https://sites.temple.edu/care/
Cyberspace is fundamental to our national prosperity, as it is critical to economy, government, and day-to-day societal functioning. The Cybersecurity in Application, Research, and Education (CARE) Lab offers a social science approach to cybersecurity and seeks to foster a multidisciplinary dialog among academia, industry, nonprofits, and government. This intersectionality enables a creative ...
https://bulletin.temple.edu/undergraduate/
A searchable database of more than 4,000 undergraduate courses; Overviews of degree programs and requirements for more than 150 undergraduate majors, as well as for minors, concentrations and certificates; Information on study abroad and research opportunities; Academic policies and procedures; and, A directory of student support services.
https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf
schedul ng algorithm and framework are presented in ection 4 and Section 5, respectively. We evalu-ate the p rformance of the proposed scheduling Fig. 1. Typical Topology of Microservice Application in Section 6, and discuss the related work in Section 7. In Section 8, we conclude the paper.
https://cis-iis1.temple.edu/cis618/Lectures/Unit2/Forms/DotNet/Onclick.htm
Responding to Both Client and Server Events in ASP.NET Server Controls For the most part, you will be primarily interested in events that are raised in server code. However, if it is appropriate for your application, you can also handle client-side events for ASP.NET server controls by writing client script. Note You cannot use HTML syntax to bind to client-side events for Web server controls ...
https://prd-kronos.erp.temple.edu/wfc/logon/
Login with your AccessNet Username and Password:Username
https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
Since ns >cs and ns >gs, it follows that the expression in formula (7) is less than 0. Therefore, ES( ) decreases as gs increases. Given that log2(j j) is constant, we can conclude that the anonymity of the source node, both TABLE IV SINGLE PATH DELIVERY AND MULTI PATHS DELIVERY IN DIFFERENT Pi ... ASsingle( ) and ASmulti( ), decreases as gs ...
https://download.temple.edu/
Temple University Information Technology Services Technology Support Center The TECH Center 12th St. & Montgomery Ave., Room 106 Philadelphia, PA 19122
https://research.temple.edu/compliance/data-management-sharing
The National Institutes of Health (NIH) has announced updates to data security standards and terms of access for human genomic data under the Genomic Data Sharing Policy (GDS). These updates are designed to enhance data security and ensure compliance with federal cybersecurity requirements. Changes are in effect as of January 25, 2025. Enhanced Security Standards: Users and developers of ...
https://its.temple.edu/tech-help
Technical Support The Technology Support Services Team provides assistance for technology related questions to the university community. Overview The Technology Support Center is staffed by professional consultants and technical student workers who are trained to assist Temple students, faculty, and staff with technical issues. Live Chat or Request Help: tuhelp.temple.edu. Faculty/staff can ...
https://cis.temple.edu/~jiewu/research/publications/Publications_2025.html
2025 Publications (Jie Wu) Journal Publications W. Jiang, S. Li, X. Li, K. Li, and J. Wu, " Uncovering Recommendation Serendipity with Objective Data-driven Factor Investigation," accepted to appear in ACM Transactions on Information Systems (TOIS). Z. Yao, L. Lin, F. Xia, and J. Wu, " Load Balancing Heterogeneous Multipath Authentication Routing Selection for Endogenous Software-Defined ...