https://cis.temple.edu/~he/publications/Conferences/DeltaFTL-Eurosys12.pdf
Abstract NAND flash-based SSDs suffer from limited lifetime due to the fact that NAND flash can only be programmed or erased for limited times. Among various approaches to address this problem, we propose to reduce the number of writes to the flash via exploiting the content locality between the write data and its corresponding old version in the flash. This content locality means, the new ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://community.mis.temple.edu/mis5121beaver2016/files/2016/02/Wk-4-Control-Types-OTC1.pdf
v Concealed income by diverJng customer payments of used material sales to separate bank account v Unreported sales – not reported to accountant (organized company business affairs to conceal) v Profit never reported on personal or business tax returns v ArJficially lowered net worth by having company pay for personal expenses (e.g. renovaJons, landscaping of home) and transferring assets to ...
https://cis.temple.edu/~apal/ccgrid_iot.pdf
Abstract—In this paper we examine the problem of conflict detection and mitigation across multiple independently designed IoT subsystems deployed in a shared environment. The desired behavior of the system is codified in terms of predefined “safety properties”. We allow both the operational rules and safety properties to include time and temporal logic operations and detect their ...
https://cis.temple.edu/tagit/presentations/Perceptual%20Symbol%20Systems.pdf
People don’t use background theories or knowledge to frame their perceptual concepts, it’s the other way around, they use simulations of perceptual concepts to ground and frame their theories. Attention is integral to perceptual symbol formation, since it determines what is extracted and transferred to long-term memory.
https://cis.temple.edu/~pwang/Publication/TheoriesOfAI.pdf
This chapter addresses several central meta-theoretical issues of AI and AGI. After ana-lyzing the nature of the field, three criteria for desired theories are proposed: correctness, concreteness, and compactness. The criteria are clarified in the AI context, and using them, the current situation in the field is evaluated.
https://faculty.cst.temple.edu/~yury/LH4lam.pdf
We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.
https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf
Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...
https://sites.temple.edu/dwolf/files/2020/06/Irony.pdf
In the phrase "Socratic irony," which, as here, is principally used with reference to Plato's charac-ter Socrates, 'irony' is also commonly understood to mean dissembling or disingenuousness. This us-age is clearly informed by the conventional under-standing of 'eironeia,' but 'irony' does not mean deception. There are two basic kinds of irony, ver-bal and situational. Verbal irony occurs when ...
https://cis.temple.edu/~wu/hoc4667-liu.pdf
ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...