Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
An increasing number of mobile applications and services require that devices are aware of their location. Global navigation satellite systems (GNSS) are the predominant enabling technology. But location information provided by commercial GNSS is not secur ...
Climate change is a global phenomenon, but its effects occur on a local scale. An example is provided by tourism. Tourism is closely interlinked with climate change both as culprit and as victim. On the one hand, it is responsible for a large portion of GH ...
Effective and robust operations, as well as security and privacy are critical for the deployment of vehicular ad hoc networks (VANETs). Efficient and easy- to-manage security and privacy-enhancing mechanisms are essential for the wide-spread adoption of th ...
The characteristics of vehicular communication environments and their networking and application requirements have led to the development of unique networking protocols. They enable vehicle-to-vehicle and vehicle-to-infrastructure communication based on th ...
Tourism is one of the main sources of income in many Swiss Alpine regions. But this industry is highly sensitive to climate conditions. Then, tourism in the Alpine region is effectively affected (both positively and negatively) by climate change and people ...
How is vulnerability to climate change spatially distributed? Which are its causes and its effects? Which are the major climate change vulnerability hotspots in which the implementation of adaptation ...
An ephemeral network is usually defined by the very short-lived and heterogeneous nature of interactions among self-organizing wireless devices. The wide penetration in everyday gadgets of radio technologies operating in unlicensed frequency spectrum, such ...
This paper presents a technique that helps automate the reverse engineering of device drivers. It takes a closed-source binary driver, automatically reverse engineers the driver’s logic, and synthesizes new device driver code that implements the exact same ...
We identify vulnerabilities in epidemic forwarding. We address broadcast applications over wireless ad-hoc networks. Epidemic forwarding employs several mechanisms such as inhibition and spread control, and each of them can be implemented using alternative ...