https://cis.temple.edu/~yanwang/publications.html
Yucheng Xie, Xiaonan Guo, Yan Wang, Jerry Cheng, and Yingying Chen. "Universal targeted adversarial attacks against mmwave-based human activity recognition." In Network Security Empowered by Artificial Intelligence, pp. 177-211. Cham: Springer Nature Switzerland, 2024. New!
https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf
Summary In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models and realistic movements of the mobile users (i.e. a mobility model). This paper is a survey of mobility models that ...
https://foxweb.fox.temple.edu/foxdata/foxevents/main/login.aspx
Fox Support Depots: Speakman 3 and Alter 242 Room Access/Tech Support: 215.204.4177 Scheduling Questions: foxevent@temple.edu Technical Questions: foxav@temple.edu Fox School Event Policies and Procedures
https://tuhelp.temple.edu/
We would like to show you a description here but the site won’t allow us.
https://community.mis.temple.edu/yiwen/files/2022/02/CV_Yiwen.pdf
Southwestern University of Finance and Economics Master in Business Intelligence
https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fZLLTsMwFET3fEXkfeI0fYRaSaTSClGp0KopLNgg17lpLTl28IPH3%2BOkIMqCbu17ZuaOnRnaiJbMnD3KLbw6MDb4aIQ0pL%2FIkdOSKGq4IZI2YIhlpJzdr0gSxaTVyiqmBDpDLhPUGNCWK4mC5SJHL4zRlMI4DeMRm4YjqJOQXu8hTIY1o8MJS%2BNJjYIn0MYzOfISHjTGwVIaS6X1R3EyDuOpJ3bxlIxHJEmfUbDwe3BJbU8drW0NwbjmTWShaQVEUDnMqxb7DWouAHcBE7yFimtgFpflGgWzn6xzJY1rQJeg3ziDx%2B3qV%2FOk5yLu82jHrNMQMdVgoQ5c4q4QFGy%2Ba7rhsuLycLmh%2FWnIkLvdbhNu1uUOFVmnQ%2Fq9ddE5XzDuRpMMnxPZ6Y0fvNdysVGCs8%2FgVumG2v%2BjDKJBf8KrsO5HiZOmBcZrDpXvRgj1PtdALeTI%2BwPCxcn0718qrr4A
Login with your AccessNet Username and Password:Username
https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fZLLTsMwFET3fEXkfeIkTWhrtZFKK0SlAlUTWLBBxrlpLTl28IPH3%2BOkIMqCbu17ZuaOPTO0FR1ZOHuQO3h1YGzw0QppyHAxR05LoqjhhkjagiGWkXJxuyFpFJNOK6uYEugEOU9QY0BbriQK1qs5eq6nLE9HSRzCdJyFWZLmIW2yLKRsnMVswqbjSYOCR9DGM3PkJTxojIO1NJZK649iz8TTML2skpykORnlTyhY%2BT24pHagDtZ2hmDc8Day0HYCIqgd5nWH%2FQYNF4D7gCneQc01MIvL8h4Fi5%2BsSyWNa0GXoN84g4fd5lfzqOci7vNox6zTEDHVYqH2XOK%2BEBRsv2u64rLmcn%2B%2BoZfjkCE3VbUNt%2FdlhYpZr0OGvXXRO58x7kfTGT4lZsc3vvNe69VWCc4%2Bg2ulW2r%2Fj5JEyXDC67AZRomTpgPGGw6170YI9b7UQC3MkfcHhIuj6d%2B%2FVFx8AQ%3D%3D
Login with your AccessNet Username and Password:Username
https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVJbT8IwFH73Vyx937oNJtAACUKMJCiEoQ%2B%2BmNKeQZOunb14%2Bfd2QyM%2ByOvp%2Ba6nY0tr2ZCZd0e1hVcP1kUftVSWdA8T5I0imlphiaI1WOIYKWf3K5InKWmMdpppic4glxHUWjBOaIWi5WKCXmjBhhVPi3iQFizuZ0UvHqbXo3jP9%2F0iG%2FB9j1IUPYGxATNBgSIArfWwVNZR5cIozYs4HcXZaJf3SD4gvewZRYuQQyjqOtTRucYSjCtRJw7qRkIC3GPBGxwSVEICbg3meAtcGGAOl%2BUaRbMfr3OtrK%2FBlGDeBIPH7eqX88TnExH8GM%2BcN5AwXWOpD0LhthAUbb5ruhGKC3W43ND%2BtGTJ3W63iTfrcoem45aHdLnNtFW%2BINyu5mN8jhifbvwQtJaLjZaCfUa32tTU%2FW8lS7JuInhcdavEK9sAE5UAHrqRUr%2FPDVAHExT0AeHpSfTvX5pefQE%3D
Login with your AccessNet Username and Password:Username
https://scholarshare.temple.edu/bitstreams/aa56228c-936b-4895-b2af-bc38bbd6055a/download
DSpace - scholarshare.temple.edu ... DSpace
https://cis.temple.edu/~giorgio/cis67/syllabus.html
First required programming course in the CS Major. Problem solving and programming in Java, introduction to software engineering, procedural and data abstraction, and elementary object-oriented programming. Data types covered include primitive data types, strings, classes, arrays, array lists, and streams. Programming techniques include at least one technique for searching and sorting an array ...