https://www.hpc.temple.edu/mhpc/hpc-technology/exercise9/ibtests.html
3. Testing IB network 3.1. Discovering all devices on IB network There are several utilities that are installed by the @infiniband group that allow you to learn more about your IB fabric. Here is a few: ibnetdiscover Generate list of all devices on the IB fabric ibdiagnet Simple IB network diagnostics utility iblinkinfo Display link information for all ports on your switches ibqueryerrors ...
https://sites.temple.edu/vahid/2022/03/05/hackerrank-solutions-tree-huffman-decoding/
Problem Huffman coding assigns variable length codewords to fixed length input characters based on their frequencies. More frequent characters are assigned shorter codewords and less frequent characters are assigned longer codewords. All edges along the path to a character contain a code digit. If they are on the left side of the tree, they will be a 0 (zero). If on the right, they’ll be a 1 ...
https://cis-linux2.temple.edu/~sallyk/
I'm Sally Kyvernitis and I teach Web Development courses for the CIS Department of Temple University (main campus), Philadelphia, PA. I also am the Faculty Adviser for undergraduate Computer Science students.
https://www.hpc.temple.edu/compute/
About Compute is a collection of large high-performance, shared memory compute servers for interactive use. These multi-socket machines host up to 88 Intel Xeon (Cascade Lake) CPU cores and 1.5TB of RAM. They provide access to various licensed software packages (MATLAB, STATA) and many open-source packages (R, RStudio, Sage Math, Apache Spark). All servers share the same user home directories ...
https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf
This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...
https://www.hpc.temple.edu/mhpc/hpc-technology/exercise9.html
One of the defining features of an HPC cluster is its high-bandwidth, low-latency interconnect. This enables massively parallel computing applications to run across multiple nodes and work together. The currently dominant technology in this space is InfiniBand. The training clusters used in this course all have InfiniBand HCA (host channel adapters) and are connected to a 108-port InfiniBand ...
https://cis-linux2.temple.edu/~tuq23078/template_website/
Some "fun" facts: I am a Computer Science BS major and Spanish BA major here at Temple. I am from East Stroudsburg, Pennsylvania (nowhere), and my junior year of high school I moved to a suburb outside of Philly. I like to produce music and I can play guitar and (limited) piano!
https://misdemo.temple.edu/
This server is used for instructional purposes only. It is used by the MIS Department in the Fox School of Business, at Temple University.
https://cis.temple.edu/~pwang/5603-AI/Project/2024F/SitongTie/CIS5603_project.pdf
1 Project Overview This project aims to design and implement a real-time target detection and au-tomatic tracking system based on deep learning models and automatic control. The system uses computer vision technology to detect and automatically track targets in a gaming environment, and combines control theory to achieve precise mouse operations. The project involves the deployment of deep ...
https://www.cis.temple.edu/~giorgio/cis307/software/mico/doc/doc/node47.html
MICO offers its own IDL-compiler called idl which is briefly described in this section. The tool is used for translating IDL-specifications to C++ as well as feeding ...