Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The pursuit of software security and reliability hinges on the identification and elimination of software vulnerabilities, a challenge compounded by the vast and evolving complexity of modern systems. Fuzzing has emerged as an indispensable technique for b ...
EPFL2024
,
Biphoton frequency combs (BFCs) are promising quantum sources for large-scale and high-dimensional quantum information and networking systems. In this context, the spectral purity of individual frequency bins will be critical for realizing quantum networki ...
AMER PHYSICAL SOC2023
,
Functional magnetic resonance imaging (fMRI) in mouse brain, paired with spatially and temporally defined manipulations, offers a powerful tool to causally explain the effect of specific neuronal activity on brain network dynamics. Here, we present an opti ...
A photochemical [2+2] cycloaddition of alkynyl boronates and maleimides is reported. The developed protocol provided 35–70 % yield of maleimide-derived cyclobutenyl boronates and demonstrated wide compatibility with various functional groups. The synthetic ...
Computational protein design has emerged as a powerful tool capable of identifying sequences compatible with pre-defined protein structures. The sequence design protocols, implemented in the Rosetta suite, have become widely used in the protein engineering ...
HfC has been very under-investigated due to its rarity and synthesising difficulty. Its potential for MEMS and NEMS applications has been recognized and is the object of an ongoing feasibility study for production since 2022. We continue on this impulse by ...
Secure retrieval of data requires integrity, confidentially, transparency, and metadata-privacy of the process. Existing protection mechanisms, however, provide only partially these properties: encryption schemes still expose cleartext metadata, protocols ...
Although encryption hides the content of communications from third parties, metadata, i.e., the information attached to the content (such as the size or timing of communication) can be a rich source of details and context. In this dissertation, we demonstr ...
In order to effectively utilize results from quasi-static cyclic testing on structural components for the earthquake-induced collapse risk quantification of structures, the need exists to establish collapse-consistent loading protocols representing the asy ...
Investigative studies of white matter (WM) brain structures using diffusion MRI (dMRI) tractography frequently require manual WM bundle segmentation, often called "virtual dissection." Human errors and personal decisions make these manual segmentations har ...