Technologizing Democracy or Democratizing Technology? A Layered-Architecture Perspective on Potentials and Challenges
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
With the pervasive digitalization of modern life, we benefit from efficient access to information and services. Yet, this digitalization poses severe privacy challenges, especially for special-needs individuals. Beyond being a fundamental human right, priv ...
This collection of essays, all authored and curated by Tim Waterman, foregrounds the entangled nature of utopia(nism), landscape (aka landship), design and imagination, where ‘everything is connected, everything is inseparable, everything can have differen ...
Graph Neural Networks (GNNs) have emerged as a powerful tool for learning on graphs, demonstrating exceptional performance in various domains. However, as GNNs become increasingly popular, new challenges arise. One of the most pressing is the need to ensur ...
One major challenge in distributed learning is to efficiently learn for each client when the data across clients is heterogeneous or non iid (not independent or identically distributed). This provides a significant challenge as the data of the other client ...
Lawful Interception (LI) is a legal obligation of Communication Service Providers (CSPs) to provide interception capabilities to Law Enforcement Agencies (LEAs) in order to gain insightful data from network communications for criminal proceedings, e.g., ne ...
The Academic Citizens’ Assembly (ACA) is a model of a citizens’ assembly built on academic principles (evidence-based, lobby-free, no ideology), open to the whole society and, using a novel process and tools, scalable to potentially include millions of par ...
Although encryption hides the content of communications from third parties, metadata, i.e., the information attached to the content (such as the size or timing of communication) can be a rich source of details and context. In this dissertation, we demonstr ...
This presentation argues that strategical activity and discourse of the Marshall Plan indoctrinated ‘democracy, cooperation and freedom’ and instrumentalized this discourse in union-founded workers’ housing cooperatives as a means of setting the bottom-up ...
Strategic information is valuable either by remaining private (for instance if it is sensitive) or, on the other hand, by being used publicly to increase some utility. These two objectives are antagonistic and leaking this information by taking full advant ...
Typical urban participatory approaches engage citizens through lengthy sessions far from the area under transformation by an urban project. Several issues result from these settings of involvement including the mobilization of similar individuals, overwhel ...