We contribute to the classification of finite dimensional algebras under stable equivalence of Morita type. More precisely we give a classification of Erdmann's algebras of dihedral, semi-dihedral and quaternion type and obtain as byproduct the validity of ...
Elsevier2011
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Kühtai reservoir is planned as an addition to the existing Sellrain-Silz group of HPPs. Two natural hazards relevant in terms of potential impulse wave impact on the dam were identified: a snow avalanche near the dam axis and a possible landslide furth ...
The problem of time validity of biometric models has received only a marginal attention from researchers. Actual and up-to-date at the time of their creation, extracted features and models relevant to a person's face may eventually become outdated, leading ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
Welding of wood is a relatively new method of joining load bearing elements, which holds the potential to compete with structural adhesion, since it allows for an almost instantaneous bond. First experimental and numerical investigations showed that failur ...
Abstract—Performance evaluation of the 802.11 MAC protocol is classically based on the decoupling assumption, which hypothesizes that the backoff processes at different nodes are independent. A necessary condition for the validity of this approach is the e ...
The problem of time validity of biometricmodels has received only a marginal attention from researchers. In this paper, we propose to manage the aging influence on the adult face verification system by an A-stack age modeling technique, which uses the age ...
In this study, we compared the cervical range of movement (ROM) and range of angular velocity (RAV) measured simultaneously using a 3-dimensional electrogoniometer, the CA6000-OSI (OSI), an optoelectronic motion capture system (MCS), the VICON® and a weara ...
We compare in an analytical way two leader-based and decentralized algorithms (that is, algorithms that do not use a leader) for Byzantine consensus with strong validity. We show that for \emph{the algorithms we analyzed}, in most cases, the decentralized ...
Personal navigation has grown rapidly with the introduction of ubiquitous computing and the new generation of smart phones. Appropriate localisation is nowadays a central element for many applications and mobile services. However the proper estimation of t ...
We propose a novel way to augment a real-world scene with minimal user intervention on a mobile phone; the user only has to point the phone camera to the desired location of the augmentation. Our method is valid for horizontal or vertical surfaces only, bu ...