Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We describe a new approach to speech recognition, in which all Hidden Markov Model (HMM) states share the same Gaussian Mixture Model (GMM) structure with the same number of Gaussians in each state. The model is defined by vectors associated with each stat ...
This paper studies the irreducible embeddings of simple algebraic groups of exceptional type. It is motivated by the role of such embeddings in the study of positive dimensional closed subgroups of classical algebraic groups. In this paper we give a classi ...
We present a generic method to construct orthogonal projectors for two-dimensional landmark-based parametric spline curves. We construct vector spaces that define a geometric transformation (e.g., affine, similarity, and scaling) that is applied to a refer ...
Every principal G-bundle over X is classified up to equivalence by a homotopy class X -> BG, where BG is the classifying space of G. On the other hand, for every nice topological space X Milnor constructed a strict model of its loop space (Omega) over tild ...
Any biometric recognizer is vulnerable to spoofing attacks and hence voice biometric, also called automatic speaker verification (ASV), is no exception; replay, synthesis, and conversion attacks all provoke false acceptances unless countermeasures are used ...
The family of natural evolution strategies (NES) offers a principled approach to real-valued evolutionary optimization by following the natural gradient of the expected fitness. Like the well-known CMA-ES, the most competitive algorithm in the field, NES c ...
Apparatus comprising M sensors for measuring the temperature on M locations of the apparatus and an estimator configured to estimate a temperature vector of the apparatus with N temperature variables, whereby the estimator is configured to approximate the ...
Motivated by financial applications, we study convex analysis for modules over the ordered ring L0 of random variables. We establish a module analogue of locally convex vector spaces, namely locally L0-convex modules. In this context, we prove hyperplane s ...
2009
,
We study the problem of constructing epsilon-coresets for the (k, z)-clustering problem in a doubling metric M(X, d). An epsilon-coreset is a weighted subset S subset of X with weight function w : S -> R->= 0, such that for any k-subset C is an element of ...
In this paper, we study multidimensional persistence modules (Carlsson and Zomorodian in Discrete Comput Geom 42(1):71-93, 2009; Lesnick in Found Comput Math 15(3):613-650, 2015) via what we call tame functors and noise systems. A noise system leads to a p ...