Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 37,500

Mathematical Tools for Multivariate Character Analysis

https://cis.temple.edu/~latecki/Courses/AI-Fall12/Lectures/GreatMatrixIntro.pdf

2 @f @x n 1 C C C C C C C C C C A Thegradientatpointx ocorrespondstoavectorindicatingthedirectionofsteepest ascent of the function at that point (the multivariate slope offat the point x o). For examplef(x)=xTxhasgradientvector2x.Atthepointx o, xTxlocallyincreases most rapidly if we change x in the same the direction as the vector going from ...

The Socialist Legal System with Chinese Characteristics: - Sites

https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf

The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...

Resume Wizard - sites.temple.edu

https://sites.temple.edu/yangyang/files/2024/10/Yang-CV-2024-Chinese.pdf

Liu-Lastres, B., Yang, Y. and Zhang, C. (forthcoming). Optimal-fit model of risk perception and travel-related behaviors during a global pandemic(全球疫情期间风险感知与旅游相关行为的最佳模型).

Problem Solving & Program Design in C - Temple University

https://cis.temple.edu/~tuf80213/courses/temple/cis1057/slides/Presentation_15.pdf

Problem Solving & Program Design in C stcpy copies the string that is its second argument into its first argument strcpy(s1, “hello”);

An Architecture for Real-time Reasoning and Learning

https://cis.temple.edu/~pwang/Publication/WHW-Realtime.pdf

Abstract. This paper compares the various conceptions of “real-time” in the context of AI, as different ways of taking the processing time into consideration when problems are solved. An architecture of real-time reasoning and learning is introduced, which is one aspect of the AGI system NARS. The basic idea is to form problem-solving processes flexibly and dynamically at run time by using ...

Lecture 6 – Chapter 3 TCP flow and congestion control

https://cis.temple.edu/~tug29203/19spring-5617/lectures/ch3-3.pdf

Lecture 6 – Chapter 3 TCP flow and congestion control CIS 5617, Fall 2019 Anduo Wang Based on Slides created by JFK/KWR

Microsoft Word - Introduction to Problem Solving and Programming in ...

https://cis.temple.edu/~tuf80213/courses/temple/cis1051/cis1051.pdf

Course Description CIS 1051 introduces students to computers, computer programming, and problem solving using programs written in the Python language. Topics covered include the general characteristics of computers; techniques of problem solving and algorithm specifications; and the implementation, debugging, and testing of computer programs. The goal is to learn to solve small programming ...

1057-CH01 - Temple University

https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch01.htm

Typical examples of high-level language include FORTRAN, ALGOL, COBOL, BASIC, Pascal, LISP, Prolog, Perl, C, C++, and Java. The translation from high-level languages and assembly languages into machine languages is accomplished by special programs: compilers, interpreters, and assemblers.

02-cpu-mode.pptx - cis.temple.edu

https://cis.temple.edu/~qzeng/cis3207-spring18/slides/02-cpu-mode.pdf

Hardware vendors are rapidly embracing virtualization and developing new features to simplify virtualization techniques. First generation enhancements include Intel Virtualization Technology (VT-x) and AMD’s AMD-V which both target privileged instructions with a new CPU execution mode feature that allows the VMM to run in a new root mode below ring 0. As depicted in Figure 7, privileged and ...

In-Kernel Traffic Sketching for Volumetric DDoS Detection

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC25_In-Kernel%20Traffic%20Sketching%20for%20Volumetric%20DDoS%20Detection-final.pdf

Abstract—Emerging network technologies like cloud comput-ing provide flexible services but also introduce vulnerabilities to host servers, such as exposure to Distributed Denial of Service (DDoS) attacks. Traditional host-based detection tools operate in the user space, which can delay detection because network traffic must pass through the kernel space first. Moving detection to the kernel ...