Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 5,110

Sanat K. Sarkar - Fox School of Business

https://www.fox.temple.edu/directory/sanat-k-sarkar-sanat

Biography Dr. Sanat K. Sarkar is an internationally recognized researcher who has made fundamental contributions to the development of the field of multiple testing toward its applications in modern scientific investigations, such as in genomics and brain imaging. His research has been funded by the National Science Foundation and the National Security Agency, and often been cited in peer ...

Department of Pediatrics - Lewis Katz School of Medicine - TUportal6

https://tuportal6.temple.edu/web/medicine/pediatrics

Located in north Philadelphia, the department provides clinical care to the children of our underserved and disadvantaged community. The research activities of the department have direct application to improving the health and quality of life of these children, are clinically based and fall into 3 areas: The impact of social determinants on child health, infant sleep hygiene, and medical ...

Change of Program for Students - Office of the University Registrar

https://registrar.temple.edu/change-of-program-for-students

What is a change of program? A change of program could be a transfer from one school or college to another within Temple University or changing from one academic program ("major") to another. Transfer between academic units is not automatic. Who does this apply to? Change of program information published on this page is specifically for undergraduate students. Graduate students should consult ...

Publications :: Ron Levy Group :: Temple University

https://ronlevygroup.cst.temple.edu/levygroup_publications.html

Publications of the Ronald M. Levy Group at Temple University

Vitae – Shanyang Zhao - Sites

https://sites.temple.edu/syzhao/vitae/

International Review of Modern Sociology 33 (2):171-192. Zhao, Shanyang. 2007. “Internet and the Lifeworld: Updating Schutz’s Theory of Mutual Knowledge.” Information Technology & People 20 (2):140-160. [2008 Emerald Literati Network Highly Recommended Paper Award] Zhao, Shanyang. 2006.

CURRICULUM VITAE - College of Liberal Arts

https://liberalarts.temple.edu/sites/liberalarts/files/TFShipley%20Vita%20for%20web.doc

Adjunct Fellow, Institute for Behavioral Research, University of Georgia, 1992-93

I N F O R M A T I O N S E C U R I T Y - community.mis.temple.edu

https://community.mis.temple.edu/mis5214sec951spring2025/files/2017/02/nistspecialpublication800-60v2r1.pdf

I N F O R M A T I O N S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930

Understanding Your ALEKS Math Placement Assessment Score

https://ira.temple.edu/sites/ira/files/TU-Understand-Your-ALEKS-Score_0.pdf

Your ALEKS assessment score indicates your level of mathematics preparation. The table below shows the course you have placed into based on your ALEKS assessment score. Some colleges, particularly Business, Education, Engineering, Public Health, and Science & Technology, require a specific mathematics sequence. You will receive in-depth advising during orientation regarding these requirements ...

Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence ...

https://www.fox.temple.edu/sites/fox/files/Frontiers-Machines-versus-Humans-The-Impact-of-Artificial-Intelligence-Chatbot-Disclosure-on-Customer-Purchases.pdf

Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence Chatbot Disclosure on Customer Purchases Xueming Luo,aSiliang Tong,aZheng Fang,bZhe Quc

1 SlimBox: Lightweight Packet Inspection over Encrypted Traf

https://cis.temple.edu/~wu/research/publications/Publication_files/TDSC2022-LQ.pdf

Abstract—Due to the explosive increase of enterprise network traffic, middleboxes that inspect packets through customized rules have been widely outsourced for cost-saving. Despite promising, redirecting enterprise traffic to remote middleboxes raises privacy concerns about the exposure of corporate secrets. To address this, existing solutions mainly apply searchable encryption (SE) to ...