Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper, we consider the problem of sequentially optimizing a black-box function f based on noisy samples and bandit feedback. We assume that f is smooth in the sense of having a bounded norm in some reproducing kernel Hilbert space (RKHS), yield ...
In this article, I focus on digital scientific archives which are made up of the leftovers of science, such as drafts, obsolete instruments, photographs, documentation, etc. The artifacts exhibited in such collections were neither meant to be representatio ...
We study the semilinear wave equation ∂t2ψ−Δψ=∣ψ∣p−1ψ for p>3 with radial data in three spatial dimensions. There exists an explicit solution which blows up at t=T>0 given by $\displaystyl ...
This paper reviews the mortgage-backed securities (MBS) market, with a particular emphasis on agency residential MBS in the United States. We discuss the institutional environment, security design, MBS risks and asset pricing, and the economic effects of m ...
We investigate the stability and stabilization of the cubic focusing Klein-Gordon equation around static solutions on the closed ball in R3. First we show that the system is linearly unstable near the static solution u≡1 for any dissipat ...
The group testing problem consists of determining a sparse subset of a set of items that are ``defective'' based on a set of possibly noisy tests, and arises in areas such as medical testing, fault detection, communication protocols, pattern matching, and ...
In this paper, we study the information-theoretic limits of community detection in the symmetric two-community stochastic block model, with intra-community and inter-community edge probabilities na and nb respectively. We consider the ...
We show that smooth, radially symmetric wave maps U from R2+1 to a compact target manifold N, where ∂rU and ∂tU have compact support for any fixed time, scatter. The result will follow from the work of Christodoulou ...
The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintext ...
In light of the environmental consequences of linear production and consumption processes, the circular economy (CE) is gaining momentum as a concept and practice, promoting closed material cycles by focusing on multiple strategies from material recycling ...