Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 21

Temple University, Center for Networked Computing

http://www.cnc.temple.edu/

The Center for Networked Computing (CNC), a university research center focused on network technology and its applications, was founded in 2010. Its missions are to advance the development of network technology and its applications by combining resource of government, industry, and academia and to train students who will be ready to join industry and academia. CNC is engaged in the following ...

Information Technology Auditing and Cyber Security MS

https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms

Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.

CIS587: The Wumpus World - Temple University

https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml

A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.

MATRICES M - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2166-Fall16/Lectures/MatrixAlg1.pdf

A matrix is a rectangular array of numbers or other mathematical objects, for which operations such as addition and multiplication are defined. Most of this article focuses on real matrices, i.e., matrices whose elements are real numbers. For instance, this is a real matrix: The numbers, symbols or expressions in the matrix are called its entries or its elements. The horizontal and vertical ...

1 QoS-aware Online Service Provisioning and Updating in Cost-efficient ...

https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf

1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...

ICAS : Upcoming Events | Temple University, Japan Campus

https://www.tuj.ac.jp/icas/events/2016-12-22

This lecture invites you to explore the profound world of Noh, one of Japan’s most ancient and revered performing arts, where the boundaries between performance, philosophy, and spirituality dissolve. You'll get to know Zeami, the legendary playwright whose ideas about performance still resonate after 600 years.

ICAS: How Russia and China Collaborate in the Information Space (In ...

https://www.tuj.ac.jp/icas/events/2024/1023/russia-china-information-space-inperson

From the perspective of a researcher of Russian disinformation, this talk will discuss how China is learning from a country with one of the most sophisticated information war strategies and applying it to undermine the information space in the Indo Pacific.

ICAS : Upcoming Events | Temple University, Japan Campus

https://www.tuj.ac.jp/icas/events/2016-01-09

This lecture invites you to explore the profound world of Noh, one of Japan’s most ancient and revered performing arts, where the boundaries between performance, philosophy, and spirituality dissolve. You'll get to know Zeami, the legendary playwright whose ideas about performance still resonate after 600 years.

ICAS : Upcoming Events | Temple University, Japan Campus

https://www.tuj.ac.jp/icas/events/2011-07-15

This lecture invites you to explore the profound world of Noh, one of Japan’s most ancient and revered performing arts, where the boundaries between performance, philosophy, and spirituality dissolve. You'll get to know Zeami, the legendary playwright whose ideas about performance still resonate after 600 years.

ICAS : Recent changes in Japanese security policy and U.S. expectations ...

https://www.tuj.ac.jp/icas/events/2023/1031/kevinmaher-japan-security-us-expectations-inperson

Overview Japan’s national defense strategy has evolved markedly since the Gulf War in 1990-1991, when security policy restricted Japan from providing anything other than financial and non-military material assistance to the US-led effort against Iraq’s invasion of Kuwait. Few in the US government expected more from Japan, especially in terms of JSDF participation. As Japan’s security ...