Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 93

Finding and Funding AAC | Institute on Disabilities | Temple University ...

https://disabilities.temple.edu/assistive-technology/pa-tech-accelerator/finding-funding-aac

A PA Tech Accelerator Webinar Finding and Funding AAC is part of the Pennsylvania Tech Accelerator webinar series, Augmentative and Alternative Communication. How do you get a communication device? Where do you start and what steps are involved? Learn about AAC assessment processes and submitting an insurance request for a speech-generating device. This session is focused on funding options ...

The New Pied Pipers: The Globalization of K-pop and the Role of ...

https://scholarshare.temple.edu/bitstreams/636811ca-840e-4a3b-8b11-04ae32975637/download

ABSTRACT This thesis uses the commonly cited concepts surrounding globalization and

the 27th annual be your own boss bowl® - Fox School of Business

https://www.fox.temple.edu/faculty-research/institutes-centers/innovation-entrepreneurship-institute/competitions/byobb

Submission Requirements The Be Your Own Boss Bowl® (BYOBB®) Competition started in 1997 at Temple University as the “Business Plan Competition,” and has since evolved into one of the nation’s most lucrative pitch competitions for aspiring entrepreneurs, with a total prize package including cash prizes and in-kind services awards worth over $100,000. The BYOBB® is open to all Temple ...

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...

Cognitive Bias and Its Impact on Expert Witnesses and the Court

https://law.temple.edu/wp-content/uploads/Cognitive-Bias-and-Its-Impact-on-Expert-Witnesses-and-the-Court.pdf

Expert evidence provides a much needed contribution to the courts in administering justice. Understanding the way humans think and how the brain processes information offers insights to circumstances in which even expert evidence may be influenced by contextual information and cognitive bias. Cognitive science can identify such potential weaknesses and suggest practical ways to mitigate them.

Digital Mental Health Interventions at Colleges & Universities

https://hope.temple.edu/sites/hope/files/media/document/Digital%20Mental%20Health%20Interventions_5.29.2024.pdf

This guide is intended to help higher education leaders make informed decisions about selecting DMHIs. DMHIs refer to the use of digital technologies for mental health support, prevention, and treatment. DMHIs provide behavioral and psychological strategies through technological features, including websites, mobile applications (“apps”), wearables, virtual reality, and online platforms.

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

Oh, Hell! Spring 2021 CIS5603 Final Project Card Playing AI Bot Jack ...

https://cis.temple.edu/~pwang/5603-AI/Project/2021S/Amend_Zach/Amend_Zach_FinalPresentation.pdf

Card Playing AI Bot Jack Amend and Cameron Zach CIS5603 Final Project Spring 2021

central-control - Temple University

https://cis.temple.edu/~tug29203/20-5590/lectures/central-control.pdf

If a Switch finds a shorter path to the Controller, way authentication with it before advertising route. Therefore, the minimum spanning the Controller, hop-by-hop as each Switch Authentication is done using the preconfigured sure that a misbehaving node cannot masquerade or another Switch. If authentication is successful, ates an encrypted connection with the Controller communication between ...

Is the Medium the Message? - scholarshare.temple.edu

https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content

Professor of Law, Temple University, Beasley School of Law. The author thanks Temple University, Beasley School of Law for research support, and Kristen Tiscione, Kirsten Davis, and Kristen Murray for the discussions and feedback that inspired this article. Many thanks also to Megan Albright and Emily Kowey for their able research assistance.