Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 89

Computer & Information Science (CIS) - Temple University

https://bulletin.temple.edu/courses/cis/

This single semester course hopes to equip students with critical consciousness around information technologies. The course is designed with the presumption that living and working with 21st Century technologies requires not only vocational skills but also theoretical grounding. Key themes such as "Computational Thinking" or "21st Century Economics and Global Communication" embed an ...

Distributed System Design: An Overview* - Temple University

https://cis.temple.edu/~wu/teaching/Spring2018/distributed-computing-2018.pdf

1. In your opinion, what is the future of the computing and the field of distributed systems? 2. Use your own words to explain the differences between distributed systems, multiprocessors, and network systems. 3. Calculate (a) node degree, (b) diameter, (c) bisection width, and (d) the number of links for an nx n2-d mesh, an n x n2- d torus, and an n-dimensional hypercube.

Graphic and Interactive Design BFA - Temple University

https://bulletin.temple.edu/undergraduate/tyler/graphic-interactive-design-bfa/

Overview The Bachelor of Fine Arts in Graphic and Interactive Design (GAID), offered by the Department of Design and Illustration, does more than prepare students for careers in print and screen-based design—it teaches them how to create unforgettable experiences that make the world a better place.

A MEANINGFUL FLOOR FOR - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf

it is grounded in the idea that all weaponry should be subject to ―meaningful human control.‖ This ―intuitively appealing‖ principle is immensely popular,

Privacy-Preserving Federated Neural Architecture Search With Enhanced ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Privacy-Preserving_Federated_Neural_Architecture_Search_With_Enhanced_Robustness_for_Edge_Computing.pdf

Abstract—With the development of large-scale artificial intelli-gence services, edge devices are becoming essential providers of data and computing power. However, these edge devices are not immune to malicious attacks. Federated learning (FL), while pro-tecting privacy of decentralized data through secure aggregation, struggles to trace adversaries and lacks optimization for hetero-geneity ...

Stronger predation intensity and impact on prey communities in the tropics

https://sites.temple.edu/bjsewall/files/2021/08/Freestone-et-al-2021-Ecology-Stronger-predation-intensity-impact-on-prey-communities-in-the-tropics.pdf

evolutionary time across the globe (Menge and Lub-chenco 1981, Albouy et al. 2019, Silvestro et al. 2020). Although evidence continues to accrue in support of the prediction that predation intensity is stronger at lower latitudes (e.g., Schemske et al. 2009, Roslin et al. 2017, Reynolds et al. 2018), debate on its generality persists (Roesti et al. 2020). Further, variation in predation ...

PHLR - Center for Public Health Law Research

https://phlr.temple.edu/

Law is a powerful tool that can advance health and well-being. By developing and promoting the measurement and evaluation of the law’s impact, through the field of legal epidemiology, we strive to support evidence-based, proactive, and creative policies that advance public health and well-being for all.

I Can Hear You Without a Microphone: Live Speech Eavesdropping From ...

https://cis.temple.edu/~yu/research/Icanhearyou-INFOCOM2023.pdf

Abstract—Recent literature advances motion sensors mounted on smartphones and AR/VR headsets to speech eavesdropping due to their sensitivity to subtle vibrations. The popularity of mo-tion sensors in earphones has fueled a rise in their sampling rate, which enables various enhanced features. This paper investigates a new threat of eavesdropping via motion sensors of earphones by developing ...

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...

Compendium of Clinical Measures for Community Rehabilitation

https://sites.temple.edu/rtwiseowls/files/2013/10/compendium-of-clinical-measures-for-community-rehabilitation.pdf

Contents of the compendium This Compendium contains a suite of outcome measures for use in community rehabilitation settings, as identified from a systematic review of the literature. This is a synthesis of 28 measures and clinical tests which have been critically appraised and then approved by an expert working group of rehabilitation clinicians.