Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 4,260

CIS-1057

https://cis.temple.edu/~wangp/1057-PC/1057-index.htm

Syllabus Instructor: Dr. Pei Wang Teaching Assistant: Xin LiSchedule

Chapter 10: Covariance and Correlation - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2033-Spring14/PPT/C10_CIS2033.ppt

* * As an example, take g(x, y) = xy for discrete random variables X and Y with the joint probability distribution given in the table. The expectation of XY is computed as follows: With the rule above we can compute the expectation of a random variable X with a Bin(n,p) which can be viewed as sum of Ber(p) distributions: * * Proof that E[X + Y] = E[X] + E[Y]: Var(X + Y) is generally not equal ...

Microsoft Word - Michael Sachs CV Oct 2018.doc

https://cph.temple.edu/sites/cph/files/node/profile/resume/Michael%20Sachs%20CV%20Oct%202018.pdf

Hollins College (VA) - 1973-1974, M.A. in general- experimental psychology, 1975. University of Windsor (Canada) - 1974-1975, first year doctoral work in social-personality psychology. Florida State University (FL) - 1975-1980, Ph.D. in motor learning (specialization in sport psychology), 1980, from the Department of Movement Science and Physical Education. Loyola College (MD) - 1983-1989, M.S ...

MIS 5208 - LE11 - Data Acquistion

https://community.mis.temple.edu/mis5208sp18/files/2018/04/MIS-5208-LE11-Data-Acquistion.pdf

Make acquiring evidence from a suspect drive more convenient Especially when used with hot-swappable devices Disadvantages Must protect acquired data with a well-tested write-blocking hardware device Tools can’t acquire data from a disk’s host protected area Some countries haven’t accepted the use of write-blocking devices for data ...

Publications | Nora S. Newcombe - Sites

https://sites.temple.edu/newcombe/research/

A nationally recognized expert on cognitive development, Dr. Newcombe’s research has focused on spatial development and the development of episodic and ...

College and University Basic Needs Insecurity: A National #RealCollege ...

https://hope.temple.edu/sites/hope/files/media/document/HOPE_realcollege_National_report_digital.pdf

Executive Summary The #RealCollege survey is the nation’s largest annual assessment of basic needs security among college students. The survey, created by the Hope Center for College, Community, and Justice (Hope Center), specifically evaluates access to afordable food and housing. This report describes the results of the #RealCollege survey administered in the fall of 2018 at 123 two- and ...

Protecting Vulnerable Voices: Reducing False Confessions from ... - Sites

https://sites.temple.edu/pcrs/2024/05/01/protecting-vulnerable-voices-reducing-false-confessions-from-people-with-mental-illness/

By Julia Rankin Introduction The issues of wrongful convictions and exonerations have gained popularity in the last few decades. The establishment of the Innocence Project, [1] as well as several media sensations such as Serial[2] and Making a Murderer, [3] have launched discussions of exonerations into the mainstream. After years of studying exonerations, scholars have identified a handful of ...

Adaptive Procedural Generation in Minecraft - Temple University

https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf

1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...