Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
All H-infinity controllers of a SISO LTI system are parameterized thanks to the relation between Bounded Real Lemma and Positive Real Lemma and a new concept of strict positive realness of two transfer functions with the same Lyapunov matrix in the matrix ...
Institute of Electrical and Electronics Engineers2010
Some frequency-domain controller design problems are solved using a finite number of frequency samples. Consequently, the performance and stability conditions are not guaranteed for the frequencies between the frequency samples. In this paper, all possible ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
This paper introduces a subgradient descent algorithm to compute a Riemannian metric that minimizes an energy involving geodesic distances. The heart of the method is the Subgradient Marching Algorithm to compute the derivative of the geodesic distance wit ...
This paper investigates the influence of the choice of the cost function in the optimal control formulation for an air-to-water heat pump system. The aim is to minimize, under given thermal comfort requirements, the electricity consumption which is calcula ...
Only recently Goyal, Olver and Shepherd (Proc. STOC, 2008) proved that the symmetric Virtual Private Network Design (sVPN) problem has the tree routing property, namely, that there always exists an optimal solution to the problem whose support is a tree. C ...
This paper presents improved collision attacks on round-reduced variants of the hash function CubeHash, one of the SHA-3 second round candidates. We apply two methods for finding linear differential trails that lead to lower estimated attack complexities w ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2010
We have studied a camera with a very large number of binary pixels referred to as the gigavision camera or the gigapixel digital film camera. Potential advantages of this new camera design include improved dynamic range, thanks to its logarithmic sensor re ...
We provide an algorithmic framework for structured sparse recovery which unifies combinatorial optimization with the non-smooth convex optimization framework by Nesterov [1, 2]. Our algorithm, dubbed Nesterov iterative hard-thresholding (NIHT), is similar ...
We study the coupling of the equations of steady-state magnetohydrodynamics (MHD) with the heat equation when the buoyancy effects due to temperature differences in the flow as well as Joule effect and viscous heating are (all) taken into account. Two mode ...
David Hilbert discovered in 1895 an important metric that is canonically associated to any convex domain Ω in the Euclidean (or projective) space. This metric is known to be Finslerian, and the usual proof assumes a certain degree of smoothness of t ...