Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 9

Fast-Track Your Future in Nursing with Temple’s Accelerated BSN

https://cph.temple.edu/marketing/lp/absn

Train in State-of-the-Art Simulation Labs – Gain hands-on experience in realistic clinical settings before you enter a hospital. Work with the Latest Medical Technology – Practice with industry-leading equipment designed to prepare you for the workforce.

community.mis.temple.edu

https://community.mis.temple.edu/mis2402sec004fall2025/files/2025/09/MIS2402-ASSIGNMENT01.docx

To complete this assignment, you will need to use either Bitvise (if you are on a Windows computer) or Terminal and SSH (if you are on a Mac). If you don’t have either set up, you need to install them.

Student Health Services

https://studenthealth.temple.edu/

Student and Employee Health Services is pleased to announce our free flu shot clinic schedule 2025! Upon presentation of a current TUid, all Temple University students, faculty and staff may receive a free seasonal flu shot!

Quick GDB Reference - cis.temple.edu

https://www.cis.temple.edu/~jfiore/2016/fall/2107/handouts/Tools/GDB/GDBQuickRef.pdf

GDB’s info command can be very helpful when examining the local stack frame (In case you don’t know about it yet, it’s an area of memory local to your current function. We’ll discuss this stuff in depth this semester).

College of Science and Technology

https://cst.temple.edu/

Master's, Professional Science Master's, and doctoral degrees; plus certificate programs

Incremental Local Outlier Detection for Data Streams

https://cis.temple.edu/~latecki/Papers/CIDM07.pdf

If the computer suddenly starts to utilize a new service (e.g., ssh), this will certainly look like a new type of behavior in network traffic data. Hence, it will be desirable to detect such behavior as soon as it appears especially since it may very often correspond to illegal or intrusive events.

F2 : A Physical Internet Architecture for Fresh Food Distribution Networks

https://cis.temple.edu/~apal/ipic_food.pdf

j pt‘ ijd t‘ ij 8‘2f2;:::;Tg;8t X t Lt‘:Vt C 8‘2f2;:::;Tg (8) where Vtis the volume of the container type t. Constraint(8) simply assumes that multiple containers of different sizes always fit within a truck as far as their cumulative volume is less than the truck’s capacity. This is an over-estimation of the packing ability of the ...

PTN-IDS: Prototypical Network Solution for the Few-shot Detection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf

Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...