Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Many state-machine Byzantine Fault Tolerant (BFT) protocols have been introduced so far. Each protocol addressed a different subset of conditions and use-cases. However, if the underlying conditions of a service span different subsets, choosing a single pr ...
Structural T1-weighted magnetic resonance imaging (MRI) provides sufficient anatomical details to measure and track changes in volumes of brain structures. The volumes of brain structures and changes in them can be used to study the effects of disease, tre ...
Provably secure distance-bounding is a rising subject, yet an unsettled one; indeed, very few distance-bounding protocols, with formal security proofs, have been proposed. In fact, so far only two protocols, namely SKI (by Boureanu et al.) and FO (by Fisch ...
A copper-catalyzed oxyalkylation of allylic alcohols using nonactivated alkyl nitriles as reaction partners was developed. A sequence involving generation of an alkyl nitrile radical followed by its addition to a double bond and a copper-mediated formation ...
A copper-catalyzed alkylation of allylic alcohols by alkyl nitriles with concomitant 1,2-aryl migration was developed. Formation of the alkyl nitrile radical was followed by its intermolecular addition to alkenes and the migration of a vicinal aryl group w ...
A computing system that uses a Scale-Out NUMA (“soNUMA”) architecture, programming model, and/or communication protocol provides for low-latency, distributed in-memory processing. Using soNUMA, a programming model is layered directly on top of a NUMA memor ...
Smartcard-based protocols represent an increasingly large share of the wireless authentication market, from contactless payments to remote car unlocking. Unfortunately, relay attacks pose a significant threat to these wireless solutions. However, this risk ...
All wireless devices must comply with the local radio regulations which are set by international and national regulatory bodies such as the European Telecommunication Standardization Institute (ETSI) for Europe and the Federal Commission for Communication ...
The actor model has been a model of choice for building reliable distributed systems. On one hand, it ensures that message-processing is serialized within each actor, preserving the familiar sequential programming model. On the other hand, programs written ...
Given a system with n>3t+1 processes, where t is the tolerated number of faulty ones, we present a fast asynchronous Byzantine agreement protocol that can reach agreement in O(t) expected running time. This improves the O(n2) expected running ...