Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 29

DAVID CONAN WOLFSDORF - Sites

https://sites.temple.edu/dwolf/files/2020/06/On-Goodness-Introduction.pdf

The goal of this study is to answer the question “What is goodness?”2 It is nat-ural to associate this question with ethics. But goodness is not confined to ethics. Water and wine, a strategy for streamlining maintenance operations, a proof or disproof of the null hypothesis, and a rendering of a candy counter in oil may all be good and in non- ethical ways. Goodness figures prominently in ...

IDENTITIES BETWEEN HECKE EIGENFORMS

https://cst.temple.edu/sites/cst/files/theses1/bao.pdf

tween Hecke eigenforms, we give another proof that the j-function is algebraic

stoj-1.qxd - Temple University

https://cis.temple.edu/~wu/teaching/Spring%202013/handoff.pdf

1.1 INTRODUCTION Mobility is the most important feature of a wireless cellular communication system. Usu-ally, continuous service is achieved by supporting handoff (or handover) from one cell to another. Handoff is the process of changing the channel (frequency, time slot, spreading code, or combination of them) associated with the current connection while a call is in progress. It is often ...

I Can Hear You Without a Microphone: Live Speech Eavesdropping From ...

https://cis.temple.edu/~yu/research/Icanhearyou-INFOCOM2023.pdf

Abstract—Recent literature advances motion sensors mounted on smartphones and AR/VR headsets to speech eavesdropping due to their sensitivity to subtle vibrations. The popularity of mo-tion sensors in earphones has fueled a rise in their sampling rate, which enables various enhanced features. This paper investigates a new threat of eavesdropping via motion sensors of earphones by developing ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

CanalScan: Tongue-Jaw Movement Recognition via Ear Canal Deformation ...

https://www.cis.temple.edu/~yu/research/CanalScan-info21.pdf

The results show that CanalScan achieves 94:84% recall and 95:00% precision in tongue-jaw movement recogni-tion. Results also show that CanalScan can generalize to new users without retraining or adaptation and is robust under various usage scenarios and environments.

Intrinsic Disorder and Protein Function A. Keith Dunker, J. David ...

https://dabi.temple.edu/external/zoran/papers/Dunker_TPT.pdf

For ordered protein, the ensemble members all have the same time-averaged canonical set of Ramachandran angles along their backbones. For intrinsically disordered protein, the ensemble members have different (and typically dynamic) Ramachandran angles. Such disorder has been characterized by a variety of methods including x-ray crystallography, NMR spectroscopy, CD spectroscopy, and protease ...

THE BEMBA ACQUITTAL: A BLOW TO THE ICC’S LEGITIMACY IN A TIME ... - Sites

https://sites.temple.edu/ticlj/files/2020/05/34.1_Article-D-Final-Format.pdf

World leaders and human rights groups have criticized the ICC as expensive and ineffective. This critique is essentially an attack on the court’s legitimacy. This Note argues that Bemba’s acquittal only serves to weaken that legitimacy. Beginning with an analysis of the majority and minority opinions, it then discusses how the decision will impact the ICC’s legitimacy by imposing ...

The Socialist Legal System with Chinese Characteristics: - Sites

https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf

The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...