Méthode de libération d'une pièce micromécanique et pièce micromécanique comprenant des attaches sacrificielles
Publications associées (98)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Human behaviour plays an important role in the spread of infectious diseases, and understanding the influence of behaviour on the spread of diseases can be key to improving control efforts. While behavioural responses to the spread of a disease have often ...
Developing modern software applications typically involves composing functionality from existing libraries. This task is difficult because libraries may expose many methods to the developer. To help developers in such scenarios, we present a technique that ...
Developing modern software applications typically involves composing functionality from existing libraries. This task is difficult because libraries may expose many methods to the developer. To help developers in such scenarios, we present a technique that ...
In this paper, we present an application of RFIDs for supply-chain management. In our application, we consider two types of readers. On one part, we have readers that will mark tags at given points. After that, these tags can be checked by another type of ...
Over the past decades, an increasing number of integral bridges have been built. This type of bridge offers various advantages in comparison with standard bridges equipped with expansion joints and bearings. In particular, integral bridges require less mai ...
EPFL Doctoral conference in Mechanics - EDCM20102010
We present Phantm, a static analyzer that uses a flow-sensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runtime information and procedure summaries for more precise results. Phantm foun ...
A common technique to by-pass 2-D face recognition systems is to use photographs of spoofed identities. Unfortunately, research in counter-measures to this type of attack have not kept-up - even if such threats have been known for nearly a decade, there se ...
We present Phantm, a static analyzer that uses a flow-sensitive analysis to detect type errors in PHP applications. Phantm can infer types for nested arrays, and can leverage runtime information and procedure summaries for more precise results. Phantm foun ...
Integrated circuit Hall sensor system comprising a plurality of elementary blocks (EB), each elementary block including a Hall cell (4), a differential pair (8) of an input stage of a Differential Difference Amplifier (DDA), and terminals (12a, 12b), where ...
This work constitutes the first extended analysis of the spatial structure of Type-I ELM filament footprints on the JET outer limiters and upper dump plates. The data is obtained using a wide angle infrared diagnostic (with time resolution of 125 Hz) and c ...