Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Capturing students' behavioral patterns through analysis of sequential interaction logs, is an important task in educational data mining to enable more effective personalized support during the learning process. This study aims at discovery and temporal an ...
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achiev ...
Further progress in the development of reliable biomonitoring strategies requires to better link effects in aquatic ecological systems to ambient concentrations of chemical contaminants. Among existing tools, in situ bioassays using caging method represent ...
Passive Kerr cavities driven by coherent laser fields display a rich landscape of nonlinear physics, including bistability, pattern formation, and localized dissipative structures (solitons). Their conceptual simplicity has for several decades offered an u ...
Cation ordering is expected to influence the properties of oxides in the ZrO2−YTaO4 system, but the ordering patterns and their relative energies are not well understood. This work investigates the stability of zirconium-yttrium-tantalum orderings over the ...
The proliferation and rapid diffusion of fake news on the Internet highlight the need of automatic hoax detection systems. In the context of social networks, machine learning (ML) methods can be used for this purpose. Fake news detection strategies are tra ...
Safe object initialization is important to avoid a category of runtime errors in programming languages. In this paper, we provide a case study of the initialization patterns on the Dotty compiler. In particular, we find that calling dynamic-dispatching met ...
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achiev ...
We investigate the Rayleigh-Taylor instability of a thin viscous film coating the inside of a spherical substrate. The aim of this work is to find and characterize the instability pattern in this spherical geometry. In contrast to the Rayleigh-Taylor insta ...
The invention relates to a method for manufacturing an electrode, preferably an implantable electrode array comprising the following steps: Applying (101) a layer of electrically conducting material (4) above a substrate material (1) for forming the electr ...