Institution
École Polytechnique Fédérale de Lausanne
Facility•Lausanne, Switzerland•
About: École Polytechnique Fédérale de Lausanne is a facility organization based out in Lausanne, Switzerland. It is known for research contribution in the topics: Population & Catalysis. The organization has 44041 authors who have published 98296 publications receiving 4372092 citations. The organization is also known as: EPFL & ETHL.
Topics: Population, Catalysis, Laser, Thin film, Perovskite (structure)
Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper presents a meta-analyses of Fourier-Transform Profilometry and its applications in 3-D Shape Measurement and Surface Profile Measurement for Structured Light Pattern and 4-Core Optical-Fiber.
1,110 citations
01 Jan 2003
TL;DR: Reference TRANSP-OR-CONF-2006-048 URL: http://transp-or.epfl.ch/documents/proceedings/Bier03.pdf
Abstract: Reference TRANSP-OR-CONF-2006-048 URL: http://transp-or.epfl.ch/documents/proceedings/Bier03.pdf URL: http://www.strc.ch/Paper/bierlaire.pdf Record created on 2008-02-15, modified on 2017-12-15
1,108 citations
••
TL;DR: This letter reports a new approach on the basis of a grating interferometer that can efficiently yield dark-field scatter images of high quality, even with conventional X-ray tube sources and is fully compatible with conventional transmission radiography and a recently developed hard-X-ray phase-contrast imaging scheme.
Abstract: Imaging with visible light today uses numerous contrast mechanisms, including bright- and dark-field contrast, phase-contrast schemes and confocal and fluorescence-based methods. X-ray imaging, on the other hand, has only recently seen the development of an analogous variety of contrast modalities. Although X-ray phase-contrast imaging could successfully be implemented at a relatively early stage with several techniques, dark-field imaging, or more generally scattering-based imaging, with hard X-rays and good signal-to-noise ratio, in practice still remains a challenging task even at highly brilliant synchrotron sources. In this letter, we report a new approach on the basis of a grating interferometer that can efficiently yield dark-field scatter images of high quality, even with conventional X-ray tube sources. Because the image contrast is formed through the mechanism of small-angle scattering, it provides complementary and otherwise inaccessible structural information about the specimen at the micrometre and submicrometre length scale. Our approach is fully compatible with conventional transmission radiography and a recently developed hard-X-ray phase-contrast imaging scheme. Applications to X-ray medical imaging, industrial non-destructive testing and security screening are discussed.
1,108 citations
••
TL;DR: How the signalling functions of bile acids can be exploited in the development of drugs for obesity, type 2 diabetes, hypertriglyceridaemia and atherosclerosis, as well as other associated chronic diseases such as non-alcoholic steatohepatitis are reviewed.
Abstract: Bile acids are increasingly being appreciated as complex metabolic integrators and signalling factors and not just as lipid solubilizers and simple regulators of bile-acid homeostasis. It is therefore not surprising that a number of bile-acid-activated signalling pathways have become attractive therapeutic targets for metabolic disorders. Here, we review how the signalling functions of bile acids can be exploited in the development of drugs for obesity, type 2 diabetes, hypertriglyceridaemia and atherosclerosis, as well as other associated chronic diseases such as non-alcoholic steatohepatitis.
1,107 citations
••
07 Nov 2005TL;DR: A set of security protocols are provided, it is shown that they protect privacy and the robustness of these protocols are analyzed, and a quantitative assessment of the proposed solution is carried out.
Abstract: Vehicular networks are likely to become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise an appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. We provide a set of security protocols, we show that they protect privacy and we analyze their robustness, and we carry out a quantitative assessment of the proposed solution.
1,104 citations
Authors
Showing all 44420 results
Name | H-index | Papers | Citations |
---|---|---|---|
Michael Grätzel | 248 | 1423 | 303599 |
Ruedi Aebersold | 182 | 879 | 141881 |
Eliezer Masliah | 170 | 982 | 127818 |
Richard H. Friend | 169 | 1182 | 140032 |
G. A. Cowan | 159 | 2353 | 172594 |
Ian A. Wilson | 158 | 971 | 98221 |
Johan Auwerx | 158 | 653 | 95779 |
Menachem Elimelech | 157 | 547 | 95285 |
A. Artamonov | 150 | 1858 | 119791 |
Melody A. Swartz | 148 | 1304 | 103753 |
Henry J. Snaith | 146 | 511 | 123155 |
Kurt Wüthrich | 143 | 739 | 103253 |
Richard S. J. Frackowiak | 142 | 309 | 100726 |
Jean-Paul Kneib | 138 | 805 | 89287 |
Kevin J. Tracey | 138 | 561 | 82791 |