Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,560

Computer & Information Science (CIS) - Temple University

https://bulletin.temple.edu/undergraduate/courses/cis/

This single semester course hopes to equip students with critical consciousness around information technologies. The course is designed with the presumption that living and working with 21st Century technologies requires not only vocational skills but also theoretical grounding. Key themes such as "Computational Thinking" or "21st Century Economics and Global Communication" embed an ...

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...

PROFESSIONAL QUALIFICATIONS

https://www.fox.temple.edu/sites/fox/files/documents/CVs/david-j-wilk-cv.pdf

Real Estate Symposia on Asset Optimization & Place-Making Economic Development at University of Delaware (2012, 2016), Perdue Business School at Salisbury University (2013), Florida Atlantic University (2014), Delaware State University (2014), University of Illinois (2015, 2017), University of Washington (2016), Johns Hopkins University (2016), and Temple University (2019) https://youtu.be ...

http://www.ce.chalmers.se/staff.PDF - Temple University

https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf

1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...

MRRC: an effective cache for fast memory registration in RDMA

https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf

Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...

SAFETY DATA SHEET - Tyler School of Art and Architecture

https://tyler.temple.edu/sites/tyler/files/architecture/Etchant%20solution%20%28PCB%20%29.pdf

EXPOSURE LIMITS IN AIR: ACGIH American Conference on Governmental Industrial Hygienists

How Online Communication Platforms Facilitated Human ... - Sites

https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/

By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...

Microsoft Word - Introduction to Problem Solving and Programming in ...

https://cis.temple.edu/~tuf80213/courses/temple/cis1051/cis1051.pdf

Course Description CIS 1051 introduces students to computers, computer programming, and problem solving using programs written in the Python language. Topics covered include the general characteristics of computers; techniques of problem solving and algorithm specifications; and the implementation, debugging, and testing of computer programs. The goal is to learn to solve small programming ...

CrossLayer.dvi - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/mass15pouya.pdf

Interference among the nodes is the second major origin of errors in wireless transmissions. In contrast with the wired links, the wireless medium is shared among the wireless devices. Consequently, in the case that two wireless trans-mitters that have a common node in their communication rage transmit simultaneously, the receiver node cannot receive the transmitted packet correctly. Feedback ...

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...