Diffractive moire features for optically variable devices
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
A data storage medium (2) comprising a stacked plurality of layers (9), each layer composed of a layer material selected from a group comprising at least two different dielectric materials, adjacent layers being formed of different materials, and at least ...
Secure documents often comprise an information layer that is hard to reproduce. Moiré techniques for the prevention of counterfeiting rely on the superposition of an array of transparent lines or microlenses on top of a base layer containing hidden informa ...
Consensus protocol have seen increased usage in recent years due to the industry shift to distributed computing. However, it has traditionally been implemented in the application layer. We propose to move the consensus protocol in the transport layer, to o ...
Moiré effects result from the superimposition of repetitive structures. The beauty of these moirés comes from the fact that macroscopic shapes seem to appear from the superposition of layers containing microscopic patterns. In addition, the moirés are dyna ...
A composite multi-layer textile (1), comprising at least one nanofibre layer (11) with nanofibres with diameters below 100nm and one support layer (12) with microfibres with diameters below three microns, wherein the layers (11, 12) were produced by electr ...
Real-time control of electric grids is a novel approach to handling the increasing penetration of distributed and volatile energy generation brought about by renewables. Such control occurs in cyber-physical systems (CPSs), in which software agents maintai ...
Website fingerprinting (WF) attacks can compromise a user’s online privacy, by learning network traffic patterns generated by websites through machine learning (ML) techniques. Such attacks remain unaffected by encryption and even defeat anonymity services ...
Poly(2-hydroxyethyl methacrylate) (PHEMA) and poly(poly(ethylene glycol) methacrylate) (PPEGMA) brushes represent a class of thin, surface-tethered polymer films that have been extensively used e.g. to generate non-biofouling surfaces or as model systems t ...
By the end of 2013, the number of internet-connected mobile devices is expected to exceed that of humans. Omnipresent and context-aware, mobile devices enable people to communicate and exchange data anytime and almost anywhere. The myriad of ”digital footp ...
The technical community has so far defined network neutrality in terms of specific mechanisms, e.g., policing or shaping. We argue that these definitions are problematic: according to them, a non-neutral network may be preferable (for all users) to a neutr ...