Princeton University is actively monitoring the situation around coronavirus (COVID-19) and the evolving guidance from government and health authorities. The latest guidance for Princeton members and visitors is available on the University’s Emergency Management website.

Please register here to attend in person.
Co-sponsored by the Department of Computer Science and the Department of Electrical and Computer Engineering
…Speaker

Please register here to attend in person.
Co-sponsored by the Department of Computer Science and the Department of Electrical and Computer Engineering
Computer security is traditionally about the protection of technology, whereas trust and safety…
Speaker

Co-sponsored by the Department of Computer Science and the Department of Electrical and Computer Engineering
Details: TBA
Bio:
Alessandro Acquisti is the Trustees Professor of Information Technology and Public Policy at the Heinz College, Carnegie Mellon University…
Speaker

Co-sponsored by the Department of Computer Science and the Department of Electrical and Computer Engineering
The Arbitrum blockchain protocol started as a Princeton University research project, and has grown into a robust community hosting hundred of applications and over 600,000 monthly users. Along the way, the system has…
Speaker

Co-sponsored by the Department of Computer Science and the Department of Electrical and Computer Engineering
Users who wish to exercise privacy rights or make privacy choices must often rely on website or app user interfaces. However, too often, these user interfaces suffer from usability deficiencies ranging from being…
Speaker

Title: TBA
Abstract: TBA
Bio: TBA
Speaker

Princeton Research Day celebrates the research and creative endeavors of the campus-wide community. The event serves as an opportunity for researchers and creators to reach across disciplines by communicating in non-specialist language about their research or creative work.
Now in its eighth consecutive year, the event highlights work…
Events Archive

Part 1: Introduction to some tools that computer programmers typically use to write and debug code in an effective manner.
Part 2: Introduction to cloud computing (create and manage cloud computing resources) How to use some tools that offer the possibility of writing code locally while seamlessly executing/running it on powerful cloud computing.

Part 1: Introduction to some tools that computer programmers typically use to write and debug code in an effective manner.
Part 2: Introduction to cloud computing (create and manage cloud computing resources) How to use some tools that offer the possibility of writing code locally while seamlessly executing/running it on powerful cloud computing.

The Center for Statistics and Machine Learning (CSML) is offering a three-hour Wintersession workshop, which aims to increase awareness of how machine learning could aid faculty, postdoc, and student research.
No detailed prior knowledge of machine learning is assumed. The workshop will begin with an overview of crucial…
Speakers
- Peter RamadgeAffiliationThe Center for Statistics and Machine Learning
- Affiliation

This mini-course will provide a comprehensive introduction to machine learning. Part 1 will briefly overview the full machine learning process and cover introductory concepts such as what is machine learning and why is it used. Popular software libraries will be discussed. Attendees will begin working hands-on in Part 2 to train simple machine learning models. Part 3 covers model evaluation and refinement. Artificial neural networks are introduced during Part 4. The mini-course concludes with a hackathon during Part 5 where participants will work on a small, end-to-end machine learning project chosen from one of multiple domains.
Speakers
- Brian ArnoldAffiliationPrinceton University
- Amy WinecoffAffiliationPrinceton University
- Vineet BansalAffiliationPrinceton University
- Christina PetersAffiliationUniversity of Delaware
- Gage DeZoortAffiliationPrinceton University

In this talk I will first describe our work on developing new tools for screening and intervention in developmental disorders, autism spectrum disorder and eating disorders in particular. I will show how equipped with computer vision and machine learning, we deployed scalable, phone/tablet-based tools in pediatric clinics and homes in the US and Africa.
Speaker

What will philology become in the wake of the digital revolution? How can computer vision, handwritten text recognition, natural language processing, deep neural networks and/or other forms of machine learning refine the arsenal of techniques for studying premodern evidence?
This works-in-progress symposium will feature six teams of Princeton scholars who are applying machine learning to manuscripts, rare books, archives, inscriptions, coins and other pre-1600 texts. Presentations will include projects on materials in Syriac, Hebrew, Latin, Greek, Chinese and English.

Are you curious about how machine learning can be used to study fragments of medieval Egyptian letters? Or how quantitative methods can help trace the monetization of misinformation on the web? Intrigued by AI but don’t know what it is? Not sure how to work with your complex collection of texts, images, and other media? Want to learn coding but don’t know where to start?

Risk-averse optimization plays a major role in the design of safety for machine learning applications. In this talk, we will present a set of tools to enhance the robustness of models and algorithms to potentially harmful data shifts.
Lunch from 12:15 p.m., RSVP to [email protected]
Speaker

In the context of first-order algorithms subject to random gradient noise, we study the trade-offs between the convergence rate (which quantifies how fast the initial conditions are forgotten) and the "risk" of suboptimality, i.e., deviations from the expected suboptimality.
Lunch from 12:15 p.m., RSVP to [email protected]
Speaker

Sparse statistical estimators are increasingly prevalent due to their ease of interpretability and superior out-of-sample performance. However, sparse estimation problems with an L0 constraint, restricting the support of the estimators, are challenging (typically NP-hard, but not always) non-convex optimization problems.