https://guides.temple.edu/datamgmt/toolssoftware
For collecting and storing clinical research data, REDCap can safely store private and confidential health data in accordance with HIPAA and FISMA regulations.
https://cis-iis2.temple.edu/users/pascucci/cis3342/GridViewExample12_codebehind.htm
using System; usingSystem.Collections.Generic; usingSystem.Linq; usingSystem.Web; usingSystem.Web.UI; usingSystem.Web.UI.WebControls;
https://cis.temple.edu/~latecki/Papers/ICME2024.pdf
Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...
https://download.temple.edu/
Temple University Information Technology Services Technology Support Center The TECH Center 12th St. & Montgomery Ave., Room 106 Philadelphia, PA 19122
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...
https://cis.temple.edu/~yanwang/publications.html
Yucheng Xie, Xiaonan Guo, Yan Wang, Jerry Cheng, and Yingying Chen. "Universal targeted adversarial attacks against mmwave-based human activity recognition." In Network Security Empowered by Artificial Intelligence, pp. 177-211. Cham: Springer Nature Switzerland, 2024. New!
https://www.hpc.temple.edu/compute/
About Compute is a collection of large high-performance, shared memory compute servers for interactive use. These multi-socket machines host up to 88 Intel Xeon (Cascade Lake) CPU cores and 1.5TB of RAM. They provide access to various licensed software packages (MATLAB, STATA) and many open-source packages (R, RStudio, Sage Math, Apache Spark). All servers share the same user home directories ...
https://www.fox.temple.edu/directory/xue-bai-tuj91380
Biography Dr. Xue Bai is a Professor of Marketing and Management Information Systems and the Milton F. Stauffer Senior Research Fellow. She joins the Fox School from the University of Connecticut, where she had served since 2007 as a faculty member in the School of Business. Bai’s research applies data mining and mathematical modeling methods to problems in online platforms and social media ...
https://bulletin.temple.edu/courses/sthm/
The first few weeks of college can feel overwhelming with new responsibilities to manage. This course will assist new students in transitioning to the college learning environment by providing access to experts, resources and important skill sets. This course is designed as an intensive, seven-week course that meets weekly with a focus on student self-reflection, awareness and discussion.
https://sites.temple.edu/dwolf/files/2020/06/Irony.pdf
In the phrase "Socratic irony," which, as here, is principally used with reference to Plato's charac-ter Socrates, 'irony' is also commonly understood to mean dissembling or disingenuousness. This us-age is clearly informed by the conventional under-standing of 'eironeia,' but 'irony' does not mean deception. There are two basic kinds of irony, ver-bal and situational. Verbal irony occurs when ...