Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 24

Information Systems Auditing - Temple University

https://community.mis.temple.edu/mis5201sec001sp2017/files/2017/03/IS-Auditing-Tools-and-Techniques-Creating-Audit-Programs.pdf

Achievement of the many benefits that can accrue to an effective audit depends on proper and thorough planning of the audit engagement. The scope and the objective of the audit must be understood and accepted by both the auditor and the area being audited. Once the purpose for the audit is clearly defined, the audit plan can be created, which will encapsulate the agreed scope, objectives and ...

Distributed Deep Multi-Agent Reinforcement Learning for Cooperative ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf

Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...

CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation ...

https://www.cis.temple.edu/~yu/research/CanalScan-info21.pdf

Abstract—Human-machine interface based on tongue-jaw movements has recently become one of the major technological trends. However, existing schemes have several limitations, such as requiring dedicated hardware and are usually uncomfortable to wear. This paper presents CanalScan, a nonintrusive system for tongue-jaw movement recognition using only commodity speaker and microphone mounted on ...

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

SAFER K-64, published in 1993, used a 64-bit key and SAFER K-128, published in 1994, employed a 128-bit key. After weaknesses were found, new versions were released called SAFER SK-40, SK-64, and SK-128, using 40-, 64-, and 128-bit keys, respectively.