Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Over the past twenty years, numerous infrastructure management systems have been developed to address gradual failure modes. Unfortunately the management of sudden failure modes within large infrastructure systems (principally: natural hazard induced failu ...
In this paper we provide a theoretical discussion of the in)pact of uncertainty in quality measurement oil the expected benefits of including biometric signal quality measures in classification. While all ideal signal quality measure should be a, precise q ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2008
Applications in software verification and interactive theorem proving often involve reasoning about sets of objects. Cardinality constraints on such collections also arise in these scenarios. Multisets arise for analogous reasons as sets: abstracting the c ...
Applications in software verification and interactive theorem proving often involve reasoning about sets of objects. Cardinality constraints on such collections also arise in these applications. Multisets arise in these applications for analogous reasons a ...
The high-temperature wettability of AlN particle preforms with pure molten Cu, Al and Ph is quantified by means of drainage curves measured during pressure infiltration. By integrating the drainage curves obtained in this study, the work of immersion for e ...
In this paper we extend the work presented in [1], [2] by quantifying the effects of in-band wormhole attacks on Intrusion Detection Systems. More specifically, we propose a mathematical framework for obtaining performance bounds of Byzantine attackers and ...
The process of verifying that a program conforms to its specification is often hampered by errors in both the program and the specification. A runtime checker that can evaluate formal specifications can be useful for quickly identifying such errors. This p ...
Today's computers allow us to simulate large, complex physical problems. Many times the mathematical models describing such problems are based on a relatively small amount of available information such as experimental measurements. The question arises whet ...
We present the design of a sterilizable optical reference to characterize and quantify the inter-patient variations in tissue autofluorescence during autofluorescence bronchoscopy with Richard Wolf's diagnostic autofluorescence endoscopy (DAFE) system. The ...
We study the jamming of bead assemblies placed in a cylindrical container whose bottom is pierced with a circular hole. Their jamming behavior is quantified here by the mean critical diameter, that is the diameter of the hole for which the jamming probabil ...