Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 40

Joint Mobile Edge Caching and Pricing: A Mean-Field Game Approach

https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf

Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...

Prediction of Dental Caries in Pediatric Patients Using Machine ...

https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download

of machine learning (ML) versus a traditional statistical model in predicting dental caries in

ETF Ownership and the Transmission of Monetary Policy

https://sites.temple.edu/lnaveen/files/2024/11/Austin_Kleespie_paper.pdf

We explore whether ETF ownership afects monetary policy transmission to individual equities. Both broad market and sector-specific ETFs appear to moderate return responses to unexpected target rate changes. However, when considering the response to unexpected changes in the path of monetary policy, we find that broad market (sector-specific) ETFs play a moderating (amplifying) role. We also ...

Stabilization of Hydroxide Ions at the Interface of a Hydrophobic ...

https://sites.temple.edu/xifanwu/files/2020/10/PhysRevLett.125.156803.pdf

We report a joint study using surface-specific sum-frequency vibrational spectroscopy and ab initio molecular dynamics simulations, respectively, on a pristine hydrophobic (sub)monolayer hexane-water interface, namely, the hexane/water interface with varied vapor pressures of hexane and different pHs in water. We show clear evidence that hexane on water revises the interfacial water structure ...

THE INFLUENCE OF WAR; THE WAR FOR INFLUENCE - Sites

https://sites.temple.edu/ticlj/files/2018/10/32.1_Article-5_Hollis.pdf

As part of a symposium on Rosa Brooks’s How Everything Became War and the Military Became Everything, this essay explores the concept of an influence operation (IO) from the perspective of international law. It examines common elements of an IO and proffers five criteria for differentiating among them, namely by assessing their (i) transparency; (ii) extent of deception; (iii) purpose; (iv ...

location_mobicom.dvi - Temple University

https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf

Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Abstract—Previous state-of-the-art studies have demonstrated that adversaries can access sensitive user data by membership inference attacks (MIAs) in Federated Learning (FL). Intro-ducing differential privacy (DP) into the FL framework is an effective way to enhance the privacy of FL. Nevertheless, in differentially private federated learning (DP-FL), local gradients become excessively ...

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

Thinking about quantity: the intertwined development of spatial and ...

https://sites.temple.edu/newcombe/files/2013/06/Newcombe_et_al-2015-Wiley_Interdisciplinary_Reviews-_Cognitive_Science.pdf

There are many continuous quantitative dimensions in the physical world. Philo-sophical, psychological, and neural work has focused mostly on space and num-ber. However, there are other important continuous dimensions (e.g., time and mass). Moreover, space can be broken down into more specific dimensions (e.g., length, area, and density) and number can be conceptualized discretely or con ...

Who Needs Innate Ability to Succeed in Math and Literacy? Academic ...

https://sites.temple.edu/cognitionlearning/files/2017/09/Gunderson-et-al-2017-Dev-Psych.pdf

Individuals’ implicit theories of intelligence exist on a spectrum, from believing intelligence is fixed and unchangeable, to believing it is malleable and can be improved with effort. A belief in malleable intelligence leads to adaptive responses to challenge and higher achievement. However, surprisingly little is known about the development of academic-domain-specific theories of ...