Search for tag: "algorithm"

DeCenter Seminar Series "What Insights Can We Learn from the Bitcoin Algorithm" - by Ling Ren (11.15.2023)

From  Broadcast Broadcast Center Staff 0 likes 5 plays

CITP Lecture: Peter Henderson – Aligning Machine Learning, Law, and Policy for Responsible Real-World Deployments

Machine learning (ML) is being deployed to a vast array of real-world applications with profound impacts on society. ML can have positive impacts, such as aiding in the discovery of new cures for…

From  CI Center for Information Technology Policy 0 likes 25 plays

CITP Lecture: "The Societal Impact of Foundation Models"

Foundation models (ChatGPT, StableDiffusion) are transforming society: remarkable capabilities, serious risks, rampant deployment, unprecedented adoption, overflowing funding, and unending…

From  Broadcast Broadcast Center Staff 0 likes 40 plays

CITP Lecture: Michael P. Kim - Foundations of Responsible Machine Learning

Algorithms make predictions about people constantly. The spread of such prediction systems has raised concerns that machine learning algorithms may exhibit problematic behavior, especially…

From  CI Center for Information Technology Policy 0 likes 23 plays

A.I. and the Future of Religion: A Conversation with Beth Singler

Beth Singler is Assistant Professor in Digital Religion(s) at the University of Zurich in the Faculty of Theology. She explores the social, ethical, philosophical, and religious implications of…

From  jlegath Legath 0 likes 143 plays

CITP Seminar: Kobbi Nissim - Can We Reconcile the Computer Science and Legal Views of Privacy?

Law and computer science interact in critical ways within sociotechnical systems, and recognition is growing among computer scientists, legal scholars, and practitioners of significant gaps between…

From  CI Center for Information Technology Policy 0 likes 5 plays

DataX SCM Workshop 6-2022_Shen

From  Broadcast Broadcast Center Staff 0 likes 14 plays

DataX PPPL Workshop 5-2022_Melchior Part 1

From  Broadcast Broadcast Center Staff 0 likes 18 plays

Jose Garrrido Torres: DataX Catalysis Data Scientists

From  Broadcast Broadcast Center Staff 0 likes 58 plays

Facial Recognition Technology in the State of New Jersey: Promoting Resident Privacy through Transparency and Regulation Within Law Enforcement, Grace Zhuang, UG '23 (3963609)

Facial recognition technology is a tool that is being used across the country by state and local law enforcement agencies. Within law enforcement, facial recognition technology can be used in cases…

From  Research Princeton Research Day 0 likes 159 plays

Generative Art, Luke Shannon, UG '23 (3965156)

I make generative art (in which the artist deliberately gives some amount of control to an autonomous system). Almost all of my work is a code-generated instance of an algorithm with an infinite,…

From  Research Princeton Research Day 4 likes 107 plays

Robot Swarms for Surface Inspection Applications, Darren Chiu, UG '23 (3958946)

Robotic swarm inspection offers a flexible, scalable, and cost-effective solution in comparison to human inspection such as the benefit of being resilient to individual failures and simplicity in…

From  Research Princeton Research Day 3 likes 61 plays

Intro to Machine Learning, Part 4 of 4

This course is primarily intended for non-computer science students who want to understand the foundations of building and testing an ML pipeline, different model types, important considerations in…

From  Andrea Rubinstein 0 likes 18 plays

Celebrate Princeton Innovation 2021: Ruby Lee: Tiny AI module for detecting smartphone theft and anomalous behavior

Professor Ruby Lee describes the development of built-in smartphone hardware to rapidly detect when a thief tries to use a stolen cell phone to access data and online information. This technology…

From  Catherine Zandonella 0 likes 35 plays

CITP Seminar: Matt Weinberg - A Crash Course on Algorithmic Mechanism Design

Algorithmic Mechanism Design studies the design of algorithms in settings where participants have their own incentives. For example, when executing an ad auction, the auctioneer/designer wants to…

From  CI Center for Information Technology Policy 0 likes 21 plays

GSS17August2021_Hakim

From  PPPL Admins 0 likes 42 plays