Search for tag: "computers"

Making Your Code Run Faster: Hardware Acceleration for Similar Input Data, Haiyue Ma, GS (2924007)

It is crucial to make computer programs run faster. Traditionally, the execution time for the same program stays the same regardless of the inputs. Based on the observation that programs tend to…

From  Research Princeton Research Day 0 likes 96 plays

How do we know what we know? -- as a mathematical question. Designing knowledge assumptions and asymmetric encryption schemes in lattice-based cryptography., Yuxi Zheng, UG '23 (2279885)

Assumptions of various hard problems are essential in modern cryptography. There is a group of assumptions known as the “knowledge assumptions.” They assume that in order for the…

From  Research Princeton Research Day 4 likes 79 plays

Accelerating Design Space Exploration with Differentiable Surrogate Models, Shikhar Tuli, GS (2278304)

Researchers constantly strive to explore large and complex search spaces in various scientific studies and physical experiments. These could include searching the exponentially large set of…

From  Research Princeton Research Day 3 likes 37 plays

CITP Lecture: "Designing Usable and Useful Privacy Choice Interfaces"

From  Broadcast Broadcast Center Staff 0 likes 9 plays

2023 Alumni Day Madison Medal Lecture - Dr. Robert Kahn *64

From  University Advancement 0 likes 3 plays

JPP15September2022_YShi

From  PPPL Admins 0 likes 30 plays

ReMatch Intern – Wilder ( Alexander) Crosier

From  our Undergraduate Research 0 likes 56 plays

M+M | 03/15/2022 | Ben Peters: After Computation: Critical Reflections on Digital Crisis [Response: Paize Keulemans]

In this discussion, Thomas S. Mullaney and Benjamin Peters - two of the editors of Your Computer Is On Fire (MIT Press 2021, with Mar Hicks and Kavita Philip) - gather to explore the question: Is…

From  M+M Program in Media and Modernity 0 likes 25 plays

Engage 2021 - Celebrate Princeton Innovation (Part 3)

Part 3 of 3 - Explore the Tech Track with Bruce Koel, Fatima Ebrahimi, Andrew Houck, Ruby Lee, Adam Finkelstein, and Jiaqi Su.Other CPI parts: Part 1 of 3 - Dean for Research Pablo Debenedetti,…

From  Innovation Innovation Communication 0 likes 22 plays

The Evolution of Ransomware

(InfoSec 101) Over the last few years, ransomware has remained an ongoing security threat for organizations worldwide. In fact, according to an annual report on global security, there were a total…

From  Stefanie Clerkin 0 likes 19 plays

ReMatch+ Intern - Evan Chandran

Robust Frequency Offset Locking for Chirped Laser Slowing of CaF

From  our Undergraduate Research 1 likes 71 plays

OURSIP Intern - Inci Karaaslan

Cross-Entropy-Style Benchmarking of a 13 ns Perfect Entangler

From  our Undergraduate Research 1 likes 35 plays

CITP Seminar: Josh Goldfoot - Computer Crime

Criminal computer intrusions can endanger privacy, safety, financial security, and more. The problem of computer crime has grown so that it threatens not only businesses and government…

From  CI Center for Information Technology Policy 0 likes 5 plays

A Worldview Through the Computational Lens - Part 1: A Common Language for Nature, Man, and Computer

From  Broadcast Broadcast Center Staff 0 likes 23 plays

Gary Marcus

Toward a Theory of how the Brain Works

From  Broadcast Broadcast Center Staff 0 likes 78 plays