Search Keywords

Results Restricted To:

https://www.temple.edu

No results were found for your search.

Temple University

https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fZLLbsIwFET3%2FYrI%2B8R5IYgFSBRUFYm2iNAuuqmMcwOWHDv1o4%2B%2Fr5O0Kl2UrX3PzNyxp4Y2oiULZ09yB68OjA0%2BGiEN6S9myGlJFDXcEEkbMMQyUi7uNiSNYtJqZRVTAp0hlwlqDGjLlUTBejVDL2mSTYqE5WFcVEWYj%2BIsPIzyccjSfJxSqDNWUBQ8gTaemSEv4UFjHKylsVRafxSnI0%2BH6XgfT0hSkDh7RsHK78EltT11srY1BOOaN5GFphUQQeUwr1rsN6i5ANwFTPEOKq6BWVyWDyhY%2FGRdKmlcA7oE%2FcYZPO42v5qDnou4z6Mds05DxFSDhTpyibtCULD9rumay4rL4%2BWGDsOQIbf7%2FTbcPpR7NJ92OqTfW8875wvG3Wg6xefEdHjje%2B%2B1Xm2V4OwzuFG6ofb%2FKEmU9Ce8Cut%2BlDhpWmC85lD5boRQ70sN1MIMeX9AeD6Y%2Fv1L86sv

Login with your AccessNet Username and Password:Username

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

Temple University

https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVJbT8IwFH73Vyx93wqDcWkYCUKMJKgLQx98MV13Bk26dvbi5d%2FbbRrxQV5Pz3c9XRhai4asnD3JPbw6MDb4qIU0pHtIkdOSKGq4IZLWYIhlJF%2Fd7UgcDUijlVVMCXQGuYygxoC2XEkUbDcpeqFzqIqCTkJa0DIcV%2FNZOI%2BTWVhMkopWU2CjZIKCJ9DGY1LkKTzQGAdbaSyV1o8GcRIO5mE8PQwSMhqS8eQZBRufg0tqO9TJ2sYQjCteRxbqRkAEpcO8bLBPUHEBuDUY4z2UXAOzOM8fULD68bpW0rgadA76jTN43O9%2BOXs%2BF3HvRztmnYaIqRoLdeQSt4WgIPuu6ZrLksvj5YaKfsmQ28MhC7OH%2FICWi5aHdLn1slW%2BINyuxgt8jlj0N773WttNpgRnn8GN0jW1%2F1sZRsNuwsuw6laJk6YBxisOpe9GCPW%2B1kAtpMjrA8LLXvTvX1pefQE%3D

Login with your AccessNet Username and Password:Username

Topology-Aware Scheduling Framework for Microservice Applications in Cloud

https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf

Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...

Temple University

https://library.temple.edu/libraries/12

We would like to show you a description here but the site won’t allow us.

Yu Wang's Bio - cis.temple.edu

https://cis.temple.edu/~yu/bio.html

Yu Wang's Bio Dr. Yu Wang is currently a Professor and Chair of the Department of Computer and Information Sciences at Temple University. He holds a Ph.D. from Illinois Institute of Technology, an MEng and a BEng from Tsinghua University, all in Computer Science. His research interest includes wireless networks, smart sensing, and distributed computing. He has published over 300 papers in peer ...

Temple University

https://fim.temple.edu/idp/profile/SAML2/Redirect/SSO?SAMLRequest=fVJbT8IwFH73Vyx937oNpq4ZJAgxkqAQhj74YrruDJp07ezFy7%2B3GxrxQV5Pz3c9LQxtRUdmzh7kFl4dGBt8tEIaMjxMkNOSKGq4IZK2YIhlpJzdr0gaxaTTyiqmBDqBnEdQY0BbriQKlosJehnRJruOqySkQCEcj4GFeV6NQtrkcTbKqopWMQqeQBuPmSBP4YHGOFhKY6m0fhSnWRjnYXq1i3OSXZI0eUbBwufgktoBdbC2MwTjhreRhbYTEEHtMK877BM0XADuDaZ4CzXXwCwuyzUKZj9e50oa14IuQb9xBo%2Fb1S%2Fnkc9F3PvRjlmnIWKqxULtucR9ISjYfNd0w2XN5f58Q9VxyZC73W4TbtblDk2LnocMufW0Vz4j3K%2BmBT5FFMcbP3it5WKjBGefwa3SLbX%2FW0miZJjwOmyGVeKk6YDxhkPtuxFCvc81UAsT5PUB4elR9O9fml58AQ%3D%3D

Login with your AccessNet Username and Password:Username

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...

Composition BM | Temple University Bulletin

https://bulletin.temple.edu/undergraduate/boyer-music-dance/composition-bm/index.html

Overview The Bachelor of Music in Composition, offered by the Department of Music Studies, covers courses in composition for various media, including electronic music. Creativity, the development of personal expression through music, and the assessment of music's role in the 21st-century societal context are the focal points for composition majors.