https://law.temple.edu/contact/zamir-ben-dan/
One of his articles was reprinted in the 38th volume of the Civil Rights Litigation and Attorney Fees Annual Handbook, published by the National Lawyers Guild (NLG). Another article was cited by the Honorable Carlton W. Reeves of the Southern District of Mississippi.
https://www.templehealth.org/locations/temple-university-hospital/patients-visitors
As one of the nation’s premier academic medical centers, Temple offers cutting-edge procedures and techniques performed by knowledgeable and compassionate doctors, nurses and staff members who never lose sight of what’s most important: patients and their families.
https://liberalarts.temple.edu/news/2025/06/criminal-justice-phd-student-steven-chen-receives-ruth-d-peterson-fellowship-american-society-criminology
Just ask criminal justice doctoral student Steven Chen. A first-generation international student, his journey from the Central Police University in his home country of Taiwan to a PhD program here at Temple has one consistent theme: Chen keeps betting on himself, and through hard work and perseverance, he keeps reaping the benefits.
https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms
The Information Technology Auditing and Cyber Security MS supports career development by including a capstone course that prepares students for the Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP) one of the following professional certification exams.
https://dabi.temple.edu/external/disprot/resource.php
Thus, the existence of disorder is determined by a protein's dynamical properties, and not necessarily by the presence or absence of local secondary structure. We define an intrinsically disordered protein as one that contains at least one disordered region.
https://sites.temple.edu/xifanwu/publications-of-xifan-wu/
See related Viewpoint in Physics, When One Plus One is More than Two by Javier Junquera. 38.
https://news.temple.edu/news/2024-09-20/flappy-bird-return-after-10-year-hiatus-true-story-behind-world-s-most-viral-mobile
It’s an endless runner game with a one-button gaming design to control a bird to fly through gaps between green pipes without hitting them for as long as you can. The gameplay was inspired by the challenge of bouncing a ping pong ball on a paddle as many times as you can.
https://community.mis.temple.edu/mis5214sec005spring2021/files/2020/03/MIS5214_Unit8_CaseStudy2_Maersk.pdf
Once hackers gained initial access to a computer, Mimikatz would pull those passwords out of RAM and use them to hack into other machines accessible with the same credentials. On networks with multiuser computers, it could even allow an automated attack to hop from one machine to the next Encryption of disk drives (no decryption offered)
https://cis.temple.edu/~pwang/AGI-Intro.html
Since each interpretation of "AGI" (except the naive one) has its own theoretical and practical values, they cannot replace each other, though can be compared and combined in certain situations.
http://www.cnc.temple.edu/
Professor Jie Wu, one of his visiting students Sheng Zhang, and Professor Sanglu Lu, both from Nanjing University, P.R. China, were presented with the "Best Paper Runner-Up Award" at IEEE MASS 2012!