Search for tag: "algorithm"

DeCenter Seminar Series "What Insights Can We Learn from the Bitcoin Algorithm" - by Ling Ren (11.15.2023)

+22 More
From  Broadcast Broadcast Center Staff 0 likes 5 plays

CITP Lecture: Peter Henderson – Aligning Machine Learning, Law, and Policy for Responsible Real-World Deployments

Machine learning (ML) is being deployed to a vast array of real-world applications with profound impacts on society. ML can have positive impacts, such as aiding in the discovery of new cures for…

From  CI Center for Information Technology Policy 0 likes 26 plays

CITP Lecture: "The Societal Impact of Foundation Models"

Foundation models (ChatGPT, StableDiffusion) are transforming society: remarkable capabilities, serious risks, rampant deployment, unprecedented adoption, overflowing funding, and unending…

From  Broadcast Broadcast Center Staff 0 likes 41 plays

CITP Lecture: Michael P. Kim - Foundations of Responsible Machine Learning

Algorithms make predictions about people constantly. The spread of such prediction systems has raised concerns that machine learning algorithms may exhibit problematic behavior, especially…

From  CI Center for Information Technology Policy 0 likes 23 plays

A.I. and the Future of Religion: A Conversation with Beth Singler

Beth Singler is Assistant Professor in Digital Religion(s) at the University of Zurich in the Faculty of Theology. She explores the social, ethical, philosophical, and religious implications of…

+19 More
From  jlegath Legath 0 likes 154 plays

CITP Seminar: Kobbi Nissim - Can We Reconcile the Computer Science and Legal Views of Privacy?

Law and computer science interact in critical ways within sociotechnical systems, and recognition is growing among computer scientists, legal scholars, and practitioners of significant gaps between…

+19 More
From  CI Center for Information Technology Policy 0 likes 5 plays

DataX SCM Workshop 6-2022_Shen

+19 More
From  Broadcast Broadcast Center Staff 0 likes 15 plays

DataX PPPL Workshop 5-2022_Melchior Part 1

+19 More
From  Broadcast Broadcast Center Staff 0 likes 21 plays

Jose Garrrido Torres: DataX Catalysis Data Scientists

+19 More
From  Broadcast Broadcast Center Staff 0 likes 61 plays

Facial Recognition Technology in the State of New Jersey: Promoting Resident Privacy through Transparency and Regulation Within Law Enforcement, Grace Zhuang, UG '23 (3963609)

Facial recognition technology is a tool that is being used across the country by state and local law enforcement agencies. Within law enforcement, facial recognition technology can be used in cases…

+20 More
From  Research Princeton Research Day 0 likes 160 plays

Generative Art, Luke Shannon, UG '23 (3965156)

I make generative art (in which the artist deliberately gives some amount of control to an autonomous system). Almost all of my work is a code-generated instance of an algorithm with an infinite,…

From  Research Princeton Research Day 4 likes 110 plays

Robot Swarms for Surface Inspection Applications, Darren Chiu, UG '23 (3958946)

Robotic swarm inspection offers a flexible, scalable, and cost-effective solution in comparison to human inspection such as the benefit of being resilient to individual failures and simplicity in…

+20 More
From  Research Princeton Research Day 3 likes 63 plays

Intro to Machine Learning, Part 4 of 4

This course is primarily intended for non-computer science students who want to understand the foundations of building and testing an ML pipeline, different model types, important considerations in…

+22 More
From  Andrea Rubinstein 0 likes 18 plays

Celebrate Princeton Innovation 2021: Ruby Lee: Tiny AI module for detecting smartphone theft and anomalous behavior

Professor Ruby Lee describes the development of built-in smartphone hardware to rapidly detect when a thief tries to use a stolen cell phone to access data and online information. This technology…

+22 More
From  Catherine Zandonella 0 likes 36 plays

CITP Seminar: Matt Weinberg - A Crash Course on Algorithmic Mechanism Design

Algorithmic Mechanism Design studies the design of algorithms in settings where participants have their own incentives. For example, when executing an ad auction, the auctioneer/designer wants to…

+20 More
From  CI Center for Information Technology Policy 0 likes 21 plays

GSS17August2021_Hakim

+20 More
From  PPPL Admins 0 likes 42 plays