Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Over a five-month time window between March and July 2020, scientists deployed two small uncrewed aircraft systems (sUAS) to the central Arctic Ocean as part of legs three and four of the MOSAiC expedition. These sUAS were flown to measure the thermodynami ...
Dehydration is a frequent condition in the elderly and can lead to serious health complications if not compensated timely. Early diagnosis can be problematic, as medical examinations in the hospital would be needed. Fully wearable low-cost multisensing dev ...
Digital technology has become an integral part of our lives, offering various benefits from communication and entertainment to education and productivity. However, its pervasive use has also raised concerns about its potential negative impact on users' wel ...
Integrating low-power wearable systems into routine health monitoring is an ongoing challenge. Recent advances in the computation capabilities of wearables make it possible to target complex scenarios by exploiting multiple biosignals and using high-perfor ...
2024
,
In confidential computing, the view of the system software is Manichean: the host operating system is untrusted and the TEE runtime system is fully trusted. However, the runtime system is often as complex as a full operating system, and thus is not free fr ...
ACM2023
,
Succinct zero knowledge proofs (i.e. zkSNARKs) are powerful cryptographic tools that enable a prover to convince a verifier that a given statement is true without revealing any additional information. Their attractive privacy properties have led to much ac ...
Berkeley2023
Nowadays mobile phones have become indispensable, as they have been endowed with many of the capabilities that a user was able to achieve previously with the help of PCs only. Among the functions that mobile phones perform we identify audio and video calls ...
POLYTECHNIC UNIV BUCHAREST2022
,
The integration of information technologies into medical systems has led to an increase in digitalization, which results in enormous possibilities, but also challenges in system development. The ever-growing complexity of modern medical devices (MD) requir ...
2023
, ,
Background: Cardiac output is essential for patient management in critically ill patients. The state-of-the-art for cardiac output monitoring bears limitations that pertain to the invasive nature of the method, high costs, and associated complications. Hen ...
FRONTIERS MEDIA SA2023
, ,
Double-fetch bugs are a plague across all major operating system kernels. They occur when data is fetched twice across the user/kernel trust boundary while allowing concurrent modification. Such bugs enable an attacker to illegally access memory, cause den ...