Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In this paper some effects of dynamical coupling between two interaction-carrying vectors on the internal auto- and cross-correlation functions are investigated in the limit of small amplitude motions. A linearized Langevin approach allows the derivation o ...
Securing ad hoc networks is notoriously challenging, notably due to the lack of an on-line infrastructure. In particular, key management is a problem that has been addressed by many researchers but with limited results. In this paper, we consider the case ...
Securing ad hoc networks is notoriously challenging, notably due to the lack of an on-line infrastructure. In particular, key management is a problem that has been addressed by many researchers but with limited results. In this paper, we consider the case ...
In this paper, we present an original non-linear subdivision scheme suitable for univariate data, plane curves and discrete triangulated surfaces, while keeping the complexity acceptable. The proposed technique is compared to linear subdivision methods hav ...
During the last 20 years, the joint expansion of computing power, computer graphics, networking capabilities and multiresolution analysis have stimulated several research domains, and developed the need for new types of data such as 3D models, i.e. discret ...
We consider unicast equation-based rate con-trol, where, at some points in time, a sender adjusts its rate to f(p,r), where p is an on-line estimate of the loss-event rate observed by this source, r of the average round-trip time, and f is a TCP throughput ...
The use of the low voltage power network for data transmission can produce radiated disturbances. In order to determine field limits when using this technique and methods to check this limit, a procedure must be defined and a standard must be written. The ...
Although a rigorous definition of growth-limiting substrate relies on a kinetic anal., a simple stoichiometric anal. based on the calcn. of the conversion is more applicable. Anal. of single and dual limitations is based on a simulated example for a substr ...
The method of invariant manifold is developed for a derivation of reduced description in kinetic equations of dilute polymeric solutions. It is demonstrated that this reduced description becomes universal in the limit of small Deborah and Weissenberg numbe ...
This paper examines a number of chaos shift keying methods Different approaches for the optimization of the transmitter and the receiver (based on statistical arguments) are compared through simulation. Based on the results, The tradeoff between computatio ...