Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,560

University Housing and Residential Life - Student Affairs

https://studentaffairs.temple.edu/housing/select-your-housing

Why live on campus? Students who live on campus are more likely to have higher GPAs and complete their degree. Resident Assistants provide programming to help foster friendships and provide an engaging experience, as well as peer support for a variety of concerns. Enjoy easy access to Philadelphia with Broad St. Line stops conveniently on campus. Need to travel for the weekend? Take the ...

Directional and Explainable Serendipity Recommendation

https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf

ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...

The Conceptual Design of OpenNARS 3.1 - Temple University

https://cis.temple.edu/tagit/publications/PAGI-TR-11.pdf

October 19, 2020 NARS (Non-Axiomatic Reasoning System) can be analyzed in three parts [Wang, 1995, Wang, 2006, Wang, 2013]:

Microsoft Word - CV_Jian Sun.docx

https://www.fox.temple.edu/sites/fox/files/media/file/cv_Jian-Sun.pdf

JIAN SUN 70 Central Ave, Franklin Park, NJ, 08823 (T) 517-897-2220 (E) sunjian0422@gmail.com

Joint Dynamic Grouping and Gradient Coding for Time-critical ...

https://cis.temple.edu/~wu/research/publications/Publication_files/Joint%20Dynamic%20Grouping%20and%20Gradient%20Coding%20for%20Time-critical%20Distributed%20Machine%20Learning%20in%20Heterogeneous%20Edge%20Networks-FINAL-VERSION.pdf

Abstract—In edge networks, distributed computing resources have been widely utilized to collaboratively perform a machine learning task by multiple nodes. However, the model training time in heterogeneous edge networks is becoming longer because of excessive computation and delay caused by slow nodes, namely stragglers. The parameter server even abandons stragglers which fail to return ...

Changemaker Challenge - Fox School of Business

https://www.fox.temple.edu/faculty-research/institutes-centers/innovation-entrepreneurship-institute/competitions/changemaker-challenge

The need to address global and social issues is becoming increasingly important. The Innovation & Entrepreneurship Institute at Temple University established the Changemaker Challenge to encourage the development and creation of social impact ideas and ventures with the aim of creating positive change in local communities and around the world.

PRESENTATION TITLE - Office of the Vice President for Research

https://research.temple.edu/sites/research/files/media/document/Temple%20University%20Export%20Control%20Introduction%20.pdf

EXPORT To send or take controlled tangible items, software, or information out of the United States in any manner (including hand-carried), to transfer ownership or control of controlled tangible items, software, or information to a foreign person, or to disclose information about controlled items, software, or information to a foreign government or foreign person. The controlled tangible item ...

Microsoft Word - Ex 4 SOD Guide.docx - Temple University

https://community.mis.temple.edu/mis5121beaver2016/files/2016/03/Ex-4-SOD-Guide.pdf

The possible access types and their corresponding symbols are: C – Create authorization – the user can create a new document R – Read authorization – the user has access to the document in order to see its contents U – Update authorization – the user can change, edit, or void an existing document D – Delete authorization – the ...

REPORT Title - community.mis.temple.edu

https://community.mis.temple.edu/mis2101sec702spring2021/files/2021/03/MIS-2101-Section-7B_week1_students.pdf

Mike is the HR manager at Playwicki Financial Services. They need to hire a new systems analyst. The job has been posted on the company’s web site and a few people have applied for the position. The hiring process starts when Mike reviews the applications and matches them up with the job requirements to identify the best candidate. Once the best candidate has been identified, their resume is ...

Deobfuscation of Virtualization-obfuscated Code through Symbolic ...

https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf

Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...