Robert Maillart's Key Methods From the Salginatobel Bridge Design Process (1928)
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
As the world becomes more interdependent and computing grows more collaborative, there is a need for new abstractions and tools to help users work together. We recently introduced entangled queries – a mechanism for information exchange between database qu ...
Sustainability issues are increasingly taking more prominent positions in the hierarchy of design decisions. The combination of linked digital analysis and parametric design has emerged as an integrated method of assimilating performative characteristics i ...
Computer Aided Architectural Design Research In Asia2011
Simulation is a key issue in the design of control electrical systems. Simulation packages using component library, such as PSIM®, are very useful to achieve this goal. The simulation model is thus easily built from the system topology (structural model). ...
The promotion of tubular structures in bridge construction is a meaningful goal since these are aesthetic, lead to structurally efficient systems as well as sustainable ones. Good fatigue design of the tubular superstructure is a key factor to ensure safet ...
Recently, two e-mail protocols were proposed claiming to provide perfect secrecy. These protocols use authentication and (Diffie-Hellman) key-exchange techniques, and as such, other standard security criteria besides perfect forward secrecy include key-rep ...
The main contribution of this paper is a new iterated secret- key block cipher called 3D, inspired by the AES cipher. The 3D cipher has an SPN design, operates on 512-bit blocks, uses 512-bit keys, it- erates 22 rounds, and employs a 3-dimensional state, i ...
Biosensors are heterogenous devices, incorporating biological struc- tures combined with electronics, optical or other readout systems. They have been developed for detecting different biomolecules and/or pathogens and represent a key technology for advanc ...
The Cu-catalyzed synthesis of skipped 1,4-dienes from allylic acetates and vinyl-Grignard reagents is key to bidirectional modifications of acyclic terpene acetates. As a result, trisubstituted double bond containing subunits can be readily transferred int ...
We are interested in developing real-time applications such as games or virtual prototyping that take advantage of the user full-body input to control a wide range of entities, from a self-similar avatar to any type of animated characters, including virtua ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2010
Due to daylight variability, a design cannot be thoroughly assessed using single-moment simulations, which is why we need dynamic performance metrics like Daylight Autonomy and Useful Daylight Illuminance. Going one step further, the annual variation in pe ...