https://cis.temple.edu/~latecki/Papers/Quan_DRBANET_ICIP_2022.pdf
[13] C. Yu, C. Gao, J. Wang, G. Yu, C. Shen, and N. Sang, “Bisenet v2: Bilateral network with guided aggregation for real-time semantic segmentation,” IJCV, pp. 1–18, 2021.
https://cst.temple.edu/sites/cst/files/theses1/bao.pdf
tween Hecke eigenforms, we give another proof that the j-function is algebraic
https://ira.temple.edu/sites/ira/files/documents/exam-services/Math-Placement-Practice-Information.pdf
(c) yp32 y v2 8vp18y3 p 65. Graph the function f(x) = 3 x + 1, including the leftmost point and three additional points.
https://sites.temple.edu/rtassessment/files/2018/10/MoCA-Instructions-English_7.1-1.pdf
Administration and Scoring Instructions The Montreal Cognitive Assessment (MoCA) was designed as a rapid screening instrument for mild cognitive dysfunction. It assesses different cognitive domains: attention and concentration, executive functions, memory, language, visuoconstructional skills, conceptual thinking, calculations, and orientation. Time to administer the MoCA is approximately 10 ...
https://cis-linux1.temple.edu/~latecki/Courses/CIS617-04/slides/Ch3DataLink.ppt
Block Code Principles Hamming distance d(v1,v2), is the number of bits in which v1 and v2 differ. Hence, d(011011,110001) = 3. Consider the following mapping for k = 2 and n = 5 Data Block Codeword 00 00000 01 00111 10 11001 11 11110 Now is a 00100 is received, what do we do ? Obviously this is not a codeword. So we have detected a error.
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
// Deobfuscated code. // (decompiled by IDA Pro.) signed int vmp_func() { int v0; // eax@1 signed int result; // eax@1 int *v2; // [sp+440h] [bp-40Ch]@0 int *v3; // [sp+444h] [bp-408h]@0 char v4; // [sp+448h] [bp-404h]@0
https://www.cla.temple.edu/RePEc/documents/DETU_17_01.pdf
YtjDt=0(y1 ^ y0 1) YtjDt=0(y1)F YtjDt=0(y0 1) =(1 p) and V2(y;y0) = E[ (y) (y0)0] for y = (y1;y2;y3;y4;y5;y6) 2 S and y0 = (y0 1;y02;y03;y04;y05;y0 6) 2 S and 0
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICDE2024_Online_Federated_Learning_on_Distributed_Unknown_Data_Using_UAVs.pdf
The total energy consumption for UAV n in round r can be expressed as En(r) = Etravel + Etrain. Similar to [25], when a UAV is flying at a fixed speed v, the power can be given by the expression: TABLE I: Description of major notations ... 3v2 s v4 v2 Pfly = p1(1 + ) + p2 (1 + )1/2 − 4v2 2v2
https://cis.temple.edu/~jiewu/research/publications/Publication_files/1-s2.0-S0957417424018475-main.pdf
The skeleton sequences are captured by three Microsoft Kinect v2 cameras from three views. There are two popular benchmarks: (1) cross-subject (C-Sub): training data comes from half of the subjects, and testing data comes from the other.
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
For example, in the same geographical area, there are two edge video providers (Alice and Bob) offering video services {v1, v2} to requesters. Here, the popularity of v1 is higher than v2, and Alice (or Bob) is capable of only caching one video due to the limited storage resources.