Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In the study of nonconscious processing, different methods have been used in order to render stimuli invisible. While their properties are well described, the level at which they disrupt nonconscious processing remains unclear. Yet, such accurate estimatio ...
In linear cryptanalysis, it has been considered most important and difficult to analyze the bias and find a large bias. The demonstration of a large bias will usually imply that the target crypto-system is not strong. Regarding the bias analysis, researche ...
This paper addresses road traffic monitoring using passive acoustic sensors. Recently, the feasibility of the joint speed and wheelbase length estimation of a road vehicle using particle filtering has been demonstrated. In essence, the direction of arrival ...
The rapid development of the Internet has created new opportunities for teaching in general and it is our aim to show how the current evolution can best be exploited for crystallography education in particular. Currently, we can find a very large selection ...
The predictive capacity of a physically based snow model to simulate point-scale, subcanopy snowmelt dynamics is evaluated in a mixed conifer forest, southern Sierra Nevada, California. Three model scenarios each providing varying levels of canopy structur ...
We present an extension of cross-recurrence analysis for dual gaze analysis which is suited for complex situations where for instance the objects of interest are not all visible at all times or when stimulus exploration is not homogeneous. The typicical si ...
It has been considered most important and difficult to analyze the bias and find a large bias regarding the security of crypto-systems, since the invention of linear cryptanalysis. The demonstration of a large bias will usually imply that the target crypto ...
Breadth First Search (BFS) is a widely used approach for sampling large graphs. However, it has been empirically observed that BFS sampling is biased toward high-degree nodes, which may strongly affect the measurement results. In this paper, we quantify an ...
Institute of Electrical and Electronics Engineers2011
Recent attention has focused on the in situ immobilization of uranium by stimulation of dissimilatory metal-reducing bacteria (DMRB). The objective of this work was to investigate the effectiveness of this approach in heterogeneous and structured porous me ...
Online reviews have become increasingly popular as a way to judge the quality of various products and services. However, recent work demonstrates that the absence of reporting incentives leads to a biased set of reviews that may not reflect the true qualit ...