Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 139

ECAI 2024 73 U. Endriss et al. (Eds.) © 2024 The Authors. of the ...

https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf

This article is published online with Open Access by IOS Press and distributed under the terms of the Creative Commons Attribution Non-Commercial License 4.0 (CC BY-NC 4.0).

Introduction to Probability, Statistics and Random Processes

https://cis-linux1.temple.edu/~tug29203/25fall-2033/lectures/ch2-extra.pdf

The prob-ability of the first rifleman hitting the target is P1 = 0.4, of the second P2 = 0.5, and of the third P3 = 0.7. Find the probability that two riflemen hit the target.

Social Media and Firm Equity Value

https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf

Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...

Prediction of Dental Caries in Pediatric Patients Using Machine ...

https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download

of machine learning (ML) versus a traditional statistical model in predicting dental caries in

doi:10.1016/j.jfineco.2006.08.008 - Sites

https://sites.temple.edu/lnaveen/files/2014/05/JFE_boards_2008.pdf

A second factor perceived to affect the board’s ability to function effectively is the size of the board. Lipton and Lorsch (1992) and Jensen (1993) suggest that larger boards could be less effective than smaller boards because of coordination problems and director free-riding. Yermack (1996) and Eisenberg, Sundgren, and Wells (1998) provide evidence that smaller boards are associated with ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Article - Multi-Factor Authentication...

https://help.temple.edu/TDClient/277/Portal/KB/ArticleDet?ID=20131

In TUportal, you can designate all your phones or particular ones for Multi-Factor Authentication. This includes Apple iPhones, Android phones, basic cell phones and landlines. To begin, log into TUportal > click on the Manage My TUprofile link at the top of the page > click on Manage Phones, and follow the instructions below:

Microsoft Word - Table_CMAI.docx - Sites

https://sites.temple.edu/rtassessment/files/2018/10/Table_CMAI.pdf

Pre-Intervention Assessment According to the Cohen-Mansfield Agitation Inventory (CMAI), ct exhibited the following frequency of Verbal/Aggressive behaviors over the past 2 weeks: making verbal sexual advances 1x/wk, screaming 1-2x/2k, and cursing or verbal aggression 1-2x/day.

Hong Kong Baptist University - Education Abroad and Overseas Campuses

https://studyabroad.temple.edu/programs/temple-exchange-programs/hong-kong-baptist-university

Hong Kong Baptist University Hong Kong Founded in 1956, Hong Kong Baptist University is Hong Kong’s second-oldest higher learning institution. It has an established place in Hong Kong’s tertiary education sector, emphasizing academic excellence and a well-rounded education. The university has four campuses located in the heart of Kowloon. Together they provide an attractive, student ...

PTN-IDS: Prototypical Network Solution for the Few-shot Detection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf

Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...