Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 20

US News ranks Temple among top 100 national universities for second ...

https://president.temple.edu/news/2024/09/us-news-ranks-temple-among-top-100-national-universities-second-straight-year

For the second year in a row, the "Best Colleges" U.S. News and World Report ranking places Temple University within the top 100 in the national universities category. Temple is ranked No. 98 in the most recent rankings, which were released Tuesday, Sept. 24. In the rankings, Temple also ranks No. 46 in the category of Top Public Schools and No. 72 in the Best Value category. “At Temple, we ...

Choose QDA software - Qualitative Data Analysis and QDA Tools ...

https://guides.temple.edu/qda/choosing

This workshop is the second of the two-part workshop on five different Qualitative Data Analysis (QDA) tools – ATLAS.ti, NVivo, Dedoose, Taguette, and QualCoder. The workshop recaps essential and distinctive features demonstrated in the Part 1 recorded workshop and answered questions about the tools. The workshop discusses considerations for choosing among the five tools and provides ...

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...

Wireshark_TCP.pdf - Temple University

https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf

The answers below are based on the trace file tcp-ethereal-trace-1 in in

Information Technology Auditing and Cyber Security MS

https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms

Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.

MATRICES M - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/Lectures/MatrixAlg1.pdf

A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

LETHAL AUTONOMOUS WEAPONS SYSTEMS (LAWS): - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Meier-TICLJ.pdf

Humanity by Human Rights Watch, lethal autonomous weapons systems (LAWS) have become an issue of national and international attention. With almost daily articles and commentary, including letters by notable scientists, debating the advantages and disadvantages of developing and fielding these systems, the public has become generally more aware of the issues related to autonomy, but it has ...

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...