https://teaching.temple.edu/sites/teaching/files/resource/pdf/TPACK.pdf
Abstract This paper describes a framework for teacher knowledge for technology integration called technological pedagogical content knowledge (originally TPCK, now known as TPACK, or technology, pedagogy, and content knowledge). This framework builds on Lee Shulman’s construct of pedagogical content knowledge (PCK) to include technology knowledge. The development of TPACK by teachers is ...
https://cis.temple.edu/academics/graduate/masters/
The MS in Computer Science program engages students in a deep exploration of concepts and techniques surrounding the design, implementation and application of algorithms and systems, as well as emerging topics in computer science. A broad range of upper-level courses are available in machine learning, wireless and mobile networks, high performance computing, information retrieval and data ...
https://law.temple.edu/aer/2022/02/24/is-victim-ever-an-impermissible-term-in-criminal-trials/
Is it impermissible to use the term “victim” in a criminal trial? On its surface, the question may appear silly – the trial has a victim [accuser] and defendant [accused]. Yet the issue arises periodically, and was highlighted in recent trials. First, who or what is a victim? According to Black’s Law Dictionary, it is “a person harmed by a crime, tort, or other wrong.” Black’s ...
https://www.fox.temple.edu/sites/fox/files/documents/CVs/david-j-wilk-cv.pdf
Real Estate Symposia on Asset Optimization & Place-Making Economic Development at University of Delaware (2012, 2016), Perdue Business School at Salisbury University (2013), Florida Atlantic University (2014), Delaware State University (2014), University of Illinois (2015, 2017), University of Washington (2016), Johns Hopkins University (2016), and Temple University (2019) https://youtu.be ...
https://news.temple.edu/news/2023-11-29/not-child-s-play-potential-risks-smart-toys-explained
They may seem like a high-tech new way for your child to have fun, but two Temple University professors warn of the hidden dangers that come with smart toys.
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf
The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...
https://cis.temple.edu/~tug29203/teaching/fall2018-3329/lectures/ch3-1.ppt
Transport Layer 3-* Chapter 3: Transport Layer our goals: understand principles behind transport layer services: multiplexing, demultiplexing reliable data transfer flow control congestion control learn about Internet transport layer protocols: UDP: connectionless transport TCP: connection-oriented reliable transport TCP congestion control ...
https://cis.temple.edu/~tug29203/21spring-3329/lectures/ch4a.pdf
Chapter 4 Network Layer: The Data Plane A note on the use of these Powerpoint slides:
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...