
News
January 17, 2017
Princeton's IP Accelerator Fund supports promising new technologies
Six new technologies — from a method that enhances X-ray images to a strategy that eliminates cybersecurity threats — will receive University funding aimed at helping to transform promising discoveries from the laboratories at Princeton into widely available products and services for the benefit of society.
January 6, 2017
In Computer Languages, Clarity Is Key
IN THE FALL OF 1996, Brian Kernighan *69 brought scissors, a beard trimmer, and a pair of hedge clippers into the auditorium where he was teaching Harvard’s introductory computer science course, CS50, to more than 450 students. It was Kernighan’s first time teaching a college course — he was employed at the time as a researcher at AT&T Bell Labs — and he decided to use that first lecture to focus on the importance of giving computers specific instructions. He asked the students in the room to direct him in trimming his beard and, when they failed to be sufficiently precise in their directions, ended up cutting his beard with hedge clippers right there at the front of the classroom.
December 20, 2016
Feamster named ACM Fellow
Nick Feamster, a professor of computer science, has been named a fellow of the Association for Computing Machinery.
December 2, 2016
Raz, Weinberg Deepen Faculty’s Leadership in Critical Areas
Ran Raz, a global authority on computational complexity theory, and Matthew Weinberg, a rising expert in algorithmic mechanism design, will join the Computer Science Department at the start of the new year, deepening the faculty’s engagement in crucial research areas.
November 22, 2016
Bias in the machine: Internet algorithms reinforce harmful stereotypes
THE ARTIFICIAL-INTELLIGENCE (AI) SYSTEMS that suggest our search terms and otherwise determine what we see online rely on data that can be biased against women and racial and religious groups, according to a study led by researchers in Princeton’s Center for Information Technology and Policy (CITP).
November 18, 2016
Computer Science Celebrates Siebel Scholars
Princeton Students gathered to celebrate the 2017 Siebel Scholar Award winners. The Siebel Scholars program acknowledges leadership, academic achievement, and the collaborative search for solutions to the world's most critical issues.
November 11, 2016
Q&A: Protection from DDoS Attacks
Twitter experienced a global distributed denial of service (DDoS) attack in October, causing the social media site to temporarily go dark. Hackers have attempted similar DDoS attacks with Hillary Clinton and President-Elect Donald Trump’s campaign websites.
November 10, 2016
Accenture Prize in Computer Science
The winners are seen here with Fred Molineux of Accenture and Professor Andrea LaPaugh, Department Representitive at the award presention held November 7, 2016.
November 2, 2016
Data traffic system switches control to network administrators
Torrents of information flow through computer data centers, driving the operations of financial markets, communications systems, commerce and just about any complex web-based activity. Much of modern society is built on these invisible networks but the infrastructure that routes the rivers of data between racks upon racks of computers can be cumbersome and inflexible.
October 31, 2016
Q&A with Appel: How to make sure every vote counts
In 2008, Andrew Appel tampered with an electronic voting machine, changing 20 percent of the votes it had registered from one candidate to the other.
October 28, 2016
Martonosi research group awarded Best Paper at MICRO-49
Congratulations to Tae Jun Ham (Princeton University), Lisa Wu (University of California, Berkeley), Narayanan Sundaram (Intel), Nadathur Satish (Intel), and Margaret Martonosi (Princeton University) who received the Best Paper Award at the 9th Annual ACM/IEEE International Symposium on Microarchitecture for their paper Graphicionado: A High-Performance and Energy-Efficient Accelerator for Graph Analytics.
October 27, 2016
New tool detects malicious websites before they cause harm
Malicious websites promoting scams, distributing malware and collecting phished credentials pervade the web. As quickly as we block or blacklist them, criminals set up new domain names to support their activities.
...
...