Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Modeling work in neuroscience can be classified using two different criteria. The first one is the complexity of the model, ranging from simplified conceptual models that are amenable to mathematical analysis to detailed models that require simulations in ...
Analysis of fringe patterns for the accurate estimation of phase and phase derivatives is of crucial importance in optical interferometry as these quantities provide important information on the physical parameters under study. A wide range of applications ...
This project presents the theoretical background in electrophysiology that is used as a basis in the development of numerical methods for the simulation of heart’s electrical activity. We discuss the mathematical models currently used in cardiac electrophy ...
Multi-user communication theory typically studies the fundamental limits of communication systems, and considers communication schemes that approach or even achieve these limits. The functioning of many such schemes assumes that users always cooperate, eve ...
Queues at signalized intersections are the main cause of traffic delays and travel time variability in urban networks. In this article, we propose a method to estimate queue profiles that are traffic shockwave polygons in the time-space plane describing th ...
This paper presents a game-theoretic model for the international negotiations that should take place to renew or extend the Kyoto protocol beyond 2012. These negotiations should lead to a self-enforcing agreement on a burden sharing scheme to realize the n ...
Wireless sensor networks (WNSs) are gradually evolving from a promising technology to a well-established reality in a large set of different domains. In order to fulfill the requirements of the specific scenario, a WSN must provide the right tradeoffs betw ...
We analyze resource allocation problems where N independent agents want to access C resources. Each resource can be only accessed by one agent at a time. In order to use the resources efficiently, the agents need to coordinate their access. We focus on dec ...
In mobile networks, authentication is a required primitive for most security protocols. Unfortunately, an adversary can monitor pseudonyms used for authentication to track the location of mobile nodes. A frequently proposed solution to protect location pri ...
The recently developed traffic signal control strategy known as traffic-responsive urban control (TUC) requires availability of a fixed signal plan that is sufficiently efficient under undersaturated traffic conditions. To drop this requirement, the well-k ...