Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 257

Introduction to Probability, Statistics and Random Processes

https://cis-linux1.temple.edu/~tug29203/25fall-2033/lectures/ch1-3.pdf

Example: A chemical reactor: residence times In a continuously stirred reactor vessel where a chemical reaction takes place, on one side fluid or gas flows in, mixes with whatever is already present in the vessel, and eventually flows out on the other side. The so-called residence time distribution tells us how long particles stay inside the vessel before moving on. We consider a continuously ...

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

The mask level is set to 0.2 and 0.5 to represent different distributions of the sparse client model. The Dirich-let distribution parameter is 0.8 for Non-IID data, and the staleness level is configured as N=K = 1000=20 for asyn-chronous scenarios.

Honors Program | Undergraduate Admissions

https://admissions.temple.edu/honors/academics/program-requirements

Any three-credit designated Honors course will automatically satisfy an Honors course requirement. All Honors courses can be identified by the following course numbering system: 0900 - 0999 General Education Honors Courses: Courses numbered 0900-0999 are appropriate for any undergraduate General Education Honors course requirements. x9xx Honors Courses: Undergraduate Honors courses will be ...

Temple University - Account Management

https://accounts.temple.edu/

Temple University Information Technology Services Technology Support Center The TECH Center 12th St. & Montgomery Ave., Room 106 Philadelphia, PA 19122

1041 - cst.temple.edu

https://cst.temple.edu/sites/cst/files/media/document/1041_F24_Problist.pdf

x2. Consider a rectangle with vertices (0, 0), (x, 0), (x, y), and (0, y), where the vertex (x, y) lies on the curve y = f(x), 0 ≤ x ≤ 2 (see the picture at ri

community.mis.temple.edu

https://community.mis.temple.edu/mis5203sec951spring2025/files/2019/01/CalculateProjectNPV_B.xlsx

Enter Discount Rate as decimal (E.g. 0.10 for 10%)

Personalized Mobile Targeting with User Engagement Stages: Combining a ...

https://www.fox.temple.edu/sites/fox/files/SHMM_isre.2018.0831.pdf

Abstract. Low engagement rates and high attrition rates have been formidable challenges to mobile apps and their long-term success, especially for those whose revenues derive mainly from in-app purchases. To date, little is known about how companies can sci-entifically detect user engagement stages and optimize corresponding personalized-targeting promotion strategies to improve business ...

Cora Z7 Reference Manual - sites.temple.edu

https://sites.temple.edu/silage/files/2022/04/cora_z7_rm.pdf

Cora Z7 Reference Manual The Digilent Cora Z7 is a ready-to-use, low-cost, and easily embeddable development platform designed around the powerful Zynq-7000 All-Programmable System-on-Chip (APSoC) from Xilinx. The Zynq-7000 architecture tightly integrates a single or dual core 667MHz ARM Cortex-A9 processor with a Xilinx 7-series FPGA. This pairing grants the ability to surround the processor ...

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...

In-Kernel Traffic Sketching for Volumetric DDoS Detection

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC25_In-Kernel%20Traffic%20Sketching%20for%20Volumetric%20DDoS%20Detection-final.pdf

The main focus of this paper is to guarantee an efficient and effective in-kernel network monitoring on hosts for the detection of volumetric DDoS attacks. The primary goal is to provide a high-performance traffic sketching solution in eBPF/XDP while ensuring that both Query and Update operations performed by the algorithm are executed in kernel space by the eBPF program, without any ...