Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 37,500

ArrayPipe: Introducing Job-Array Pipeline Parallelism for High ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m48122-zhao%20final.pdf

ArrayPipe: Introducing Job-Array Pipeline Parallelism for High Throughput Model Exploration Hairui Zhao1, Hongliang Li1,2,∗, Qi Tian1, Jie Wu3, Meng Zhang1, Xiang Li1, Haixiao Xu4

2.3A.ppt - Temple University

https://cis.temple.edu/~latecki/Courses/RobotFall08/Talks/LinearProgramming.pdf

provides 2 units of vitamin C and 2 units of iron and each ounce of B provides 1 unit of vitamin C and 2 units of iron. Suppose the cost of A is 4¢/ounce and the cost of B is 3¢/ounce. If the breakfast menu must provide at least 8 units of vitamin C and 10 units of iron, how many ounces of each item should be provided in order to meet the iron and vitamin C requirements for the least cost ...

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

Cryptographyis the science of secret writing is an ancient art; the first documented use of cryptography in writing dates back to circa 1900 B.C. when an Egyptian scribe used non-standard hieroglyphs in an inscription.

slides_lec9 - cis.temple.edu

https://cis.temple.edu/~latecki/Courses/CIS601-03/Lectures/slides_lec9.pdf

Most of us fuse the images from our eyes in order to obtain depth information. This is exploited in the stereo viewer, where photographs taken from two positions are presented one to each eye, and a subjective sense of depth is produced.

Chapter 03

https://ronlevygroup.cst.temple.edu/courses/2016_fall/biost5312/lectures/biostat_lecture_02.pdf

Summary of Chapter 2 Numeric or graphic methods for displaying data help in

HearBP: Hear Your Blood Pressure via In-ear ... - Temple University

https://cis.temple.edu/~yu/research/HearBP-info24.pdf

Abstract—Continuous blood pressure (BP) monitoring using wearable devices has received increasing attention due to its importance in diagnosing diseases. However, existing methods mainly measure BP intermittently, involve some form of user effort, and suffer from insuficient accuracy due to sensor properties. In order to overcome these limitations, we study the BP measurement technology ...

CIS 3207: Introduction to Systems Programming & Operating Systems

https://sites.temple.edu/gkwatny/files/2024/12/CIS3207-Syllabus_Fall-2024.pdf

ll be using the C language for program development to complete the projec s. You will need a C compiler, linker and editing environment for this work. Your lab instruct r will give you help in choosing software for local (your own computer) use. CIS-linux2.

Enabling Processes - Temple University

https://community.mis.temple.edu/mis5203sec951spring2022/files/2019/01/COBIT5-Ver2-enabling.pdf

Disclaimer ISACA has designed this publication, COBIT® 5: Enabling Processes (the ‘Work’), primarily as an educational resource for governance of enterprise IT (GEIT), assurance, risk and security professionals. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or ...

Majors | Department of Computer & Information Sciences | College of ...

https://cis.temple.edu/academics/undergraduate/majors/

The Computer Science curriculum is targeted to students with an interest in the theoretical and practical aspects of computing systems, software design and development. Our programs help students develop knowledge of traditional computer science concepts such as data structures, algorithms, computer systems, computing theory and software engineering, which can be applied to areas such as ...