Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Unexpected disruptions occur for many reasons in railway networks and cause delays, cancellations, and, eventually,
passenger inconvenience. This thesis focuses on the railway timetable rescheduling problem from a macroscopic point of view
in case of lar ...
We propose an efficient remote biometric authentication protocol that gives strong protection to the user’s biometric data in case of two common kinds of security breaches: (1) loss or theft of the user’s token (smart card, handheld device, etc.), giving t ...
Biometrics already form a significant component of current and emerging identification technologies. Biometrics systems aim to determine or verify the identity of an individual from their behavioral and/or biological characteristics. Despite significant pr ...
We present an efficient, modular, and feature-rich framework for automated generation and validation of complex structures, suitable for tasks that explore a large space of structured values. Our framework is capable of exhaustive, incremental, parallel, a ...
User authentication is an important step to protect information and in this regard face biometrics is advantageous. Face biometrics is natural, easy to use and less human-invasive. Unfortunately, recent work revealed that face biometrics is quite vulnerabl ...
The need for automation of the identity recognition process for a vast number of applications resulted in great advancement of biometric systems in the recent years. Yet, many studies indicate that these systems suffer from vulnerabilities to spoofing (pre ...
With biometrics playing the role of a password which can not be replaced if stolen, the necessity of establishing counter- measures to biometric spoofing attacks has been recognized. Regardless of the biometric mode, the typical approach of anti-spoofing s ...
In this work we study periocular biometrics in a challenging scenario: a mobile environment, where person recognition can take place on a mobile device. The proposed technique, that models session variability, is evaluated for the authentication task on th ...
Following the definition of the task of the anti-spoofing systems to discriminate between real accesses and spoofing attacks, anti-spoofing can be regarded as a binary classification problem. The spoofing databases and the evaluation methodologies for anti ...
This dissertation describes a set of research projects that were conducted between 2012 and 2014 in order to answer the question how do computational ideas alter our understanding of place? Each project was produced in the context of the performing arts an ...