Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In recent works, the use of phone class-conditional posterior probabilities (posterior features) directly as features provided successful results in template-based ASR systems. In this paper, motivated by the high quality of current text-to-speech systems ...
The effect of irregular hole shape on the spectrum and radiation losses of a photonic crystal waveguide is studied using Bloch-mode expansion. Deviations from a circular hole are characterized by a radius fluctuation amplitude and correlation angle. It is ...
Recent developments in information and communication technologies have been profound and life-changing. Most people are now equipped with smart phones with high computation power and communication capabilities. These devices can efficiently run multiple so ...
The physical education teacher education community in Ireland has developed Beginning Teacher Standards for Physical Education (BTSfPE) at the post-primary (secondary) level. This study explored teacher educators’ perspectives on how the BTSfPE could be im ...
The ability of human auditory systems to focus on one signal and ignore other signals in an auditory scene where several auditory events are taking place, often referred to as cocktail-party effect, is a key to localization of sound sources. This ability i ...
Poor data quality is responsible for many or even most matching errors in fingerprint recognition systems. It became obvious that particular effort is needed in adaptation of the state-of-the-art minutiae-based fingerprint matching techniques to real-world ...
The mainstream approach to protecting the location-privacy of mobile users in location-based services (LBSs) is to alter the users' actual locations in order to reduce the location information exposed to the service provider. The location obfuscation algor ...
Comparing two or more phylogenetic trees is a fundamental task in computational biology. The simplest outcome of such a comparison is a pairwise measure of similarity, dissimilarity, or distance. A large number of such measures have been proposed, but so f ...
Due to high peak energy demands, existing hydropower plants operate nowadays under rough conditions to regulate the discharge and power with relatively fast and repeated opening and closing of turbines and pumps. The local deterioration of the mechanical p ...
The experimental determination of transcriptional regulatory networks in the laboratory remains difficult and time-consuming, while computational methods to infer these networks provide only modest accuracy. The latter can be attributed partly to the limit ...