Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 10,400

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...

Legendre-Hadamard conditions for two-phase configuration

https://faculty.cst.temple.edu/~yury/LH4lam.pdf

We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.

From College Readiness to Ready for Revolution!

https://tupjournals.temple.edu/index.php/kalfou/article/download/12/48

In August, Hoover and Wirth secured a $150,000 grant from the federal government; it rested, however, on the CRP’s ability to raise matching funds from the local district.25 CRP oficials, therefore, appealed to college administrators to raise funds for the program.

An introduction to Kalman filt - Temple University

https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/kalmanintroduction.pdf

1 Introduction In his 1960 famous publication (“A new approach to linear filtering and prediction problems”, Trans. ASME J. Basic Engineering., vol 82, March 1960, pp 34-45), Rudolf Kalman based the construction of the state estimation filter on probability theory, and more specifically, on the properties of conditional Gaussian random variables. The criterion he proposed to minimize is ...

NIST SP 800-122, Guide to Protecting the Confidentiality of Personally ...

https://community.mis.temple.edu/mis5206sec001fall2021/files/2018/08/nistspecialpublication800-122_GuideToProtectingConfidentialityOfPII.pdf

Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation‘s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to ...

0004760417 293..324

https://sites.temple.edu/dwolf/files/2020/06/Dissoi-Logoi-EGE.pdf

1. Orientation to the Text It is generally agreed that the text T that we call the Dissoi Logoi was originally composed within the first decade or so after the Peloponnesian War. The single most compelling piece of evidence in support of this dating is the text’s description of the Spartans victory

ArrayPipe: Introducing Job-Array Pipeline Parallelism for High ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m48122-zhao%20final.pdf

ArrayPipe: Introducing Job-Array Pipeline Parallelism for High Throughput Model Exploration Hairui Zhao1, Hongliang Li1,2,∗, Qi Tian1, Jie Wu3, Meng Zhang1, Xiang Li1, Haixiao Xu4

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

LETHAL AUTONOMOUS WEAPONS SYSTEMS (LAWS): - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Meier-TICLJ.pdf

Humanity by Human Rights Watch, lethal autonomous weapons systems (LAWS) have become an issue of national and international attention. With almost daily articles and commentary, including letters by notable scientists, debating the advantages and disadvantages of developing and fielding these systems, the public has become generally more aware of the issues related to autonomy, but it has ...

la5011055 1. - sites.temple.edu

https://sites.temple.edu/borguet/files/2025/01/structure-of-water-2014.pdf

ABSTRACT: The properties of water molecules located close to an interface deviate significantly from those observed in the homogeneous bulk liquid. The length scale over which this structural perturbation persists (the so-called interfacial depth) is the object of extensive investigations. The situation is particularly complicated in the presence of surface charges that can induce long-range ...