https://community.mis.temple.edu/ziyizhao/
Ziyi (Iggy) Zhao is a PhD candidate in Management Information Systems (MIS) at the Fox School of Business, Temple University. Her dissertation focuses on “Collaborative Intelligence and Innovation in Knowledge Work.” She is an AIS Entrepreneurial Innovation Fellow, supported by the Ewing Marion Kauffman Foundation. Her research focuses on AI and the Future of Collaborative Innovation ...
https://librarysearch.temple.edu/databases
Temple Libraries' official online search tool for books, media, journals, databases, government documents and more.
https://research.temple.edu/compliance/human-research-protection-program/institutional-review-board-irb/irb-trainings-resources
The following changes to Exempt research review by the IRB: The IRB has created additional consent templates for some types of Exempt research. They can be found on the Investigator Quick Links page. The IRB will no longer stamp consents for studies that are approved as Exempt. Already approved and stamped Exempt consent forms may still be used, however, stamped consent forms cannot be ...
https://news.temple.edu/news/2025-04-09/lincoln-financial-ceo-ellen-cooper-joins-president-john-fry-keynote-conversation
As part of last week’s Innovation with Impact events, Temple University hosted a keynote conversation between Cooper, the first female CEO in the 120-year history of Lincoln Financial, and President Fry.
https://medicine.temple.edu/education/md-program/program-outcomes
MD program graduates typically continue their training in Accreditation Council for Graduate Medical Education (ACGME) accredited residencies and fellowships in all disciplines of medicine throughout the United States. Following residency, graduates enter careers in academic medicine, private practice, research and industry. Temple graduates secure impressive residencies, attributable to our ...
https://www.fox.temple.edu/directory/yiwei-chen-tuo02351
Biography Yiwei Chen is an associate professor in the Department of Statistics, Operations, and Data Science, and the director of the Master of Science in Business Analytics program. He received his PhD from MIT Sloan School of Management. His research interests include dynamic optimization and machine learning with applications in operations management. Chen has published papers in top tier ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Joint%20Dynamic%20Grouping%20and%20Gradient%20Coding%20for%20Time-critical%20Distributed%20Machine%20Learning%20in%20Heterogeneous%20Edge%20Networks-FINAL-VERSION.pdf
Abstract—In edge networks, distributed computing resources have been widely utilized to collaboratively perform a machine learning task by multiple nodes. However, the model training time in heterogeneous edge networks is becoming longer because of excessive computation and delay caused by slow nodes, namely stragglers. The parameter server even abandons stragglers which fail to return ...
https://cis.temple.edu/~wu/hoc4667-liu.pdf
ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...
https://sites.temple.edu/xifanwu/files/2020/10/2017.PRB_.Comparative-first-principles-studies-of-prototypical-ferroelectric-materials-by-LDA-GGA-and-SCAN-meta-GGA.pdf
Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA Comparative first-principles studies of prototypical ferroelectric materials by LDA, GGA, and SCAN meta-GGA
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC25_In-Kernel%20Traffic%20Sketching%20for%20Volumetric%20DDoS%20Detection-final.pdf
Abstract—Emerging network technologies like cloud comput-ing provide flexible services but also introduce vulnerabilities to host servers, such as exposure to Distributed Denial of Service (DDoS) attacks. Traditional host-based detection tools operate in the user space, which can delay detection because network traffic must pass through the kernel space first. Moving detection to the kernel ...