Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Existing loading protocols for quasi-static cyclic testing of structures are based on recordings from regions of high seismicity. For regions of low to moderate seismicity they overestimate imposed cumulative damage demands. Since structural capacities are ...
Some of the routing protocols used in telecommunication networks route traffic on a shortest path tree according to configurable integral link weights. One crucial issue for network operators is finding a weight function that ensures a stable routing: when ...
A wireless sensor network (WSN) is built of two types of nodes: regular sensor nodes and base stations. The regular sensor nodes monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and cooperatively pass their data thro ...
Based on tamper-evident devices, i.e., a type of distinguishable, sealed envelopes, we put forward weak bit-commitment protocols which are UC-secure. These commitments are weak in that it is legitimate that a party could cheat. Unlike in several similar li ...
This paper deals with the development of loading protocols appropriate for cyclic testing in regions of low to moderate seismicity in Europe. To serve this goal, cumulative damage demands imposed by a set of 60 ground motion records, representative of a Eu ...
This paper discusses the development of drift-based and dual-parameter fragility curves for steel braces as part of concentrically braced frames designed in seismic regions. The experimental results from 24 different research programs are compiled into a d ...
In this paper we examine mobile ad-hoc networks (MANET) composed by unmanned aerial vehicles (UAVs). Due to the high-mobility of the nodes, these networks are very dynamic and the existing routing protocols partly fail to provide a reliable communication.W ...
In many networks, it is less costly to transmit a packet to any node in a set of neighbors than to one specific neighbor. This observation was previously exploited by opportunistic routing protocols by using single-path routing metrics to assign to each no ...
In sensor networks, a key efficiency measure for routing protocols is the stretch of the computed paths, where the stretch is the ratio of the path length and the Euclidean distance covered. In the literature, many protocols have been evaluated via extensi ...
The technological advancement in the area of wireless networking is ultimately envisioned to reach complete and seamless ubiquity, where every point on earth will need to be covered by Internet access. Low connectivity environments have emerged as a major ...