Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 8,540

2024 Temple University Move-in Guide - Student Affairs

https://studentaffairs.temple.edu/sites/studentaffairs/files/media/document/2024_Fall_MoveinGuide_Final_5-13-24_508.pdf

Moving into a residence hall—whether you’re new to college, new to Temple or new to the hall—can be unpredictable. To make the transition easier, the University Housing and Residential Life staf has developed this guide to help answer your questions even before you pack your bags. This Fall 2024 Move-in Guide details specific move-in days, parking services, directions and other important ...

Firewalls, IDS and IPS - Temple University

https://community.mis.temple.edu/mis5214sec702spring2021/files/2021/02/06_S21_MIS5214_Unit6_Firewalls-IDS-IPS.pdf

You may use app.diagrams.net, Visio, or Cyber Security Evaluation Tool (available here: CSET) CSET’s Diagram Tool, to draw the logical network diagram of the information system infrastructure Use appropriate network symbols and annotation in your architectural diagram, include:

central-control - Temple University

https://cis.temple.edu/~tug29203/20-5590/lectures/central-control.pdf

centralized control — separating data- and control- planes 5590: software defined networking

Lecture 6 – Chapter 3 TCP flow and congestion control

https://cis.temple.edu/~tug29203/19spring-5617/lectures/ch3-3.pdf

Lecture 6 – Chapter 3 TCP flow and congestion control CIS 5617, Fall 2019 Anduo Wang Based on Slides created by JFK/KWR

How Online Communication Platforms Facilitated Human ... - Sites

https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/

By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

Microsoft Word - Article B Bricker.doc

https://sites.temple.edu/ticlj/files/2017/02/27.1.Bricker-TICLJ.pdf

Long ago, American legislatures and courts rejected such a defense for various reasons that make sense under both a utilitarian and retributivist model of punishment.2 Prior to developments in modern medicine, many injuries that are treatable today led to death3 and were treated as murder under different theories such as depraved heart murder. Further, based on the immutable facts in the above ...

Internal Control Using COBIT 5 - Temple University

https://community.mis.temple.edu/mis5202online2016/files/2016/03/Internal-Control-Using-COBIT-5_whp_eng_0316.pdf

Internal Control in COBIT In COBIT® terms, a control can be any enabler that supports the achievement of one or more objectives (control objectives). These objectives are the desired result or purpose from the implementation of a relevant process, practice, principle, tool, organizational unit, symbol or other capability. A control practice is a key mechanism that supports the achievement of ...

Topology-Aware Scheduling Framework for Microservice Applications in Cloud

https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf

Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...

Distributed Deep Multi-Agent Reinforcement Learning for Cooperative ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf

Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...