Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,010

It’s RILA Time: An Introduction to Registered Index-Linked Annuiti

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf

Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...

ECAI 2024 73 U. Endriss et al. (Eds.) © 2024 The Authors. of the ...

https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf

Addressing these gaps, we introduce the FlowLearn Dataset1, which includes both scientific and simulated flowcharts. The scien-tific subset features 3,858 flowcharts sourced from scientific liter-ature, annotated with captions (median length of 25 words) and in-figure text. The simulated subset consists of 10,000 flowcharts gener-ated from Mermaid code. This simulated subset enhances the ...

Building Classification Models: ID3 and C4.5 - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html

Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information ...

How to Benchmark Code Execution Times on Intel IA-32 and IA-64 ...

https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf

How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010

http://www.ce.chalmers.se/staff.PDF - Temple University

https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf

1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...

CRC_AU2832_C01.tex - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf

The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...

The Socialist Legal System with Chinese Characteristics: - Sites

https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf

The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...