Model-based synthesis of band moire images for authenticating security documents and valuable products
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
By means of Raman and photoluminescence measurements we have studied the effect of strain and confinement on the optical phonon spectrum of single InAs quantum wells. The frequency region of longitudinal optical phonons confined in both the InAs well and I ...
A biocompatible interface was constructed on a microchip by using the layer-by-layer (LBL) assembly of charged polysaccharides incorporating proteases for highly efficient proteolysis. The controlled assembly of natural polyelectrolytes and the enzyme-adso ...
RFID tags have very promising applications in many domains (retail, rental, surveillance, medicine to name a few). Unfortunately the use of these tags can have serious implications on the privacy of people carrying tagged items. Serious opposition from con ...
We address the problem of recognizing sequences of human interaction patterns in meetings, with the goal of structuring them in semantic terms. The investigated patterns are inherently group-based (defined by the individual activities of meeting participan ...
We address the problem of recognizing sequences of human interaction patterns in meetings, with the goal of structuring them in semantic terms. The investigated patterns are inherently group-based (defined by the individual activities of meeting participan ...
The present invention relies on the moiré patterns generated when superposing a base layer made of base band patterns and a revealing line grating (revealing layer). The produced moiré patterns comprise an enlargement and a transformation of the individual ...
A solid coated device is disclosed that has covalently attached a coating which comprises a first layer contg. first functional groups, to which first layer functional groups is covalently attached a second, linking layer carrying second functional groups, ...
Large scale systems are becoming more and more common today. Many distributed applications are emerging that use the capability of world-wide internetworking. Since many applications require availability and consistency in the presence of failures, an adeq ...
Mobile ad-hoc networking works properly only if the participating nodes cooperate in routing and forwarding. However, it may be advantageous for individual nodes not to cooperate. We propose a protocol, called CONFIDANT, for making misbehavior unattractive ...
The problem of secure key distribution has been the subject of much attention in recent years. This paper describes a novel method for authenticated key distribution in the distributed systems environment. In particular, a braiding technique for key distri ...