https://cis.temple.edu/~pwang/AGI-Intro.html
Artificial General Intelligence — A gentle introduction Pei Wang [On-line document since 2007, last updated in August 2025] [中文] [Español] [This page contains information about the field of Artificial General Intelligence (AGI), collected and organized according to my judgment, though efforts are made to avoid personal biases.]
https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf
The answers below are based on the trace file tcp-ethereal-trace-1 in in
https://cis.temple.edu/~giorgio/old/cis307s96/readings/docs/sockets.html
Introduction As you delve into the mysteries of UNIX, you find more and more things that are difficult to understand immediately. One of these things, at least for most people, is the BSD socket concept. This is a short tutorial that explains what they are, how they work, and gives sample code showing how to use them. The Analogy (or: What is a socket, anyway?) The socket is the BSD method for ...
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://cis.temple.edu/~wu/teaching/Spring2018/distributed-computing-2018.pdf
1. In your opinion, what is the future of the computing and the field of distributed systems? 2. Use your own words to explain the differences between distributed systems, multiprocessors, and network systems. 3. Calculate (a) node degree, (b) diameter, (c) bisection width, and (d) the number of links for an nx n2-d mesh, an n x n2- d torus, and an n-dimensional hypercube.
https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf
How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010
https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf
Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf
it is grounded in the idea that all weaponry should be subject to ―meaningful human control.‖ This ―intuitively appealing‖ principle is immensely popular,
https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf
1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...