Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 58

Dr. Jie Wu - 2024 Publications

https://cis.temple.edu/~jiewu/research/publications/Publications_2024.html

Book & Book Chapters Y. Chen, J. Wu, C. Wang, and P. Yu, " Network Security Empowered by Artificial Intelligence," Springer, 2024.

Filling Polygons - Temple University

https://cis.temple.edu/~latecki/Courses/CIS581-02/MatCIS581-02/LectureHolzschuch/FillingPolygons.pdf

Dr Nicolas Holzschuch University of Cape Town e-mail: holzschu@cs.uct.ac.za

220511 Salil K Mehra - CV

https://law.temple.edu/wp-content/uploads/22.05.11-Salil-K-Mehra-CV.pdf

“Artificial Intelligence, Algorithms and Collusion” (Canadian Bar Association 90-minute Brown Bag teleconference, with Joshua Gans and Denes Rothschild), February 28, 2018. “Algorithms, Big Data and Antitrust’s Error-Cost Framework,” Competition Law and the Digital Economy Conference, University of Zurich, February 19, 2018.

OLLI OSHER LIFELONG LEARNING INSTITUTE - Temple University

https://noncredit.temple.edu/upload/Spring%202022%20OLLI%20Online%20Course%20Guide_Final%2012-20.pdf

Some of you had to learn new technology skills and have even seen some benefits to meeting online, beyond the safety factor. I want you to know that it is the intention of our program to return to in-person classes as soon as it’s feasible. However, the decision was made to maintain the program virtually, due to the uncertainty of the COVID situation.

Is the Medium the Message? - scholarshare.temple.edu

https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content

In addition, some courts have developed software designed to convert legal citations in briefs to hyperlinks.89 Courts are also working on creating electronic records, so that record citations can also be hyper-linked.90 Now that this software has been developed, it is only a matter of time before it is adopted throughout the state and federal ...

Cost of a Data Breach Report 2022 - Temple University

https://community.mis.temple.edu/mis5206sec951summer2023/files/2023/06/Cost-of-a-Data-Breach-Full-Report-2022.pdf

Executive summary The Cost of a Data Breach Report offers IT, risk management and security leaders a lens into factors that can increase or help mitigate the rising cost of data breaches.

stoj-1.qxd - Temple University

https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf

1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...

Zhanteng Xie, Pujie Xin, and Philip Dames - Sites

https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf

Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...

Compendium of Clinical Measures for Community Rehabilitation

https://sites.temple.edu/rtwiseowls/files/2013/10/compendium-of-clinical-measures-for-community-rehabilitation.pdf

Contents of the compendium This Compendium contains a suite of outcome measures for use in community rehabilitation settings, as identified from a systematic review of the literature. This is a synthesis of 28 measures and clinical tests which have been critically appraised and then approved by an expert working group of rehabilitation clinicians.

IDENTITIES BETWEEN HECKE EIGENFORMS

https://cst.temple.edu/sites/cst/files/theses1/bao.pdf

tween Hecke eigenforms, we give another proof that the j-function is algebraic