Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Embedded cryptographic systems, such as smart cards, require secure implementations that are robust to a variety of low-level attacks. Side-Channel Attacks (SCA) exploit the information such as power consumption, electromagnetic radiation and acoustic leak ...
Iterative Adaptation is a novel approach to adaptation for resource-limited mobile and wireless environments that supports powerful application-specific adaptations without requiring modifications to the application's source code. Common productivity appli ...
Brain activity elicited by visually presented words was investigated using behavioral measures and current source densities calculated from high-resolution EEG recordings. Verbs referring to actions usually performed with different body parts were compared ...
This research aims at developing a hybrid choice model (HCM) where a perceptional variable is measured by means of adjectives reported by individuals. Due to the qualitative nature of adjectives, the main challenges of the study involve their quantificatio ...
This research aims at developing a hybrid choice model (HCM) where a perceptional variable is measured by means of adjectives reported by individuals. Due to the qualitative nature of adjectives, the main challenges of the study involve their quantificatio ...
As humans appear to be literally wired for social interaction, it is not surprising to observe that social aspects of human behavior and psychology attract interest in the computing community as well. The gap between social animal and unsocial machine was ...
This work proposes a new approach to the retrieval of images from text queries. Contrasting with previous work, this method relies on a discriminative model: the parameters are selected in order to minimize a loss related to the ranking performance of the ...
A method and apparatus for efficient list decoding of Reed-Solomon error correction codes. A polynomial for a predetermined target list size combining points of an error code applied to a message and points of a received word is determined for a k dimensio ...
This thesis belongs to the general discipline of establishing black-box models from real-word data, more precisely, from measured time-series. This is an old subject and a large amount of papers and books has been written about it. The main difficulty is t ...
This work proposes a new approach to the retrieval of images from text queries. Contrasting with previous work, this method relies on a discriminative approach: the parameters are selected in order to minimize a loss related to the ranking performance of t ...