https://cis.temple.edu/~wu/teaching/Spring2018/distributed-computing-2018.pdf
1. In your opinion, what is the future of the computing and the field of distributed systems? 2. Use your own words to explain the differences between distributed systems, multiprocessors, and network systems. 3. Calculate (a) node degree, (b) diameter, (c) bisection width, and (d) the number of links for an nx n2-d mesh, an n x n2- d torus, and an n-dimensional hypercube.
https://cis.temple.edu/~pwang/Publication/heuristic.pdf
Heuristics and Normativ e Mo dels of Judgmen t under Uncertain t y P ei W ang Center for R ese ar ch on Conc epts and Co gnition Indiana University
https://bulletin.temple.edu/courses/cis/
This single semester course hopes to equip students with critical consciousness around information technologies. The course is designed with the presumption that living and working with 21st Century technologies requires not only vocational skills but also theoretical grounding. Key themes such as "Computational Thinking" or "21st Century Economics and Global Communication" embed an ...
https://sites.temple.edu/subodha/files/2025/04/Subodha-CV-Web.pdf
Professor of Statistics, Operations, and Data Science (Secondary appointment in Information Systems)
https://secretary.temple.edu/sites/secretary/files/policies/04.82.02.pdf
Temple University is committed to providing a learning and working environment that emphasizes the dignity and worth of every member of its community, free from discriminatory conduct. Sexual misconduct, which includes sexual harassment, is a type of discriminatory conduct that is contrary to this commitment and will not be tolerated. Sexual misconduct subverts the mission and the work of the ...
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://community.mis.temple.edu/mis5206sec701fall2022/files/2022/08/Risk-IT-Framework-2nd-Edition_fmk_Eng_0620-1.pdf
About ISACA For more than 50 years, ISACA® (www.isaca.org) has advanced the best talent, expertise and learning in technology. ISACA equips individuals with knowledge, credentials, education and community to progress their careers and transform their organizations, and enables enterprises to train and build quality teams. ISACA is a global professional association and learning organization ...
https://sites.temple.edu/ticlj/files/2017/02/24.1.Leventhal-TICLJ.pdf
below one percent.4 Despite sufficient attention, abundant funding, and scientifically proven methods of prevention, this health crisis persists unabated. The longer the spread of HIV infections remains uncontained, the more irreparable the resultant damage will be. Countries are losing a generation of young adults and creating a generation of orphans.5 As new infections continue, and the ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf
Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...
https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf
The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...