Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
End user
Applied sciences
Computer engineering
Software engineering
Topics in software engineering
Graph Chatbot
Related lectures (31)
Login to filter by course
Login to filter by course
Reset
Chaos and Sensitivity in Double Pendulum
Delves into chaos and sensitivity in the double pendulum system, exploring unpredictability and exponential divergence of trajectories.
Deanonymizing Databases: IMDB vs Netflix
Explores deanonymizing IMDB and Netflix databases, revealing user identities and analyzing movie evaluations.
Numerical Methods: Differential Equations
Covers the application of numerical methods to solve differential equations using MATLAB.
Riemannian Trust Regions framework
Introduces the Riemannian Trust Regions (RTR) framework, covering conjugate directions, Newton's method, and model improvement.
Piston Stress Analysis
Covers the static calculation of a piston using Abaqus CAE.
Recommender Systems and Structure Discovery
Explores recommender systems, latent factor models, and clustering algorithms for structure discovery.
Optimization in Machine Learning
Explores optimization techniques, word embeddings, and recommendation systems in machine learning.
Search and Routing Protocols
Explores unstructured and structured search and routing protocols, emphasizing the importance of network structure assumptions and introducing the 'Bubble Storm' algorithm.
Moodle Environment
Explores the support services and environment of Moodle at EPFL, including group modes, admin tools, course management, and user interactions.
Finite Element Method: Applications and Formulations
Explores the application and formulation of the finite element method in solving various engineering problems.
Internet Advertising Giants: Google & Facebook
Explores the dominance of Google and Facebook in internet advertising, covering revenue, user statistics, ad auctions, and data privacy.
Previous
Page 2 of 2
Next