Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Compute-and-Forward (CF), also known as reliable physical layer network coding, is a technique that provides the possibility of exploiting the features of broadcast and superposition in wireless networks. It has been shown that the throughput for multiple ...
Institute of Electrical and Electronics Engineers2014
Wireless communication relies on high-frequency signal transmission between communication nodes. The signals are at the same time the message and the infrastructure for communication. Questioning the current wireless signals space occupancy in a playful wa ...
Small antennas, or more specifically, electrically small antennas, are passive radiating elements whose size is much smaller than the operating wavelength. The current wireless application systems usually have size constraints that, for the most common ope ...
Mobile devices and wireless networks have a prominent place in our interaction with the environment and with each other. Like every new technology, it has been a subject to inflated expectations. Scholars, writers, artists and architects have explored how ...
Wireless networks offer novel means to enhance social interactions. In particular, peer-to-peer wireless communications enable direct and real-time interaction with nearby devices and communities and could extend current online social networks by providing ...
We develop a formal framework for the analysis of security protocols in wireless networks. The framework captures characteristics necessary to reason about neighbor discovery protocols, such as the neighbor relation, device location, and message propagatio ...
Real-time monitoring of the temperature in supermarket refrigerators, testing air quality, detecting presence or position of a person indoors, monitoring the structural integrity of bridges, and measuring soil humidity for precision agriculture are only a ...
Wireless multi-hop local area networks use in general scheduling schemes that assume the network capacity to be known. Indeed in most of the throughput-optimal algorithms the sources are assumed to send at a rate within the capacity region. However, measur ...
Energy efficiency is a major design issue in the context of Wireless Sensor Networks (WSN). If the acquired data is to be sent to a far-away base station, collaborative beamforming performed by the sensors may help to distribute the communication load amon ...
Information-theoretic secrecy is combined with cryptographic secrecy to create a secret-key exchange protocol for wireless networks. A network of transmitters, which already have cryptographically secured channels between them, cooperate to exchange a secr ...