https://cis.temple.edu/~yu/research/thesis00.pdf
本章将详细给出了我们实现的两种自适应方法:基于最大后验概率(MAP )方法和基于最大似然线性回归(MLLR)方法的原理和实现。
https://cis.temple.edu/~jiewu/research/publications/Publication_files/FedHAN.pdf
FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Lizhao Wu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of ...
https://law.temple.edu/wp-content/uploads/Hollis-CV.pdf
Associate Dean for Academic Affairs January 2011-July 2018 Served as part of the Law School’s leadership team. Administrative responsibilities included faculty oversight and scheduling, curriculum development, public and alumni outreach, plus general oversight and implementation of law school and university academic policies.
https://scholarshare.temple.edu/bitstreams/7cdfa314-56d4-48a3-9f3b-0aecbd5ab09b/download
Figure 2. The sporulation phosphorelay leading to phosphorylation of Spo0A. (a) In response to environmental stimuli, any one of the five histidine kinases becomes autophosphorylated which results in a phosphorelay leading to phosphorylation of Spo0A, the master regulator of sporulation. (b) Following phosphorylation of Spo0A, the stages of spore formation at which transcription regulators ...
https://cph.temple.edu/sites/cph/files/node/profile/resume/Shivayogi%20Hiremath%20CV%20July%202023.pdf
University of Pittsburgh, Pittsburgh, USA Post-Doctoral Fellowship in Physical Medicine and Rehabilitation Postdoctoral training in clinical brain computer interfaces. Mentor: Wei Wang
https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://sites.temple.edu/dwolf/files/2020/06/Dissoi-Logoi-EGE.pdf
1. Orientation to the Text It is generally agreed that the text T that we call the Dissoi Logoi was originally composed within the first decade or so after the Peloponnesian War. The single most compelling piece of evidence in support of this dating is the text’s description of the Spartans victory
https://cis.temple.edu/~latecki/Courses/CIS166-05/Lectures/graph.ppt
Topics in enumeration; principle of inclusion and exclusion, Partial orders and lattices. Algorithmic complexity; recurrence relations, Graph theory.
https://www.fox.temple.edu/sites/fox/files/documents/CVs/gurdip-s-bakshi-cv.pdf
Gurdip Bakshi, and Georgios Skoulakis, ``Do Subjective Expectations Explain Asset Pricing Puzzles,” Journal of Financial Economics 98, (2010), 462-477. Gurdip Bakshi, Dilip Madan, and George Panayotov, `` Returns of Claims on the Upside and the Viability of U-Shaped Pricing Kernels,” Journal of Financial Economics 97 (2010), 130-154.