You are here Homepage chevron_right News & events chevron_right ETH News chevron_right All articles chevron_right 2017 chevron_right October 2017 chevron_right How much does life weigh? ETH researchers have developed a scale for measuring cells. It allows the weight of individual living cells, and any changes in this weight, to be determined quickly and accurately for the first time. The invention
A dependent function type describes functions where the result type may depend on the function's parameter values. Example: trait Entry { type Key; val key: Key } def extractKey(e: Entry): e.Key = e.key // a dependent method val extractor: (e: Entry) => e.Key = extractKey // a dependent function value // ║ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ⇓ ║ // ║ Dependent ║ // ║ Function Type ║ // ╚═══════════════════╝ Scala already
Breadcrumb navigation EPFL STI Microelectronic Systems Laboratory Language switcher English The Microelectronic Systems Laboratory (LSM) at EPFL operates as a part of the Institute of Electrical Engineering (IEL), concentrating its activities on the design and implementation of high-performance digital and mixed-signal VLSI circuits, language-based modeling and validation of SoC components, neurom
Two Approaches to Portable Macros Fengyun Liu EPFL fengyun.liu@epfl.ch Eugene Burmako Twitter, Inc. eburmako@twitter.com Abstract For any programming language that supports macros and has multiple implementations (each with different AST def- initions), there is a common problem: how to make macros that operate on ASTs portable among different compiler imple- mentations? Implementing portable macr
POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES acceptée sur proposition du jury: Prof. J. R. Larus, président du jury Prof. M. Odersky, directeur de thèse Dr D. Syme, rapporteur Prof. S. Tobin-Hochstadt, rapporteur Prof. V. Kuncak, rapporteur Unification of Compile-Time and Runtime Metaprogramming in Scala THÈSE NO 7159 (2017) ÉCOLE POLYTECHNIQUE FÉDÉRALE DE LAUSANNE PRÉSENTÉE LE 6 MARS 2017 À L
We study the effects of the Internet, especially with respect to routing on public Blockchains, taking Bitcoin as our use case. To that end, we first uncover the impact that Internet routing attacks (such as BGP hijacks) and malicious Internet Service Providers (ISP) can have on Bitcoin (see paper). Next, we provide a concrete relay design that guarantees connectivity to the Bitcoin network even i
Studies in Contemporary History and Security Policy Volume 10, © Peter Lang, Bern 2002. Strategie ohne Aussenpolitik Zur Entwicklung der schweizerischen Sicherheitspolitik im Kalten Krieg Christoph Breitenmoser edited by Kurt R. Spillmann and Andreas Wenger Online version provided by the International Relations and Security Network A public service run by the Center for Security Studies at the ETH
I am a final year PhD student working in Kevin Schawinski's black hole group at the Institute for Particle Physics and Astrophysics at ETH Zurich. My research focuses on galaxy evolution, especially the impact of AGN feedback on the quenching of star formation, and black hole seed formation. Please find a list of recent projects under 'research'. Research Please find here a summary of recent proje
Researchers at EPFL can now see what happens in our brains when we hear music in our heads. The researchers hope that in time their findings will be used to help people who have lost the ability to speak. When we listen to music, different parts of our brain process different information – such as high and low frequencies – so that our auditory perception of the sounds matches what we hear. It’s e
Understanding a program entails understanding its context; dependencies, configurations and even implementations are all forms of contexts. Modern programming languages and theorem provers offer an array of constructs to define contexts, implicitly. Scala offers implicit parameters which are used pervasively, but which cannot be abstracted over. This paper describes a generalization of implicit pa
We propose an approach to detect flying objects such as UAVs and aircrafts when they occupy a small portion of the field of view, possibly moving against complex backgrounds, and are filmed by a camera that itself moves. Detecting a small drone against a complex moving background. (Left) It is almost invisible to the human eye and hard to detect from a single image. (Right) Yet, our algorithm can
POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES acceptée sur proposition du jury: Prof. W. Zwaenepoel, président du jury Prof. G. Candea, directeur de thèse Prof. E. Berger, rapporteur Dr M. Musuvathi, rapporteur Prof. C. Kozyrakis, rapporteur Techniques for Detection, Root Cause Diagnosis, and Classification of In-Production Concurrency Bugs THÈSE NO 6873 (2015) ÉCOLE POLYTECHNIQUE FÉDÉRALE DE L
Duncan Murdoch murdoch.duncan at gmail.com Thu Sep 28 12:27:03 CEST 2017 Previous message (by thread): R 3.4.2 is released Next message (by thread): Help wanted - R contributed documentation Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] I've just finished the Windows build of R 3.4.2. It will make it to CRAN and its mirrors over the next few hours. This is the last binary release
Ganymed SSH2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). See: Description Ganymed SSH2 for Java is a library which implements the SSH-2 protocol in pure Java (tested on J2SE 1.4.2 and 5.0). It allows one to connect to SSH servers from within Java programs. It supports SSH sessions (remote command execution and shell access), local and remo
Marc Schwartz MSchwartz at MedAnalytics.com Tue Sep 7 21:01:24 CEST 2004 Previous message: [R] using text on the x axis ticks rather than numbers Next message: [R] using text on the x axis ticks rather than numbers Messages sorted by: [ date ] [ thread ] [ subject ] [ author ] On Tue, 2004-09-07 at 12:52, Rajarshi Guha wrote: > Hello, > is there a way in which I can use text labels rather than num
リリース、障害情報などのサービスのお知らせ
最新の人気エントリーの配信
処理を実行中です
j次のブックマーク
k前のブックマーク
lあとで読む
eコメント一覧を開く
oページを開く