Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 24

community.mis.temple.edu

https://community.mis.temple.edu/mis2402sec004fall2025/files/2025/09/MIS2402-ASSIGNMENT01.docx

80 – Your code has one or two small problems (such as a miscalculation or a formatting problem) 50 – Your code has multiple problems, but it does not crash and you made an effort. 0 – Your code is missing, your code completely crashes, or you failed to provide a good URL.

Copy of huge - admissions.temple.edu

https://admissions.temple.edu/sites/admissions/files/2024-2025%20Honors%20Program%20Handbook.pdf

HONORS THESIS The Honors Thesis Project is designed for students who want to complete an advanced research project in addition to their other Program requirements. This project is meant to be an interdisciplinary exercise — we ask that they collaborate with faculty outside of their primary field of study in the research design. Students will work closely with a faculty mentor and a second ...

Understanding the Game Theory in Poker

https://sites.temple.edu/gametheory/2024/04/22/understanding-the-game-theory-in-poker/

One of the foundational concepts in game theory applied to poker is the Nash Equilibrium, named after mathematician John Nash. In poker terms, Nash Equilibrium occurs when a player’s strategy is optimal, considering the strategies of their opponents.

Resume Wizard - sites.temple.edu

https://sites.temple.edu/yangyang/files/2024/10/Yang-CV-2024-Chinese.pdf

期刊客座主编 专刊“Application of Geospatial Big Data in Tourism Research” for Applied Spatial Analysis and Policy (SSCI 索引刊物) 专刊“Technological Revolution, Digital Economy and Tourism Economics” for Tourism Economics (SSCI 索引刊物) 专刊合集“Tourism and Coronavirus” for Annals of Tourism Research (SSCI 索引刊物) 专刊“Spatial Economics and Tourism ...

Auditors’ Responsibility for Fraud Detection.

https://community.mis.temple.edu/mis5208sp18/files/2018/01/Auditors%E2%80%99-Responsibility-for-Fraud-Detection.-1.pdf

Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor (1) gathers information needed to identify material misstatement due to fraud, (2 ...

HARMONIC ANALYSIS METHODS FOR ELLIPTIC BOUNDARY VALUE PROBLEMS IN ...

https://scholarshare.temple.edu/bitstreams/3faf52f7-123b-4304-889b-42a7eee1f8a1/download

Overdetermined boundary value problems for the Laplacian on uniformly rectifiable domains; Overdetermined boundary value problems for second-order, homogeneous, constant complex coeficient elliptic systems on uniformly rectifiable domains; Overdetermined boundary value problems for the Stokes system of linearized hydro- statics on uniformly rectifiable domains; Fredholm Theory for the ...

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

1057-CH06 - Temple University

https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch06.htm

Chapter 6. Pointers and Modular Programming 1. Pointers and the indirection operator An asterisk ('*') before an identifier is called an "indirection operator", which indicates that the variable contains the address of another variable. Such a variable is called a "pointer" in C. For instance, the declaration double *p makes p a "pointer variable" of type "pointer to double ", and char *signp ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...

Adaptive Procedural Generation in Minecraft - Temple University

https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf

1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...