Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 20

2025 AQL Program - boyer.temple.edu

https://boyer.temple.edu/sites/boyer/files/2025%20AQL%20Program.pdf

For today’s conference, our 12th such event, our theme is “Arts for Health in Medical and Community Practices.” Where last year’s conference reasserted our aim to explore the impacts of dance, film, music and theater on quality-of-life measures, this year you’ll find expanded involvement from across the Center for the Performing and Cinematic Arts and various other programs across ...

Cybersecurity BS - Temple University

https://bulletin.temple.edu/undergraduate/science-technology/cybersecurity-bs/cybersecurity-bs.pdf

Overview The Bachelor of Science in Cybersecurity, offered by he Department of Computer and Information Sciences (CIS), is designed to equip students with the knowledge and skills required to protect computer systems and networks from cyber threats. This program addresses the growing demand for cybersecurity professionals by providing students with both strong technical foundations and hands ...

Xueming Luo - Fox School of Business

https://www.fox.temple.edu/directory/xueming-luo-tuf35198

Biography Xueming Luo is Charles Gilliland Distinguished Chair Professor of Marketing, Professor of Strategic Management, Professor of Management Information Systems. He is the Founder/Director of the Global Institute for Artificial Intelligence and Business Analytics in the Fox School of Business at Temple University. He is interested in digital mobile marketing, omnichannel customer ...

Lecture: Debye – Huckel Theory - Temple University

https://ronlevygroup.cst.temple.edu/courses/2016_fall/chem5302/lectures/chem5302_lecture10.pdf

Now, 1 ( ) is the average charge density at due to all the ions when ion number 1 is fixed at the origin. The charge density at can be expressed in terms of the pairs correlation function, which in turn can be expressed in terms of the potential of mean force, which can be expressed in terms of the averaged electrostatic potential.

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...

Fuzzy Boundary-Guided Network for Camouflaged Object Detection

https://cis.temple.edu/~latecki/Papers/ICME2024.pdf

Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...

MATRICES M - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2166-Spring18/Lectures/MatrixAlg1.pdf

A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...

Microsoft Word - skeletonPAMI06.doc - Temple University

https://cis.temple.edu/~latecki/Papers/skeletonPAMI06.pdf

The green skeleton branch (ending at C) remained, since each of its points has generating points on two different arcs BC and CD of the original contour. A skeleton branch shown in green in (b) does not belong to the skeleton determined by the DCE polygon, since it ends at a concave vertex P.

Dense Subgraph Partition of Positive Hypergraphs

https://cis.temple.edu/~latecki/Papers/DSP_PAMI2014.pdf

Abstract—In this paper, we present a novel partition framework, called dense subgraph partition (DSP), to automatically, precisely and efficiently decompose a positive hypergraph into dense subgraphs. A positive hypergraph is a graph or hypergraph whose edges, except self-loops, have positive weights. We first define the concepts of core subgraph, conditional core subgraph, and disjoint ...

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...