Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We consider a multiuser OFDM system in which users want to transmit videos via a base station. The base station knows the channel state information (CSI) as well as the rate distortion (RD) information of the video streams and tries to allocate power and s ...
Institute of Electrical and Electronics Engineers2013
The objective of this study was to evaluate the possibility of photoinduced stack/rod electron transfer in surface “zipper” architectures composed of stacks of blue (B) naphthalenediimides (NDIs) along strings of oligophenylethynyl (OPE) rods. The synthesi ...
Software-defined networking, and the emergence of OpenFlow-capable switches, enables a wide range of new network functionality. However, enhanced programmability inevitably leads to more software faults (or bugs). We believe that tools for testing OpenFlow ...
This contribution presents a new strategy to grow nonfouling poly (poly(ethylene glycol) methacrylate) (PPEGMA) brushes from polydimethylsiloxane (PDMS) substrates. The strategy presented here is based on the use of a sequence of vapor deposition/hydrolysi ...
The focus of this thesis is on communication over cooperative information networks. In the first half of the thesis, we consider lossy source coding problems where a relay assists in the communication of a source stream between two terminals. The following ...
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering ...
In this paper, we present Ishtar, a lightweight and versatile collection of software for remote data access and monitoring. The monitoring architecture is crucial during the development and experimentation of autonomous systems like Micro Air Vehicles. Ish ...
Solving consensus in wireless ad hoc networks has started to be addressed in several papers. Most of these papers adopt system models similar to those developed for wired networks. These models are focused towards node failures while ignoring link failures ...
This work presents three applications of dry photoresist film for printed and flexible electronics devices. First, as part of the flexible encapsulation of printed gas sensors (i.e. humidity). This process was performed at relatively low temperatures (85 ° ...
A close look at many existing systems reveals their two- or multi-layer nature, where a number of coexisting networks interact and depend on each other. For instance, in the Internet, any application-level graph (such as a peer-to-peer network) is mapped o ...