Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The central idea behind this attempt is to merge common objects and robotics to obtain a new type of interactive artefact, we call robjects. Robjects provide services to everyday life and can be controlled by the user in a very intuitive way. Robjects take ...
Tamper-proof devices are pretty powerful. They typically make security applications simpler (provided that the tamper-proof assumption is not violated). For application requiring privacy, we observe that some properties may become harder (if possible at al ...
The invention pertains to the field of methods for estimating source signals from a multichannel mixture signal, and the aim of the invention is to carry out a reliable estimation of the properties of source signals without necessarily requiring prior info ...
New network types require new security concepts. Surprisingly, trust – the ultimate goal of security – has not evolved as much as other concepts. In particular, the traditional notion of building trust in entities seems inadequate in an ephemeral environme ...
Computer keyboards are often used to transmit confidential data such as passwords. Since they contain electronic components, keyboards eventually emit electromagnetic waves. These emanations could reveal sensitive information such as keystrokes. The techni ...
We develop an information-theoretic framework for the quantitative assessment of the maximum amount of information provided by optical coherence imaging through scattering media. We use our approach to investigate the fundamental dependence of the extracta ...
Tamper-proof devices are pretty powerful. They can be used to have better security in applications. In this work we observe that they can also be maliciously used in order to defeat some common privacy protection mechanisms. We propose the theoretical mode ...
Closed-loop supply chains (CLSC) consider all of the activities in the lifecycle of a product from design to end-of-life operation. These chains encompass, in addition to the traditional forward flow of products to customers, the acquisition and return flo ...
Embedded systems are an established part of life. Their security requirements underline the importance of properly formulated, implemented, and enforced security policies throughout their life-cycle. Currently, security is just an afterthought, and most so ...
We propose a novel framework for measuring and evaluating location privacy preserving mechanisms in mobile wireless networks. Within this framework, we first present a formal model of the system, which provides an efficient representation of the network us ...