https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
To circumvent the above challenges, we introduce the Mean-Field Game (MFG) theory [29] to reduce a one-to-many game to a one-to-one game and further propose a joint MFG framework for mobile edge Caching and Pricing, namely MFG-CP, where each EDP can optimize its own utility in a distributed manner.
https://www.fox.temple.edu/sites/fox/files/Nonlinear-Role-of-Social-Interactions-for-Individual-Goal-Pursuit-and-Spendin.pdf
Nonlinear Effects of Social Connections and Interactions on Individual Goal Attainment and Spending: Evidences from Online Gaming Markets Although it seems intuitive for firms to leverage social connections and interactions to inuence consumers’ fl goal attainment and spending, the authors present a caveat of such strategies. Using two large-scale data sets with more than 5 million people ...
https://ronlevygroup.cst.temple.edu/courses/2017_spring/chem5412/lectures/Lecture4_SBII_2017.pdf
Using Protein-sequence-variation profitably Correlated Mutations and Structural Contacts
https://www2.law.temple.edu/10q/doj-targeting-private-equity-firms-in-false-claims-act-litigation/
The False Claims Act (FCA) has long been a powerful tool for the federal government to generate large recoveries from government contractors, including companies in the healthcare industry. In fiscal year 2017 alone, the US Department of Justice (DOJ) recovered more than $3.7 billion in settlements and judgments in civil cases brought under the FCA. The government’s focus on continued ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
The table’s intent is to provide a one-page overview of the main communication flows on IT risk that should exist in one form or another in any enterprise. More detailed information, e.g., source and destination of information, can be found in the Risk IT process descriptions, in the input and output tables.
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...
https://cis.temple.edu/~tug29203/18spring-3329/reading/Lab_7_Solutions.pdf
The answers below are based on the trace file tcp-ethereal-trace-1 in in
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://www.temple.edu/academics/degree-programs/information-technology-auditing-cyber-security-ms-bu-itac-ms
Prepare for a career in cyber security, IT risk management or information systems auditing in the business and critical infrastructure sectors.
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...