Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The integrated network Mott Physics Beyond the Heisenberg Model (MPBH) united researchers across Switzerland in a collective effort to explore new aspects of Mott physics, in particular how spin-orbit interactions, in concert with strong electron correlati ...
Recent trends in shipboard power distribution network design, such as the transition from AC to DC result in new challenges on the issue of distribution network protection. Devices such as a solid state bus tie switch provide a first line of defence agains ...
In this thesis, we developed a research direction that combines the theoretical concepts of complex networks with practical needs and applications in the field of transportation engineering.
As a first objective we analyzed the phenomenon of congestion pr ...
Face recognition has evolved as a widely used biometric modality. However, its vulnerability against presentation attacks poses a significant security threat. Though presentation attack detection (PAD) methods try to address this issue, they often fail in ...
In this paper, we tackle the problem of static 3D cloth draping on virtual human bodies. We introduce a two-stream deep network model that produces a visually plausible draping of a template cloth on virtual 3D bodies by extracting features from both the b ...
We present a novel method for semantic text document analysis which in addition to localizing text it labels the text in user-defined semantic categories. More precisely, it consists of a fully-convolutional and sequential network that we apply to the part ...
Face recognition has evolved as a widely used biometric modality. However, its vulnerability against presentation attacks poses a significant security threat. Though presentation attack detection (PAD) methods try to address this issue, they often fail in ...
Flow reshaping is used in time-sensitive networks (as in the context of IEEE TSN and IETF Detnet) in order to reduce burstiness inside the network and to support the computation of guaranteed latency bounds. This is performed using per-flow regulators (suc ...
Brain mechanisms of visual selective attention involve both local and network-level activity changes at specific oscillatory rhythms, but their interplay remains poorly explored. Here, we investigate anticipatory and reactive effects of feature-based atten ...
Realistic rendering using discrete reflectance measurements is challenging, because arbitrary directions on the light and view hemispheres are queried at render time, incurring large memory requirements and the need for interpolation. This explains the des ...