Search Keywords

Results Restricted To:

https://www.temple.edu

No results were found for your search.

Basic Needs Resources - Student Financial Services

https://sfs.temple.edu/about/basic-needs-resources

call BenePhilly at 1-833-373-5868, download the MyCompass PA app or visit COMPASS.state.pa.us. consider signing up for the gas and electric savings programs if you pay for utility bills to help reduce costs.

cis.temple.edu

https://cis.temple.edu/tagit/events/workshop2025/NARS_files/docs/GeneticNARSAGI25.pptx

the system’s memory; concepts, beliefs, goals, questions, etc. This level is acquired by the system’s experience, and can change during the system’s lifetime.

How Online Communication Platforms Facilitated Human ... - Sites

https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/

By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...

Risk-IT-Framework-2nd-Edition_fmk_Eng_0620 - Temple University

https://community.mis.temple.edu/mis5206sec001fall2022/files/2022/08/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf

Risk IT Task Force Steven Babb, CRISC, CGEIT, ITIL, MUFG Investor Services, United Kingdom Urs Fischer, CISA, CRISC, CPA (Swiss), UBS Business Solutions AG ...

GI Bill® Benefits - Military and Veteran Students

https://veterans.temple.edu/military-education-benefits/gi-bill-benefits

GI Bill® is a registered trademark of the U.S. Department of Veterans Affairs (VA). More information about education benefits offered by VA is available at the ...

Measuring Similarity Between Texts in Python - Sites

https://sites.temple.edu/tudsc/2017/03/30/measuring-similarity-between-texts-in-python/

By Luling Huang This post demonstrates how to obtain an n by n matrix of pairwise semantic/cosine similarity among n text documents. Finding cosine similarity is a basic technique in text mining. My purpose of doing this is to operationalize “common ground” between actors in online political discussion (for more see Liang, 2014, p. 160). The tools are Python libraries scikit-learn (version ...

Critical Infrastructure Ransomware Attacks (CIRA) – CARE Lab ...

https://sites.temple.edu/care/cira/

In September 2019, we started a dataset of Critical Infrastructures Ransomware Attacks (CIRAs). These are based on publicly disclosed incidents in the media or security reports. This dataset (version 12.15) now has 2,119 records assembled from publicly disclosed incidents between November 2013 and March 31, 2025, and has been mapped to the MITRE ATT&CK Framework. To date, we have fulfilled ...

Proxy Access Login - Temple University

https://prd-wlssb.temple.edu/prod8/bwgkpxya.P_PA_Login

What is Proxy Access? Temple students can opt to grant access to certain components of their information in Self Service Banner to other people. This is called granting “proxy access,” and the person getting access is referred as the “proxy.” Students commonly grant this access to parents, guardians or spouses and can set up multiple proxies, granting each of them similar or different ...

NARS Introduction - Temple University

https://cis.temple.edu/~pwang/NARS-Intro.html

NARS (Non-Axiomatic Reasoning System) is a project aimed at the building of a general-purpose intelligent system, i.e., a "thinking machine" (also known as " AGI "), that follows the same principles as the human mind, and can solve problems in various domains.

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf

FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...