Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
In integrated ecosystem assessment projects, scenarios provide alternative images of environmental futures as orientation knowledge for opinion-forming and decision-making. Participatory scenario frameworks provide the methodological basis for ecosystem sc ...
The electron self-interaction is a long-standing problem in density functional theory and is particularly critical in the description of polarons. Polarons are quasiparticles involving charge localization coupled with self-induced lattice distortions. Sinc ...
Despite scientific and technological advances in the field of assistive technology (AT) for people with visual impairment (VI), technological designs are frequently based on a poor understanding of the physical and social context of use, resulting in devic ...
X-Ray observation of Venus using JEMX instrument on INTEGRAL telescope in the 18.04.22 to 24.04.22 window. Abstract: On April 22 and 24, 2022, Venus was observed with the JEM-X detector of the INTEGRAL space telescope. The observation performed yielded a d ...
End-to-end learning methods like deep neural networks have been the driving force in the remarkable progress of machine learning in recent years. However, despite their success, the deployment process of such networks in safety-critical use cases, such as ...
Protecting ML classifiers from adversarial examples is crucial. We propose that the main threat is an attacker perturbing a confidently classified input to produce a confident misclassification. We consider in this paper the attack in which a small number ...
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this pa ...
This collection of essays, all authored and curated by Tim Waterman, foregrounds the entangled nature of utopia(nism), landscape (aka landship), design and imagination, where ‘everything is connected, everything is inseparable, everything can have differen ...
Second-harmonic generation allows for coherently bridging distant regions of the optical spectrum, with applications ranging from laser technology to self-referencing of frequency combs. However, accessing the nonlinear response of a medium typically requi ...
Contrary to common stereotypes, engineering education and practice are not purely rational activities. Emotions, just like cognition, play important roles in teaching, learning, and professional practice. Today, there is a nascent body of research explorin ...