skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Who's in and who's out? A case study of multimodal CLIP-filtering in DataComp
Award ID(s):
2045402 2206950 2205171
PAR ID:
10570305
Author(s) / Creator(s):
; ; ;
Publisher / Repository:
ACM
Date Published:
ISBN:
9798400712227
Page Range / eLocation ID:
1 to 17
Format(s):
Medium: X
Location:
San Luis Potosi Mexico
Sponsoring Org:
National Science Foundation
More Like this
  1. Abstract Games are frequently used to promote math learning, yet the competitive and collaborative contexts introduced by games may exacerbate gender differences. In this study, 1st and 2nd grade children in the U.S. (ages 5–8;N = 274; 70% White, 15% Asian, 2% Black, 1% Native American, 14% mixed or other race; 17% Hispanic) played either a competitive, collaborative, or solo game to learn about a challenging novel math concept: proportion. Overall, both social contexts boosted perseverance and task attitudes. However, analyses revealed the competitive condition yielded gender differences in attention to proportion in the presence of competing cues, with older boys underperforming in the competition condition. Potential explanations for these findings, as well as implications for classroom math learning, are discussed. 
    more » « less
  2. null (Ed.)
  3. null (Ed.)
    Unsolicited calls are one of the most prominent security issues facing individuals today. Despite wide-spread anecdotal discussion of the problem, many important questions remain unanswered. In this paper, we present the first large-scale, longitudinal analysis of unsolicited calls to a honeypot of up to 66,606 lines over 11 months. From call metadata we characterize the long-term trends of unsolicited calls, develop the first techniques to measure voicemail spam, wangiri attacks, and identify unexplained high-volume call incidences. Additionally, we mechanically answer a subset of the call attempts we receive to cluster related calls into operational campaigns, allowing us to characterize how these campaigns use telephone numbers. Critically, we find no evidence that answering unsolicited calls increases the amount of unsolicited calls received, overturning popular wisdom. We also find that we can reliably isolate individual call campaigns, in the process revealing the extent of two distinct Social Security scams while empirically demonstrating the majority of campaigns rarely reuse phone numbers. These analyses comprise powerful new tools and perspectives for researchers, investigators, and a beleaguered public. 
    more » « less