Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Blockchain systems often rely on rationality assumptions for their security, expecting that nodes are motivated to maximize their profits. These systems thus design their protocols to incentivize nodes to execute the honest protocol but fail to consider ou ...
Quantum Field Theories are a central object of interest of modern physics, describing fundamental interactions of matter. However, current methods give limited insight into strongly coupling theories. S-matrix bootstrap program, described in this thesis, a ...
We study the effects of exceptionally light QCD axions on the stellar configuration of white dwarfs. At finite baryon density, the nonderivative coupling of the axion to nucleons displaces the axion from its invacuum minimum, which implies a reduction of t ...
Emerging technologies such as artificial intelligence, gene editing, nanotechnology, neurotechnology and robotics, which were originally unrelated or separated, are becoming more closely integrated. Consequently, the boundaries between the physical-biologi ...
Hawking's black hole area theorem was proven using the null energy condition (NEC), a pointwise condition violated by quantum fields. The violation of the NEC is usually cited as the reason that black hole evaporation is allowed in the context of semiclass ...
Electric vehicles (EVs) are becoming more popular due to environmental consciousness. The limited availability of charging stations (CSs), compared to the number of EVs on the road, has led to increased range anxiety and a higher frequency of CS queries du ...
Billions of people now have conversations daily over the Internet. A large portion of this communication takes place via secure messaging protocols that offer "end-to-end encryption'" guarantees and resilience to compromise like the widely-used Double Ratc ...
A sample of 3984 candidates of the K+ -> pi(+)gamma gamma decay, with an estimated background of 291 +/- 14 events, was collected by the NA62 experiment at CERN during 2017-2018. In order to describe the observed di-photon mass spectrum, the next-to-leadin ...
In contrast to vast academic efforts to study AI security, few real-world reports of AI security incidents exist. Released incidents prevent a thorough investigation of the attackers' motives, as crucial information about the company and AI application is ...