Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 29

Current Members – Neuroeconomics Laboratory - Sites

https://sites.temple.edu/neuroeconlab/people/

Derrick is a first-year doctoral student in the Cognition and Neuroscience Program. He is particularly interested in the neural mechanisms underlying economic and social decision-making, with a research focus on the complexities of choice overload and its impact on decision-making processes. Derrick earned his Master’s degree from Duke University, where he worked under Dr. Scott Huettel, and ...

Montreal Cognitive Assessment - Sites

https://sites.temple.edu/rtassessment/files/2018/10/MoCA-Instructions-English_7.2.pdf

Administration and Scoring Instructions The Montreal Cognitive Assessment (MoCA) was designed as a rapid screening instrument for mild cognitive dysfunction. It assesses different cognitive domains: attention and concentration, executive functions, memory, language, visuoconstructional skills, conceptual thinking, calculations, and orientation. Time to administer the MoCA is approximately 10 ...

Temple University, Center for Networked Computing

http://www.cnc.temple.edu/

The Center for Networked Computing (CNC), a university research center focused on network technology and its applications, was founded in 2010. Its missions are to advance the development of network technology and its applications by combining resource of government, industry, and academia and to train students who will be ready to join industry and academia. CNC is engaged in the following ...

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...

Wireshark_TCP.pdf - Temple University

https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf

The answers below are based on the trace file tcp-ethereal-trace-1 in in

Yan Wang's personal website - Temple University

https://cis.temple.edu/~yanwang/publications.html

Yucheng Xie, Xiaonan Guo, Yan Wang, Jerry Cheng, and Yingying Chen. "Universal targeted adversarial attacks against mmwave-based human activity recognition." In Network Security Empowered by Artificial Intelligence, pp. 177-211. Cham: Springer Nature Switzerland, 2024. New!

GR ADUATION CEREMONY - School of Pharmacy

https://pharmacy.temple.edu/sites/pharmacy/files/media/document/TUSP%202024%20GRAD%20PROGRAM%205.9.pdf

The School houses the Moulder Center for Drug Discovery research, The Jayne Haines Center for Pharmacogenomics and Drug Safety, a tissue culture facility for cell-based research, a Proteomics Facility an Addiction Research Lab and a CGMP facility, one of only six based at universities nationwide.

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...

JOURNAL OF LA Privacy Preserving Ranked Multi-Keyword Search for ...

https://cis.temple.edu/~wu/research/publications/Publication_files/zhangweitc.pdf

Abstract—With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner ...