https://www2.law.temple.edu/10q/steps-to-protect-your-brand-from-trademark-hijacking-during-a-time-of-crisis/
Even during a time of crisis such as the COVID-19 pandemic, criminals and other unsavory individuals continue to prey on the vulnerable and look to use technology and fraudulent schemes to generate profit. Adding to already known nefarious actions, such as domain name cybersquatting and ransomware a
https://community.mis.temple.edu/mis5206sec001fall2022/files/2022/08/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf
Risk IT Task Force Steven Babb, CRISC, CGEIT, ITIL, MUFG Investor Services, United Kingdom Urs Fischer, CISA, CRISC, CPA (Swiss), UBS Business Solutions AG ...
https://cis.temple.edu/~latecki/Papers/ICIP2019.pdf
ABSTRACT The extensive computational burden limits the usage of CNNs in mobile devices for dense estimation tasks. In this paper, we present a lightweight network to address this prob-lem, namely LEDNet, which employs an asymmetric encoder-decoder architecture for the task of real-time semantic seg-mentation. More specifically, the encoder adopts a ResNet as backbone network, where two new ...
https://www2.law.temple.edu/10q/sec-begins-knock-wall-secrecy-pbms-drug-manufacturers/
Duane Morris attorneys Jonathan Swichar (LAW '97) and Bradley Wasser discuss the SEC's efforts to knock down the wall of secrecy between PBMs and drug manufacturers.
https://community.mis.temple.edu/mis5202online2016/files/2016/03/Internal-Control-Using-COBIT-5_whp_eng_0316.pdf
Internal Control in COBIT In COBIT® terms, a control can be any enabler that supports the achievement of one or more objectives (control objectives). These objectives are the desired result or purpose from the implementation of a relevant process, practice, principle, tool, organizational unit, symbol or other capability. A control practice is a key mechanism that supports the achievement of ...
https://sites.temple.edu/wise2022/files/2022/11/WISE-2022-Schedule-and-Program-11.24.22.pdf
December 14-16, 2022, Copenhagen Business School, Denmark Preliminary – Subject to Change
https://www.fox.temple.edu/sites/fox/files/documents/CVs/yan-li-cv.pdf
Yan Li 425 Alter Hall Department of Finance The Fox School of Business Temple University Phone: 215-204-4148 E-mail: liyanlpl@temple.edu
https://cis.temple.edu/~latecki/Courses/CIS617-04/Solutions/archana_guptaHW1.pdf
Solutions by Archana Gupta Question 1 (Chapter 3: 10) An 8-bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary value after encoding?
https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf
1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...
https://scholarshare.temple.edu/bitstreams/acea1ad1-1c27-4de3-89b1-770bd96f230b/download
Chapter Summaries Chapter 2 Articulations in Journalism In Chapter 2, I attempt to understand what binge-watching is by analyzing how journalists have defined it. Because of the dearth of literature on journalistic articulations e the history of it in contrast to concurrent uses of the more popular term “marathon.” I then construct an