11/15
Computer Science
Two from Penn named Distinguished Members of the Association for Computing Machinery
Jing (Jane) Li of the School of Engineering and Applied Science and Li Shen of the Perelman School of Medicine have been named distinguished members of the Association for Computing Machinery.
For ‘spirit of innovation,’ three from Penn named National Academy of Inventors Fellows
Vijay Kumar of the School of Engineering and Applied Science and Katalin Karikó and Drew Weissman of the Perelman School of Medicine were honored with the recognition.
PIK Professor Kevin Johnson named University Professor
Kevin Johnson, who has appointments in the Perelman School of Medicine and the School of Engineering and Applied Science, and a secondary appointment in the Annenberg School for Communication, will become the David L. Cohen University Professor.
Social media bots may appear human, but their similar personalities give them away
A new engineering study examines how social media bots disguise themselves to interact with genuine accounts on social media platforms, while suggesting a new strategy for how to detect them.
Reported anger, sadness, depression, and anxiety spiked after George Floyd killing
The police killing of George Floyd took an unprecedented toll on the emotional and mental health of Black Americans, according to a new study by LDI senior fellow Sharath Guntuku.
Xunjing Wu on a mid-career switch to computer science
Penn’s Online Master of Computer and Information Technology degree allows professionals like Wu the opportunity to switch careers without restarting their education from the beginning.
New engineering approaches to address unmet oral health needs
With a new NIH training grant, awards, and new faculty and publications, the recently launched Center for Innovation & Precision Dentistry is leveraging technological advancements to improve oral health.
The pioneering career of Norman Badler
The computer and information sciences professor retired in June. He chats about his recent ACM SIGGRAPH election and his expansive computer graphics path.
The multilayered challenges of broadband expansion
Penn professors identify the challenges ahead for expanding broadband access to people who need it, in areas both rural and urban.
Studying plants from 400 miles up
Using remote sensing data, senior Paul Lin looked for signals of climate change in the grasslands of the Great Plains.
In the News
Superhuman vision lets robots see through walls, smoke with new LiDAR-like eyes
Mingmin Zhao of the School of Engineering and Applied Science and colleagues are using radio signals to allow robots to “see” beyond traditional sensor limits.
FULL STORY →
Many wealthy members of Congress are descendants of rich slaveholders — new study demonstrates the enduring legacy of slavery
A co-authored study by Ph.D. student Neil Sehgal of the School of Engineering and Applied Science found that legislators who are descendants of slaveholders are significantly wealthier than members of Congress without slaveholder ancestry.
FULL STORY →
Innovating responsibly with generative AI
Michael Kearns of the School of Engineering and Applied Science explains some of the best practices to help leaders responsibly build generative AI.
FULL STORY →
As colleges grapple with AI’s pitfalls, U. of Delaware uses technology to transform faculty lectures into interactive study aides
Penn will be the first Ivy League school to launch a new undergraduate degree in artificial intelligence. PIK Professor Duncan Watts and colleagues built the Media Bias Detector, which uses artificial intelligence to scan news articles for tone and bias.
FULL STORY →
Artificial expectations? Time to get real about AI
Benjamin Lee of the School of Engineering and Applied Science says that the rate and depth of adoption for generative AI has been slower than many anticipated.
FULL STORY →
Global tech outage: South Jersey Boy Scout troop stuck overseas due to airline impact of outage
Benjamin Lee of the School of Engineering and Applied Science says there need to be contingency plans to cover ongoing vulnerabilities of critical computer infrastructure.
FULL STORY →