Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 4,960

Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing

https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf

Abstract—The Internet of Things (IoT) is gathering paces in the new era of Industry 4.0, and the Digital Twin (DT) technology bridges the gap between the bursting amounts of data generated by IoT devices and the user requirements for real-time data processing.

Temple University - Temple MIS - Connect and innovate with an elite ...

https://community.mis.temple.edu/

Temple MIS Connect and innovate with an elite information systems program

3. Testing IB network — High-Performance Computing Technologies

https://www.hpc.temple.edu/mhpc/hpc-technology/exercise9/ibtests.html

Create two terminals, one on master and on one of your compute nodes (e.g. c01) On the master launch the server: [root@master ~]# ibv_rc_pingpong -d mlx4_0 -g 0 -i 1 local address: LID 0x000a, QPN 0x00020f, PSN 0xd26d63, GID fe80::2:c903:b:86f9 On the compute nodes, launch the client: [root@c01 ~]# ibv_rc_pingpong -g 0 -d mlx4_0 -i 1 192.168.16.1

4. Install syslinux and configure pxelinux — High-Performance Computing ...

https://www.hpc.temple.edu/mhpc/hpc-technology/exercise2/pxelinux.html

Copy pxelinux.0, menu.c32, ldlinux.c32 and libutil.c32 into /var/lib/tftpboot. To see if TFTP is working, go to your home directory and try to download pxelinux.0 using tftp.

Temple University Information Technology Services

https://its.temple.edu/

Gain an all-access pass to the latest technology through a number of computer labs and technology stations on campus to choose from.

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

IG parameter K > 0 as input, runs in polynomial time in K, and outputs a prime number q, the description of two groups and of order G1 G2 q, and the description of a bilinear map ˆe : G1 G1 ! G2. Definition 3 (BDH Problem): Given a random element aP , bP , and cP , for some a; b; c compute ˆe(P; P )abc

Hongling Xie | College of Liberal Arts | Temple University College of ...

https://liberalarts.temple.edu/directory/hongling-xie

Merrill-Palmer Quarterly, 55, 157-183. doi:10.1353/mpq.0.0021 Xie, H., Li, Y., Boucher, S. M., Hutchins, B. C., & Cairns, B. D. (2006). What makes a girl (or a boy) popular (or unpopular)? African-American children’s perceptions and developmental differences. Developmental Psychology, 42, 599-612. doi:10.1037/0012-1649.42.4.599

community.mis.temple.edu

https://community.mis.temple.edu/mis2402sec004fall2025/files/2025/09/MIS2402-ASSIGNMENT01.docx

80 – Your code has one or two small problems (such as a miscalculation or a formatting problem) 50 – Your code has multiple problems, but it does not crash and you made an effort. 0 – Your code is missing, your code completely crashes, or you failed to provide a good URL.

CARE Lab Director – CARE Lab: Cybersecurity in Application ... - Sites

https://sites.temple.edu/care/team/director/

She also serves on the Advisory Board of Raices Cyber and Black Girls Hack. var sc_project=11402088; var sc_invisible=0; var sc_security=”e3831152″; var scJsHost = ( (“https:” == document.location.protocol) ? “https://secure.” : “http://www.”); document.write (“”);

FISSIONE: A Scalable Constant Degree and Low ... - Temple University

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FissionE_infocom%20t2.pdf

Applications of peer-to-peer networks vary among file sharing, persistent data storage, cooperative web-caching, DNS, and application level multicast. Many peer-to-peer systems have been deployed on the Internet, and some of them have become popular Internet applications.