Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Website fingerprinting (WF) attacks can compromise a user’s online privacy, by learning network traffic patterns generated by websites through machine learning (ML) techniques. Such attacks remain unaffected by encryption and even defeat anonymity services ...
In this paper we study the properties of the quenched pressure of a multi-layer spin-glass model (a deep Boltzmann Machine in artificial intelligence jargon) whose pairwise interactions are allowed between spins lying in adjacent layers and not inside the ...
SPRINGER2020
, , , , , ,
In this article, we investigate the effect of prolonged light exposure on silicon heterojunction solar cells. We show that, although light exposure systematically improves solar cell efficiency in the case of devices using intrinsic and p-type layers with ...
Layer-by-layer manufacturing of composite mechanisms allows fast and cost-effective fabrication of customized robots in millimeter and centimeter scales which is promising for research fields that rely on frequent and numerous physical iterations. Due to t ...
The present invention concerns a single crystalline diamond optical element production method. The method includes the steps of: ‐ providing a single crystalline diamond substrate or layer; ‐ applying a mask layer to the single crystalline diamond substrat ...
The ever-growing number of edge devices (e.g., smartphones) and the exploding volume of sensitive data they produce, call for distributed machine learning techniques that are privacy-preserving. Given the increasing computing capabilities of modern edge de ...
The present disclosure concerns an excitonic device including at least one heterostructure comprising or consisting solely of a first two-dimensional material or layer and a second two-dimensional material or layer. The at least one heterostructure being c ...
The present disclosure concerns a Field-Effect Transistor device or sensor comprising at least one drain region, at least one source region, at least a channel region, at least a first gate connected to the channel region, at least one stack comprising at ...
Consensus protocol have seen increased usage in recent years due to the industry shift to distributed computing. However, it has traditionally been implemented in the application layer. We propose to move the consensus protocol in the transport layer, to o ...
Real-time control of electric grids is a novel approach to handling the increasing penetration of distributed and volatile energy generation brought about by renewables. Such control occurs in cyber-physical systems (CPSs), in which software agents maintai ...