The new political dimension in supply security: The downstream integration of gas producers and their political power
Graph Chatbot
Chattez avec Graph Search
Posez n’importe quelle question sur les cours, conférences, exercices, recherches, actualités, etc. de l’EPFL ou essayez les exemples de questions ci-dessous.
AVERTISSEMENT : Le chatbot Graph n'est pas programmé pour fournir des réponses explicites ou catégoriques à vos questions. Il transforme plutôt vos questions en demandes API qui sont distribuées aux différents services informatiques officiellement administrés par l'EPFL. Son but est uniquement de collecter et de recommander des références pertinentes à des contenus que vous pouvez explorer pour vous aider à répondre à vos questions.
We develop an exchange rate target zone model with finite exit time and non-Gaussian tails. We show how the tails are a consequence of time-varying investor risk aversion, which generates mean-preserving spreads in the fundamental distribution. We solve ex ...
Detecting digital face manipulation in images and video has attracted extensive attention due to the potential risk to public trust. To counteract the malicious usage of such techniques, deep learning-based deepfake detection methods have been employed and ...
Predictive models based on machine learning (ML) offer a compelling promise: bringing clarity and structure to complex natural and social environments. However, the use of ML poses substantial risks related to the privacy of their training data as well as ...
Risk management has become an essential element in the functioning of modern society. Correct risk identification and assessment are undoubtedly crucial to improving overall safety; nevertheless, often, it is accompanied by the wrong selection of correcti ...
Static and mobile sensor nodes can be employed in gas monitoring tasks to detect gas leaks in an early stage and localize gas sources. Due to the intermittent nature of gas plumes and the slow dynamics of commonly used gas sensors, measuring gas concentrat ...
Protecting ML classifiers from adversarial examples is crucial. We propose that the main threat is an attacker perturbing a confidently classified input to produce a confident misclassification. We consider in this paper the attack in which a small number ...
Financial criteria in architectural design evaluation are limited to cost performance. Here, I introduce a method – Automated Design Appraisal (ADA) – to predict the market price of a generated building design concept within a local urban context. Integrat ...
In addition to individual practices and access to water, sanitation, and hygiene (WASH) facilities, housing conditions may also be associated with the risk of diarrhea. Our study embraced a broad approach to health determinants by looking at housing depriv ...
Security system designers favor worst-case security metrics, such as those derived from differential privacy (DP), due to the strong guarantees they provide. On the downside, these guarantees result in a high penalty on the system's performance. In this pa ...
Central banks are increasingly concerned about climate-related risks and want to ensure that the financial system is resilient to them. As they integrate these risks into financial stability monitoring, they also discuss how to apply environmental criteria ...