Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Cloud computing sets to make a change in business between enterprises over the Internet based on services providing dynamically reconfigurable and virtualized networks. It is difficult for an aircraft manufacturer to consider the performance and status of ...
Recent technological advances in mobile devices enable the connection of classrooms with other virtual and physical spaces. Some approaches aim at helping teachers carry out learning situations across such spaces. However, these proposals tend to be isolat ...
The operating system storage stack is an important software component, but it faces several reliability threats. The research community has come up with many solutions to address individual parts of this reliability problem. However, when considering the b ...
Motion control of bio-inspired mobile robotic platforms can prove a challenging problem. In particular, models for the considered type of systems may prove nonlinear, uncertain, and fairly complicated. To address these issues, use of an output predictor-ba ...
Crowdsourcing is becoming a popular cost effective alternative to lab-based evaluations for subjective quality assessment. However, crowd-based evaluations are constrained by the limited availability of display devices used by typical online workers, which ...
BACKGROUND AND PURPOSE: Intracranial stents have become extremely important in the endovascular management of complex intracranial aneurysms. Sizing and landing zone predictions are still very challenging steps in the procedure. Virtual stent deployment ma ...
We present a preliminary study of buffer overflow vulnerabilities in CUDA software running on GPUs. We show how an attacker can overrun a buffer to corrupt sensitive data or steer the execution flow by overwriting function pointers, e.g., manipulating the ...
This presentation introduced a novel method for creating immersive scenes for Virtual Reality based on physically-based renderings and discussed the potential and limitation of this method. ...
Recent works have explored the use of brain signals to directly control virtual and robotic agents in sequential tasks. So far in such brain-computer interfaces (BCI), an explicit calibration phase was required to build a decoder that translates raw electr ...
The problem of partitioning a dataflow program onto a target architecture is a difficult challenge for any application design. In general, since the problem is NP-complete, it consists of looking for high quality solutions in terms of maximizing the achiev ...