Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The ability to correctly identify the existence and polarity of emotion in informal, textual communication is a very important part of a realistic and immersive 3D environment where people communicate with one another through avatars or with an automated s ...
The key-point for the development of an amperometric sensor is the immobilization of the enzyme. In the present work we use biosensors based on glucose oxidase (GOD) onto electrodes nanostructured with carbon nanotubes (CNT), to be employed in cell culture ...
The existence of invariant generators for distributions satisfying a compatibility condition with the symmetry algebra is proved. (C) 2011 Elsevier B.V. All rights reserved. ...
This paper describes an extremely efficient squaring operation in the so-called ‘cyclotomic subgroup’ of Fq6, for q≡1mod6. Our result arises from considering the Weil restriction of scalars of this group from Fq6 ...
The notion of tree projection provides a natural generalization for various structural decomposition methods, which have been proposed in the literature in order to single out classes of nearly-acyclic (hyper)graphs. In this paper, the mathematical propert ...
In the spirit of Bjork-DiMasi-Kabanov-Runggaldier, we investigate term structure models driven by Wiener process and Poisson measures with forward curve dependent volatilities. This includes a full existence and uniqueness proof for the corresponding Heath ...
We provide a concrete security treatment of several "provably secure" hash functions. Interpreting arguments behind MQ-HASH, FSB, SWIFFTX and VSH we identify similar lines of reasoning. We aim to formulate the main security claims in a language closer to t ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2010