Entrepreneurial Opportunities and Threats in the Era of Grand Societal Challenges
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
The need for nodes to be able to generate their own address and verify those from others, without relying on a global trusted authority, is a well-known problem in networking. One popular technique for solving this problem is to use self-certifying address ...
Springer-Verlag New York, Ms Ingrid Cunningham, 175 Fifth Ave, New York, Ny 10010 Usa2009
The influence of firms on the elaboration of climate policy in a democratic system is quite controversial. Firms do not form a solid bloc of opponents to environmental regulation. Some firms even expect to gain from such regulation, either because they off ...
Spheropolyhedra are bodies obtained as Minkowski sums of polyhedra with spheres. They are simple, yet flexible models of non-spherical particles for granular media simulated with the Distinct Element Method (DEM). We here give an analytical method for the ...
Research on Networks on Chips (NoCs) has spanned over a decade and its results are now visible in some products. Thus the seminal idea of using networking technology to address the chip-level interconnect problem has been shown to be correct. Moreover, as ...
This paper wants to further develop the theory of co-evolution between technology and institutions in the network industries by addressing one of the critiques that is generally raised, namely the lack of taking into account its dynamics. The paper outline ...
Discussion paper series on the coherence between institutions and technologies in infrastructures2010
We investigate the asymptotic behavior of the solution to equations of the p-Laplacian type in cylindrical domains becoming unbounded and address some issues regarding the solution in unbounded domains. ...
Several recent studies identify the memory system as the most frequent source of hardware failures in commercial servers. Techniques to protect the memory system from failures must continue to service memory requests, despite hardware failures. Furthermore ...
2007
Responses to educational inequality in Ireland are typically individualistic, addressing themselves to the individual learner rather than to the structural or social processes that give rise to inequality. This chapter reviews some of the systemic causes o ...
The Web services resource framework (WS-RF) and the Web services notification (WS-N) specifications are a crucial component of grid infrastructures. They provide a standardized interface to stateful services so that they can be managed remotely. There are ...
We develop three functions around the MAC layer: (1) Pseudo broadcast is a technique used to improve throughput of broadcast transmissions in case of congested networks. The mechanism consists in sending a packet in unicast to a station using RTS/CTS. Othe ...