Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 26

May 1: Franklin Institute Awards Symposium: Density Functional Theory ...

https://cst.temple.edu/news/2025/03/may-1-franklin-institute-awards-symposium-density-functional-theory-honoring-john-perdew

The Franklin Institute Awards Symposium DENSITY FUNCTIONAL THEORY honoring John Perdew, recipient of the 2025 Benjamin Franklin Medal in Physics This symposium will gather experts to explore the latest advancements in density functional theory (DFT), a powerful computational tool in studying electronic structure, reactivity and material properties. Presentations will cover newtheoretical ...

Disprot - Database of Protein Disorder

https://dabi.temple.edu/external/disprot/resource.php

Summary Towards the objective of understanding commonness, flavors, complexity and function of protein disorder, we assembled a database of known disordered protein sequence segments and used it for developing predictors of protein disorder from primary sequence information. The preliminary results were obtained by analyzing sequences from the Protein Data Bank (PDB). Swiss Protein (SwissProt ...

‘Flappy Bird’ to return after a 10-year hiatus: the true story behind ...

https://news.temple.edu/news/2024-09-20/flappy-bird-return-after-10-year-hiatus-true-story-behind-world-s-most-viral-mobile

Temple University film and media arts faculty member Thomas Sharpe discusses the rise, fall and 2025 return of Flappy Bird, the world’s most viral mobile game.

Publications of Xifan Wu – Research group of Xifan Wu - Sites

https://sites.temple.edu/xifanwu/publications-of-xifan-wu/

Fujie Tang, Xifan Wu, “Theoretical X-ray Absorption Spectroscopy of Liquid Water Using First-Principles Calculations”, Chapter One in Book of Properties of Water from Numerical and Experimental Perspectives CRC Press, 19 October (2022).

Information Technology Auditing and Cyber Security MS

https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms

Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.

Lecture Set 4 – Selection Structures - Temple University

https://cis.temple.edu/~friedman/cis071/Lecture4-web.doc

The book also uses flow charts, which are sometimes handy for visualizing what is going on with a decision structure. However, pseudo-code, if properly indented and written with a little care is a preferred mechanism for mapping out the logic of a decision before trying to program it (and having to worry about syntax).

PSFL: Parallel-Sequential Federated Learning with Convergence Guarantees

https://cis.temple.edu/~jiewu/research/publications/Publication_files/INFOCOM2024_PSFL%20Parallel-Sequential%20Federated%20Learning%20with%20Convergence%20Guarantees.pdf

Abstract—Federated Learning (FL) is a novel distributed learning paradigm which can coordinate multiple clients to jointly train a machine learning model by using their local data samples. Existing FL works can be roughly divided into two categories according to the modes of model training: Parallel FL (PFL) and Sequential FL (SFL). PFL can speed up each round of model training time through ...

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...

FW_web.pdf - Temple University

https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf

Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...