Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We study the possible IR and UV asymptotics of 4D Lorentz invariant unitary quantum field theory. Our main tool is a generalization of the Komargodski-Schwimmer proof for the alpha-theorem. We use this to rule out a large class of renormalization group flo ...
This thesis is a small part of the preparation of the launch of the Gaia mission, a satellite of the European Space Agency (ESA). One of the goals of the mission is to perform a classification among variable stars considering different attributes. Periodic ...
We study spectral properties of generalized weighted Hilbert matrices. In particular, we establish results on the spectral norm, the determinant, and various relations between the eigenvalues and eigenvectors of such matrices. We also study the asymptotic ...
We study the longitudinal linear optimal perturbations (which maximize the energy gain up to a prescribed time T) to inviscid parallel shear flow, which present unbounded energy growth due to the lift-up mechanism. Using the phase invariance with respect t ...
This paper presents a Model Predictive Control (MPC) scheme for nonlinear continuous time systems where an extra performance index, which is not a measure of the distance to the set point, is introduced to influence the transient behavior of the controlled ...
Performance evaluation of the 802.11 MAC protocol is classically based on the decoupling assumption, which hypothesizes that the backoff processes at different nodes are independent. This decoupling assumption results from mean field convergence and is gen ...
Institute of Electrical and Electronics Engineers2012
In this paper, we derive elementary M- and optimally robust asymptotic linear (AL)-estimates for the parameters of an Ornstein-Uhlenbeck process. Simulation and estimation of the process are already well-studied, see Iacus (Simulation and inference for sto ...
An approximate analytical solution of the Hairsine-Rose model of erosion is obtained by interpolation of asymptotic expressions for large times and great distances. The solution, when erosion is initiated by rainfall impact, is both simple and accurate. Th ...
Algorithms for distributed agreement are a powerful means for formulating distributed versions of existing centralized algorithms. We present a toolkit for this task and show how it can be used systematically to design fully distributed algorithms for stat ...
Factoring-based public-key cryptosystems have an overall complexity which is dominated by the key-production algorithm, which requires the generation of prime numbers. This is most inconvenient in settings where the key-generation is not an one-off process ...