https://bulletin.temple.edu/undergraduate/science-technology/cybersecurity-bs/cybersecurity-bs.pdf
Overview The Bachelor of Science in Cybersecurity, offered by he Department of Computer and Information Sciences (CIS), is designed to equip students with the knowledge and skills required to protect computer systems and networks from cyber threats. This program addresses the growing demand for cybersecurity professionals by providing students with both strong technical foundations and hands ...
https://www.fox.temple.edu/sites/fox/files/documents/CVs/yue-qiu-cv.pdf
Fox School of Business, Alter 430 1801 Liacouras Walk Philadelphia, PA 19122
https://guides.temple.edu/qda/choosing
This workshop is the second of the two-part workshop on five different Qualitative Data Analysis (QDA) tools – ATLAS.ti, NVivo, Dedoose, Taguette, and QualCoder. The workshop recaps essential and distinctive features demonstrated in the Part 1 recorded workshop and answered questions about the tools. The workshop discusses considerations for choosing among the five tools and provides ...
https://guides.temple.edu/qda/transcription
Information for Temple students, researchers, and instructors interested in conducting qualitative data analysis
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICDE2024_Online_Federated_Learning_on_Distributed_Unknown_Data_Using_UAVs.pdf
Abstract—Along with the advance of low-altitude economy, a variety of applications based on Unmanned Aerial Vehicles (UAVs) have been developed to accomplish diverse tasks. In this paper, we focus on the scenario of multiple UAVs performing Federated Learning (FL) tasks. Specifically, a group of UAVs is scheduled to repeatedly visit some Points of Interest (PoIs), collect the data produced ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Reinforcement_Learning-based_Dual-Identity_Double_Auction_in_Personalized_Federated_Learning.pdf
Reinforcement Learning-based Dual-Identity Auction in Personalized Federated Juan Li, Member, IEEE, Zishang Chen, Tianzi Wu, Fellow, IEEE, Yanmin
https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf
This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License 4.0 (CC BY-NC 4.0).
https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf
NARS utilises the Non-Axiomatic Logic (NAL) [9] for inference and the Nars-ese language for representing statements. The language and the logic are outside the scope of this document. The aim of this paper is to describe the current implementation of NARS in detail. The following aspects of the implementa-tion are focused on: memory management with concept centric processing, non-deterministic ...