Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A computer implemented method for encrypting one or more files and wrapping them in an HTML document. The HTML document contains the encrypted files, the necessary code to decrypt the files, as well as user interface code to receive a passphrase input from ...
Changes in building design during the twentieth and twenty-first centuries have been largely focussed on driving safety and reducing capital expenditure, with less attention given to improvements in building energy efficiency. However, energy efficiency in ...
Villigen PSI, World Resources Forum, printed by Paul Scherrer Institute2015
Almost all research work in computational neuroscience involves software. As researchers try to understand ever more complex systems, there is a continual need for software with new capabilities. Because of the wide range of questions being investigated, n ...
Software packet-processing platforms--network devices running on general-purpose servers--are emerging as a compelling alternative to the traditional high-end switches and routers running on specialized hardware. Their promise is to enable the fast dep ...
Software bugs are inevitable in software-defined networking control software, and troubleshooting is a tedious, time-consuming task. In this paper we discuss how to improve control software troubleshooting by presenting a technique for automatically identi ...
This paper presents an important step forward towards increasing the independence of people with severe motor disabilities, by using brain-computer interfaces (BCI) to harness the power of the Internet of Things. We analyze the stability of brain signals a ...
By the end of 2013, the number of internet-connected mobile devices is expected to exceed that of humans. Omnipresent and context-aware, mobile devices enable people to communicate and exchange data anytime and almost anywhere. The myriad of ”digital footp ...
Relevant and readily available information is a crucial basis for decision making, problem solving or performing knowledge-intensive work. The motivation for this thesis lays in the fact that in certain situations not all information provided by an applica ...
Software upgrades are frequent. Unfortunately, many of the upgrades either fail or misbehave. We argue that many of these failures can be avoided for users of the new version of the software by exploiting the characteristics of the upgrade and feedback fro ...
A computer-implemented method for generating a user profile of a user of an online platform, a computer-implemented method for providing a first user with targeted information and a computer-implemented method for providing a user of an online platform wit ...