https://www.fox.temple.edu/sites/fox/files/documents/CVs/david-j-wilk-cv.pdf
Real Estate Symposia on Asset Optimization & Place-Making Economic Development at University of Delaware (2012, 2016), Perdue Business School at Salisbury University (2013), Florida Atlantic University (2014), Delaware State University (2014), University of Illinois (2015, 2017), University of Washington (2016), Johns Hopkins University (2016), and Temple University (2019) https://youtu.be ...
https://education.temple.edu/apply
How to Apply for Graduate Admission To get started, create an account on MyTU and submit your application for admission. A non-refundable application fee is due when submitting your application. Admission Requirements and Application Deadlines Determine the admission requirements and application deadlines for your intended program. Supporting Materials Once you've submitted your application ...
https://www.fox.temple.edu/sites/fox/files/ISR-delayed-effects.pdf
Can location-based mobile promotion (LMP) trigger contemporaneous and delayed sales purchases? As mobile technologies can reach users anywhere and anytime, LMP becomes a promising new channel. We unravel the dynamic sales impact of LMP on the basis of a randomized field experiment with 22,000 mobile users sponsored by one of the largest mobile service providers in the world. Our identification ...
https://noncredit.temple.edu/upload/Spring%202022%20OLLI%20Online%20Course%20Guide_Final%2012-20.pdf
Some of you had to learn new technology skills and have even seen some benefits to meeting online, beyond the safety factor. I want you to know that it is the intention of our program to return to in-person classes as soon as it’s feasible. However, the decision was made to maintain the program virtually, due to the uncertainty of the COVID situation.
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf
The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://cis.temple.edu/~yu/research/D3Guard-Infocom19.pdf
I. INTRODUCTION Drowsy driving [1] is a significant factor in causing severe traffic accidents. The National Highway Traffic Safety Ad-ministration reported that 803 fatalities were drowsy-driving-related in 2016 based on the records in Fatal Accident Report-ing System. These reported fatalities have remained largely consistent across the past decade. Between 2011 and 2015, there were a total ...
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://scholarshare.temple.edu/server/api/core/bitstreams/d5d8ff3d-a246-44fa-ba1a-7ed48b4e6adf/content
Professor of Law, Temple University, Beasley School of Law. The author thanks Temple University, Beasley School of Law for research support, and Kristen Tiscione, Kirsten Davis, and Kristen Murray for the discussions and feedback that inspired this article. Many thanks also to Megan Albright and Emily Kowey for their able research assistance.
https://cis.temple.edu/~yu/research/mobicomPOS06-bo.pdf
ABSTRACT In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behav-ior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch ac-tions. By tracking the fine-detailed touch actions of the user, we build a “touch-based biometrics” model of the ...