Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This paper suggests several approaches for determining the transient stability of a power network by using an analog VLSI chip for simulating the system behavior. The main advantages of using this method are the much shorter computation time and lower comp ...
In this paper we use bilevel programming to find the maximum difference between a reference controller and a low-complexity controller in terms of the infinity-norm difference of their control laws. A nominal MPC for linear systems with constraints, and a ...
We consider the asymmetric multilevel diversity (A-MLD) coding problem, where a set of 2(K) - 1 information sources, ordered in a decreasing level of importance, is encoded into K messages (or descriptions). There are 2(K) - 1 decoders, each of which has a ...
Most recent findings in robot-assisted therapy suggest that the therapy is more successful if the patient actively participates to the movement (“assistance-as-needed”). In the present contribution, we propose a novel approach for designing highly flexible ...
Sensors acquire data, and communicate this to an interested party. The arising coding problem is often split into two parts: First, the sensors compress their respective acquired signals, potentially applying the concepts of distributed source coding. Then ...
Peer-to-peer (P2P) architectures are popular for tasks such as collaborative download, VoIP telephony, and backup. To maximize performance in the face of widely variable storage capacities and bandwidths, such systems typically need to shift work from poor ...
Symmetric multilevel diversity coding was introduced by Roche et al, where a set of K information sources is encoded by K encoders and the decoders reconstruct sources 1, . . . , k, where k is the number of encoders to which they have access. In this paper ...
Ieee Computer Soc Press, Customer Service Center, Po Box 3014, 10662 Los Vaqueros Circle, Los Alamitos, Ca 90720-1264 Usa2008
Indexed memory is used as a generic protocol for handling vectors of data in genetic programming. Using this simple method, a single program can generate many outputs. It eliminates the complexity of maintaining different trees for each desired parameter a ...
In this paper stochastic approximation theory is used to produce Iterative Learning Control algorithms which are less sensitive to stochastic disturbances, a typical problem for the learning process of standard ILC algorithms. Two algorithms are developed, ...
The analysis and interpretation of perturbative modulated electron cyclotron heating (MECH) discharges for power deposition localization using different diagnostics, such as electron cyclotron emission (ECE) and soft x-ray (SXR) measurements, are presented ...