Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We outline a procedure for using pseudorandom generators to construct binary codes with good properties, assuming the existence of sufficiently hard functions. Specifically, we give a polynomial time algorithm, which for every integers n and k, constru ...
Phase of the interference fringe pattern is known to convey important information in optical metrology. Typically, phase measurement using temporal techniques involves incorporating a piezoelectric device (PZT) in one arm of the interferometer for shifting ...
This dissertation is concerned with cryptanalysis of E0, the stream cipher used in the short-range wireless radio standard Bluetooth, and of its generalization by means of correlation attacks. It consists of three parts. In the first part, we propose an E0 ...
Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection i.e. insertion of random data into input files, buffers or protocol packets, combi ...
In this paper, we address the problem of scrambling regions of interest in a video sequence for the purpose of preserving privacy in video surveillance. We propose an efficient solution based on transform-domain scrambling. More specifically, the sign of s ...
The reliability of computer predictions of physical events depends on several factors: the mathematical model of the event, the numerical approximation of the model, and the random nature of data characterizing the model. This paper addresses the mathemati ...
Human papillomavirus (HPV) begins its life cycle by infecting the basal cells of the epithelium. Within these proliferating cells, the viral genomes are replicated, maintained, and passed on to the daughter cells. Using HPV episome-containing cell lines th ...
Efficiently handling reputation is important in dealing with free-riding, malicious attacks and random failures in self-organized communication systems. At the same time, work in this context is often found to be relevant in many other disciplines, in part ...
The consumption of resources within an urban neighbourhood depends on the behaviour of its occupants. To understand the randomness of this behaviour and its effect on the demand of resources calls for the development of a set of stochastic models which are ...
Modeling the immune system (IS) means putting together a set of assumptions about its components (cells and organs) and their interactions. Simulations of a model show joint behavior of the components, which for complex realistic models is often impossible ...