In this thesis we address various factors that contribute both theoretically and practically to mitigating supply demand mismatches. The thesis is composed of three chapters, where each chapter is an independent scientific paper. In the first paper, we dev ...
We analyze the environmental benefits of operational flexibility that emerge in the form of less product waste during the sourcing process by reducing overproduction. We consider three different options for operational flexibility: (1) lead-time reduction, ...
Offshoring research and development (R&D) commonly invokes concerns regarding the loss of high value jobs and a hollowing out of technological capabilities, but it can also benefit domestic firms by enabling them to tap into the global technological fronti ...
OXFORD UNIV PRESS2019
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
Background: One of the tasks in the 2017 iDASH secure genome analysis competition was to enable training of logistic regression models over encrypted genomic data. More precisely, given a list of approximately 1500 patient records, each with 18 binary feat ...
Protecting the privacy of crowd workers has been an important topic in crowdsourcing, however, task privacy has largely been ignored despite the fact that many tasks, e.g., form digitization, live audio transcription or image tagging often contain sensitiv ...
The control of compliant robots is, due to their often nonlinear and complex dynamics, inherently difficult. The vision of morphological computation proposes to view these aspects not only as problems, but rather also as parts of the solution. Non-rigid bo ...
In secure delegatable computation, computationally weak devices (or clients) wish to outsource their computation and data to an untrusted server in the cloud. While most earlier work considers the general question of how to securely outsource any computati ...
This work studies the nearshore hydrodynamics of a shallow turbulent flow entering a laterally unconfined quiescent ambient with a sloping bottom boundary. Examples of such flow are neutrally buoyant ebb tidal jets and hyperpycnal river plumes entering ope ...
Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing of sensitive data, such as genomic data, comes with important concerns related to privacy and sec ...
In this paper, we present a modeling framework called “Value Map”. Value Map assists in conceptualization, representation and analysis of value creation and capture processes with the objective of innovating a firm’s business model. We illustrate the appli ...