https://cis.temple.edu/~latecki/Papers/ACM_MM2023.pdf
ABSTRACT Image stitching aims to align a pair of images in the same view. Generating precise alignment with natural structures is challeng-ing for image stitching, as there is no wider field-of-view image as a reference, especially in non-coplanar practical scenarios. In this paper, we propose an unsupervised image stitching frame-work, breaking through the coplanar constraints in homography ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/DiVE.pdf
Abstract—Ensuring stable and high-quality real-time video an-alytics for computationally constrained mobile agents is essential. However, limited computing resources and network bandwidth present significant challenges in meeting the objective of low response time and high inference accuracy. In this paper, we present DiVE, an edge-assisted video analytics system that utilizes motion vectors ...
https://sites.temple.edu/lnaveen/files/2014/05/JFE_risktaking_2006.pdf
We provide empirical evidence of a strong causal relation between managerial compensa-tion and investment policy, debt policy, and firm risk. Controlling for CEO pay-performance sensitivity (delta) and the feedback effects of firm policy and risk on the managerial compensation scheme, we find that higher sensitivity of CEO wealth to stock volatility (vega) implements riskier policy choices ...
https://sites.temple.edu/trail/files/2021/11/XieXinDamesIROS2021.pdf
Zhanteng Xie, Pujie Xin, and Philip Dames Abstract—This paper proposes a novel neural network-based control policy to enable a mobile robot to navigate safety through environments filled with both static obstacles, such as tables and chairs, and dense crowds of pedestrians. The network architecture uses early fusion to combine a short history of lidar data with kinematic data about nearby ...
https://cis.temple.edu/~yu/research/mobicomPOS06-bo.pdf
ABSTRACT In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behav-ior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch ac-tions. By tracking the fine-detailed touch actions of the user, we build a “touch-based biometrics” model of the ...
https://cis.temple.edu/~latecki/Papers/ChamferECCVFinal.pdf
2 Related work There is a large number of applications of chamfer matching in computer vision and in medical image analysis. Chamfer distance was first introduced by Barrow et al. [2] in 1977 with a goal of matching two collections of contour fragments. Until today chamfer matching is widely used in object detection and classifica-tion task due to its tolerance to misalignment in position ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf
Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf
In all five group mobility models, random motion of each individual MN within a given group occurs. In Section 4, we illustrate that a mobility model has a large effect on the performance evaluation of an ad hoc network protocol. In other words, we show how the performance results of an ad hoc network pro-tocol significantly change when the mobility model in the simulation is changed. The ...
https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf
1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...