https://cis.temple.edu/~latecki/Papers/ICME2024.pdf
Abstract—Camouflaged object detection (COD) is a challeng-ing task that identifies camouflaged objects from highly similar backgrounds. Existing methods typically treat the whole object equally while neglecting the indistinguishable regions that require more attention than other regions. In this paper, we propose a Fuzzy Boundary-Guided Network (FBG-Net) for camouflaged object detection ...
https://liberalarts.temple.edu/about/community-engagement/community-scholars-program
Spring 2025 Community Scholars Program What is the Community Scholars Program? The Community Scholars Program is a paid opportunity for CLA students to gain tools to make a difference in the community, in partnership with other like-minded students. During this 10-week introductory program, you’ll learn principles of effective engagement, participate in community projects, and discuss issues ...
https://bulletin.temple.edu/undergraduate/fox-business-management/international-business-supply-chain-transportation-logistics-bba/
Major Requirements Students must follow the Major Requirements and College Requirements current at the time of declaration. Students not continuously enrolled who have not been approved for a Leave of Absence or study elsewhere must follow University, College, and Major requirements current at the time of re-enrollment. Requirements of International Supply Chain Management, Transportation ...
https://scholarshare.temple.edu/bitstreams/1c1f1a6d-0f34-4234-8b39-41d9eeb397f0/download
of machine learning (ML) versus a traditional statistical model in predicting dental caries in
https://sites.temple.edu/pcrs/2023/11/12/how-online-communication-platforms-facilitated-human-trafficking-and-rethinking-the-websites-as-hosts-theory/
By Aamy Kuldip (view PDF version) I. Introduction Human trafficking is a horrific crime that involves stealing one’s freedom for profit. [1] Victims of human trafficking may be tricked or forced into providing commercial sex or illegal labor, and are often left extremely traumatized. [2] Online communication platforms, such as Facebook, Twitter, and Craigslist, enable human trafficking ...
https://cis.temple.edu/~pwang/AGI-Intro.html
Artificial General Intelligence — A gentle introduction Pei Wang [On-line document since 2007, last updated in August 2025] [中文] [Español] [This page contains information about the field of Artificial General Intelligence (AGI), collected and organized according to my judgment, though efforts are made to avoid personal biases.]
https://cis.temple.edu/~pwang/papers.html
Selected Papers of Pei Wang All the following publications are authored by Pei Wang unless specified otherwise.
https://cis.temple.edu/~tug29203/18spring-3329/reading/hw4a.pdf
c. Suppose that different VC numbers are permitted in each link along a VC’s path. During connection setup, after an end-to-end path is determined, describe how the links can choose their VC numbers and configure their for-warding tables in a decentralized manner, without reliance on a central node. P3. A bare-bones forwarding table in a VC network has four columns. What is the meaning of ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf
Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...