Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,320

PTN-IDS: Prototypical Network Solution for the Few-shot Detection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf

Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...

2 Outcomes, events, and probability - Temple University

https://cis.temple.edu/~latecki/Courses/Math3033-Fall09/DekkingBook07/DekkingBook_c2.pdf

Outcomes, events, and probability The world around us is full of phenomena we perceive as random or unpre-dictable. We aim to model these phenomena as outcomes of some experiment, where you should think of experiment in a very general sense. The outcomes are elements of a sample space Ω, and subsets of Ω are called events.The events will be assigned a probability, a number between 0 and 1 ...

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

MRRC: an effective cache for fast memory registration in RDMA

https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf

Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...

CRC_AU2832_C01.tex - cis.temple.edu

https://cis.temple.edu/~wu/research/publications/Publication_files/handbook-part1.pdf

The 19 chapters in this section cover a wide range of topics across multiple layers: MAC (part of the data link layer), network, and applications. One chapter is devoted to the cross-layer architecture for ad hoc wireless networks. Several chapters deal with various efficient and scalable routing, including multicasting and geocasting, in ad hoc wireless networks. One chapter discusses routing ...

It’s RILA Time: An Introduction to Registered Index-Linked Annuiti

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf

Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...

Directional and Explainable Serendipity Recommendation

https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf

ABSTRACT Serendipity recommendation has attracted more and more atten-tion in recent years; it is committed to providing recommendations which could not only cater to users’ demands but also broaden their horizons. However, existing approaches usually measure user-item relevance with a scalar instead of a vector, ignoring user preference direction, which increases the risk of unrelated ...

http://www.ce.chalmers.se/staff.PDF - Temple University

https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf

1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...