https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms
Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.
https://cis.temple.edu/~pwang/AGI-Intro.html
Two publications on the project are selected, usually one brief introduction and one detailed description. ACT-R [An Integrated Theory of the Mind; The Atomic Components of Thought] ACT-R is a cognitive architecture: a theory for simulating and understanding human cognition.
https://cis.temple.edu/~jiewu/research/publications/Publication_files/INFOCOM2024_PSFL%20Parallel-Sequential%20Federated%20Learning%20with%20Convergence%20Guarantees.pdf
Abstract—Federated Learning (FL) is a novel distributed learning paradigm which can coordinate multiple clients to jointly train a machine learning model by using their local data samples. Existing FL works can be roughly divided into two categories according to the modes of model training: Parallel FL (PFL) and Sequential FL (SFL). PFL can speed up each round of model training time through ...
https://cis.temple.edu/~latecki/Courses/CIS617-04/Solutions/archana_guptaHW1.pdf
Solutions by Archana Gupta Question 1 (Chapter 3: 10) An 8-bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary value after encoding?
https://cis.temple.edu/~ingargio/cis587/readings/wumpus.shtml
A variety of "worlds" are being used as examples for Knowledge Representation, Reasoning, and Planning. Among them the Vacuum World, the Block World, and the Wumpus World. We will examine the Wumpus World and in this context introduce the Situation Calculus, the Frame Problem, and a variety of axioms.
https://www2.law.temple.edu/10q/blowing-the-whistle-a-primer-on-the-false-claims-act/
Benjamin McCoy (LAW ’12) is an associate at Fox Rothchild LLP. He represents clients involving matters related to healthcare fraud, provider-payer disputes, bad faith coverage denials, civil RICO claims, shareholder derivative suits, and trade secret misappropriation actions. Ben also has a robust first amendment practice that focuses primarily on the defense of companies against claims of ...
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...
https://sites.temple.edu/nickerson/files/2017/07/Bennion_Nickerson.2011.pdf
The use of one-tailed hypothesis tests is strong evidence of this assumption (e.g., Arceneaux and Nickerson 2010; Green, Gerber, and Nickerson 2003; McNulty 2005), as is the concept of attributable effects (Hansen and Bowers 2009).
https://ronlevygroup.cst.temple.edu/courses/2017_spring/chem5412/lectures/Lecture4_SBII_2017.pdf
Using Protein-sequence-variation profitably Correlated Mutations and Structural Contacts