Search Keywords

Results Restricted To:

https://www.temple.edu

No results were found for your search.

Tools & software - Research Data Management - Temple University

https://guides.temple.edu/datamgmt/toolssoftware

For collecting and storing clinical research data, REDCap can safely store private and confidential health data in accordance with HIPAA and FISMA regulations.

cis-iis2.temple.edu

https://cis-iis2.temple.edu/users/pascucci/cis3342/GridViewExample12_codebehind.htm

using System; usingSystem.Collections.Generic; usingSystem.Linq; usingSystem.Web; usingSystem.Web.UI; usingSystem.Web.UI.WebControls;

Fuzzy Boundary-Guided Network for Camouflaged Object Detection

https://cis.temple.edu/~latecki/Papers/ICME2024.pdf

Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...

Download Site | Temple CS

https://download.temple.edu/

Temple University Information Technology Services Technology Support Center The TECH Center 12th St. & Montgomery Ave., Room 106 Philadelphia, PA 19122

FW_web.pdf - Temple University

https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf

Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...

Yan Wang's personal website - Temple University

https://cis.temple.edu/~yanwang/publications.html

Yucheng Xie, Xiaonan Guo, Yan Wang, Jerry Cheng, and Yingying Chen. "Universal targeted adversarial attacks against mmwave-based human activity recognition." In Network Security Empowered by Artificial Intelligence, pp. 177-211. Cham: Springer Nature Switzerland, 2024. New!

High-Performance Computing - Temple University

https://www.hpc.temple.edu/compute/

About Compute is a collection of large high-performance, shared memory compute servers for interactive use. These multi-socket machines host up to 88 Intel Xeon (Cascade Lake) CPU cores and 1.5TB of RAM. They provide access to various licensed software packages (MATLAB, STATA) and many open-source packages (R, RStudio, Sage Math, Apache Spark). All servers share the same user home directories ...

Xue Bai - Fox School of Business

https://www.fox.temple.edu/directory/xue-bai-tuj91380

Biography Dr. Xue Bai is a Professor of Marketing and Management Information Systems and the Milton F. Stauffer Senior Research Fellow. She joins the Fox School from the University of Connecticut, where she had served since 2007 as a faculty member in the School of Business. Bai’s research applies data mining and mathematical modeling methods to problems in online platforms and social media ...

Sport, Tourism and Hospitality Management (STHM) - Temple University

https://bulletin.temple.edu/courses/sthm/

The first few weeks of college can feel overwhelming with new responsibilities to manage. This course will assist new students in transitioning to the college learning environment by providing access to experts, resources and important skill sets. This course is designed as an intensive, seven-week course that meets weekly with a focus on student self-reflection, awareness and discussion.

TIle Irony of Socrates

https://sites.temple.edu/dwolf/files/2020/06/Irony.pdf

In the phrase "Socratic irony," which, as here, is principally used with reference to Plato's charac-ter Socrates, 'irony' is also commonly understood to mean dissembling or disingenuousness. This us-age is clearly informed by the conventional under-standing of 'eironeia,' but 'irony' does not mean deception. There are two basic kinds of irony, ver-bal and situational. Verbal irony occurs when ...