https://cis.temple.edu/~jiewu/research/publications/Publications_2024.html
Book & Book Chapters Y. Chen, J. Wu, C. Wang, and P. Yu, " Network Security Empowered by Artificial Intelligence," Springer, 2024.
https://cis.temple.edu/~latecki/Courses/CIS581-02/MatCIS581-02/LectureHolzschuch/FillingPolygons.pdf
Dr Nicolas Holzschuch University of Cape Town e-mail: holzschu@cs.uct.ac.za
https://law.temple.edu/wp-content/uploads/22.05.11-Salil-K-Mehra-CV.pdf
“Artificial Intelligence, Algorithms and Collusion” (Canadian Bar Association 90-minute Brown Bag teleconference, with Joshua Gans and Denes Rothschild), February 28, 2018. “Algorithms, Big Data and Antitrust’s Error-Cost Framework,” Competition Law and the Digital Economy Conference, University of Zurich, February 19, 2018.
https://noncredit.temple.edu/upload/Spring%202022%20OLLI%20Online%20Course%20Guide_Final%2012-20.pdf
Some of you had to learn new technology skills and have even seen some benefits to meeting online, beyond the safety factor. I want you to know that it is the intention of our program to return to in-person classes as soon as it’s feasible. However, the decision was made to maintain the program virtually, due to the uncertainty of the COVID situation.
https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content
In addition, some courts have developed software designed to convert legal citations in briefs to hyperlinks.89 Courts are also working on creating electronic records, so that record citations can also be hyper-linked.90 Now that this software has been developed, it is only a matter of time before it is adopted throughout the state and federal ...
https://community.mis.temple.edu/mis5206sec951summer2023/files/2023/06/Cost-of-a-Data-Breach-Full-Report-2022.pdf
Executive summary The Cost of a Data Breach Report offers IT, risk management and security leaders a lens into factors that can increase or help mitigate the rising cost of data breaches.
https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf
1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://sites.temple.edu/rtwiseowls/files/2013/10/compendium-of-clinical-measures-for-community-rehabilitation.pdf
Contents of the compendium This Compendium contains a suite of outcome measures for use in community rehabilitation settings, as identified from a systematic review of the literature. This is a synthesis of 28 measures and clinical tests which have been critically appraised and then approved by an expert working group of rehabilitation clinicians.
https://cst.temple.edu/sites/cst/files/theses1/bao.pdf
tween Hecke eigenforms, we give another proof that the j-function is algebraic