Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A novel design-for-test (DFT) method that requires minor modifications to the controller in the register-transfer level (RTL) description of a circuit is presented. The control/data flow graph representation of an RTL circuit is used for analysing the test ...
The present invention concerns a receiver and a method for retrieving data from Ultra wideband radio transmission signals received by a receiver and transmitted in packets containing at least a preamble known to the receiver and a payload containing data u ...
New multimedia embedded applications are increasingly dynamic, and rely on Dynamically-allocated Data Types (DDTs) to store their data. The optimization of DDTs for each target embedded system is a time-consuming process due to the large design space of po ...
The present invention concerns a receiver and a method for retrieving data from Ultra wideband radio transmission signals received by a receiver and transmitted in packets containing at least a preamble known to the receiver and a payload containing data u ...
Aerucyclamides C and D were isolated from the cyanobacterium Microcystis aeruginosa PCC 7806, and their structures established by NMR spectroscopy and chemical transformation and degradation. Acidic hydrolysis of aerucyclamide C (CF3CO2H, H2O) resulted in ...
A broadcasting system for communicating data to multiple receivers using information additive code includes one or more information additive code transmitters and one or more information additive code receivers. Each of the information additive code transm ...
We present an approach for finding errors in programs and specifications. We formulate our approach as an execution mechanism for a non-deterministic guarded-command language. Guarded commands have already proved useful for verification-condition generatio ...
We argue that the traditional notion of trust as a relation among entities, while useful, becomes insu±cient in ephemeral ad hoc networks. In this paper, we address the challenge of extending the traditional notion of trust to data-centric trust, that is, ...
We propose several methods for speeding up the processing of particle physics data on clusters of PCs. We present a new way of indexing and retrieving data in a high dimensional space by making use of two levels of catalogues enabling an efficient data pre ...
Many software model checkers are based on predicate abstraction. Values of variables in branching conditions are represented abstractly using predicates. The strength of this approach is its path-sensitive nature. However, if the control flow depends heavi ...