Adaptive predictors based on probabilistic SVM for real time disruption mitigation on JET
Related publications (91)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This paper presents a synthesis of a framework of cooperative work directed towards creativity, innovation and decision-making. This framework is adapted to project management and integrates the concepts, methodologies and technologies, which aim at improv ...
Linear alkylbenzenes (LABs) are common environmental contaminants associated with a range of industrial and domestic activities. Although natural environments receiving LABs may exhibit a range of redox conditions, until now only aerobic biodegradation of ...
The visualization of complex cellular processes involving multiple proteins requires the use of spectroscopically distinguishable fluorescent reporters. We have previously introduced the SNAP-tag as a general tool for the specific labeling of SNAP-tag fusi ...
Economic development policies such as the Enterprise Zone have been pursued with different designs by state and local governments in many countries. These programs can be defined by a double objective: to promote and control economic growth. This thesis in ...
In this paper, we describe the architecture and the functionality of our own OCL tool called RoclET. Besides standard features of OCL tools such as editing of class and object diagrams and parsing of OCL assertions (invariants, pre-/post-conditions), our t ...
People frequently use the world-wide web to find their most preferred item among a large range of options. We call this task preference-based search. The most common tool for preference-based search on the WWW today obtains users' preferences by asking the ...
The accuracy of a machine-tool depends on manufacturing and assembly errors, backlash in the structure and the links, thermal variations, vibrations, and others. The method presented in this paper deals with manufacturing and assembly errors but it can be ...
Automated vulnerability searching tools have led to a dramatic increase of the rate at which such flaws are discovered. One particular searching technique is fault injection i.e. insertion of random data into input files, buffers or protocol packets, combi ...
Abstract Generalized extreme value (GEV) models provide a convenient way to model choice behavior that is consistent with utility maximization theory, but the development of specific new models within the GEV family has been slow, due to the difficulty of ...
Traditional media, such as text, image, audio and video, have long been the main media resources and granted full support of standard desktop tools and applications. Interactive rich multimedia documents, adding resources such as video or synthetic animati ...