The evaluation of avalanche release depths constitutes a great challenge for risk assessment in mountainous areas. This study focuses on slab avalanches, which generally result from the rupture of a weak layer underlying a cohesive slab. We use the finite- ...
When developing code, a programmer typically knows the approximate structure of the desired expression. However, often the first attempt at writing it down results in an ill-typed code fragment. We propose an approach that automatically repairs code expres ...
2013
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
This thesis presents two approaches to code generation (synthesis) along with a discussion of other related and influential works, their ideas and relations to these approaches. The common goal of these approaches is to efficiently and effectively assist d ...
This paper focuses on urban environmental system identification. Wind-flow modeling is a challenging task because of simplifications of complex processes as well as geometry simplifications. Even a more detailed model may not be accurate because of uncerta ...
Institute of Electrical and Electronics Engineers ( IEEE )2013
We propose and study the notions of behaviour type and composition operator making a first step towards the definition of a formal framework for studying behaviour composition in a setting sufficiently general to provide insight into how the component-base ...
In the scientific literature, two main approaches have been proposed for control system design from data. In the "model-based" approach, a model of the system is first derived from data and then a controller is computed based on the model. In the "data-dri ...
In this paper, we propose a system level design approach considering voltage over-scaling (VOS) that achieves error resiliency using unequal error protection of different computation elements, while incurring minor quality degradation. Depending on user sp ...
Speaker verification (SV) on portable devices like smartphones is gradually becoming popular. In this context, two issues need to be considered: 1) such devices have relatively limited computation resources, and 2) they are liable to be used everywhere, po ...
This work aims at investigating the automatic recognition of speaker role in meeting conversations from the AMI corpus. Two types of roles are considered: formal roles, fixed over the meeting duration and recognized at recording level, and social roles rel ...
In this paper we show how the deployment of a lightweight note sharing system can restore the antique social vocation of annotations in the classroom. The system was designed for the classroom context and evaluated through a longitudinal study lasting for ...