Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
This protocol describes how in vivo-imaged dendrites and axons in adult mouse brains can subsequently be prepared and imaged with focused ion beam scanning electron microscopy (FIBSESEM). The procedure starts after in vivo imaging with chemical fixation, f ...
In multiview applications, camera views can be used as reference views to synthesize additional virtual viewpoints, allowing users to freely navigate within a 3D scene. However, bandwidth constraints may restrict the number of reference views sent to clien ...
Many scientific applications are iterative and specify repetitive communication patterns. This paper shows how a parallel-language compiler and a predictive cache-coherence protocol in a distributed shared memory system together can implement shared-memory ...
This article describes how to reliably electroporate with DNA plasmids rodent neuronal progenitors of the hippocampus; the motor, prefrontal and visual cortices; and the cerebellum in utero. As a Protocol Extension article, this article describes an adapta ...
In this paper, we compare the performance of two multiple-writer protocols based on lazy release consistency. In particular, we compare the performance of Princeton’s home-based protocol and TreadMarks’ protocol on a 32-processor platform. We found that th ...
Disulfide bridges play a crucial role in defining and rigidifying the three-dimensional structure of peptides. However, disulfides are inherently unstable in reducing environments. Consequently, the development of strategies aiming to circumvent these defi ...
Current charging mechanisms in the Internet are restricted mainly to volume and time of the day. We propose a mechanism which allows to use additional information for charging in the edges and core of the network. Links or network clouds will have weights ...
Current anonymous communication systems make a trade-off between weak anonymity among many nodes, via onion routing, and strong anonymity among few nodes, via DC-nets. We develop novel techniques in Dissent, a practical group anonymity system, to increase ...
Ranking in scientific publication databases involves a variety of additional resources that are usually not applied in standard general purpose search engines. Moreover, community-specific expectations of users influence the perception of the adequacy of r ...
In this paper, we present a query-driven indexing/retrieval strategy for efficient full text retrieval from large document collections distributed within a structured P2P network. Our indexing strategy is based on two important properties: (1) the generate ...