Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 6,250

Marco Shaojun Qin - Fox School of Business and Management

https://www.fox.temple.edu/sites/fox/files/documents/CVs/marco-shaojun-qin-cv.pdf

Employment Assistant Professor of Marketing, Fox School of Business, Temple University, July 2018 - present

Research Guides: Modern Physics: PHYS 2796: Lab Reports

https://guides.temple.edu/physics2796/labs

PHY 2796 Modern Physics Laboratory (provide an informative title) Your name, Department of Physics, Temple University Abstract This paper describes the required format of the lab reports of the experiments performed in PHYSICS 2796 Modern Physics Laboratory. It also serves as a template for your lab reports. An abstract is designed to give the reader: a) Knowledge of the general method ...

Navigating Colonial Histories: Mapping the Repatriation of the Benin ...

https://sites.temple.edu/tudsc/2023/12/14/navigating-colonial-histories-mapping-the-repatriation-of-the-benin-bronzes/

Serving as a graduate extern in the Loretta C. Duckworth Scholars Studio and working towards completing the Cultural Analytics Certificate, my digital research delves into the migration patterns of the global Benin Bronzes repatriation initiative.

#OUREXPERIENCESMATTER: HOW RACE, GENDER AND SOCIO-ECONOMIC IDENTITY ...

https://sites.temple.edu/pcrs/2023/11/06/ourexperiencesmatter-how-race-gender-and-socio-economic-identity-have-historically-influenced-the-criminalization-of-the-black-female-sex-worker-a-look-at-early-twentieth-century-new-york/

#OUREXPERIENCESMATTER: HOW RACE, GENDER AND SOCIO-ECONOMIC IDENTITY HAVE HISTORICALLY INFLUENCED THE CRIMINALIZATION OF THE BLACK FEMALE SEX WORKER — A LOOK AT EARLY-TWENTIETH CENTURY NEW YORK AND PRESENT-DAY SAN JUAN, PUERTO RICO

How to Benchmark Code Execution Times on Intel IA-32 and IA-64 ...

https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf

How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010

Shape Retrieval Using Fourier Descriptors - Temple University

https://cis.temple.edu/~lakaemper/courses/cis595_2004/papers/fourierShape.pdf

Abstract: Shape is one of the most important features in Content Based Image Retrieval (CBIR). Many shape representations and retrieval methods exists. However, most of those methods either do not well represent shape or are difficult to do normalization (making matching hard). Among them, methods based Fourier descriptors (FD) achieve both well representation and well normalization. Different ...

What Counts in the Development of Young Children’s Number ... - Sites

https://sites.temple.edu/cognitionlearning/files/2013/09/Levine-et-al-2010.pdf

What Counts in the Development of Young Children’s Number Knowledge? Susan C. Levine, Linda Whealton Suriyakham, Meredith L. Rowe, Janellen Huttenlocher, and Elizabeth A. Gunderson

Graduate | History | Temple University College of Liberal Arts

https://liberalarts.temple.edu/academics/departments-and-programs/history/graduate

Graduate Study at the University of Erfurt With the support of a grant from the German government, History graduate students can participate in an exchange at the University of Erfurt. Erfurt is a stunning medieval city with winding streets and graceful market squares in the center of Germany, two hours by train from Frankfurt and Berlin. Largely untouched by the bombing of World War II ...

At World Food Day event, Food Insecurity Task Force addresses hunger on ...

https://news.temple.edu/news/2023-11-01/world-food-day-event-food-insecurity-task-force-addresses-hunger-campus

The recently formed Food Insecurity Task Force is bringing people across the university together to find solutions to hunger among college students.

Automating Conflict Detection and Mitigation in Large-Scale IoT Syste

https://cis.temple.edu/~apal/ccgrid_iot.pdf

Abstract—In this paper we examine the problem of conflict detection and mitigation across multiple independently designed IoT subsystems deployed in a shared environment. The desired behavior of the system is codified in terms of predefined “safety properties”. We allow both the operational rules and safety properties to include time and temporal logic operations and detect their ...