Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
When developing code, a programmer typically knows the approximate structure of the desired expression. However, often the first attempt at writing it down results in an ill-typed code fragment. We propose an approach that automatically repairs code expres ...
This thesis presents two approaches to code generation (synthesis) along with a discussion of other related and influential works, their ideas and relations to these approaches. The common goal of these approaches is to efficiently and effectively assist d ...
We propose and study the notions of behaviour type and composition operator making a first step towards the definition of a formal framework for studying behaviour composition in a setting sufficiently general to provide insight into how the component-base ...
This work aims at investigating the automatic recognition of speaker role in meeting conversations from the AMI corpus. Two types of roles are considered: formal roles, fixed over the meeting duration and recognized at recording level, and social roles rel ...
This paper focuses on urban environmental system identification. Wind-flow modeling is a challenging task because of simplifications of complex processes as well as geometry simplifications. Even a more detailed model may not be accurate because of uncerta ...
Institute of Electrical and Electronics Engineers ( IEEE )2013
In this paper we show how the deployment of a lightweight note sharing system can restore the antique social vocation of annotations in the classroom. The system was designed for the classroom context and evaluated through a longitudinal study lasting for ...
The evaluation of avalanche release depths constitutes a great challenge for risk assessment in mountainous areas. This study focuses on slab avalanches, which generally result from the rupture of a weak layer underlying a cohesive slab. We use the finite- ...
In this paper, we propose a system level design approach considering voltage over-scaling (VOS) that achieves error resiliency using unequal error protection of different computation elements, while incurring minor quality degradation. Depending on user sp ...
In the scientific literature, two main approaches have been proposed for control system design from data. In the "model-based" approach, a model of the system is first derived from data and then a controller is computed based on the model. In the "data-dri ...
Speaker verification (SV) on portable devices like smartphones is gradually becoming popular. In this context, two issues need to be considered: 1) such devices have relatively limited computation resources, and 2) they are liable to be used everywhere, po ...