Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In underwater sensor networks (UWSNs), one of the main concerns is to reduce the energy consumption in order to maximize the lifetime. This work focuses on multiple sensor networks governed by different authorities. If the authorities are willing to cooper ...
We introduce Markov Decision Evolutionary Games with N players, in which each individual in a large population interacts with other randomly selected players. The states and actions of each player in an interaction together determine the instantaneous payo ...
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact times between nodes are short and neighbors change frequently - reputations ...
We study the behavior of users in a classical Additive White Gaussian Noise Multiple Access Channel. We model users as rational entities whose only interest is to maximize their own communication rate, and we model their interaction as a noncooperative one ...
Computational models of biological systems aim at accurately simulating in vivo phenomena. They have become a very powerful tool enabling scientists to study complex behavior. A side effect of their success Unfortunately exists and is observed as an increa ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2008
In mobile networks, authentication is a required primitive of the majority of security protocols. However, an adversary can track the location of mobile nodes by monitoring pseudonyms used for authentication. A frequently proposed solution to protect locat ...
We apply gene expression programing to evolve a player for a real-time strategy (RTS) video game. The paper describes the game, evolutionary encoding of strategies and the technical implementation of experimental framework. In the experimental part, we com ...
In this paper, the bit error rate (BER) performance for an ultra-wide bandwidth (UWB) impulse radio in an additive white Gaussian noise (AWGN) transmission channel and with Gaussian jitter is estimated. The assumed receiver combines the received pulses to ...
This paper proposes a dynamic-game theoretic model for the international negotiations that should take place to agree on a global mitigation scheme when the real extent of climate change due to anthropogenic emissions is known. The model assumes a non-coop ...
Laboratoire de recherche en économie et management de l'environnement2005
The intestine is today still an organ whose mechanisms of functions are not fully understood. The diffculty in its understanding comes from the fact that it is regulated by a complex network of signals of different natures. Granting that a multitude of exp ...