Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 31,400

Social Media and Firm Equity Value

https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf

Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...

02-cpu-mode.pptx - cis.temple.edu

https://cis.temple.edu/~qzeng/cis3207-spring18/slides/02-cpu-mode.pdf

Hardware vendors are rapidly embracing virtualization and developing new features to simplify virtualization techniques. First generation enhancements include Intel Virtualization Technology (VT-x) and AMD’s AMD-V which both target privileged instructions with a new CPU execution mode feature that allows the VMM to run in a new root mode below ring 0. As depicted in Figure 7, privileged and ...

Incremental Local Outlier Detection for Data Streams

https://cis.temple.edu/~latecki/Papers/CIDM07.pdf

Abstract. Outlier detection has recently become an important problem in many industrial and financial applications. This problem is further complicated by the fact that in many cases, outliers have to be detected from data streams that arrive at an enormous pace. In this paper, an incremental LOF (Local Outlier Factor) algorithm, appropriate for detecting outliers in data streams, is proposed ...

M2381 - BENSON PRINT.indd - College of Liberal Arts

https://liberalarts.temple.edu/sites/liberalarts/files/Handbook_on_the_Economics.pdf

Dain, D.P. and R.L. Brennan Jr (2003), ‘Negligent security law in the Commonwealth of Massachusetts in the post- September 11 era’, New England Law Review, 38 (Fall), 73–96. Economic Report of the President (2009 and 2006), Table 67, Washington, DC: US Government Printing.

Lecture 7: Potential Energy Functions - Temple University

https://ronlevygroup.cst.temple.edu/courses/2023_fall/chem5302/slides-notes/chem5302_lecture7.pdf

Terminology Potential Energy – non-kinetic part of the internal energy of a system.

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...

Chapter 5 Network Layer: The Control Plane - cis.temple.edu

https://cis.temple.edu/~tug29203/22spring-4319/lectures/ch5b-2.pdf

Chapter 5 Network Layer: The Control Plane A note on the use of these Powerpoint slides:

Microsoft Word - DissertationHandbook Feb 1 Revision

https://education.temple.edu/sites/education/files/uploads/grad/DissertationHandbook%20Feb%201%20Revision.pdf

There are a number of books and articles which have been published that might be of help in completing the dissertation. Several of these are listed in the reference section. I have also created a short document that contains some words of advice about writing issues in proposals and dissertations. This is contained in Appendix A.I should mention that quite a bit of this document was taken ...

HUMAN RIGHTS, THE RULE OF LAW, AND THE EAST AFRICAN COURT OF ... - Sites

https://sites.temple.edu/ticlj/files/2020/11/34.2.7.pdf

Mihreteab Tsighe Taye* This article represents a first systematic attempt to trace the trajectory that follows the professionalization of a group of East African lawyers committed to the cause of a regional International Court (IC) inspired by the rule of law and human rights. It demonstrates how a group of lawyers participated in the struggle to define law and to construct the East African ...