Method for transmitting payment information between a terminal and a third equipment
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no ...
The central idea behind this attempt is to merge common objects and robotics to obtain a new type of interactive artefact, we call robjects. Robjects provide services to everyday life and can be controlled by the user in a very intuitive way. Robjects take ...
Visual markers are graphic symbols designed to be easily recognised by machines. They are traditionally used to,track goods, but there is increasing interest in their application to mobile HCI. By scanning a visual marker through a camera phone, users can ...
Acm Order Department, P O Box 64145, Baltimore, Md 21264 Usa2009
In this paper we describe an exploratory study of a mobile cosmetic advisory system that enables women to select appropriate colors of cosmetics. This system is intended for commercial use to address the problem of foundation color selection. Although wome ...
This paper reports on results from a field experiment using a pervasive game that aims at eliciting the influence of location-awareness of others in a mobile and collaborative task. We present the environment as well as first results concerning how differe ...
The presentation reports upon the conception and realization of a miniature very low-power microcamera system that has been embedded in a wristwatch so as to enable the spontaneous capture of photographs in everyday life based on timekeeping devices the us ...
Ad hoc network users are resource constrained: Before transmitting data, they have to take into account the energy expenditure involved. Even if a user is, in principle, willing to spend energy to improve network connectivity, his actual decision will be h ...
During the last decade, the number of wireless devices like digital organizers, mobile phones and laptop computers has drastically increased. At the same time, several technologies, like Bluetooth, GPRS, or WiFi have become mature and offer a high-performa ...
Computers have become affordable, small, omnipresent and are often connected to the Internet. However, despite the availability of such rich environments, user interfaces have not been adapted to fully leverage their potential. In our view, user interfaces ...
The purpose of this demonstration is to illustrate that an off-the-shelf Wireless Sensor and Actuator Network (WSAN) can be used to discover resource availability and guide mobile users to these resources without any support from a navigation system like G ...