Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this thesis we address various factors that contribute both theoretically and practically to mitigating supply demand mismatches. The thesis is composed of three chapters, where each chapter is an independent scientific paper. In the first paper, we dev ...
This work studies the nearshore hydrodynamics of a shallow turbulent flow entering a laterally unconfined quiescent ambient with a sloping bottom boundary. Examples of such flow are neutrally buoyant ebb tidal jets and hyperpycnal river plumes entering ope ...
We analyze the environmental benefits of operational flexibility that emerge in the form of less product waste during the sourcing process by reducing overproduction. We consider three different options for operational flexibility: (1) lead-time reduction, ...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing of sensitive data, such as genomic data, comes with important concerns related to privacy and sec ...
Protecting the privacy of crowd workers has been an important topic in crowdsourcing, however, task privacy has largely been ignored despite the fact that many tasks, e.g., form digitization, live audio transcription or image tagging often contain sensitiv ...
Background: One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic data. More precisely, given a list of approximately 1500 patient records, each with 18 binary feat ...
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their computation and data to an untrusted server in the cloud. While most earlier work considers the general question of how to securely outsource any computati ...
In this paper, we present a modeling framework called “Value Map”. Value Map assists in conceptualization, representation and analysis of value creation and capture processes with the objective of innovating a firm’s business model. We illustrate the appli ...
The control of compliant robots is, due to their often nonlinear and complex dynamics, inherently difficult. The vision of morphological computation proposes to view these aspects not only as problems, but rather also as parts of the solution. Non-rigid bo ...
Offshoring research and development (R&D) commonly invokes concerns regarding the loss of high value jobs and a hollowing out of technological capabilities, but it can also benefit domestic firms by enabling them to tap into the global technological fronti ...