PhD Seminar • Human-Computer Interaction — Expression of Curiosity in Teachable Robots: Design, Perception, and Effects on Behaviour
Jessy Ceha, PhD candidate
David R. Cheriton School of Computer Science
Jessy Ceha, PhD candidate
David R. Cheriton School of Computer Science
Marco Serafini, College of Information and Computer Sciences
University of Massachusetts Amherst
Amine Mhedhbi, PhD candidate
David R. Cheriton School of Computer Science
Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science
Amira Ghenai, PhD candidate
David R. Cheriton School of Computer Science
Yuhao Dong, PhD candidate
David R. Cheriton School of Computer Science
Crispin Cowan, Leviathan Security Group
Privacy, especially anonymity, is tricky, because you don’t want to trust anyone, lest your identity leak, but you must trust someone, or else you cannot communicate. Threat modeling is rarely used in privacy, instead most used for prioritizing security hardening efforts.
Joan Bartlett, School of Information Studies
McGill University
Chendi Ni, PhD candidate
David R. Cheriton School of Computer Science
Dr. Mohamed Omar
Harvey Mudd College
Toward the end of an undergraduate degree, especially at an institution with many students in technical majors, students tend to form a perception of their mathematical/technical prowess and abilities. However, this perception is usually based on markers that do not come close to adequately reflecting the mathematical process as it is practiced by mathematicians.