Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Large hybrid objects integrating multiple functions and whose scale, over 100'000 m2, is halfway between the fragment of a city and that of a large-scale building: these are the key features of the complex projects that are triggering new debates on the su ...
Efficient methods for the convergent synthesis of (poly) cyclic scaffolds are urgently needed in synthetic and medicinal chemistry. Herein, we describe new annulation reactions of thioalkynes with phthalimide-substituted donor-acceptor cyclopropanes, which ...
Let S be a set of n points in R-2 contained in an algebraic curve C of degree d. We prove that the number of distinct distances determined by S is at least c(d)n(4/3), unless C contains a line or a circle. We also prove the lower bound c(d)' min{m(2/3)n(2/ ...
In the present study, the response of model trailing vortices subjected to a harmonic forcing is studied. To this purpose, a globally stable non-parallel Batchelor vortex is considered as the baseflow. Direct numerical simulations (DNS) show that a large v ...
We prove the existence of an affine paving for the three-step flag Hilbert scheme that parametrizes flag of three 0-dimensional subschemes of length, respectively, n, n+1 and n+2 that are supported at the origin of the affine plane. This is done by showing ...
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, ...
In the present thesis we study the geometry of the moduli spaces of Bradlow-Higgs triples on a smooth projective curve C. There is a family of stability conditions for triples that depends on a positive real parameter Ï. The moduli spaces of Ï-semistable ...
We prove that Hausel’s formula for the number of rational points of a Nakajima quiver variety over a finite field also holds in a suitable localization of the Grothendieck ring of varieties. In order to generalize the arithmetic harmonic analysis in his pr ...
Since automatic speaker verification (ASV) systems are highly vulnerable to spoofing attacks, it is important to develop mechanisms that can detect such attacks. To be practical, however, a spoofing attack detection approach should have (i) high accuracy, ...
This paper aims to describe and explain the processes behind the creation of a digital library composed of two Swiss newspapers, namely Gazette de Lausanne (1798-1998) and Journal de Genève (1826-1998), covering an almost two-century period. We developed a ...