Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In a context of housing crisis and general increase in short-term/casual work, new forms of social precarity have developed since the end of the nineties in Western countries. Furthermore, a movement of voluntary shift to nomadic lifestyles is initiated. P ...
This paper takes a frank look at what has and has not been achieved in African language technology during the past two decades. Several questions are addressed: What was the status of technology for African languages 20 years ago? What were the major initi ...
We present protocols for creating pairwise secrets between nodes in a wireless network, so that these secrets are secure from an eavesdropper, Eve, with unbounded computational and memory capabilities, but with limited network presence. We first present a ...
Current security systems often rely on the adversary's computational limitations. Wireless networks offer the opportunity for a different, complementary kind of security, which relies on the adversary's limited network presence (i.e., that the adversary ca ...
An active distribution network (ADN) is an electrical-power distribution network that implements a real-time monitoring and control of the electrical resources and the grid. Effective monitoring and control is realised by deploying a large number of sensin ...
Commuting and travelling extensively for job reasons both helps and challenges people to balance competing demands of work and personal life. People do not have equal resources and possibilities to benefit from high mobility. Globalisation, labour flexibil ...
In this work, a base-station design is proposed for passive UHF RFID tags that use pulse-width modulation (PWM) in backscattering communication. The theoretical analysis of the PWM backscattering is presented along with the challenges it creates in the bas ...
Ieee2014
, , , ,
In this paper we present the motivation, design, development, and initial evaluation of a time awareness technology for meetings. As part of improving meetings effectiveness using technology, we focus on the meeting time management, and the method relies o ...
The paper considers the problem of detecting cyber-attacks occurring in communication networks for distributed control schemes. A distributed methodology is proposed to detect the presence of malicious attacks aimed at compromising the stability of large-s ...
Relay attacks (and, more generally, man-in-the-middle attacks) are a serious threat against many access control and payment schemes. In this work, we present distance-bounding protocols, how these can deter relay attacks, and the security models formalizin ...