Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Let G be a finite group with a Sylow 2-subgroup P which is either quaternion or semi-dihedral. Let k be an algebraically closed field of characteristic 2. We prove the existence of exotic endotrivial kG-modules, whose restrictions to P are isomorphic to th ...
This dissertation is concerned with modular representation theory of finite groups, and more precisely, with the study of classes of representations, which we shall term relative endotrivial modules. Given a prime number p, a finite group G of order divisi ...
This text address the challenge of answering to two inseparable question: What is a just territory ? and What can we do to approach more just territories? The first section of this text explores three approaches of spatial justice as deployed by Jacques Lé ...
In this note we show that, for any proper action of a Banach-Lie group G on a Banach manifold M, the corresponding tangent maps g -> T-x(M) have closed range for each x is an element of M, i.e., the tangent spaces of the orbits are closed. As a consequence ...
The objective of this PhD thesis is the approximate computation of the solutions of the Spectral Problem associated with the Laplace operator on a compact Riemann surface without boundaries. A Riemann surface can be seen as a gluing of portions of the Hype ...
Systems that employ network coding for content distribution convey to the receivers linear combinations of the source packets. If we assume randomized network coding, during this process the network nodes collect random subspaces of the space spanned by th ...
Let k be an algebraically closed field of characteristic 2. We prove that the restricted nilpotent commuting variety C, that is the set of pairs of (n x n)-matrices (A, B) such that A(2) = B-2 = [A, B] = 0, is equidimensional. C can be identified with the ...
We examine networks that employ network coding, and are subject to Byzantine attacks. We consider systems where an appropriate network error correcting scheme is employed that is able to correct (up to a certain number of) Byzantine errors. Given this setu ...
Randomized network coding has network nodes randomly combine and exchange linear combinations of the source packets. A header appended to the packet, called coding vector, specifies the exact linear combination that each packet carries. The main contributi ...
So far, cellular networks have been operated in "private" frequency bands. But recently, several researchers and legislators have argued in favor of a more flexible and more efficient management of the spectrum, leading to the possible coexistence of sever ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2006