https://boyer.temple.edu/sites/boyer/files/2025%20AQL%20Program.pdf
For today’s conference, our 12th such event, our theme is “Arts for Health in Medical and Community Practices.” Where last year’s conference reasserted our aim to explore the impacts of dance, film, music and theater on quality-of-life measures, this year you’ll find expanded involvement from across the Center for the Performing and Cinematic Arts and various other programs across ...
https://bulletin.temple.edu/undergraduate/science-technology/cybersecurity-bs/cybersecurity-bs.pdf
Overview The Bachelor of Science in Cybersecurity, offered by he Department of Computer and Information Sciences (CIS), is designed to equip students with the knowledge and skills required to protect computer systems and networks from cyber threats. This program addresses the growing demand for cybersecurity professionals by providing students with both strong technical foundations and hands ...
https://www.fox.temple.edu/directory/xueming-luo-tuf35198
Biography Xueming Luo is Charles Gilliland Distinguished Chair Professor of Marketing, Professor of Strategic Management, Professor of Management Information Systems. He is the Founder/Director of the Global Institute for Artificial Intelligence and Business Analytics in the Fox School of Business at Temple University. He is interested in digital mobile marketing, omnichannel customer ...
https://ronlevygroup.cst.temple.edu/courses/2016_fall/chem5302/lectures/chem5302_lecture10.pdf
Now, 1 ( ) is the average charge density at due to all the ions when ion number 1 is fixed at the origin. The charge density at can be expressed in terms of the pairs correlation function, which in turn can be expressed in terms of the potential of mean force, which can be expressed in terms of the averaged electrostatic potential.
https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf
FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...
https://cis.temple.edu/~latecki/Papers/ICME2024.pdf
Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...
https://cis.temple.edu/~latecki/Courses/CIS2166-Spring18/Lectures/MatrixAlg1.pdf
A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...
https://cis.temple.edu/~latecki/Papers/skeletonPAMI06.pdf
The green skeleton branch (ending at C) remained, since each of its points has generating points on two different arcs BC and CD of the original contour. A skeleton branch shown in green in (b) does not belong to the skeleton determined by the DCE polygon, since it ends at a concave vertex P.
https://cis.temple.edu/~latecki/Papers/DSP_PAMI2014.pdf
Abstract—In this paper, we present a novel partition framework, called dense subgraph partition (DSP), to automatically, precisely and efficiently decompose a positive hypergraph into dense subgraphs. A positive hypergraph is a graph or hypergraph whose edges, except self-loops, have positive weights. We first define the concepts of core subgraph, conditional core subgraph, and disjoint ...
https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf
Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...