https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf
This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License 4.0 (CC BY-NC 4.0).
https://cis-linux1.temple.edu/~tug29203/25fall-2033/lectures/ch2-extra.pdf
The prob-ability of the first rifleman hitting the target is P1 = 0.4, of the second P2 = 0.5, and of the third P3 = 0.7. Find the probability that two riflemen hit the target.
https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf
Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...
https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download
of machine learning (ML) versus a traditional statistical model in predicting dental caries in
https://sites.temple.edu/lnaveen/files/2014/05/JFE_boards_2008.pdf
A second factor perceived to affect the board’s ability to function effectively is the size of the board. Lipton and Lorsch (1992) and Jensen (1993) suggest that larger boards could be less effective than smaller boards because of coordination problems and director free-riding. Yermack (1996) and Eisenberg, Sundgren, and Wells (1998) provide evidence that smaller boards are associated with ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...
https://help.temple.edu/TDClient/277/Portal/KB/ArticleDet?ID=20131
In TUportal, you can designate all your phones or particular ones for Multi-Factor Authentication. This includes Apple iPhones, Android phones, basic cell phones and landlines. To begin, log into TUportal > click on the Manage My TUprofile link at the top of the page > click on Manage Phones, and follow the instructions below:
https://sites.temple.edu/rtassessment/files/2018/10/Table_CMAI.pdf
Pre-Intervention Assessment According to the Cohen-Mansfield Agitation Inventory (CMAI), ct exhibited the following frequency of Verbal/Aggressive behaviors over the past 2 weeks: making verbal sexual advances 1x/wk, screaming 1-2x/2k, and cursing or verbal aggression 1-2x/day.
https://studyabroad.temple.edu/programs/temple-exchange-programs/hong-kong-baptist-university
Hong Kong Baptist University Hong Kong Founded in 1956, Hong Kong Baptist University is Hong Kong’s second-oldest higher learning institution. It has an established place in Hong Kong’s tertiary education sector, emphasizing academic excellence and a well-rounded education. The university has four campuses located in the heart of Kowloon. Together they provide an attractive, student ...
https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf
Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...