Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 2,070

Microsoft Word - VMware_paravirtualization - 2007-10-15.doc

https://cis.temple.edu/~qzeng/cis5512-fall2015/papers/VMware_paravirtualization.pdf

The savings that tens of thousands of companies have generated from the deployment of this technology is further driving the rapid adoption of virtualized computing from the desktop to the data center. As new vendors enter the space and attempt to differentiate their products, many are creating confusion with their marketing claims and terminology. For example, while hardware assist is a ...

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...

Mutual Risk Sharing and Fintech: The Case of Xiang Hu Bao

https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf

The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...

silent-Sense.dvi - cis.temple.edu

https://cis.temple.edu/~yu/research/mobicomPOS06-bo.pdf

ABSTRACT In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behav-ior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch ac-tions. By tracking the fine-detailed touch actions of the user, we build a “touch-based biometrics” model of the ...

Combinatorial Probability - Temple University

https://cis.temple.edu/~latecki/Courses/CIS2033-Spring12/ElementaryProbabilityforApplications/ch2.pdf

10 · 9 C10,8(0.6)8(0.4)2 = (0.6)8(0.4)2 = 0.1209 1 · 2 In the same way we can compute the other probabilities. The results are given in Figure 2.2. With a TI-83 calculator these answers can be found by going to the DISTR menu and using binompdf(10,0.25,k). Here pdf is short for probability density function. Example 2.16. Aces at Bridge.

THE USE OF FORCE AND CYBER COUNTERMEASURES

https://sites.temple.edu/ticlj/files/2020/02/32.2_Corn_Article02-header-deleted.pdf

ABSTRACT In a global environment where most unfriendly acts between nations fall below the threshold of a use of force, the doctrine of countermeasures can be an important tool for states. However, in the realm of cyber operations, the rules governing the application of countermeasures result in unrealistic constraints on states. Particularly when compared with the much lesser constraints on ...

http://www.ce.chalmers.se/staff.PDF - Temple University

https://cis.temple.edu/~lakaemper/courses/cis350_2004/etc/moeller_triangle.pdf

1 Introduction Most collision detection algorithms, such as OBBTree [Gottschalk96], sphere hier-archies [Hubbard96] and BV-trees [Klosowski97], try to minimize the number of primitive-primitive intersections that have to be computed. Still, a fast and reliable method for computing the primitive-primitive intersection is desired. Since render-ing hardware is often targeted for triangles, the ...

FISSIONE: A Scalable Constant Degree and Low ... - Temple University

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FissionE_infocom%20t2.pdf

In recent years, peer-to-peer (P2P) computing has attracted significant attention from both industry and academic re-search [1], [2]. Applications of peer-to-peer networks vary among file sharing, persistent data storage, cooperative web-caching, DNS, and application level multicast. Many peer-to-peer systems have been deployed on the Internet, and some of them have become popular Internet ...

Stabilization of Hydroxide Ions at the Interface of a Hydrophobic ...

https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf

We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water. We show clear evidence that hexane on water revises the interfacial water structure ...

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...