Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 22

Wireshark_TCP.pdf - Temple University

https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf

The answers below are based on the trace file tcp-ethereal-trace-1 in in

Auditors’ Responsibility for Fraud Detection.

https://community.mis.temple.edu/mis5208sp18/files/2018/01/Auditors%E2%80%99-Responsibility-for-Fraud-Detection.-1.pdf

Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor (1) gathers information needed to identify material misstatement due to fraud, (2 ...

Information Technology Auditing and Cyber Security MS

https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms

Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

LETHAL AUTONOMOUS WEAPONS SYSTEMS (LAWS): - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Meier-TICLJ.pdf

Humanity by Human Rights Watch, lethal autonomous weapons systems (LAWS) have become an issue of national and international attention. With almost daily articles and commentary, including letters by notable scientists, debating the advantages and disadvantages of developing and fielding these systems, the public has become generally more aware of the issues related to autonomy, but it has ...

What do you meme you can get sued for that social post?

https://news.temple.edu/nutshell/2023-03-20/what-do-you-meme-you-can-get-sued-social-post

Donald Harris, a Temple professor and expert on intellectual property law, explains everything you need to know about protecting yourself from lawsuits for sharing a meme.

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...

THE BEMBA ACQUITTAL: A BLOW TO THE ICC’S LEGITIMACY IN A TIME ... - Sites

https://sites.temple.edu/ticlj/files/2020/05/34.1_Article-D-Final-Format.pdf

World leaders and human rights groups have criticized the ICC as expensive and ineffective. This critique is essentially an attack on the court’s legitimacy. This Note argues that Bemba’s acquittal only serves to weaken that legitimacy. Beginning with an analysis of the majority and minority opinions, it then discusses how the decision will impact the ICC’s legitimacy by imposing ...

Distributed Deep Multi-Agent Reinforcement Learning for Cooperative ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf

Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...

1 9 8 2 U 7JòO 1 U 20 D 80 O D 73, 4 1 O a - Temple University, Japan ...

https://www.tuj.ac.jp/sites/japan/files/20191212_mainichi_tokyo.pdf

1 9 8 2 U 7JòO 1 U 20 D 80 O D