Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
A data storage medium (2) comprising a stacked plurality of layers (9), each layer composed of a layer material selected from a group comprising at least two different dielectric materials, adjacent layers being formed of different materials, and at least ...
Molecular sensing system including: a sensing device (5) comprising at least one support layer (10), and an active layer (6) mounted on said support layer and having at least one nano-pore (12) configured for translocation of a molecular analyte (18) there ...
Real-time control of electric grids is a novel approach to handling the increasing penetration of distributed and volatile energy generation brought about by renewables. Such control occurs in cyber-physical systems (CPSs), in which software agents maintai ...
Consensus protocol have seen increased usage in recent years due to the industry shift to distributed computing. However, it has traditionally been implemented in the application layer. We propose to move the consensus protocol in the transport layer, to o ...
A method produces a conductive paste comprising 15-20% by weight of PDMS and 80-85% by weight of metallic micro-nano particles, wherein the conductive paste is obtained by repeated addition of singular doses of PDMS to a heptane diluted PDMS low viscosity ...
Website fingerprinting (WF) attacks can compromise a user’s online privacy, by learning network traffic patterns generated by websites through machine learning (ML) techniques. Such attacks remain unaffected by encryption and even defeat anonymity services ...
Secure documents often comprise an information layer that is hard to reproduce. Moiré techniques for the prevention of counterfeiting rely on the superposition of an array of transparent lines or microlenses on top of a base layer containing hidden informa ...
A composite multi-layer textile (1), comprising at least one nanofibre layer (11) with nanofibres with diameters below 100nm and one support layer (12) with microfibres with diameters below three microns, wherein the layers (11, 12) were produced by electr ...
Dynamic Nuclear Polarization MAS NMR is introduced to characterize model methylcellulose ether compounds at natural isotopic abundance. In particular an approach is provided to determine the position of the methyl ether group within the repeating unit. Spe ...
2021
, , , ,
Poly(2-hydroxyethyl methacrylate) (PHEMA) and poly(poly(ethylene glycol) methacrylate) (PPEGMA) brushes represent a class of thin, surface-tethered polymer films that have been extensively used e.g. to generate non-biofouling surfaces or as model systems t ...