https://cis.temple.edu/~mindyshi/
Candidate must have or be close to obtaining a Ph.D. in quantitative fields (include but not limited to Computer Science, Statistics, Mathematics, and Physics) and have demonstrated a high level of research productivity through publication in peer-reviewed conferences and journals. Experiences with machine learning or data privacy is required. As a team player working closely with cross ...
https://www.fox.temple.edu/directory/ram-mudambi-rmudambi
Biography Ram Mudambi is the Frank M. Speakman Professor of Strategy at the Fox School of Business, Temple University. He previously served on the faculties of the University of North Carolina – Chapel Hill, Case Western Reserve University, and the University of Reading (UK). He is a Fellow of the Academy of International Business (AIB) and the European International Business Academy (EIBA ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/m48122-zhao%20final.pdf
ArrayPipe: Introducing Job-Array Pipeline Parallelism for High Throughput Model Exploration Hairui Zhao1, Hongliang Li1,2,∗, Qi Tian1, Jie Wu3, Meng Zhang1, Xiang Li1, Haixiao Xu4
https://sites.temple.edu/ticlj/files/2018/10/32.1_Article-5_Hollis.pdf
As part of a symposium on Rosa Brooks’s How Everything Became War and the Military Became Everything, this essay explores the concept of an influence operation (IO) from the perspective of international law. It examines common elements of an IO and proffers five criteria for differentiating among them, namely by assessing their (i) transparency; (ii) extent of deception; (iii) purpose; (iv ...
https://cis.temple.edu/~friedman/cis071/Lecture4-web.doc
The book also uses flow charts, which are sometimes handy for visualizing what is going on with a decision structure. However, pseudo-code, if properly indented and written with a little care is a preferred mechanism for mapping out the logic of a decision before trying to program it (and having to worry about syntax).
https://boyer.temple.edu/sites/boyer/files/2024.03.05%20Essentially%20Ellington.pdf
Garnet Valley High School The Essentially Ellington High School Jazz Band Program (EE) is unique among educational resources for high school jazz bands. Each year, Jazz at Lincoln Center (JALC) transcribes, publishes, and distributes charts by Duke Ellington and other seminal big band composers and arrangers, along with additional educational materials to bands in the U.S., Canada and American ...
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://cis.temple.edu/~latecki/Courses/RobotFall08/BishopBook/Pages_from_PatternRecognitionAndMachineLearning-2.pdf
Probabilities play a central role in modern pattern recognition. We have seen in Chapter 1 that probability theory can be expressed in terms of two simple equations corresponding to the sum rule and the product rule. All of the probabilistic infer-ence and learning manipulations discussed in this book, no matter how complex, amount to repeated application of these two equations. We could ...
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...