https://www.temple.edu/news/2025/08/reward-requirement-new-tipping-culture
In recent years, tipping has expanded far beyond sit-down restaurants. Customers are now prompted to tip at quick-service counters, fast-food chains and coffee shops—often before receiving any service at all. What was once a way to reward good service has become an expected step in many transactions, sparking frustration, confusion and even guilt. Lu Lu, an associate professor at Temple ...
https://sites.temple.edu/yangyang/files/2024/10/Yang-CV-2024-Chinese.pdf
期刊客座主编 专刊“Application of Geospatial Big Data in Tourism Research” for Applied Spatial Analysis and Policy (SSCI 索引刊物) 专刊“Technological Revolution, Digital Economy and Tourism Economics” for Tourism Economics (SSCI 索引刊物) 专刊合集“Tourism and Coronavirus” for Annals of Tourism Research (SSCI 索引刊物) 专刊“Spatial Economics and Tourism ...
https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml
A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.
https://scholarshare.temple.edu/bitstreams/3faf52f7-123b-4304-889b-42a7eee1f8a1/download
Overdetermined boundary value problems for the Laplacian on uniformly rectifiable domains; Overdetermined boundary value problems for second-order, homogeneous, constant complex coeficient elliptic systems on uniformly rectifiable domains; Overdetermined boundary value problems for the Stokes system of linearized hydro- statics on uniformly rectifiable domains; Fredholm Theory for the ...
https://cis.temple.edu/~wangp/1057-PC/Lecture/Ch06.htm
Chapter 6. Pointers and Modular Programming 1. Pointers and the indirection operator An asterisk ('*') before an identifier is called an "indirection operator", which indicates that the variable contains the address of another variable. Such a variable is called a "pointer" in C. For instance, the declaration double *p makes p a "pointer variable" of type "pointer to double ", and char *signp ...
https://community.mis.temple.edu/mis5208sp18/files/2018/01/Auditors%E2%80%99-Responsibility-for-Fraud-Detection.-1.pdf
Auditors will enter a much expanded arena of procedures to detect fraud as they implement SAS no. 99. The new standard aims to have the auditor’s consideration of fraud blended into the audit process and continually updated until the audit’s completion. SAS no. 99 describes a process in which the auditor (1) gathers information needed to identify material misstatement due to fraud, (2 ...
https://sites.temple.edu/gametheory/2024/04/22/understanding-the-game-theory-in-poker/
One of the foundational concepts in game theory applied to poker is the Nash Equilibrium, named after mathematician John Nash. In poker terms, Nash Equilibrium occurs when a player’s strategy is optimal, considering the strategies of their opponents.
https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf
1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...
https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf
Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...
https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf
The mathematical "trick" in PKC is to find a trap doorin the one-way function so that the inverse calculation becomes easy given knowledge of some item of information. Generic PKC employs two keys that are mathematically related although knowledge of one key does not allow someone to easily determine the other key.