Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The Swiss Federal Institute of Technology in Lausanne (EPFL) has introduced the Moodle Learning Management System (LMS) in 2005. Since then, the number of teachers and users has increased rapidly. With more than 350 active courses hosted on Moodle for this ...
This paper addresses two problems: Firstly, the problem of classifying remote and collocated small-group working meet- ings, and secondly, the problem of identifying the remote participant, using in both cases nonverbal behavioral cues. Such classifiers ca ...
This work presents a “3 steps–2 aggregation levels” methodological approach for modelling the evolution of the hybriddemand order flow pattern over long time horizons. The hybriddemand is the result of the mutual interaction between the e-commerce and the ...
Media content distribution constitutes a growing share of the services on the Internet. In recent years methods for cooperative media distribution has been a research area with high activity. Concurrently wireless internet connections have emerged. Wireles ...
Increased market pressure, sharp competition and globalisation are some of the main challenges faced nowadays by companies, pushing them to continuously evaluate the suitability of their business model and to look for new opportunities. Electronic commerce ...
With the increased dynamics of modern life, the efficiency and reliability of everyday services is emerging to be a fundamental concern. On the other hand, modern telecommunication technologies, like wireless Internet access, are penetrating all segments o ...
In a bandwidth-flooding attack, compromised sources send high-volume traffic to the target with the purpose of causing congestion in its tail circuit and disrupting its legitimate communications. In this paper, we present Active Internet Traffic Filtering ...
Comment mettre à disposition des enseignants les informations dont ils ont besoin pour bien enseigner au supérieur sans sombrer dans un guide de l’enseignant rébarbatif et indigeste. Après avoir cherché en vain quelque chose de convainquant, nous avons déc ...