https://community.mis.temple.edu/mis5203sec951summer2020/files/2019/01/application-audit-process-guide-information-security-professionals-1534.pdf
The Application Audit Process - A Guide for Information Security Professionals This paper is meant to be a guide for IT professionals, whose applications are audited, either by an internal or external IS audit. It provides a basic understanding of the IS Audit process. It is also meant as an aid for auditors to facilitate the audit process by communicating audit terms and objectives. The ...
https://teaching.temple.edu/sites/teaching/files/resource/pdf/TPACK.pdf
Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman’s construct of pedagogical content knowledge (PCK) to include technology knowledge. The development of TPACK by teachers is ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...
https://cis.temple.edu/~tug29203/18spring-3329/reading/hw4a.pdf
c. Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their for-warding tables in a decentralized manner, without reliance on a central node. P3. A bare-bones forwarding table in a VC network has four columns. What is the meaning of ...
https://scholarshare.temple.edu/bitstreams/9680ba47-5749-4c07-8df5-cfd27fcc515c/download
A highly distinctive combination of thought, word and gesture which together constitute a ritual drama that has been sacred to Afrikans for as long as humanity has counted time, and perhaps even before then. It is a powerful moment of profound significance in which divinity and ancestors are invoked, the environment acknowledged, and all the generations within the entire time/space correlation ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://cis.temple.edu/~apal/ipic_food.pdf
Computer and Information Sciences, Temple University, Philadelphia, PA 19122 E-mail:famitangshu.pal,kkantg@temple.edu Abstract: In this paper, we introduce a Physical Internet architecture for fresh food distribution networks, with the goal of meeting the key challenges of fresh product delivery and reduce waste. In particular, we explore fuel-efficient delivery of fresh food among different ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...
https://cis.temple.edu/~wu/research/publications/Publication_files/zhangweitc.pdf
Abstract—With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner ...
https://cis.temple.edu/~latecki/Courses/CIS601-04/ProjectPapers/shapeRepPR04.pdf
Abstract More and more images have been generated in digital form around the world. There is a growing interest in 1nding images in large collections or from remote databases. In order to 1nd an image, the image has to be described or represented by certain features. Shape is an important visual feature of an image. Searching for images using shape features has attracted much attention. There ...