Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
If phi is an excellent form, then it is possible to use the dimensions of the higher complements of phi to obtain an annihilating polynomial of phi of low degree. The main result of this paper is the construction of such a polynomial with the help of metho ...
The stability properties of Alfvén Eigenmodes (AEs) are investigated directly using external antenna excitation and detection of stable modes in a variety of plasma configurations in different devices. Dedicated methods to measure the AE damping rate separ ...
Temperature-dependent electron spin resonance (ESR) measurements are reported on stage-1 potassium-doped graphite, a model system of biased graphene. The ESR linewidth is nearly isotropic, and although the g factor has a sizable anisotropy, its majority is ...
We prove new equidistribution results for Galois orbits of Heegner points with respect to single reduction maps at inert primes. The arguments are based on two different techniques: primitive representations of integers by quadratic forms and distribution ...
We introduce the notion of forgery-resilience for digital signature schemes, a new paradigm for digital signature schemes exhibiting desirable legislative properties. It evolves around the idea that, for any message, there can only be a unique valid signat ...
Most people believe that renaming is easy: simply choose a name \emph{at random}; if more than one process selects the same name, then try again. We highlight the issues that occur when trying to implement such a scheme and shed new light on the read-write ...
We study annihilating polynomials and annihilating ideals for elements of Witt rings for groups of exponent 2. With the help of these results and certain calculations involving the Clifford invariant, we are able to give full sets of generators for the ann ...
In this work, we focus on the integration of two problems arising in the management of transshipment container terminals: the problem of assigning and scheduling incoming ships to berthing positions (berth allocation problem), and the problem of assigning ...
We consider quadratic stochastic programs with random recourse—a class of problems which is perceived to be computationally demanding. Instead of using mainstream scenario tree-based techniques, we reduce computational complexity by restricting the space o ...
Commonly used RNA folding programs compute the minimum free energy structure of a sequence under the pseudoknot exclusion constraint. They are based on Zuker's algorithm which runs in time O(n^3). Recently, it has been claimed that RNA folding can be achie ...