https://librarysearch.temple.edu/databases
Temple Libraries' official online search tool for books, media, journals, databases, government documents and more.
https://alt.library.temple.edu/databases/
This site is an alternate access for Temple University Libraries main site. It can be accessed when the main site is down. It provides basic contact info and access to select databases. This site is always up.
https://www.cis.temple.edu/~jfiore/2016/fall/2107/handouts/Tools/GDB/GDBQuickRef.pdf
GDB’s info command can be very helpful when examining the local stack frame (In case you don’t know about it yet, it’s an area of memory local to your current function. We’ll discuss this stuff in depth this semester).
https://law.temple.edu/contact/tom-lin/
Tom C.W. Lin is the Murray H. Shusterman Chair Professor of Law at Temple University’s Beasley School of Law, and bestselling author of the award-winning book, The Capitalist and the Activist, which was named one of the best business books as well as one of the best social justice books of the year in 2023. His research and teaching focus are in the areas of corporate governance, business ...
https://law.temple.edu/academics/degrees/jd/part-time/
Temple Law’s part-time programs are designed for students with time restrictions due to employment or other responsibilities. Most part-time students attend the Evening Division and attend classes…
https://community.mis.temple.edu/mis5201sec001sp2017/files/2017/03/IS-Auditing-Tools-and-Techniques-Creating-Audit-Programs.pdf
Abstract Information systems audits can provide a multitude of benefits to an enterprise by ensuring the effective, efficient, secure and reliable operation of the information systems so critical to organizational success. The effectiveness of the audit depends, in large part, on the quality of the audit program.
https://bulletin.temple.edu/academic-programs/academic-programs.pdf
Academic Programs List Temple University's Board of Trustees meets regularly to consider recommendations to establish, terminate or change academic programs. To see the full list of academic programs by school and college, including programs that have been terminated, please read Temple's Policy on Establishing, Restructuring and Terminating Academic Programs.
https://cis.temple.edu/~latecki/Courses/CIS617-04/Solutions/archana_guptaHW1.pdf
Solutions by Archana Gupta Question 1 (Chapter 3: 10) An 8-bit byte with binary value 10101111 is to be encoded using an even-parity Hamming code. What is the binary value after encoding?
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
2 Power of background noise -95 Bm Size of requested contents [0.5, 1.5] MB 2.4GHz Intel Xeon E5-2650 processor and 256GB RAM. The main parameters are listed in Table II. For performance comparison, the following four bench-mark caching methods are introduced:
https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf
Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...