Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints, Extended Version
Related publications (64)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
Learning and memory rely on synaptic communication in which intracellular signals are transported to the nucleus to stimulate transcriptional activation. Memory induced transcriptional increases are accompanied by alterations to the epigenetic landscape an ...
Episodic autobiographical memories are characterized by a spatial context and an affective component. But how do affective and spatial aspects interact? Does affect modulate the way we encode the spatial context of events? We investigated how one element o ...
In this thesis, we propose model order reduction techniques for high-dimensional PDEs that preserve structures of the original problems and develop a closure modeling framework leveraging the Mori-Zwanzig formalism and recurrent neural networks. Since high ...
Our work addresses long-term motion context issues for predicting future frames. To predict the future precisely, it is required to capture which long-term motion context (e.g., walking or running) the input motion (e.g., leg movement) belongs to. The bott ...
It is unknown whether visual memory capacity can develop if onset of pattern vision is delayed for several years following birth. We had an opportunity to address this question through our work with an unusual population of 12 congenitally blind individual ...
The study investigates how transcranial direct current stimulation (tDCS) over the auditory cortex (AC) modulates memory for melodies under different noise conditions, whilst also considering cumulative disruptive interference effects. Forty-one participan ...
Side-channel attacks constitute a concrete threat to IoT systems-on-a-chip (SoCs). Embedded memories implemented with 6T SRAM macrocells often dominate the area and power consumption of these SoCs. Regardless of the computational platform, the side-channel ...
Understanding memory requires an explanation for how information can be stored in the brain in a stable state. The change in the brain that accounts for a given memory is referred to as an engram. In recent years, the term engram has been operationalized a ...
We investigate the persistence of micro-contacts between two elastic random rough surfaces by means of a simple model for quasi-static sliding. Contact clusters are calculated with the Boundary Element Method, then surfaces are repeatedly displaced to stud ...
Behavioral diversity seen in biological systems is, at the most basic level, driven by interactions between physical materials and their environment. In this context we are interested in falling paper systems, specifically the V-shaped falling paper (VSFP) ...