Search for tag: "messages"

The Swarm Garden: A Human-Swarm Interactive Platform for Self-Adaptive Art, Architecture and Dance Performance, Jad Bendarkawi, UG '24, Yenet Tafesse, UG'24 (F258874D)

The Swarm Garden represents a combination of swarm robotics, architecture, and art, developed through the collaboration between the Self-Organizing Swarms and Robotics Lab and the Form Finding Lab.…

From  Research Princeton Research Day 22 likes 210 plays

DeCenter Seminar Series "What Insights Can We Learn from the Bitcoin Algorithm" - by Ling Ren (11.15.2023)

From  Broadcast Broadcast Center Staff 0 likes 5 plays

CITP Seminar: Surya Mattu - Breaking The Black Box: How CITP’s Digital Witness Lab Uses Data-Driven Investigations to Expose Surveillance and Misinformation

The CITP Digital Witness Lab is a research initiative that collects data to expose surveillance, misinformation, and other harms on digital platforms. We build independent, public, and open-source…

From  CI Center for Information Technology Policy 0 likes 2 plays

"You are My 'Treaty of Nanjing,' The Beginning of My Fall": A Cultural Analysis of Contemporary China's Obsession with "Little Fresh Meat" 小鲜肉, Anne Wen, UG '23 (2985594)

In the thesis, I argue that xiao xian rou 小鲜肉 pushes back against the state-sanctioned ideals to look masculine, and the role of effeminate men in modern Chinese television uplifts women. Given the…

From  Research Princeton Research Day 1 likes 40 plays

It all Started with a Phish: Protecting Sensitive Information from Cyber Criminals

(InfoSec 101) Most of us receive a large volume of email and instant messages, often scanning through hundreds a week. These numerous online communications make us susceptible to cybercrime. Did you…

From  Stefanie Clerkin 0 likes 13 plays

3.31.22 Embodying the Virgin Mary, Christ, and the Nation: A Contemporary Lebanese Female Mystic

From  Broadcast Broadcast Center Staff 0 likes 19 plays

Teaching Computers to Negotiate, Denis Peskoff, Postdoc (3949464)

Negotiation is a core component of day-to-day life and international politics. But this is not a skill we associate with the everyday Artificial Intelligence of today: Siri and Alexa do not…

From  Research Princeton Research Day 10 likes 139 plays

Please Pay Attention: Using YouTube’s Ad Algorithm to Analyze the Presentation of Unwanted Information, Justin Curl, UG '22 (2304305)

How do you get people to pay attention to or process unwanted information? Our research studies the effect of user behavior -- how often a user skips ads -- on the amount, length, and type of ads a…

From  Research Princeton Research Day 4 likes 176 plays

Effective ML

Yaron Minsky guest lecture in Princeton COS 326 Functional Programming, November 5, 2020

From  Andrew Appel 0 likes 104 plays

Webinar: Spotting and Preventing Social Engineering Attacks

(InfoSec 101) Millions of dollars are lost every year due to scams. But why would anyone willingly give away their personal information? Social engineering is the art of influencing a person to…

From  Tara Schaufler 0 likes 63 plays

Why was NOW interested in childcare, according to Victory Chase (audio clip)

Victory Chase explains the interest of the National Organization for Women (NOW) in the issue of child care in the 1970s. Interview by Carolyn Jones.

From  Matilda Luk 0 likes 79 plays

Lunch & Learn, April 30, 2015, "Phasing Out Postini", Dan Ascione, HelpDesk Staff

Lunch & Learn, April 30, 2015, "Phasing Out Postini", Dan Ascione, HelpDesk Staff

From  PPPL Admins 0 likes 8 plays