Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 30

The Application Audit Process - A Guide for Information Security ...

https://community.mis.temple.edu/mis5203sec951summer2020/files/2019/01/application-audit-process-guide-information-security-professionals-1534.pdf

The Application Audit Process - A Guide for Information Security Professionals This paper is meant to be a guide for IT professionals, whose applications are audited, either by an internal or external IS audit. It provides a basic understanding of the IS Audit process. It is also meant as an aid for auditors to facilitate the audit process by communicating audit terms and objectives. The ...

Microsoft Word - v9i1general1.docx

https://teaching.temple.edu/sites/teaching/files/resource/pdf/TPACK.pdf

Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman’s construct of pedagogical content knowledge (PCK) to include technology knowledge. The development of TPACK by teachers is ...

Forward Legal Anonymous Group Pairing-Onion Routing for Mobile ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf

a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...

Network Architectures 3329 Spring 2018 03/30/2018 Name: Homework 4 Due ...

https://cis.temple.edu/~tug29203/18spring-3329/reading/hw4a.pdf

c. Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their for-warding tables in a decentralized manner, without reliance on a central node. P3. A bare-bones forwarding table in a VC network has four columns. What is the meaning of ...

LIBERATORY EXPRESSIONS: BLACK WOMEN, RESISTANCE AND THE CODED WORD, AN ...

https://scholarshare.temple.edu/bitstreams/9680ba47-5749-4c07-8df5-cfd27fcc515c/download

A highly distinctive combination of thought, word and gesture which together constitute a ritual drama that has been sacred to Afrikans for as long as humanity has counted time, and perhaps even before then. It is a powerful moment of profound significance in which divinity and ancestors are invoked, the environment acknowledged, and all the generations within the entire time/space correlation ...

Review Summary Generation in Online Systems: Frameworks for Supervised ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf

In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...

F2 : A Physical Internet Architecture for Fresh Food Distribution Networks

https://cis.temple.edu/~apal/ipic_food.pdf

Computer and Information Sciences, Temple University, Philadelphia, PA 19122 E-mail:famitangshu.pal,kkantg@temple.edu Abstract: In this paper, we introduce a Physical Internet architecture for fresh food distribution networks, with the goal of meeting the key challenges of fresh product delivery and reduce waste. In particular, we explore fuel-efficient delivery of fresh food among different ...

FW_web.pdf - Temple University

https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf

Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...

JOURNAL OF LA Privacy Preserving Ranked Multi-Keyword Search for ...

https://cis.temple.edu/~wu/research/publications/Publication_files/zhangweitc.pdf

Abstract—With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner ...

doi:10.1016/j.patcog.2003.07.008 - Temple University

https://cis.temple.edu/~latecki/Courses/CIS601-04/ProjectPapers/shapeRepPR04.pdf

Abstract More and more images have been generated in digital form around the world. There is a growing interest in 1nding images in large collections or from remote databases. In order to 1nd an image, the image has to be described or represented by certain features. Shape is an important visual feature of an image. Searching for images using shape features has attracted much attention. There ...