Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We prove a version of the Lp hodge decomposition for differential forms in Euclidean space and a generalization to the class of Lizorkin currents. We also compute the Lqp−cohomology of Rn. ...
A method for extracting in real-time the position and size of liver vessels from 2D ultrasound images is described. It proceeds in two steps. Starting with a rough localization of the vessels using the scale-space theory, seed points are defined. Then, ves ...
We give two impossibility results regarding strong encryption over an infinite enumerable domain. The first one relates to statistically secure one-time encryption. The second one relates to computationally secure encryption resisting adaptive chosen ciphe ...
In this paper we use bilevel programming to find the maximum difference between a reference controller and a low-complexity controller in terms of the infinity-norm difference of their control laws. A nominal MPC for linear systems with constraints, and a ...
We show how improved sequences for magnetic resonance imaging can be found through optimization of Bayesian design scores. Combining approximate Bayesian inference and natural image statistics with high-performance numerical computation, we propose the fir ...
Erwinia carotovora are phytopathogenic Gram-negative bacteria of agronomic interest as these bacteria are responsible for fruit soft rot and use insects as dissemination vectors. The Erwinia carotovora carotovora strain 15 (Ecc15) is capable of persisting ...
In opportunistic routing, each node maintains a group of candidate relays to reach a particular destination, and transmits packets to any node in this group. If a single candidate relay receives the packet, it becomes the effective relay to forward the pac ...
The effects of the subgrid scales on chemical transformations in large-eddy simulations of the convective atmospheric boundary layer (CBL) are investigated. Dynamic similarity subgrid-scale models are formulated and used to calculate the subgrid-scale cova ...
We study private computations in a system of tiny mobile agents. We consider the mobile population protocol model of Angluin et al. [2] and ask what can be computed without ever revealing any input to a curious adversary. We show that any computable predic ...
Modern communication networks are reaching a high level of complexity. As their global dimensioning and performance evaluation are very hard tasks, a multi-layer approach is generally applied to divide them in smaller problems easier to tackle. Within this ...