness in mind. The public primarily regards wireless networking technolo ...
Recently Grubbs et al. [GLR17] initiated the formal study of message franking protocols. This new type of service launched by Facebook, allows the receiver in a secure messaging application to verifiably report to a third party an abusive message some send ...
Housing equity is an important component of borrowers’ wealth and a critical determinant of their vulnerability to shocks. In this article, the authors use a unique, newly created data set to analyze the evolution of household leverage—defined here as the ...
A constrained informationally efficient market is defined as one in which the price process arises as the outcome of some equilibrium where agents face restrictions on trade. This paper investigates the case of short sale constraints, a setting which, desp ...
We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless toget ...
This paper documents a series of experiments that explore the effects of wireless communication technology on the experience of space. Wireless connectivity and its infrastructure, un-sense-able to human body, are increasingly important in our interactions ...