Search Keywords

Results Restricted To:

https://www.temple.edu

No results were found for your search.

Microsoft Word - IJNPA_submission2-final.doc

https://cis.temple.edu/~apal/npa.pdf

Abstract Recent advances in radio and embedded systems have enabled the proliferation of wireless sensor networks. Wireless sensor networks are tremendously being used in different environments to perform various monitoring tasks such as search, rescue, disaster relief, target tracking and a number of tasks in smart environments. In many such tasks, node localization is inherently one of the ...

The Intersection of Game Theory and Chess

https://sites.temple.edu/gametheory/2024/11/12/chess/

Chess, often dubbed the “game of kings,” is a classic example of strategic thinking and tactical prowess. Beyond its status as a board game, chess has been a subject of extensive study in mathematics, psychology, and computer science. One of the most profound ways to analyze chess is through the lens of game theory—a branch of mathematics that studies strategic interactions among ...

Khalifa | Kalfou - Temple University

https://tupjournals.temple.edu/index.php/kalfou/article/view/432

I work at the operations building here at SCIP, the State Correctional Institution at Pittsburgh. About eight years ago I worked in this same building, and I was always somehow drawn to this particular spot at this window. It’s got pretty much a full view of the yard, pretty much a view of the institution overall, and from here, I see a lot of me and three or four generations of me. Just ...

CRC_AU2832_C01.tex - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf

The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...

Research Guides: Public Health Law Research Guide: Legal Mapping

https://guides.temple.edu/c.php?g=990083&p=7162366

A guide to finding empirical studies related to public health law.

Marc Ilies, PhD - School of Pharmacy

https://pharmacy.temple.edu/marcilies

Google Scholar LinkedIn ORCID Research Gate Teaching & Academic Contributions PharmD Teaching: Medicinal Chemistry Graduate Teaching Principles of Biochemistry Advanced Drug and Gene Delivery Systems Introduction to Drug Design/Advanced Medicinal Chemistry Drug Delivery Certificate Advising: 4 doctoral students (TUSP) Research Focus & Activities Dr. Ilies’s lab interests lie in the broadly ...

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...

Genealogy Resources of the Philadelphia Jewish Archives Center

https://guides.temple.edu/c.php?g=1417474&p=10506348

An introduction to the genealogy-related holdings of the Special Collections Research Center.

Application Development Technology and Tools: Vulnerabilities and ...

https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf

This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...

Daohai Yu, PhD, MS | Lewis Katz School of Medicine | Lewis Katz School ...

https://medicine.temple.edu/directory/daohai-yu-phd-ms

Lewis Katz School of Medicine Center for Biostatistics and Epidemiology Professor Cancer and Cellular Biology Professor