Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
We introduce robust principal component analysis from a data matrix in which the entries of its columns have been corrupted by permutations, termed Unlabeled Principal Component Analysis (UPCA). Using algebraic geometry, we establish that UPCA is a well-de ...
The fib Model Code 2010 (MC2010) contains a semi-empirical formulation for the local bond-slip relationship for both pull-out and splitting failure modes (derived from short pull-out tests), as well as a semi-empirical formulation of the steel stress that ...
We develop an algorithm to solve the bottleneck assignment problem (BAP) that is amenable to having computation distributed over a network of agents. This consists of exploring how each component of the algorithm can be distributed, with a focus on one com ...
In this paper the loaded polymer transport and its escape via a nanometer size aperture, virtually by nanomembrane, the polymer being moved by an exterior electrostatic field, has been studied. Assuming a linear dependency of the friction coefficient on th ...
We provide a new description of the complex computing the Hochschild homology of an -unitary -algebra as a derived tensor product such that: (1) there is a canonical morphism from it to the complex computing the cyclic homology of that was introduced by Ko ...
Numerical continuation in the context of optimization can be used to mitigate convergence issues due to a poor initial guess. In this work, we extend this idea to Riemannian optimization problems, that is, the minimization of a target function on a Riemann ...
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this pa ...
We revisit the calculation of chiral anomalies for global and gauge symmetries in the framework of the covariant derivative expansion (CDE). Due to the presence of UV divergences, the result is an ambiguous quantity that depends on the regularization proce ...
We extend the group-theoretic notion of conditional flatness for a localization functor to any pointed category, and investigate it in the context of homological categories and of semi-abelian categories. In the presence of functorial fiberwise localizatio ...
Electromagnetic waves that resonate with the cyclotron motion of electrons in a magnetized plasma can efficiently transfer their momentum and energy to the plasma. This is routinely used to heat or drive current in tokamak plasmas. The impact of this local ...