Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 41

3rd Edition: Chapter 3 - Temple University

https://cis.temple.edu/~tug29203/teaching/fall2018-3329/lectures/ch3-1.ppt

Transport Layer 3-* Chapter 3: Transport Layer our goals: understand principles behind transport layer services: multiplexing, demultiplexing reliable data transfer flow control congestion control learn about Internet transport layer protocols: UDP: connectionless transport TCP: connection-oriented reliable transport TCP congestion control ...

Computer & Information Science (CIS) - Temple University

https://bulletin.temple.edu/courses/cis/

To accomplish this the course includes communications technology, computer network technology internetworking using the TCP/IP protocol suite, client-server protocols, client-server computing, network program component models as well as issues involving security, privacy, authentication, intellectual property rights, and social changes related ...

Workshop on Information Systems and Economics (WISE) 2022 ... - Sites

https://sites.temple.edu/wise2022/files/2022/11/WISE-2022-Schedule-and-Program-11.24.22.pdf

December 14-16, 2022, Copenhagen Business School, Denmark Preliminary – Subject to Change

F2 : A Physical Internet Architecture for Fresh Food Distribution Networks

https://cis.temple.edu/~apal/ipic_food.pdf

Computer and Information Sciences, Temple University, Philadelphia, PA 19122 E-mail:famitangshu.pal,kkantg@temple.edu Abstract: In this paper, we introduce a Physical Internet architecture for fresh food distribution networks, with the goal of meeting the key challenges of fresh product delivery and reduce waste. In particular, we explore fuel-efficient delivery of fresh food among different ...

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE

https://scholarshare.temple.edu/bitstreams/8f76a8fa-7976-4769-b0a7-fe3b9341ce13/download

Analysis of RNA conformation in endogenously assembled RNPs by icSHAPE The majority of the mammalian genome is transcribed into non-coding RNAs, many of which co-evolve with RNA-binding proteins (RBPs) to function as biochemically defined and tractable ribonucleoproteins (RNPs). Here, we applied icSHAPE, a robust and versatile RNA structural probing pipeline, to endogenous RNPs purified from ...

NFMI: Near Field Magnetic Induction based communication

https://cis.temple.edu/~apal/nfmi_comnet.pdf

Near Field Magnetic Induction (NFMI) based communication is an emerging technology that promises several advantages over the traditional radio frequency (RF) communication including low energy use, ability to work reliably in a variety of difficult propagation media (e.g., water, non-ferromagnetic metals, underground, tissue media of fresh produce & meats, etc.), and low leakage possibility ...

Forward Legal Anonymous Group Pairing-Onion Routing for Mobile ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf

a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...

An Overview of Cryptography - Temple University

https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf

Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

CRC_AU2832_C01.tex - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf

The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...