Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
This paper presents a new approach for estimating physical properties of deformable models from experimental measurements. In contrast to most previous work, we introduce a new method based on particle filters which identifies the different stiffness prope ...
Ieee Service Center, 445 Hoes Lane, Po Box 1331, Piscataway, Nj 08855-1331 Usa2008
Malaria is a major threat to world health. The identification of parasite targets for drug development is a priority and parasitic protein kinases suggest themselves as suitable targets as many display profound structural and functional divergences from th ...
The sizing process of a supercapacitive tank is today a well-known procedure. It enables the identification of the number of cells needed to match energy requirements. In some cases, this number must be increased, in order to match the power needs of the a ...
Methods of inferring user preferences using ontologies use ontology structure based similarity and an inference mechanism in defining ontology filtering (OF). Items are recommended to users by identifying items that the users may prefer, but may not have b ...
Entrepreneurs play a fundamental role in bringing new technologies to market. Because technologies are often configurable to serve a variety of different markets, it is possible for entrepreneurs to identify multiple market opportunities prior to the first ...
The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? What if processes do not have unique identifiers or do not wish to divulge them for re ...
The vast majority of papers on distributed computing assume that processes are assigned unique identifiers before computation begins. But is this assumption necessary? What if processes do not have unique identifiers or do not wish to divulge them for reas ...
We study the jamming of bead assemblies placed in a cylindrical container whose bottom is pierced with a circular hole. Their jamming behavior is quantified here by the mean critical diameter, that is the diameter of the hole for which the jamming probabil ...
Analyzing the proliferation of item-level RFID, recent studies have identified the cost sharing of the technology as a gating issue. Various qualitative studies have predicted that conflict will arise, in particular in decentralized supply chains, from the ...
The present article evaluates the knowledge that can be attributed to the application of « Best Practices » in the field of urban habitat. It especially aims at identifying the conditions of innovation in such a setting, as well as defining the necessary c ...