Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Enhanced global connectivity, networks’ capacity to carry data, and increases in transmission speed already affect the way architectural practices work. With computer-assisted drafting (CAD) equipment now used by the overwhelming majority of architectural ...
This publication compiles the results of the SpaceWatch event 2008. The first edition has taken place in Lausanne on May 15th, 2008. The present book is composed of two parts. Part I presents the scientific comments on the press review highlighting the con ...
Comment mettre à disposition des enseignants les informations dont ils ont besoin pour bien enseigner au supérieur sans sombrer dans un guide de l’enseignant rébarbatif et indigeste. Après avoir cherché en vain quelque chose de convainquant, nous avons déc ...
Modern web sites commonly interact with third-party domains to integrate advertisements and generate revenue from them. To improve the relevance of advertisement, online advertisers track user activities online with third- party cookies. However, excessive ...
To avoid chaos and arbitrariness architects have traditionally looked for ways to structure buildings as wholes that can be factorised into parts. This approach to the nature of architecture is that of composition. After the Second World War, the world of ...
In RFID protocols, tags identify and authenticate themselves to readers. At Asiacrypt 2007, Vaudenay studied security and privacy models for these protocols. We extend this model to protocols which offer reader authentication to tags. Whenever corruption i ...
In this paper, we address the problem of privacy in video surveillance systems. More specifically, we consider the case of H.264/AVC which is the state-of-the-art in video coding. We assume that Regions of Interest (ROI), containing privacy-sensitive infor ...
Over the past twenty years, numerous infrastructure management systems have been developed to address gradual failure modes. Unfortunately the management of sudden failure modes within large infrastructure systems (principally: natural hazard induced failu ...
We present a novel peer-to-peer backup technique that allows computers connected to the Internet to back up their data cooperatively: Each computer has a set of partner computers, which collectively hold its backup data. In return, it holds a part of each ...
In this paper, we present a smart video surveillance system based on standard technologies and wired or wireless IP networking. The key novelty of the system is that it protects the privacy of people under surveillance. More specifically, a video analysis ...