Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
This paper reviews the mortgage-backed securities (MBS) market, with a particular emphasis on agency residential MBS in the United States. We discuss the institutional environment, security design, MBS risks and asset pricing, and the economic effects of m ...
In light of the environmental consequences of linear production and consumption processes, the circular economy (CE) is gaining momentum as a concept and practice, promoting closed material cycles by focusing on multiple strategies from material recycling ...
In this article, I focus on digital scientific archives which are made up of the leftovers of science, such as drafts, obsolete instruments, photographs, documentation, etc. The artifacts exhibited in such collections were neither meant to be representatio ...
We show that smooth, radially symmetric wave maps U from R2+1 to a compact target manifold N, where ∂rU and ∂tU have compact support for any fixed time, scatter. The result will follow from the work of Christodoulou ...
We study the semilinear wave equation ∂t2ψ−Δψ=∣ψ∣p−1ψ for p>3 with radial data in three spatial dimensions. There exists an explicit solution which blows up at t=T>0 given by $\displaystyl ...
We investigate the stability and stabilization of the cubic focusing Klein-Gordon equation around static solutions on the closed ball in R3. First we show that the system is linearly unstable near the static solution u≡1 for any dissipat ...
The group testing problem consists of determining a sparse subset of a set of items that are ``defective'' based on a set of possibly noisy tests, and arises in areas such as medical testing, fault detection, communication protocols, pattern matching, and ...
In this paper, we consider the problem of sequentially optimizing a black-box function f based on noisy samples and bandit feedback. We assume that f is smooth in the sense of having a bounded norm in some reproducing kernel Hilbert space (RKHS), yield ...
The NIST standard FF3 scheme (also known as BPS scheme) is a tweakable block cipher based on a 8-round Feistel Network. We break it with a practical attack. Our attack exploits the bad domain separation in FF3 design. The attack works with chosen plaintext ...
In this paper, we study the information-theoretic limits of community detection in the symmetric two-community stochastic block model, with intra-community and inter-community edge probabilities na and nb respectively. We consider the ...