130 result(s)
James Chong The Tesseract NCS Group  How to Sell a Better Mousetrap  How Advanced Analytics and Generative AI is changing the world and how to convince people to use it
27 February 2024
James Chong (The Tesseract, NCS Group) – “How to Sell a Better Mousetrap” – How Advanced Analytics and Generative AI is changing the world and how to convince people to use it
James Chong (The Tesseract, NCS Group) – “How to Sell a Better Mousetrap” – How Advanced Analytics and Generative AI is changing the world and how to convince people to use it
ISTD
Seminar/Lecture

3.00 pm – 4.15 pm
SUTD Albert Hong Lecture Theatre (Building 1, Level 1) 8 Somapah Road
Nitish Ramkumar London Stock Exchange Group - Present and Future of Financing Net-Zero Transition
22 February 2024
Nitish Ramkumar (London Stock Exchange Group) – Present and Future of Financing Net-Zero Transition
According to a UN report from 2022, time is running out to limit temperature rises to 1.5C by 2050. Around $3.5 trillion climate investment per year is needed to build the net zero economy by 2050. This investment is possible only with significant contribution from the private financial sector. This is specifically the case in emerging markets, where public investments aren’t growing as quickly as needed to meet climate targets. There are a quite a few issues related to data disclosures, transparency and complexities, which needs to be tackled in order to efficiently manage the private sustainable investment need. Data Science and Innovation can help tackle these issues and assist the community is making quick and accurate investment decisions.
ESD
Seminar/Lecture

6.30 pm – 7.30 pm
SUTD Lecture Theatre 5 (Building 2, Level 5) 8 Somapah Road
Pye Sone Kyaw Government Technology Agency  Leveraging AIML for Transformative Solutions in Diverse Industries
21 February 2024
Pye Sone Kyaw (Government Technology Agency) – Leveraging AI/ML for Transformative Solutions in Diverse Industries
Pye Sone Kyaw (Government Technology Agency) – Leveraging AI/ML for Transformative Solutions in Diverse Industries
ISTD
Seminar/Lecture

2.30 pm – 4.00 pm
SUTD Lecture Theatre 5 (Building 2, Level 5) 8 Somapah Road
Geoffrey Chua Nanyang Technological University - An Algorithmic Approach to Managing Supply Chain Data Security The Differentially Private Newsvendor
15 February 2024
Geoffrey Chua (Nanyang Technological University) – An Algorithmic Approach to Managing Supply Chain Data Security: The Differentially Private Newsvendor
Data is now unanimously considered a key firm asset for enabling better operational decisions. However, data-driven decisions can inadvertently expose private data, leaving firms vulnerable to unforeseen danger. How to manage data security risks by protecting data from being inferred from observable decisions thus becomes an important question. In this paper, we focus on data security in supply chains due to their data-intensive nature. Specifically, we examine a data-driven contextual newsvendor problem. To quantify and ensure data security, we adopt the notion of differential privacy, a mathematically rigorous measure of data security that limits an attacker’s inference accuracy. Employing convolution smoothing and noise injection, we propose several differentially private algorithms that provably guarantee both data security and asymptotic optimality with (near) optimal rates. In the non-asymptotic regime, we further identify three drivers of the cost of data security; namely, dataset size, context, and number of products. This finding suggests that gathering more data, collecting detailed context, and pooling data from multiple products can lower data security cost. Lastly, we examine the impact of a newsvendor’s private algorithms on supply chain partners. We discover additional distortion to the demand signaling process and lower profit share for an upstream supplier.
ESD
Seminar/Lecture

10.00 am – 11.00 am
SUTD Think Tank 21 (Building 2, Level 3) 8 Somapah Road
Andre Sirimanne amp Arun Chandrasekaran Ollion  Navigating the Data Analytics Frontier From Concepts to Applications
07 February 2024
Andre Sirimanne & Arun Chandrasekaran (Ollion) – Navigating the Data Analytics Frontier: From Concepts to Applications
Andre Sirimanne & Arun Chandrasekaran (Ollion) – Navigating the Data Analytics Frontier: From Concepts to Applications
ISTD
Seminar/Lecture

2.00 pm – 3.30 pm
SUTD Lecture Theatre 4 (Building 2, Level 4) 8 Somapah Road
DH Asia Webinar Series Computational Methods and Intangible Cultural Heritage by Dr Miguel Escobar Varela
02 February 2024
DH Asia Webinar Series: “Computational Methods and Intangible Cultural Heritage” by Dr. Miguel Escobar Varela
DH Asia Webinar Series: “Computational Methods and Intangible Cultural Heritage” by Dr. Miguel Escobar Varela
HASS
Seminar/Lecture

2.00 pm – 3.00 pm
Lee Wei Yang Monetary Authority of Singapore - Digitalizing the Future of License Applications
30 January 2024
Lee Wei Yang (Monetary Authority of Singapore) – Digitalizing the Future of License Applications
Assessing license applications submitted by Financial Institutions can be a long and manual process with stringent requirements to be met to ensure Singapore remains a secure and stable financial hub. How might we enable a smooth and comprehensive process for Financial Institutions to transact with Monetary Authority of Singapore so that applications can be processed more efficiently? With the launch of eLicensing application, the application process has now become more streamlined with automated processes and built-in validations for forms.
ESD
Seminar/Lecture

6.30 pm – 7.30 pm
SUTD Lecture Theatre 4 (Building 2, Level 4) 8 Somapah Road
Feng Ling ASTAR - Optimal Machine Intelligence at the Edge of Chaos and Initial Applications to Model Training
12 January 2024
Feng Ling (A*STAR) – Optimal Machine Intelligence at the Edge of Chaos and Initial Applications to Model Training
It has long been suggested that the biological brain operates at some critical point between two different phases, possibly order and chaos, to maximize the information processing power. Investigating the same hypothesis on the ‘artificial’ brains, i.e. the modern computer vision models, we find that they exhibits the same pattern, i.e. highest test accuracy or lowest test loss at the edge of chaos. A theoretical investigation demonstrates that, the best performance is attributed to the maximal metastable states/periodic cycle length near the edge of chaos, where each metastable state can represent an information point. Applied on a very simple network equivalent of the SK spin glass model and Fashion MNIST dataset, we illustrate a simple and principled training method that can achieve both high accuracy and prevent fitting noisy labels automatically.
ESD
Seminar/Lecture

11.00 am – 12.00 pm
SUTD Think Tank 22 (Building 2, Level 3) 8 Somapah Road
DH Asia Webinar Series The Diaries of the Soviet Ambassador in Pyongyang Data-Specific Network Approaches to North Korean History Studies by Dr Donghyun Woo
15 December 2023
DH Asia Webinar Series: “The Diaries of the Soviet Ambassador in Pyongyang: Data-Specific Network Approaches to North Korean History Studies” by Dr. Donghyun Woo
DH Asia Webinar Series: “The Diaries of the Soviet Ambassador in Pyongyang: Data-Specific Network Approaches to North Korean History Studies” by Dr. Donghyun Woo
HASS
Seminar/Lecture

2.00 pm – 4.00 pm
Online
Limited-Trust in Diffusion of Competing Alternatives Over Social Networks amp Apurv Shukla Texas AampM University - Differentially Private Online Resource Allocation
15 December 2023
Limited-Trust in Diffusion of Competing Alternatives Over Social Networks & Apurv Shukla (Texas A&M University) – Differentially Private Online Resource Allocation
We consider the diffusion of two alternatives in social networks using a game-theoretic approach. Each individual plays a coordination game with its neighbors repeatedly and decides which to adopt. As products are used in conjunction with others and through repeated interactions, individuals are more interested in their long-term benefits and tend to show trust to others to maximize their long-term utility by choosing a suboptimal option with respect to instantaneous payoff. To capture such trust behavior, we deploy limited-trust equilibrium (LTE) in diffusion process. We analyze the convergence of emerging dynamics to equilibrium points using mean-field approximation and study the equilibrium state and the convergence rate of diffusion using absorption probability and expected absorption time of a reduced-size absorbing Markov chain. We also show that the diffusion model on LTE under the best-response strategy can be converted to the well-known linear threshold model. Simulation results show that when agents behave trustworthy, their long-term utility will increase significantly compared to the case when they are solely self-interested. Moreover, the Markov chain analysis provides a good estimate of convergence properties over random networks.
Seminar/Lecture

11.00 am – 12.00 pm
SUTD Lecture Theatre 3 (Building 2, Level 4) 8 Somapah Road