https://bulletin.temple.edu/undergraduate/courses/cis/
This single semester course hopes to equip students with critical consciousness around information technologies. The course is designed with the presumption that living and working with 21st Century technologies requires not only vocational skills but also theoretical grounding. Key themes such as "Computational Thinking" or "21st Century Economics and Global Communication" embed an ...
https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf
ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...
https://www.fox.temple.edu/sites/fox/files/documents/CVs/david-j-wilk-cv.pdf
Real Estate Symposia on Asset Optimization & Place-Making Economic Development at University of Delaware (2012, 2016), Perdue Business School at Salisbury University (2013), Florida Atlantic University (2014), Delaware State University (2014), University of Illinois (2015, 2017), University of Washington (2016), Johns Hopkins University (2016), and Temple University (2019) https://youtu.be ...
https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf
1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...
https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf
Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...
https://tyler.temple.edu/sites/tyler/files/architecture/Etchant%20solution%20%28PCB%20%29.pdf
EXPOSURE LIMITS IN AIR: ACGIH American Conference on Governmental Industrial Hygienists
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~tuf80213/courses/temple/cis1051/cis1051.pdf
Course Description CIS 1051 introduces students to computers, computer programming, and problem solving using programs written in the Python language. Topics covered include the general characteristics of computers; techniques of problem solving and algorithm specifications; and the implementation, debugging, and testing of computer programs. The goal is to learn to solve small programming ...
https://cis.temple.edu/~wu/research/publications/Publication_files/mass15pouya.pdf
Interference among the nodes is the second major origin of errors in wireless transmissions. In contrast with the wired links, the wireless medium is shared among the wireless devices. Consequently, in the case that two wireless trans-mitters that have a common node in their communication rage transmit simultaneously, the receiver node cannot receive the transmitted packet correctly. Feedback ...
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...