PyLandStats: An open-source Pythonic library to compute landscape metrics
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, ...
This paper aims to describe and explain the processes behind the creation of a digital library composed of two Swiss newspapers, namely Gazette de Lausanne (1798-1998) and Journal de Genève (1826-1998), covering an almost two-century period. We developed a ...
Efficient methods for the convergent synthesis of (poly) cyclic scaffolds are urgently needed in synthetic and medicinal chemistry. Herein, we describe new annulation reactions of thioalkynes with phthalimide-substituted donor-acceptor cyclopropanes, which ...
To maximize run-time performance, programmers often specialize their code by hand, replacing library collections and containers by custom objects in which data is restructured for efficient access. However, changing the data representation is a tedious and ...
The task of Heterogeneous Face Recognition consists in to match face images that were sensed in different modalities, such as sketches to photographs, thermal images to photographs or near infrared to photographs. In this preliminary work we introduce a no ...
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, ...
Peer reviewing is one of the core processes of science. While the typical blind system helps to improve original submissions, there are opportunities for academic publishing to learn from open source practices (commits, bug reports, feature requests, docum ...
Technology downscaling is expected to amplify a variety of reliability concerns in future digital systems. A good understanding of reliability threats is crucial for the creation of efficient mitigation techniques. This survey performs a systematic classif ...
The field of cavity optomechanics is reviewed. This field explores the interaction between electromagnetic radiation and nanomechanical or micromechanical motion. This review covers the basics of optical cavities and mechanical resonators, their mutual opt ...