https://www.fox.temple.edu/faculty-research/institutes-centers/innovation-entrepreneurship-institute/competitions/byobb
All finalists are required to apply cash prizes and awards received toward your proposed business venture. All Finalists are required to provide an annual update on your venture to the Innovation & Entrepreneurship Institute for 5-years, as per the executed Terms of Agreement governing the BYOBB®.
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://sites.temple.edu/borguet/files/2025/01/structure-of-water-2014.pdf
ABSTRACT: The properties of water molecules located close to an interface deviate significantly from those observed in the homogeneous bulk liquid. The length scale over which this structural perturbation persists (the so-called interfacial depth) is the object of extensive investigations. The situation is particularly complicated in the presence of surface charges that can induce long-range ...
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICDE2024_Online_Federated_Learning_on_Distributed_Unknown_Data_Using_UAVs.pdf
Abstract—Along with the advance of low-altitude economy, a variety of applications based on Unmanned Aerial Vehicles (UAVs) have been developed to accomplish diverse tasks. In this paper, we focus on the scenario of multiple UAVs performing Federated Learning (FL) tasks. Specifically, a group of UAVs is scheduled to repeatedly visit some Points of Interest (PoIs), collect the data produced ...
https://cis.temple.edu/~giorgio/cis307/readings/futex.pdf
This exemplifies that using futexes is really tricky since they provide problems even to their inventors. This docu-ment will hopefully provide correct and detailed instruc-tions on how to use futexes. First an understanding of the kernel interface and its semantic is needed.
https://cis.temple.edu/~wu/hoc4667-liu.pdf
ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...
https://cis.temple.edu/~pwang/papers.html
Selected Papers of Pei Wang All the following publications are authored by Pei Wang unless specified otherwise.
https://cis.temple.edu/~wu/teaching/Spring2022/Chapter4.pdf
Greedy approaches Seek to maximize the overall utility of some process by making the
https://cis.temple.edu/~tug29203/teaching/fall2018-3329/lectures/ch3-1.ppt
Transport Layer 3-* Chapter 3: Transport Layer our goals: understand principles behind transport layer services: multiplexing, demultiplexing reliable data transfer flow control congestion control learn about Internet transport layer protocols: UDP: connectionless transport TCP: connection-oriented reliable transport TCP congestion control ...