Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 40

Microsoft Word - Article B Bricker.doc

https://sites.temple.edu/ticlj/files/2017/02/27.1.Bricker-TICLJ.pdf

Long ago, American legislatures and courts rejected such a defense for various reasons that make sense under both a utilitarian and retributivist model of punishment.2 Prior to developments in modern medicine, many injuries that are treatable today led to death3 and were treated as murder under different theories such as depraved heart murder. Further, based on the immutable facts in the above ...

FORMATTED_Randy Goldson_113-161

https://sites.temple.edu/ticlj/files/2025/05/Randy-Goldson-Vol.-38-Issue-1-1.pdf

Randy Goldson* The demand for climate reparations is a bold and necessary step in addressing the uneven burden of climate change. While the predominant state-centered, North-South formulation of climate reparations has value, this Comment argues that the nation-state cannot be the exclusive recipient of climate reparations by highlighting the work of TWAIL scholars who have shown that the ...

Affinity Learning with Diffusion on Tensor Product Graph

https://cis.temple.edu/~latecki/Papers/PAMI_Jan2013.pdf

Affinity Learning with Diffusion on Tensor Product Graph Xingwei Yang, Lakshman Prasad, and Longin Jan Latecki, Senior Member, IEEE

central-control - Temple University

https://cis.temple.edu/~tug29203/20-5590/lectures/central-control.pdf

If a Switch finds a shorter path to the Controller, way authentication with it before advertising route. Therefore, the minimum spanning the Controller, hop-by-hop as each Switch Authentication is done using the preconfigured sure that a misbehaving node cannot masquerade or another Switch. If authentication is successful, ates an encrypted connection with the Controller communication between ...

1 QoS-aware Online Service Provisioning and Updating in Cost-efficient ...

https://cis.temple.edu/~wu/research/publications/Publication_files/10_bare_jrnl_compsoc.pdf

1.1 Motivation and Challenges Service provisioning and updating refers to the decision-making process of the locations of services within a specific edge computing network to balance the interests of service providers and consumers to achieve the greatest eficiency possible [7]. Numerous mobile devices and sensors in edge networks need to interface with services and exchange data in real-time ...

Microsoft Word - Article D_Streater_PRINT.docx - Sites

https://sites.temple.edu/ticlj/files/2019/05/33.1_Streater_Article4.pdf

ABSTRACT Zimbabwe—like most African Post-Colonial nation states—has been criticized and castigated for exercising its legal rights to self-determination, autonomy and sovereignty over land and resources—especially when these conflict with the economic and/or geo-political interests of the West, or white expats who once dominated these former colonies. Often, when discussing this ...

Balancing Privacy and Accuracy using Significant Gradient Protection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/J-CT-2024-Balancing%20Privacy%20and%20Accuracy%20using%20Siginificant%20Gradient%20Protection%20in%20Federated%20Learning.pdf

Motivated by these aforementioned issues, we aim to im-prove the model accuracy and availability while ensuring privacy protection by balancing privacy and accuracy of DP-FL.

A Modern Introduction to Probability and Statistics

https://cis.temple.edu/~latecki/Courses/Math3033-Fall09/DekkingBook07/A_modern_intro_probability_statistics_Dekking05.pdf

A modern introduction to probability and statistics. — (Springer texts in statistics) 1. Probabilities 2. Mathematical statistics I. Dekking, F. M.

Topology-Aware Scheduling Framework for Microservice Applications in Cloud

https://cis.temple.edu/~wu/research/publications/Publication_files/Topology-Aware_Scheduling_Framework_for_Microservice_Applications_in_Cloud.pdf

Abstract—Loosely coupled and highly cohesived microservices running in containers are becoming the new paradigm for application development. Compared with monolithic applications, applications built on microservices architecture can be deployed and scaled independently, which promises to simplify software development and operation. However, the dramatic increase in the scale of microservices ...

Distributed Deep Multi-Agent Reinforcement Learning for Cooperative ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf

Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...