https://community.mis.temple.edu/mis5214sec001spring2025/files/2025/01/OWASP-Application-Security-Verification-Standard-4.0.3-en-3.pdf
The Application Security Verification Standard is built upon the shoulders of those involved from ASVS 1.0 in 2008 to 3.0 in 2016. Much of the structure and verification items that are still in the ASVS today were originally written by Mike Boberski, Jeff Williams and Dave Wichers, but there are many more contributors. Thank you to all those previously involved. For a comprehensive list of all ...
https://sites.temple.edu/ignatova/files/2024/08/ElectroBD.pdf
LONG TIME DYNAMICS OF ELECTROCONVECTION IN BOUNDED DOMAINS ABSTRACT. We discuss nonlinear nonlocal equations with fractional diffusion describing electroconvection phenomena in incompressible viscous fluids. We prove the global well-posedness, global regularity and long time dynamics of the model in bounded smooth domains with Dirichlet boundary conditions. We prove the existence and ...
https://cis.temple.edu/~edragut/5517/Spr25/classNotes/CloudPlatforms.pptx
Data Intensive and Cloud ComputingCloud Platforms: Google Cloud and Microsoft Azure
https://sites.temple.edu/dwolf/files/2020/06/Plato-on-Pain.pdf
In various passages of his corpus Plato’s dramatic characters discuss pain. With respect to what pain is, including what kinds of pain there are, the most incisive discussions occur at Republic 583-587, Philebus 31-55, and Timaeus 64-65.1 The foci of these passages dif-fer from one another and do so in several ways. First the Republic and Philebus passages focus on pleasure. However Plato ...
https://cis.temple.edu/~latecki/Courses/AI-Fall10/Lectures/SVDEig08.ppt
If A is a symmetric and positive definite then SVD = Eigen decomposition EIG( i) = SVD( i2) Here AAT has an eigenvalue-eigenvector pair ( i2,ui) Alternatively, the vi are the eigenvectors of ATA with the same non zero eigenvalue i2 Example for SVD Let A be a symmetric, positive definite matrix U can be computed as V can be computed as Example ...
https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/KalmanFilterSIGGRAPH2001.pdf
1. Introduction The Kalman filter is a mathematical power tool that is playing an increasingly important role in computer graphics as we include sensing of the real world in our systems. The good news is you don’t have to be a mathematical genius to understand and effectively use Kalman filters. This tutorial is designed to provide developers of graphical systems with a basic understanding ...
https://www.fox.temple.edu/sites/fox/files/smj2112-Luo.pdf
While the direct influence of CEO tenure on firm performance has been examined in the strategy literature, the underlying channels of influence have remained largely unexplored. This article draws upon the career seasons paradigm, learning perspectives, and marketing literature to examine whether firm-employee and firm-customer relationships are the pathways through which CEO tenure influences ...
https://cis.temple.edu/~wu/research/publications/Publication_files/mass15pouya.pdf
Interference among the nodes is the second major origin of errors in wireless transmissions. In contrast with the wired links, the wireless medium is shared among the wireless devices. Consequently, in the case that two wireless trans-mitters that have a common node in their communication rage transmit simultaneously, the receiver node cannot receive the transmitted packet correctly. Feedback ...
https://www.fox.temple.edu/sites/fox/files/Frontiers-Machines-versus-Humans-The-Impact-of-Artificial-Intelligence-Chatbot-Disclosure-on-Customer-Purchases.pdf
Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence Chatbot Disclosure on Customer Purchases Xueming Luo,aSiliang Tong,aZheng Fang,bZhe Quc
https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf
Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...