https://cis.temple.edu/~tug29203/21fall-4319/lectures/ch3c-2.ppt
Transport Layer 3-* Chapter 3 outline 3.1 transport-layer services 3.2 multiplexing and demultiplexing 3.3 connectionless transport: UDP 3.4 principles of reliable data transfer 3.5 connection-oriented transport: TCP segment structure reliable data transfer flow control connection management 3.6 principles of congestion control 3.7 TCP congestion control Transport Layer 3-* TCP congestion ...
https://teaching.temple.edu/sites/teaching/files/resource/pdf/TPACK.pdf
In C. Crawford et al. (Eds.), Proceedings of Society for Information Technology and Teacher Education International Conference 2007 (pp. 2214-2226). Chesapeake, VA: Association for the Advancement of Computing in Education.
https://community.mis.temple.edu/yiwen/files/2022/02/CV_Yiwen.pdf
“Engaging the crowd: Shall we tell stories or provide structured content?” in Conference on Health IT and Analytics (CHITA), Nov 15-16, 2019, Washington D.C.
https://cis.temple.edu/~friedman/cis071/Lecture4-web.doc
The book also uses flow charts, which are sometimes handy for visualizing what is going on with a decision structure. However, pseudo-code, if properly indented and written with a little care is a preferred mechanism for mapping out the logic of a decision before trying to program it (and having to worry about syntax).
https://scholarshare.temple.edu/bitstreams/8f76a8fa-7976-4769-b0a7-fe3b9341ce13/download
Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE The majority of the mammalian genome is transcribed into non-coding RNAs, many of which co-evolve with RNA-binding proteins (RBPs) to function as biochemically defined and tractable ribonucleoproteins (RNPs). Here, we applied icSHAPE, a robust and versatile RNA structural probing pipeline, to endogenous RNPs purified from ...
https://cis.temple.edu/~giorgio/cis307/readings/precedence.html
CIS 307: Precedence Graphs, Concurrency Grain, Fork and Join, CoBegin CoEnd
https://sites.temple.edu/vocaldevlab/files/2021/12/HellerMurray_CPP_selfarchived-2.pdf
the “Calculate CPPS” button (circled in red), will be visible. After analysis of a “Single File,” (B) The new sound file with only the voiced speech segments is added to the “Praat Objects” window, (C) CPP_full and CPP_voice values are displayed in “Praat Info” window, and (D) CPP_
https://www.fox.temple.edu/sites/fox/files/documents/CVs/rajiv-d-banker-cv.pdf
1997–2003: Ashbel Smith Chair in Accounting and Information Management, Director of Accounting and Information Management Programs, School of Management, The University of Texas at Dallas. Joint appointments in the Accounting and Information Management Area and the Information Systems and Operations Management Area. Executive Director of the Center for Practice and Research in Software ...
https://cis.temple.edu/~yanwang/publications.html
Hongbo Liu, Jie Yang, Yan Wang, Yingying Chen, and C. Emre Koksal, "Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation", IEEE Transactions on Mobile Computing (IEEE TMC), Volume 13, Issue 12, Pages 2820-2835, 2014.
https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch06.htm
Chapter 6. Pointers and Modular Programming 1. Pointers and the indirection operator An asterisk ('*') before an identifier is called an "indirection operator", which indicates that the variable contains the address of another variable. Such a variable is called a "pointer" in C. For instance, the declaration double *p makes p a "pointer variable" of type "pointer to double ", and char *signp ...