Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In this paper we present a novel approach to location obfuscation for location privacy purposes. The motivating observation is that obfuscation strategies only grounded on geometric criteria can lead to privacy leaks. We thus propose to complement geometry ...
The emerging technology of vehicular communications (VC) raises a number of technical problems that need to be addressed. Among those, security and privacy concerns are paramount for the wide adoption of VC. In this position paper, we are concerned with pr ...
RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious implications on the privacy of people carrying tagged items. Serious opposition from con ...
The biggest challenge for RFID technology is to provide benefits without threatening the privacy of consumers. Many solutions have been suggested but almost as many ways have been found to break them. An approach by Ohkubo, Suzuki and Kinoshita using an in ...
"Where are you?". This recurring question when opening a mobile conversation attests the importance of spatialisation in social interactions. More and more applications support mutual location-awareness: they enable members of a group to locate their partn ...
In this paper we seek to empirically study the use of location-awareness of others in the context of mobile collaboration. We report on a field experiment carried out using a pervasive game we developed called CatchBob!. Using both quantitative and qualita ...
In several industrial case studies, we put in evidence that microsystem manufacturing costs skyrocket because of low yields. Sometimes product functionalities are badly defined ; sometimes metrology systems, in spite of their high cost, happen not to measu ...
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the spam phenomenon. Our solution does not require changes to the email infrast ...
Building ubiquitous applications that exploit location requires both low-level underlying infrastructure for linking sensors and managing spatial information and also high-level representation of the measured space to produce a pleasant user experience. Ho ...
This contribution presents an ongoing study focused on how location awareness feature modifies collaboration in the context of mobile computing. First it describes the environment we designed and implemented in the form of a mobile game called CatchBob!. T ...