Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 50

MRRC: an effective cache for fast memory registration in RDMA

https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf

The results show that MRRC ef ciently increase the cache hit ratios by 10% and reduces the total cost of mem-ory registration and deregistration by up to 70% compared to traditional RDMA operations without optimization.

Summer Internship Report - cis.temple.edu

https://cis.temple.edu/~pwang/9991-PJ/Reports/OzkanKilic.pdf

AGI SYSTEMS For more than 60 years, AI researchers have been working on creating intelligent machines or programs that can perform intellectual tasks that a human being can. These tasks can vary a lot from playing chess, counting animals in a picture, performing commands given in a natural language to making jokes, having a conversation with a human, producing novel inventions and art. Weak-AI ...

A MEANINGFUL FLOOR FOR - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf

it is grounded in the idea that all weaponry should be subject to ―meaningful human control.‖ This ―intuitively appealing‖ principle is immensely popular,

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information ...

CRC_AU2832_C01.tex - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf

The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...

http://www.ce.chalmers.se/staff.PDF - Temple University

https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf

1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...

Shape Descriptors for Non-rigidShapes with a Single Closed Contour

https://cis.temple.edu/~latecki/Papers/cvpr00.pdf

Abstract The Core Experiment CE-Shape-1 for shape descriptors performed for the MPEG-7 standard gave a unique oppor-tunity to compare various shape descriptors for non-rigid shapes with a single closed contour. There are two main dif-ferences with respect to other comparison results reported in the literature: (1) For each shape descriptor, the exper-iments were carried out by an institute ...

“Neural-Symbolic Computing: An Effective Methodology for Principled ...

https://cis.temple.edu/tagit/presentations/Neural-Symbolic%20Computing%20An%20Effective%20Methodology%20for%20Principled%20Integration%20of%20Machine%20Learning%20and%20Reasoning.pdf

Several works have identified the need for integrating symbolic knowledge representation and reasoning with deep-learning systems

Accessing the Employee Career Center: - Temple Health

https://hr.templehealth.org/employeecareercenter.html

Are you using a shared workstation now? Everyone else, use this link

A Practical Guide to Informed Consent

https://ictoolkit.templehealth.org/html/ictoolkitpage21.html

A Practical Guide to Informed Consent