Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We contribute to the classification of finite dimensional algebras under stable equivalence of Morita type. More precisely we give a classification of Erdmann's algebras of dihedral, semi-dihedral and quaternion type and obtain as byproduct the validity of ...
The problem of time validity of biometricmodels has received only a marginal attention from researchers. In this paper, we propose to manage the aging influence on the adult face verification system by an A-stack age modeling technique, which uses the age ...
The Kühtai reservoir is planned as an addition to the existing Sellrain-Silz group of HPPs. Two natural hazards relevant in terms of potential impulse wave impact on the dam were identified: a snow avalanche near the dam axis and a possible landslide furth ...
The problem of time validity of biometric models has received only a marginal attention from researchers. Actual and up-to-date at the time of their creation, extracted features and models relevant to a person's face may eventually become outdated, leading ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2010
In this study, we compared the cervical range of movement (ROM) and range of angular velocity (RAV) measured simultaneously using a 3-dimensional electrogoniometer, the CA6000-OSI (OSI), an optoelectronic motion capture system (MCS), the VICON® and a weara ...
We compare in an analytical way two leader-based and decentralized algorithms (that is, algorithms that do not use a leader) for Byzantine consensus with strong validity. We show that for \emph{the algorithms we analyzed}, in most cases, the decentralized ...
We propose a novel way to augment a real-world scene with minimal user intervention on a mobile phone; the user only has to point the phone camera to the desired location of the augmentation. Our method is valid for horizontal or vertical surfaces only, bu ...
Personal navigation has grown rapidly with the introduction of ubiquitous computing and the new generation of smart phones. Appropriate localisation is nowadays a central element for many applications and mobile services. However the proper estimation of t ...
Welding of wood is a relatively new method of joining load bearing elements, which holds the potential to compete with structural adhesion, since it allows for an almost instantaneous bond. First experimental and numerical investigations showed that failur ...
Abstract—Performance evaluation of the 802.11 MAC protocol is classically based on the decoupling assumption, which hypothesizes that the backoff processes at different nodes are independent. A necessary condition for the validity of this approach is the e ...