Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 7,190

Wang Lab - Temple University

https://cis.temple.edu/~yu/wanglab/index.html

About The W ireless and A dvanced N etworking G roup (WANG Lab) in the Department of Computer and Information Sciences at Temple University focuses on research that advances the way that people, devices and applications interact in emerging wireless networking, smart sensing, distributed computing, and artificial intelligence. Wang Lab was established in the University of North Carolina at ...

Research Guides: All Health Sciences Databases: Home

https://guides.temple.edu/allhsdatabases

This is an alphabetical list of all the Health Sciences Databases. The tabs on the left categorize the databases by area of study within the Temple Health Sciences Schools.

J E F F R E Y L. D U N O F F

https://law.temple.edu/wp-content/uploads/Dunoff_cv_2025.pdf

J E F F R E Y L. D U N O F F Temple University Beasley School of Law • Philadelphia, PA Phone: 215.204.8233 • E-Mail: jeffrey.dunoff@temple.edu

Federal Direct Parent Loan for Undergraduate Students (Parent PLUS)

https://sfs.temple.edu/financial-aid-types/federal-student-loans/undergraduate-loans/federal-direct-parent-loan-undergraduate-students-parent-plus

Repayments are made to the federal loan servicer. Repayment terms range from 10 to 25 years to repay the Parent PLUS Loan. Please refer to the federal StudentAid website for more information on loan repayment. Deferment lets parent-borrowers delay loan repayment until after their student is no longer enrolled at least half-time (less than 6 ...

Mindy Shi's Homepage at Temple University

https://cis.temple.edu/~mindyshi/

One postdoctoral position in computational biology and bioinformatics is available in the Department of Computer and Information Sciences at Temple University. The appointee will support and complement ongoing projects in developing computational approaches/pipelines to integrate and analyze large-scale (epi)genomic, expression and interaction data sets for scientific discovery and validation ...

The Clone Wars: A New Congress Reconsiders the NO FAKES Act to Combat ...

https://www2.law.temple.edu/10q/the-clone-wars-a-new-congress-reconsiders-the-no-fakes-act-to-combat-digital-deepfakes/

Timothy J. Miller (LAW ’23) and Jeffrey N. Rosenthal discuss the legal concerns with vocal AI cloning and the reintroduction of the NO FAKES Act in Congress.

Remembering James P. Mall, Emeritus Temple French Professor and ... - Sites

https://sites.temple.edu/owltopia/2023/07/25/remembering-james-p-mall-emeritus-temple-french-professor-and-tu-rome-director/

James P. Mall, professor of French emeritus, died June 24, 2023. He made lasting contributions to the greater university and to Temple’s global presence during his time at Temple (1968-2000). Mall’s research interests focused on eighteenth-to twentieth-century French literature and critical theory. He was director of Temple Rome from 1986 to 1988, director of Temple’s Education Abroad ...

Lethal Autonomous Weapon Systems (LAWS): Accountability, Collateral ...

https://law.temple.edu/ilit/lethal-autonomous-weapon-systems-laws-accountability-collateral-damage-and-the-inadequacies-of-international-law/

As the development and deployment of AI-enabled weapons shows no signs of stopping, the United Nations Secretary-General, Antonio Gutiérrez’s 2023 New Agenda for Peace recommends that states conclude a legally binding instrument to not only regulate all types of autonomous weapon systems, but also outright ban LAWS that function without ...

Application Development Technology and Tools: Vulnerabilities and ...

https://community.mis.temple.edu/mis5206sec701fall2024/files/2020/08/SANS-Reading7_application-development-technology-tools-vulnerabilities-threat-management-secure-programming-practices-defense-in-depth-approach-1283.pdf

This paper addresses the security challenges that exist due to programming flaws, and explains how simple programming practices can reduce the risks. The paper starts with a description of common application vulnerabilities and risks. The vulnerabilities that are discussed include Buffer overflows, SQL Injection, Script Injection, XML injection and others. The application development platforms ...

Prof. Dr. Longin Jan Latecki - Temple University

https://cis.temple.edu/~latecki/phdStudent.php

Graduated PhD students in computer science at Temple UniversityFormer PhD students co-supervised at other institutions