An Application-Specific Design Methodology for STbus Crossbar Generation
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Intelligent Transportation Systems (ITS) can only operate successfully if selection and training of personnel is carried out in a systematic, theoretically sound way. Given the increasing responsibility of operators working in the control room, a scientifi ...
Intelligent transportation systems (ITSs) can operate successfully only if selection and training of personnel are carried out in a systematic, theoretically sound way. Given the increasing responsibility of operators, a scientific analysis to develop requ ...
Many Networks-on-Chip (NoC) applications exhibit one or more critical traffic flows that require hard Quality of Service (QoS). Guaranteeing bandwidth and latency for such real time flows is crucial. In this paper, we present novel methods to efficiently c ...
We propose an approximation framework for distributed target localization in sensor networks. We represent the unknown target positions on a location grid as a sparse vector, whose support encodes the multiple target locations. The location vector is linea ...
Traffic information services provide new options to ease the individual’s access to all kinds of transport modes. This is linked to the expectation that services as they are provided by a multimodal routing system offer the possibility to influence travel ...
Vehicular communication (VC) systems have recently drawn the attention of industry, authorities, and academia. A consensus on the need to secure VC systems and protect the privacy of their users led to concerted efforts to design security architectures. In ...
Snort is an open source Network Intrusion Detection System combining the benefits of signature, protocol and anomaly based inspection and is considered to be the most widely de- ployed IDS/IPS technology worldwide. However, Snort's deployment in a large co ...
Designing a power-efficient interconnection architec- ture for MultiProcessor Systems-on-Chips (MPSoCs) satisfying the application performance constraints is a nontrivial task. In order to meet the tight time-to-market constraints and to effec- tively hand ...
Institute of Electrical and Electronics Engineers2007
This paper describes the methodology used to transform the 2001 Swiss SAM devised at ETH Zürich and align it to the requirements of the GEMINI-E3 model which is based on the GTAP database. ...
The development of robotic cognition and the advancement of understanding of human cognition form two of the current greatest challenges in robotics and neuroscience, respectively. The RobotCub project aims to develop an embodied robotic child (iCub) with ...