https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf
Addressing these gaps, we introduce the FlowLearn Dataset1, which includes both scientific and simulated flowcharts. The scien-tific subset features 3,858 flowcharts sourced from scientific liter-ature, annotated with captions (median length of 25 words) and in-figure text. The simulated subset consists of 10,000 flowcharts gener-ated from Mermaid code. This simulated subset enhances the ...
https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://cis.temple.edu/~qzeng/cis4360-spring17/papers/An%20Overview%20of%20Cryptography.pdf
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information ...
https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf
How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010
https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf
1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf
Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...
https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf
The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...
https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf
The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...