https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...
https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download
of machine learning (ML) versus a traditional statistical model in predicting dental caries in
https://sites.temple.edu/lnaveen/files/2024/11/Austin_Kleespie_paper.pdf
We explore whether ETF ownership afects monetary policy transmission to individual equities. Both broad market and sector-specific ETFs appear to moderate return responses to unexpected target rate changes. However, when considering the response to unexpected changes in the path of monetary policy, we find that broad market (sector-specific) ETFs play a moderating (amplifying) role. We also ...
https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf
We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water. We show clear evidence that hexane on water revises the interfacial water structure ...
https://sites.temple.edu/ticlj/files/2018/10/32.1_Article-5_Hollis.pdf
As part of a symposium on Rosa Brooks’s How Everything Became War and the Military Became Everything, this essay explores the concept of an influence operation (IO) from the perspective of international law. It examines common elements of an IO and proffers five criteria for differentiating among them, namely by assessing their (i) transparency; (ii) extent of deception; (iii) purpose; (iv ...
https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf
Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...
https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf
Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...
https://sites.temple.edu/newcombe/files/2013/06/Newcombe_et_al-2015-Wiley_Interdisciplinary_Reviews-_Cognitive_Science.pdf
There are many continuous quantitative dimensions in the physical world. Philo-sophical, psychological, and neural work has focused mostly on space and num-ber. However, there are other important continuous dimensions (e.g., time and mass). Moreover, space can be broken down into more specific dimensions (e.g., length, area, and density) and number can be conceptualized discretely or con ...
https://sites.temple.edu/cognitionlearning/files/2017/09/Gunderson-et-al-2017-Dev-Psych.pdf
Individuals’ implicit theories of intelligence exist on a spectrum, from believing intelligence is fixed and unchangeable, to believing it is malleable and can be improved with effort. A belief in malleable intelligence leads to adaptive responses to challenge and higher achievement. However, surprisingly little is known about the development of academic-domain-specific theories of ...