Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In this thesis, we address the problem of face modelling by using dedicated statistical generative models, with an application to the face authentication task. Face authentication consists in either accepting or rejecting a user's claim supported by its fa ...
The ARMADILLO cryptographic primitive is a multi-purpose cryptographic primitive for RFID devices proposed at CHES’10. The main purpose of the primitive is to provide a secure authentication in a challenge-response protocol. It has two versions, named ARMA ...
In this paper, we analyze the first known provably secure Radio Frequency Identification (RFID) authentication schemes that are designed to provide forward untraceability and backward untraceability: the L-K and S-M schemes. We show how to trace tags in th ...
(La0.6Sr0.4)0.95FeO3-δ/ Sm0.2Ce0.8O2 (70:30 w/w) and (La0.6Sr0.4)0.995Co0.2Fe 0.8O3-δ/Gd0.1Ce0.9O 2 (50:50 w/w) cathodes screen printed on anode-supported cells were tested for 500 h under different conditions by using a Taguchi matrix that combined cathod ...
This paper applies inter-session variability modelling and joint factor analysis to face authentication using Gaussian Mixture Models. These techniques, originally developed for speaker authentication, aim to explicitly model and remove detrimental within- ...
HTTPS is the de facto standard for securing Internet communications. Although it is widely deployed, the security provided with HTTPS in practice is dubious. HTTPS may fail to provide security for multiple reasons, mostly due to certificate-based authentic ...
There is currently a lack of established calculation method for the geotechnical design of heat exchanger piles, although the technology is experiencing a fast expansion. Instead of quantifying the effects of temperature changes on the static behavior of h ...
(La0.6Sr0.4)(0.95)FeO3-delta/Sm0.2Ce0.8O2 (70:30, w/w) and (La0.6Sr0.4)(0.995)Co0.2Fe0.8O3-delta/Gd0.1Ce0.9O2 (50:50, w/w) cathodes screen printed on anode-supported cells were tested for 500h under different conditions by using a Taguchi matrix that combi ...
In this paper, a novel statistical generative model to describe a face is presented, and is applied to the face authentication task. Classical generative models used so far in face recognition, such as Gaussian Mixture Models (GMMs) and Hidden Markov Model ...
User identification and access control have become a high demand feature on mobile devices because those devices are wildly used by employees in corporations and government agencies for business and store increasing amount of sensitive data. This paper des ...