Communication Predicates: A high-level abstraction for coping with transient and dynamic faults
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Related key attacks (RKAs) are powerful cryptanalytic attacks where an adversary can change the secret key and observe the effect of such changes at the output. The state of the art in RKA security protects against an a-priori unbounded number of certain a ...
Consensus is one of the key problems in fault-tolerant distributed computing. Although the solvability of consensus is now a well-understood problem, comparing different algorithms in terms of efficiency is still an open problem. In this paper, we address ...
This paper sheds light on some of the graphical methods used by Robert Maillart to design the Salginatobel Bridge, a three-hinged concrete structure spanning 90 meters. Built in 1929, this masterpiece has since received extensive recognition both for its s ...
Consensus is one of the key problems in fault-tolerant distributed computing. Although the solvability of consensus is now a well-understood problem, comparing different algorithms in terms of efficiency is still an open problem. In this paper, we address ...
We present a structural attack against the Sidelnikov cryptosystem. The attack creats a private key from a give public key. Its running time is subexponential and it is effective if the parameters of the Reed-Muller code allow for efficient sampling of min ...
The goal of the Human Brain Project is to develop, during the next decade, an infrastructure capable of simulating a draft human brain model based on available experimental data. One of the key issues is therefore to integrate and make accessible the exper ...
Recently, two e-mail protocols were proposed claiming to provide perfect secrecy. These protocols use authentication and (Diffie-Hellman) key-exchange techniques, and as such, other standard security criteria besides perfect forward secrecy include key-rep ...
One of the key sources of uncertainty in building simulation relates to the presence and behaviour of occupants. Fortunately, several academic groups have been working to address this uncertainty, particularly in relation to the use of windows and the corr ...
This paper studies the problem of demand driven employee scheduling for direct-sales retail outlets. The demand for sales personnel during each half hour is predicted a week in advance based on previous recorded data and the problem of computing an optimal ...
A numerical code was developed for modeling phase change micro heat exchangers. The model covers evaporating and condensing annular flows as well as slug/elongated bubble flows. The model was validated against a set of experimental results from different l ...