Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 11,600

Michael Jackson, 1958-2009: Primary Resources, Historical Perspectives ...

https://sites.temple.edu/librarynews/2009/07/07/michael_jackson/

Michael Jackson, known as “King of Pop”, died unexpectedly Thursday, June 25th in Los Angeles at age 50. His career began when he was 11 as part of the group the “Jackson Five”, the youngest of five brothers. He is known for his extraordinary talent in music and dance, and as a gifted entertainer. He was an innovator, most notably in the music video medium and early MTV. Jackson’s ...

NIST SP 800-122, Guide to Protecting the Confidentiality of Personally ...

https://community.mis.temple.edu/mis5206sec001fall2021/files/2018/08/nistspecialpublication800-122_GuideToProtectingConfidentialityOfPII.pdf

Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the nation‘s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analysis to ...

Reducing SSD Read Latency via NAND Flash Program and Erase Suspension

https://cis.temple.edu/~he/publications/Conferences/PEPausing-FAST12.pdf

The implementation of P/E suspension for NAND flash involves minimal modifications to the flash inter-face, i.e., merely the “program suspend/resume” and “erase suspend/resume” commands need to be added in the command set of the flash interface [12]. To support P/E suspension, the control logic inside the flash chip is required to determine the appropriate time to suspend the P/E ...

#RealCollege 2021: Basic Needs Insecurity Among Texas College Students ...

https://hope.temple.edu/sites/hope/files/media/document/RC2020_RCTX.pdf

This report examines the pandemic’s impact on #RealCollege students in Texas who were able to continue their education in this trying environment. Using our sixth-annual #RealCollege Survey, we assessed Texas students’ basic needs security and their well-being, as indicated by employment status, academic engagement, and mental health.

PowerPoint Presentation

https://cis.temple.edu/~latecki/Courses/CIS166-Spring07/Lectures/ch7.5.ppt

Section 7.5 Equivalence Relations Longin Jan Latecki Temple University, Philadelphia latecki@temple.edu We can group properties of relations together to define new types of important relations. _________________ Definition: A relation R on a set A is an equivalence relation iff R is • reflexive • symmetric • transitive Two elements related by an equivalence relation are called equivalent ...

PSFL: Parallel-Sequential Federated Learning with Convergence Guarantees

https://cis.temple.edu/~jiewu/research/publications/Publication_files/INFOCOM2024_PSFL%20Parallel-Sequential%20Federated%20Learning%20with%20Convergence%20Guarantees.pdf

Abstract—Federated Learning (FL) is a novel distributed learning paradigm which can coordinate multiple clients to jointly train a machine learning model by using their local data samples. Existing FL works can be roughly divided into two categories according to the modes of model training: Parallel FL (PFL) and Sequential FL (SFL). PFL can speed up each round of model training time through ...

10 Ways to Improve Student Research - Temple University

https://guides.temple.edu/improving_research

The following tips for faculty to help students successfully complete research assignments are based on the results of studies conducted by Project Information Literacy (PIL), an ongoing national research project that examines undergraduate student research practices. PIL’s methodologies have included a survey of over 8,000 students from 25 U.S. college campuses, including Temple; a content ...

The Application Audit Process - A Guide for Information Security ...

https://community.mis.temple.edu/mis5203sec951summer2020/files/2019/01/application-audit-process-guide-information-security-professionals-1534.pdf

The Application Audit Process - A Guide for Information Security Professionals This paper is meant to be a guide for IT professionals, whose applications are audited, either by an internal or external IS audit. It provides a basic understanding of the IS Audit process. It is also meant as an aid for auditors to facilitate the audit process by communicating audit terms and objectives. The ...

Is the Medium the Message? - scholarshare.temple.edu

https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content

Early electronic legal research platforms, greeted with a high degree of distrust, mimicked the legal organization found in the print world.'3 Legal documents produced with word-processing programs, when printed or saved elec-tronically, looked identical to those produced by older technologies.'4 5 BARON, supra note 4, at 5.

WHEN DURING CROSS DO YOU IMPEACH WITH A PRIOR INCONSISTENT STATEMENT ...

https://law.temple.edu/aer/2021/03/18/when-during-cross-do-you-hit-the-witness-with-a-prior-inconsistent-statement/

Is it best to begin cross with the impeachment; end cross with the impeachment; or place it chronologically in the flow of the cross?