Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We study bounding approximations for a multistage stochastic program with expected value constraints. Two simpler approximate stochastic programs, which provide upper and lower bounds on the original problem, are obtained by replacing the original stochast ...
Floods are not only due to fatality. It is the responsibility of the human being to protect himself from heavy damages due to natural elements, and he sometimes has the chance to profit from a given situation to influence events. One of these possibilities ...
This paper investigates the achievable rates using variable length codes when transmitting independent informationover a degraded broadcast channel. In this note, we define the transmission rates from the perspective of the receivers and allow the decoders ...
Speaker detection is an important component of a speech-based user interface. Audiovisual speaker detection, speech and speaker recognition or speech synthesis for example find multiple applications in human-computer interaction, multimedia content indexin ...
Agreement is at the heart of distributed computing. In its simple form, it requires a set of processes to decide on a common value out of the values they propose. The time-complexity of distributed agreement problems is generally measured in terms of the n ...
This document provides a methodical investigation of the main assessment steps that have led to the construction of Eurotunnel and it compares the results of the analyses that were achieved before the key decisions with the results of studies that have bee ...
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is scarce or non-existent. We review existing techniques for dealing with this p ...
Finance does not represent the desirability of a gamble in terms of a score on a unidimensional scale, but rather in terms of the trade-off or conflict between various statistical features of the payoff. The approach facilitates computations and dramatical ...
This paper presents a new method for evaluating product designs at their early stage of development according to different criteria and a case-study-based project. The goal is to select among imprecisely defined design alternatives in a multicriteria conte ...