Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Although the stability properties of the wake past impervious bluff bodies have been widely examined in the literature, similar analyses regarding the flow around and through porous ones are still lacking. In this work, the effect of the porosity and perme ...
Capturing students' behavioral patterns through analysis of sequential interaction logs, is an important task in educational data mining to enable more effective personalized support during the learning process. This study aims at discovery and temporal an ...
Conditions for vegetation spreading and pattern formation are mathematically framed through an analysis encompassing three fundamental processes: flow stochasticity, vegetation dynamics, and sediment transport. Flow unsteadiness is included through Poisson ...
This paper investigates the equilibrium properties of the morning commute problem at the network level with heterogeneous trip lengths. Congestion is modeled with a Macroscopic Fundamental Diagram relating the space-mean speed of a network to the vehicular ...
Actors from academia, politics, and the civil society increasingly acknowledge that to address our current unsustainable regimes of resource and energy demand, we need to redefine our ways of being and doing. Everyday practices are a key driver of energy a ...
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achiev ...
We address the problem of substring searchable encryption. A single user produces a big stream of data and later on wants to learn the positions in the string that some patterns occur. Although current techniques exploit auxiliary data structures to achiev ...
The model, that is usually called the Lugiato-Lefever equation (LLE), was introduced in 1987 with the aim of providing a paradigm for dissipative structure and pattern formation in nonlinear optics. This model, describing a driven, detuned and damped nonli ...
Cation ordering is expected to influence the properties of oxides in the ZrO2−YTaO4 system, but the ordering patterns and their relative energies are not well understood. This work investigates the stability of zirconium-yttrium-tantalum orderings over the ...
We develop and perform continuum mechanics simulations of carbon nanotube (CNT) deployment directed by a combination of surface topography and rarefied gas flow. We employ the discrete elastic rods method to model the deposition of CNT as a slender elastic ...