https://sites.temple.edu/borguet/files/2025/01/ultrabroadband-2012.pdf
Ultra-broadband sum-frequency vibrational spectrometer of aqueous interfaces based on a non-collinear optical parametric amplifier
https://cis.temple.edu/~apal/npa.pdf
Localization Algorithms in Wireless Sensor Networks: Current Approaches and Future Challenges Amitangshu Pal Department of Electrical and Computer Engineering The University of North Carolina at Charlotte 9201 University City Blvd, Charlotte, North Carolina 28223-0001
https://cis.temple.edu/~latecki/Courses/CIS2033-Spring12/ElementaryProbabilityforApplications/ch2.pdf
When p = 0.6 the three values are 0.648, 0.68256, and 0.710208. The graph in Figure 2.3 compares the winning probabilities for a team that wins each game with probability p.
https://cis.temple.edu/~pwang/9991-PJ/Reports/OzkanKilic.pdf
AGI SYSTEMS For more than 60 years, AI researchers have been working on creating intelligent machines or programs that can perform intellectual tasks that a human being can. These tasks can vary a lot from playing chess, counting animals in a picture, performing commands given in a natural language to making jokes, having a conversation with a human, producing novel inventions and art. Weak-AI ...
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...
https://cis.temple.edu/~latecki/Papers/ICME2024.pdf
Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...
https://faculty.cst.temple.edu/~seibold/teaching/2024_2121/class13_PhasePortraits.pdf
The phase portrait is a graphical tool to visualize how the solutions of a given system of diferential equations behaves in the long run. It is a representative set of solutions for the system of ODEs, plotted as parametric curves (with t as the parameter) on the Cartesian plane tracing the path of each particular solution.
https://cis.temple.edu/~latecki/Courses/AI-Fall12/Lectures/RandomFields_Sarah.pdf
Stochastic processes as Dynamic Bayesian Networks Dynamic Bayesian Network is a probabilistic graphical model that represents a sequence of random variables and their conditional dependencies.
https://disabilities.temple.edu/self-advocate-spotlight-george-shands
How did you decide to start your own business? My name is George Shands. I am the founder & CEO of GFresh Emporium. I began my business in June 2018 with a mission to make the world smell good. I wanted to do something fresh and exciting, something I could put my style and personality into. I decided I wanted to provide fresh-smelling products to the people of Philadelphia and beyond. I ...
https://www.hpc.temple.edu/
High-Performance Computing Team ICMS (035-07) Science Education and Research Center (SERC) 1925 North 12th Street Philadelphia, PA 19122