Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
I did not use WeChat as my main method or main source of materials, but I realized that during my fieldwork in China, I did use WeChat very often to help me collect data, and I see the potential of using WeChat as an increasingly important method for furth ...
We derive an optimization framework for computing a view selection policy for streaming multi-view content over a bandwidth constrained channel. The optimization allows us to determine the decisions of sending the packetized data such that the end-to-end r ...
The participatory sensing paradigm, through the growing availability of cheap sensors in mobile devices, enables applications of great social and business interest, e.g., electrosmog exposure measurement and early earthquake detection. However, users' priv ...
In peer-to-peer content delivery systems, such as BitTorrent, there may exist nodes that are non-cooperative and do not contribute their upload bandwidth to the system while still downloading content from others. The current widely used countermeasures aga ...
With the latest development of multimedia computing technologies, many different services have been provided and many different devices have been deployed. A diversity of media content formats have emerged in various applications. Multimedia delivery has b ...
In the first part, we first introduce steganography (in chapter 1) not in the usual context of information security, but as a method to piggyback data on top of some content. We then focus on audio steganography and propose a new steganographic scheme in c ...
In parallel to their most frequent application as an auxiliary dam spillway, piano key weirs (PKWs) are also installed on low-head barrages in combination with run-off-the-river power plants. Their efficient rating curve, advantageous behavior under driftw ...
This paper presents a search and retrieval framework that enables the management of Intellectual Property in the World Wide Web. This twofold framework helps users to detect digital rights infringements of their copyrighted content. In order to detect poss ...
In this thesis, a simple law of adhesion with "digital" decohesion is proposed for modeling unilateral contact with adhesion, together with a stable experiment based on an original axisymmetric epoxy-stamp on glass-disc specimen for measuring the relevant ...
Media content distribution constitutes a growing share of the services on the Internet. In recent years methods for cooperative media distribution has been a research area with high activity. Concurrently wireless internet connections have emerged. Wireles ...