Search for tag: "key"

ReMatch+ Intern - Jack Thompson

Strange Loops in Attention Schema Theory Advised by:Michael Graziano, Princeton Neuroscience Institute Kirsten Ziman, Princeton Neuroscience Institute

+19 More
From  our Undergraduate Research 0 likes 17 plays

Harmonizing Sound and Light: MIDI-Enabled LED Visualization System, Kalu James Christopher Obasi, UG '25 (704C3684)

This report presents an innovative approach to music visualization, focusing on creating an interactive electronic system that provides users with a multi-sensory music-making experience. The system…

+19 More
From  Research Princeton Research Day 3 likes 24 plays

Meta, Moamen Elmassry, PD (2266360)

Trillions of bacteria live in our intestines. This community of microbes is called the gut microbiota. The gut microbiota is a rich source of small molecules. While the majority of gut…

+27 More
From  Research Princeton Research Day 7 likes 51 plays

Clip 01 with credits

+4 More
From  Patrizia D'Adamo 0 likes 37 plays

Rockefeller College - Welcome Class of 2026

+19 More
From  Broadcast Broadcast Center Staff 0 likes 778 plays

CITP Seminar: Lucy Qin - A Decentralized and Encrypted National Gun Registry

Gun violence results in a significant number of deaths in the United States. Starting in the 1960’s, the US Congress passed a series of gun control laws to regulate the sale and use of…

+22 More
From  CI Center for Information Technology Policy 0 likes 8 plays

Jimin Kang - 2021 Journalism Senior Colloquium

Jimin Kang '21 presents her certificate project, "What About the International Students?," during the Program in Journalism's third annual Senior Colloquium. Each year, over a…

From  Margo Bresnen 0 likes 46 plays

Citadel End User Training

End-User Citadel Training Live zoom session recording from January 7, 2021

From  Irene Kopaliani 0 likes 39 plays

Citadel Sub-Admin-Zoom

Sub-Admin and Admin Zoom Session Recording from January 5, 2021

+20 More
From  Irene Kopaliani 0 likes 28 plays

CITP Seminar: Shaanan Cohney - Leaving Randomness to Chance: Standards Shortcomings and Buried Backdoors in Random Number Generators

Security is too important to leave to chance. Security by design is often touted as the solution, but when your system is broken before you design it—something has gone very, very wrong.Secure…

From  CI Center for Information Technology Policy 0 likes 15 plays

cos326-2020-05-02-inductive-data-types

Inductive Datatypes

+20 More
From  Daniel Macleod 0 likes 222 plays

Access Panels and Doors

From  John Kraeck 0 likes 6 plays