Search for tag: "messages"
The Swarm Garden: A Human-Swarm Interactive Platform for Self-Adaptive Art, Architecture and Dance Performance, Jad Bendarkawi, UG '24, Yenet Tafesse, UG'24 (F258874D)The Swarm Garden represents a combination of swarm robotics, architecture, and art, developed through the collaboration between the Self-Organizing Swarms and Robotics Lab and the Form Finding Lab.…
From Research Princeton Research Day
22 likes
231 plays
|
|
CITP Seminar: Surya Mattu - Breaking The Black Box: How CITP’s Digital Witness Lab Uses Data-Driven Investigations to Expose Surveillance and MisinformationThe CITP Digital Witness Lab is a research initiative that collects data to expose surveillance, misinformation, and other harms on digital platforms. We build independent, public, and open-source…
From CI Center for Information Technology Policy
0 likes
2 plays
|
|
"You are My 'Treaty of Nanjing,' The Beginning of My Fall": A Cultural Analysis of Contemporary China's Obsession with "Little Fresh Meat" 小鲜肉, Anne Wen, UG '23 (2985594)In the thesis, I argue that xiao xian rou 小鲜肉 pushes back against the state-sanctioned ideals to look masculine, and the role of effeminate men in modern Chinese television uplifts women. Given the…
From Research Princeton Research Day
1 likes
40 plays
|
|
It all Started with a Phish: Protecting Sensitive Information from Cyber Criminals(InfoSec 101) Most of us receive a large volume of email and instant messages, often scanning through hundreds a week. These numerous online communications make us susceptible to cybercrime. Did you…
From Stefanie Clerkin
0 likes
14 plays
|
|
Teaching Computers to Negotiate, Denis Peskoff, Postdoc (3949464)Negotiation is a core component of day-to-day life and international politics. But this is not a skill we associate with the everyday Artificial Intelligence of today: Siri and Alexa do not…
From Research Princeton Research Day
10 likes
145 plays
|
|
Please Pay Attention: Using YouTube’s Ad Algorithm to Analyze the Presentation of Unwanted Information, Justin Curl, UG '22 (2304305)How do you get people to pay attention to or process unwanted information? Our research studies the effect of user behavior -- how often a user skips ads -- on the amount, length, and type of ads a…
From Research Princeton Research Day
4 likes
183 plays
|
|
Effective MLYaron Minsky guest lecture in Princeton COS 326 Functional Programming, November 5, 2020
From Andrew Appel
0 likes
108 plays
|
|
Webinar: Spotting and Preventing Social Engineering Attacks(InfoSec 101) Millions of dollars are lost every year due to scams. But why would anyone willingly give away their personal information? Social engineering is the art of influencing a person to…
From Tara Schaufler
0 likes
69 plays
|
|
Why was NOW interested in childcare, according to Victory Chase (audio clip)Victory Chase explains the interest of the National Organization for Women (NOW) in the issue of child care in the 1970s. Interview by Carolyn Jones.
From Matilda Luk
0 likes
80 plays
|
|
Lunch & Learn, April 30, 2015, "Phasing Out Postini", Dan Ascione, HelpDesk StaffLunch & Learn, April 30, 2015, "Phasing Out Postini", Dan Ascione, HelpDesk Staff
From PPPL Admins
0 likes
8 plays
|