https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf
it is grounded in the idea that all weaponry should be subject to ―meaningful human control.‖ This ―intuitively appealing‖ principle is immensely popular,
https://cis.temple.edu/~pwang/Publication/EverydayReasoning.pdf
In summary, in AI and cognitive science (CogSci), “logic” has returned to its original subject matter, that is, reasoning in all domains, or in everyday reasoning, though the most common tool used is still the logic developed for a special type of reasoning in a special domain, that is, theorem proving in mathematics.
https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf
NARS utilises the Non-Axiomatic Logic (NAL) [9] for inference and the Nars-ese language for representing statements. The language and the logic are outside the scope of this document. The aim of this paper is to describe the current implementation of NARS in detail. The following aspects of the implementa-tion are focused on: memory management with concept centric processing, non-deterministic ...
https://cis.temple.edu/~latecki/Papers/DSP_PAMI2014.pdf
Abstract—In this paper, we present a novel partition framework, called dense subgraph partition (DSP), to automatically, precisely and efficiently decompose a positive hypergraph into dense subgraphs. A positive hypergraph is a graph or hypergraph whose edges, except self-loops, have positive weights. We first define the concepts of core subgraph, conditional core subgraph, and disjoint ...
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...
https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf
Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf
Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...