https://news.temple.edu/news/2021-07-06/why-aromantic-and-asexual-people-belong-lgbtqia-community
Jennifer Pollitt, an assistant professor and assistant director of gender, sexuality and women’s studies, talks about asexuality and aromanticism and provides insight into these lesser known LGBTQIA+ identities and why they’re often overlooked.
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~latecki/Papers/VisualCurvatureCVPR07.pdf
a relation between multi-scale visual curvature and convexity of simple closed curves. To our best knowledge, the proposed definition of visual curvature is the first ever that applies to regular curves as defined in differential geometry as well as to turn angles of polygonal curves. Moreover, it yields stable curvature estimates of curves in digital images even under sever distortions.
https://sites.temple.edu/emilyksnell/files/2017/08/Wasik-Hindman-Snell-2016.pdf
a b s t r a c t This paper reviews high-quality empirical studies on book reading practices in early childhood that have resulted in increases in child vocabulary.
https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf
How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...
https://news.temple.edu/nutshell/2023-03-20/what-do-you-meme-you-can-get-sued-social-post
If your meme is fixed and original, then you don’t have to do anything else for it to receive copyright protection. However, Harris says that you will want to register your meme with the copyright office if you’re really worried that someone will infringe on your intellectual property rights.
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
The goal is to generate a list of potential items,Ttar ⊂ T, each one of which is represented as a reCap, and provide expla-nations for , so as to enhance recommendation serendipity (a utar balance between diference and accuracy) and explainability.
https://cis.temple.edu/~latecki//Courses/CIS166-Spring07/Lectures/ch7.4.pdf
Section 7.4 Closures of Relations Definition: The closure of a R relation with respect property P is the relation number of ordered R to obtain pairs property to
https://scholarshare.temple.edu/bitstreams/bde3365d-5ae4-418c-ab8c-5d52c3b0c2a7/download
Table 3: DPC Practice Characteristics in Ten Most Populous Cities in US This table shows all of the DPC practices included in the analysis for Table 1. This includes practices within the city limits of the cities included in Table 1 according to the DPC Frontier Mapper that meet the three-part definition of the DPC model in that they charge a recurring monthly or yearly membership fee, they do ...