Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 8,570

RepObE: Representation Learning-Enhanced Obfuscation Encryption Modular ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%207432%20Camera%20Ready%20Version.pdf

Abstract Model inversion and adversarial attacks in se-mantic communication pose risks, such as con-tent leaks, alterations, and prediction inaccuracies, which threaten security and reliability. This pa-per introduces, from an attacker’s viewpoint, a novel framework called RepObE (Representation Learning-Enhanced Obfuscation Encryption Mod-ular Semantic Task Framework) to secure semantic ...

HackerRank Solutions: Tree: Huffman Decoding – Vahid E-Portfolio

https://sites.temple.edu/vahid/2022/03/05/hackerrank-solutions-tree-huffman-decoding/

Problem Huffman coding assigns variable length codewords to fixed length input characters based on their frequencies. More frequent characters are assigned shorter codewords and less frequent characters are assigned longer codewords. All edges along the path to a character contain a code digit. If they are on the left side of the tree, they will be a 0 (zero). If on the right, they’ll be a 1 ...

la5011055 1. - sites.temple.edu

https://sites.temple.edu/borguet/files/2025/01/structure-of-water-2014.pdf

ABSTRACT: The properties of water molecules located close to an interface deviate significantly from those observed in the homogeneous bulk liquid. The length scale over which this structural perturbation persists (the so-called interfacial depth) is the object of extensive investigations. The situation is particularly complicated in the presence of surface charges that can induce long-range ...

Directional and Explainable Serendipity Recommendation

https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf

ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...

Free Boot Camp and Windows 10 Installation - Temple University

https://cphapps.temple.edu/wiki/it/student/bootcamp

Windows 10 is available for free to all Temple University students. In order for Mac users (with the exception of the M1 Mac) to run Windows 10 on their computers, they must run a program called Boot Camp, which is also free to Temple students, or a similar program. Windows 10 is available via the OnTheHub website. Before beginning this installation, it is highly recommended that you make a ...

Social Media and Firm Equity Value

https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf

Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...

SOH_ImplementationEvaluation_9-28-2020_Letterhead

https://hope.temple.edu/sites/hope/files/media/document/SOH_Implementation.pdf

INTRODUCTION An estimated 1 in 2 college students experiences food insecurity while pursuing postsecondary credentials. Food insecurity is associated with compromised academic performance and lower rates of degree attainment. Many organizations around the country are seeking ways to address this problem. For ten years, a nonprofit organization called Swipe Out Hunger has been on a mission ...

NFMI: Near Field Magnetic Induction based communication

https://cis.temple.edu/~apal/nfmi_comnet.pdf

Near Field Magnetic Induction (NFMI) based communication is an emerging technology that promises several advantages over the traditional radio frequency (RF) communication including low energy use, ability to work reliably in a variety of difficult propagation media (e.g., water, non-ferromagnetic metals, underground, tissue media of fresh produce & meats, etc.), and low leakage possibility ...

Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing

https://cis.temple.edu/~wu/research/publications/Publication_files/Social-Aware%20DT-Assisted%20Service%20Provisioning%20in%20Serverless%20Edge%20Computing.pdf

Social-Aware DT-Assisted Service Provisioning in Serverless Edge Computing Jing Li†, Jianping Wang†, Weifa Liang†, Jie Wu¶, Quan Chen§, and Zichuan Xu$ † Department of Computer Science, City University of Hong Kong, Hong Kong, P. R. China ¶ Department of Computer and Information Sciences, Temple University, Philadelphia, USA

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...