https://ronlevygroup.cst.temple.edu/courses/2016_fall/biost5312/lectures/biostat_lecture_06.pdf
p-value: Pr(t > t(obs)jH0), the probability of obtaining a test statistic as extreme as or more extreme than the actual test statistic value, given that H0 is true.
https://www.fox.temple.edu/sites/fox/files/ISR-delayed-effects.pdf
The results of the Cox proportional hazard analyses confirm that LMP treat-ment indeed has a significant impact on purchase speed with more delayed and slower nonimpulsive purchases over time (hazard ratio = 0.6692, p < 0 000 when comparing LMP treatment with the geo-fenced control and 0.8073, p < 0 000 when comparing LMP treatment with the ...
https://cis.temple.edu/~wangp/5603-AI/Project/2022S/pattersonblaker/Ward_Patterson_Final_Report.pdf
1 Abstract Minecraft has been the focus of much AI research in past years. Most recently, interest has risen in procedural generation of settlements in Minecraft, largely due to a annual competition established in 2018 called the Generative Design in Minecraft Competition. Inspired by this recent research, we aim to develop a set of algorithms that are capable of building a realistic ...
https://cis.temple.edu/~tug29203/21fall-4319/lectures/ch2b-2.ppt
Application Layer 2-* Chapter 2: outline 2.1 principles of network applications 2.2 Web and HTTP 2.3 electronic mail SMTP, POP3, IMAP 2.4 DNS 2.5 P2P applications 2.6 video streaming and content distribution networks 2.7 socket programming with UDP and TCP Socket programming goal: learn how to build client/server applications that communicate using sockets socket: door between application ...
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...
https://cis.temple.edu/~wu/teaching/Spring2022/Chapter4.pdf
Greedy approaches Seek to maximize the overall utility of some process by making the
https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf
Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...
https://cis.temple.edu/~latecki/Papers/JoPanECAI2024.pdf
Addressing these gaps, we introduce the FlowLearn Dataset1, which includes both scientific and simulated flowcharts. The scien-tific subset features 3,858 flowcharts sourced from scientific liter-ature, annotated with captions (median length of 25 words) and in-figure text. The simulated subset consists of 10,000 flowcharts gener-ated from Mermaid code. This simulated subset enhances the ...
https://www.fox.temple.edu/sites/fox/files/social-media-isr.pdf
Companies have increasingly advocated social media technologies to transform businesses and improve orga- nizational performance. This study scrutinizes the predictive relationships between social media and firm equity value, the relative effects of social media metrics compared with conventional online behavioral metrics, and the dynamics of these relationships. The results derived from ...
https://cis.temple.edu/~yu/research/CrispBP-Mobicom21.pdf
ABSTRACT Arterial blood pressure (ABP) monitoring using wearables has emerged as a promising approach to empower users with self-monitoring for efective diagnosis and control of hypertension. However, existing schemes mainly monitor ABP at discrete time intervals, involve some form of user efort, have insuficient ac-curacy, and require collecting suficient training data for model development ...