Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 3,860

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

TileSR: Accelerate On-Device Super-Resolution with Parallel Ofloading in Tile Granularity Ning Chen1, Sheng Zhang1∗, Yu Liang2, Jie Wu3, Yu Chen1, Yuting Yan1, Zhuzhong Qian1 and Sanglu Lu1

BSD Sockets: A Quick And Dirty Primer - Temple University

https://cis.temple.edu/~giorgio/old/cis307s96/readings/docs/sockets.html

Introduction As you delve into the mysteries of UNIX, you find more and more things that are difficult to understand immediately. One of these things, at least for most people, is the BSD socket concept. This is a short tutorial that explains what they are, how they work, and gives sample code showing how to use them. The Analogy (or: What is a socket, anyway?) The socket is the BSD method for ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

Optimizing Data-Driven Federated Learning in UAV Networks

https://cis-linux1.temple.edu/~jiewu/research/publications/Publication_files/ICPADS2024.pdf

Abstract—Federated Learning (FL) is an emerging privacy-preserving distributed machine learning paradigm that enables numerous clients to collaboratively train a global model without transmitting private datasets to the FL server. Unlike most existing research, this paper introduces a Data-Driven FL system in Unmanned Aerial Vehicle (UAV) networks, named DDFL, which features an innovative ...

Registration Waitlisting - Office of the University Registrar

https://registrar.temple.edu/registration-waitlisting

What is a registration waitlist? The registration waitlist allows students to be notified when a seat becomes available for a closed section. Not every section allows you to join a waitlist. You will be notified through your TUmail account when a seat becomes available. Once notified, you will need to register by the deadline noted in the email, typically 72 hours from notification (and 24 ...

Who Needs Innate Ability to Succeed in Math and Literacy? Academic ...

https://sites.temple.edu/cognitionlearning/files/2017/09/Gunderson-et-al-2017-Dev-Psych.pdf

Individuals’ implicit theories of intelligence exist on a spectrum, from believing intelligence is fixed and unchangeable, to believing it is malleable and can be improved with effort. A belief in malleable intelligence leads to adaptive responses to challenge and higher achievement. However, surprisingly little is known about the development of academic-domain-specific theories of ...

Deobfuscation of Virtualization-obfuscated Code through Symbolic ...

https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf

Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...

HackerRank Solutions: Jesse and Cookies – Vahid E-Portfolio

https://sites.temple.edu/vahid/2022/03/05/hackerrank-solutions-jesse-and-cookies/

HackerRank Solutions: Jesse and Cookies Published by Vahid Khalkhali on March 5, 2022

Xiang (Robert) Li - Temple University

https://www.temple.edu/directory/xiang-robert-li-tug28441

Biography Dr. Xiang (Robert) Li is a professor and Washburn Senior Research Fellow in the Department of Tourism and Hospitality Management, Temple University. He is also Director of Temple’s U.S.-Asia Center for Tourism and Hospitality Research. Prof. Li’s research mainly focuses on destination marketing and tourist behavior, with special emphasis on international destination branding ...