Modeling and mitigating supply chain disruptions as a bilevel network flow problem
Related publications (92)
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
In this paper, we consider electric vehicle charging facilities that offer various levels of service, i.e., charging rates, for varying prices such that rational users choose a level of service that minimizes the total cost to themselves including an oppor ...
This paper examines the minimization of the cost for an expected random production output, given an assembly of finished goods from two random inputs, matched in two categories. We describe the optimal input portfolio, first using the standard normal appro ...
2022
Coverage-guided greybox fuzzers rely on control-flow coverage feedback to explore a target program and uncover bugs. Compared to control-flow coverage, data-flow coverage offers a more fine-grained approximation of program behavior. Data-flow coverage capt ...
Lignocellulosic biomass is a potential renewable resource for production of high-value, sustainable products. Furfural is among the important bio-based chemicals in biorefineries. However, the conventional process of furfural production using a reaction-se ...
Generative language models (LMs) have become omnipresent across data science. For a wide variety of tasks, inputs can be phrased as natural language prompts for an LM, from whose output the solution can then be extracted. LM performance has consistently be ...
In this work we consider an online learning problem, called Online k-Clustering with Moving Costs, at which a learner maintains a set of k facilities over T rounds so as to minimize the connection cost of an adversarially selected sequence of clients. The ...
Globalization, outsourcing and cost optimization have all contributed to increased supply chain vulnerability, yet our understanding of effective mitigation strategies remains limited. In our research, we study the effects of disruptions on supply chain ne ...
EPFL2021
In the transition to a sustainable energy system, energy communities have unique advantages; they require no additional land and allow inhabitants to reduce their energy bills. Nowadays, each shareholder’s profit is calculated based on their share of inves ...
2021
In recent years, a new additive manufacturing technology Melt Electrowriting (MEW) has become attractive, especially for biomedical applications, and it has potential in many other fields as well. In order to carry out an in-depth study of melt electrowrit ...
Lensless imaging can provide visual privacy due to the highly multiplexed characteristic of its measurements. However, this alone is a weak form of security, as various adversarial attacks can be designed to invert the one-to-many scene mapping of such cam ...