Audiovisual Summarization of Lectures and Meetings Using a Segment Similarity Graph
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The Distinct Element Method (DEM) is a popular tool to perform granular media simulations. The two key elements this requires are an adequate model for inter-particulate contact forces and an efficient contact detection method. Originally, this method was ...
Definitions are introduced to classify the regions of interest around PLC networks. An improvement to an existing technique for the reduction of emissions from PLC networks is proposed. Using numerical simulations, the technique is shown to reduce any one ...
The distinct element method was originally designed to handle spherical particles. Here, this method is generalized to a wider range of particle shapes called spherosimplices. A contact detection method is given as well which uses weighted Delaunay triangu ...
A finite-temp. linear tetrahedron method for electronic structure calcns. of periodic systems is developed. When compared to widely used simple temp. broadening, the no. of k points necessary for accurate integration at finite temps. is reduced. The utilit ...
We give a new, combinatorial proof for the necklace splitting problem for two thieves using only Tucker's lemma (a combinatorial version of the Borsuk-Ulam theorem). We show how this method can be applied to obtain a related recent result of Simonyi and ev ...
The aim of the present invention is to provide a method to detect misbehavior use of the IEEE 802.11 standard without modifying the standard itself. This aim is reached according to a method for detecting misbehavior in a contention based communication net ...