Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A rapid acquisition method for two-dimensional (2D) magnetic resonance force microscopy images is described. Spatial resolution is based on gradients in the static magnetic field B0 and in the applied radiofrequency field B1. Hadamard- and Fourier-encoding ...
The idea to use error-correcting codes in order to construct public key cryptosystems was published in 1978 by McEliece [ME1978]. In his original construction, McEliece used Goppa codes, but various later publications suggested the use of different familie ...
A theoretical and experimental analysis of optical pulse coding techniques applied to distributed optical fiber temperature sensors based on spontaneous Brillouin scattering using the Landau-Placzek ratio (LPR) scheme is presented, quantifying in particula ...
A distributed temperature sensor based on spontaneous Brillouin scattering and employing optical pulse coding has been implemented and characterized using a direct-detection receiver. The signal-to-noise ratio (SNR) enhancement provided by coding is analyz ...
Institute of Electrical and Electronics Engineers2008
It is well-known that random error-correcting codes achieve the Gilbert-Varshamov bound with high probability. In [2], the authors describe a construction which can be used to yield a polynomially large family of codes of which a large fraction achieve the ...
We present a structural attack against the Sidelnikov cryptosystem. The attack creats a private key from a give public key. Its running time is subexponential and it is effective if the parameters of the Reed-Muller code allow for efficient sampling of min ...
Among advanced electronic designs, vision systems are perhaps those that have undergone the most dramatic technological revolutions of the last decades. Recently, a new family of vision systems has emerged aimed at three-dimensional (3D) imaging. Many appl ...
Designs for transmit alphabet constrained spacetime codes naturally lead to questions about the design of rank distance codes. Recently, diversity embedded multi-level space-time codes for flat fading channels have been designed by using sets of binary mat ...
It is shown that a correlation inequality of statistical mechanics can be applied to linear low-density parity-check codes. Thanks to this tool we prove that, under a natural assumption, the exponential growth rate of regular low-density parity-check (LDPC ...
Institute of Electrical and Electronics Engineers2007
Designs for transmit alphabet constrained space-time codes naturally lead to questions about the design of rank distance codes. Recently, diversity embedded multi-level space-time codes for flat fading channels have been designed by using sets of binary ma ...