Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,750

Lecture 6 – Chapter 3 TCP flow and congestion control

https://cis.temple.edu/~tug29203/19spring-5617/lectures/ch3-3.pdf

Lecture 6 – Chapter 3 TCP flow and congestion control CIS 5617, Fall 2019 Anduo Wang Based on Slides created by JFK/KWR

The Impact of Insider Trading Regulations on Stock Market ... - Sites

https://sites.temple.edu/ticlj/files/2017/02/23.2.Hughes-TICLJ.pdf

ABSTRACT The goal of this Comment is to highlight the disconnect between the theoretical law and economics debate over the merits of insider trading regulations and the empirical body of work regarding the effect of these regulations on stock market efficiency. This Comment first summarizes the theories of insider trading which have heretofore consumed and defined this law and economics debate ...

Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing

https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf

Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA

doi:10.1016/j.patcog.2003.07.008 - Temple University

https://cis.temple.edu/~latecki/Courses/CIS601-04/ProjectPapers/shapeRepPR04.pdf

Abstract More and more images have been generated in digital form around the world. There is a growing interest in 1nding images in large collections or from remote databases. In order to 1nd an image, the image has to be described or represented by certain features. Shape is an important visual feature of an image. Searching for images using shape features has attracted much attention. There ...

D:/Editors/Kishor/LaTeX/Linear Algebra/ila4/ila4new.dvi

https://cis.temple.edu/~latecki/Courses/CIS2166-Fall14/StrangMatrixAlg/ila0403.pdf

The best C in Problems 5–6 and the best D in Problems 7–8 do not agree with the best .C; D/ in Problems 1–4. That is because .1; 1; 1; 1/ and .0; 1; 3; 4/ are

Microsoft Word - CampbellSoupStrategyDraft.docx

https://community.mis.temple.edu/jonathanfertal/files/2014/03/CampbellSoupStrategy.pdf

Morrison has outlined three strategic plans to inject growth into Campbell: stabilize and increase profitability in North American soup and simple meals, expand international presence, and continue to drive growth in healthy beverages and baked snacks (Goudreau, 2013). This strategy seeks to address key strategic decisions of the past, missed opportunities, and unmet expansion.

Comparative first-principles studies of prototypical ferroelectric ...

https://sites.temple.edu/xifanwu/files/2020/10/2017.PRB_.Comparative-first-principles-studies-of-prototypical-ferroelectric-materials-by-LDA-GGA-and-SCAN-meta-GGA.pdf

Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA

Edge-Cloud Networks for Efficient AI/ML Implementations

https://cis.temple.edu/~wu/research/publications/Publication_files/Cloudnet-2023-final.pdf

Three-stage collaborative pipeline and offloading ¡ Local, communication, remote (Cloud)

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

Privacy-Preserving Federated Neural Architecture Search With Enhanced ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Privacy-Preserving_Federated_Neural_Architecture_Search_With_Enhanced_Robustness_for_Edge_Computing.pdf

Abstract—With the development of large-scale artificial intelli-gence services, edge devices are becoming essential providers of data and computing power. However, these edge devices are not immune to malicious attacks. Federated learning (FL), while pro-tecting privacy of decentralized data through secure aggregation, struggles to trace adversaries and lacks optimization for hetero-geneity ...