https://www.fox.temple.edu/sites/fox/files/documents/CVs/yan-li-cv.pdf
“A New Measure of Management Overconfidence Based on Management Forecasts” (with Kose John and Xin Che). “Lead-lag relationship in Style Portfolios” (with Bhaskaran Swaminathan). “Resolving the Relationship Between Leverage and Expected Return Anomaly: Impact of Debt Maturity” (with Jong Hyun Kim and Connie Mao)
https://sites.temple.edu/lnaveen/files/2014/05/JFE_boards_2008.pdf
A second factor perceived to affect the board’s ability to function effectively is the size of the board. Lipton and Lorsch (1992) and Jensen (1993) suggest that larger boards could be less effective than smaller boards because of coordination problems and director free-riding. Yermack (1996) and Eisenberg, Sundgren, and Wells (1998) provide evidence that smaller boards are associated with ...
https://community.mis.temple.edu/mis5203sec003spring2020/files/2019/01/COBIT-2019-Framework-Introduction-and-Methodology_res_eng_1118.pdf
A dynamic view of EGIT will lead toward a viable and future-proof EGIT system. must be A governance system should clearly distinguish between governance and management activities and structures.
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://studyabroad.temple.edu/programs/temple-university-japan-campus/semester-academic-year-summer-tokyo
Temple University, Japan Campus (TUJ) offers a semester, academic year, and 10-week summer program. Coursework is available in Asian studies, Japanese language, and a variety of other academic disciplines.
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content
8 developed literacy in a pre-digital world.3 As these digital natives continue to enter the practicing bar and judiciary, this will inevitably lead to changes in the content of legal analysis that reflect a more multidimen-sional view of communication. At a minimum, digital technologies create the potential for new forms of legal analysis.
https://cis.temple.edu/~latecki/Courses/CIS2033-Spring13/Modern_intro_probability_statistics_Dekking05.pdf
A modern introduction to probability and statistics. — (Springer texts in statistics) 1. Probabilities 2. Mathematical statistics I. Dekking, F. M.
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...