Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
A method for optimizing memory access for database operations is provided. The method may include performing a first database operation by at least executing a first instruction stream associated with the first database operation. The first database opera ...
The Pollution Detection Algorithm (PDA) is an algorithm to identify and flag periods of primary polluted data in remote atmospheric time series in five steps. The first and most important step identifies polluted periods based on the gradient (time-derivat ...
This paper studies the possibility of adding an experimental channel into the core of the CROCUS nuclear reactor. Thinking about all the implications of the installation of a channel, different configurations for the insertion of a channel are discussed. T ...
An execution of a target software program that causes a particular bug to manifest itself is generated. A target software program is received. A bug report generated by an execution of the target software program is received. The bug report describes a par ...
The calculation of the electronic structure of chemical systems, necessitates computationally expensive approximations to the time-independent electronic Schrödinger equation in order to yield static properties in good agreement with experimental results. ...
Algorithms are everywhere.The recipe for the frangipane cake is an algorithm.If all the listed ingredients are available and the cook is sufficiently deft, after a finite number of small, well-defined steps a delicious dessert will exit the oven.Now, what ...
A computer-implemented method, computer program product and computer system (100) for editing a configuration of a physical entity (30) to configure a future operating mode of a physical entity. A GUI component (200) provides a visual representation of a t ...
A method for optimizing memory access for database operations is provided. The method may include identifying an access pattern associated with a database operation. The access pattern may include data required to perform the database operation. One or mor ...
The present invention discloses a method, apparatus and computer program product for locating a source of diffusion in a network, the method comprising providing a model of at least a portion of the network, the network comprising a plurality of nodes, a p ...
A computer-implemented method, computer program product and computer system (100) for editing a configuration of a real-world object to optimize a future state of the real-world object. The configuration includes a plurality of potential states for the rea ...