Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Trojan messages are messages that seem correct to the receiver but cannot be generated by any correct sender. Such messages constitute major vulnerability points of a distributed system---they constitute ideal targets for a malicious actor and facilitate f ...
Over the past 40 years, hard disks, the traditional building block of storage systems, have become increasingly slower when compared to the other system components such as the main memory and the CPU. Hard disks face mechanical constraints that cause their ...
The security of supply is becoming an important concern in the energy supply of the railway networks operated at 16.7âHz. This situation calls for the improvement of the interconnection with the 50âHz grid and creates a need for ancillary services, esp ...
The celebrated distributed computing approach for building systems and services using multiple machines continues to expand to new domains. Computation devices nowadays have additional sensing and communication capabilities, while becoming, at the same tim ...
The Cloud trend is an attempt to leverage economics of scale in the domain of computing resources. Unfortunately, this often means losing control of the lower levels of a computer system, and exposing users to new threat vectors. These threats may be signi ...
To increase their dependability, distributed control systems (DCSs) need to agree in real time about crashed hosts, i.e., they need a real-time membership service. In this paper, we prove that such a service cannot be implemented deterministically if, besi ...
New miniaturization and integration capabilities made available from the emerging MEMS technology allow for the design of artificial linings involving distribution of a large number of elementary cells, that may be composed of loudspeakers and microphones. ...
To increase their dependability, distributed control systems (DCSs) need to agree in real time about which hosts have crashed, i.e., they need a real-time membership service. In this paper, we prove that such a service cannot be implemented deterministical ...
Modern data storage systems are extremely large and consist of several tens or hundreds of nodes. In such systems, node failures are daily events, and safeguarding data from them poses a serious design challenge. The focus of this thesis is on the data rel ...
As part of the transition to a future power grid, distribution systems are undergoing profound changes evolving into Active Distribution Networks (ADNs). The presence of dispersed generation, local storage systems and responsive loads in these systems incu ...