Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 7

Dr. Jie Wu - 2025 Publications

https://cis.temple.edu/~jiewu/research/publications/Publications_2025.html

2025 Publications (Jie Wu) Journal Publications W. Jiang, S. Li, X. Li, K. Li, and J. Wu, " Uncovering Recommendation Serendipity with Objective Data-driven Factor Investigation," accepted to appear in ACM Transactions on Information Systems (TOIS). Z. Yao, L. Lin, F. Xia, and J. Wu, " Load Balancing Heterogeneous Multipath Authentication Routing Selection for Endogenous Software-Defined ...

Yan Wang's personal website - Temple University

https://cis.temple.edu/~yanwang/publications.html

Tianfang Zhang, Qiufan Ji, Zhengkun Ye, Md Mojibur Rahman Redoy Akanda, Ahmed Tanvir Mahdad, Cong Shi, Yan Wang, Nitesh Saxena, Yingying Chen, "SAFARI: Speech-Associated Facial Authentication for AR/VR Settings via Robust VIbration Signatures," in Proceedings of the ACM Conference on Computer and Communications Security (ACM CCS 2024), Salt ...

Bo Ji (季博), Ph.D. - Temple University

https://cis.temple.edu/~boji/

My group will be moving to Department of Computer Science at Virginia Tech in Fall 2020. Please visit my new webpage there.

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Here, let Ji(t) be the set of requesters who are served by EDP i at time t. Since the signals received by requesters from the corresponding EDP may undergo the interference from other links, the achievable wireless transmission rate from EDP i to requester j is: |gi,j(t)|2Gi Hi,j(t) = B log 1 + .

phylotree.js - a JavaScript library for application development and ...

https://scholarshare.temple.edu/bitstreams/b1ecc345-7a7c-4776-a366-9b5585e714d6/download

London: J. Murray; 1859. Vaughan TG. IcyTree: rapid browser-based visualization for phylogenetic trees and networks. Bioinformatics. 2017;33:btx155. Kreft Ł, Botzki A, Coppens F, Vandepoele K, Van Bel M. PhyD3: a phylogenetic tree viewer with extended phyloXML support for functional genomics data visualization. Bioinformatics. 2017;33(18):2946 ...

Fuzzy Boundary-Guided Network for Camouflaged Object Detection

https://cis.temple.edu/~latecki/Papers/ICME2024.pdf

Ji, G. Yan, J. Li, Y. Piao, S. Yao, M. Zhang, L. Cheng, and H. Lu, “Dmra: Depth-induced multi-scale recurrent attention network for rgb-d saliency detection,” TIP, vol. 31, pp. 2321–2336, 2022. [28]