https://cis.temple.edu/~pwang/Publication/WHW-Realtime.pdf
Abstract. This paper compares the various conceptions of “real-time” in the context of AI, as different ways of taking the processing time into consideration when problems are solved. An architecture of real-time reasoning and learning is introduced, which is one aspect of the AGI system NARS. The basic idea is to form problem-solving processes flexibly and dynamically at run time by using ...
https://law.temple.edu/csj/wp-content/uploads/sites/3/2016/07/Live-Stop-Report.pdf
The Live Stop law instructs police officers to immobilize drivers’ cars for certain traffic violations including driving without a license, with a suspended or revoked license, and driving with expired or no registration.1 The law applies only to Philadelphia. Other counties may adopt the law by local ordinance, however, most have not done so.2 The law instructs that cars should be towed for ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf
Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...
https://news.temple.edu/news/2021-02-03/exploring-best-way-bring-black-children-white-families-and-communities
Temple University staff members Valerie Harrison and Kathryn Peach D’Angelo discuss “Do Right By Me,” their book about raising Black children in white spaces.
https://education.temple.edu/ofp/mentor-teacher-roles-responsibilities
Thank you for inviting a Temple University College of Education and Human Development student teacher into your classroom. We appreciate your willingness to collaborate with us in preparing excellent teachers for the future. We make every effort to provide our education students with a strong background in content knowledge, pedagogical theory, and teaching methods. We also provide many of ...
https://cis.temple.edu/tagit/presentations/Perceptual%20Symbol%20Systems.pdf
the advent of computers, cognitive science has been trying but struggling to describe coherent amodal (non-sensory, non-perceptual) theories of cognition that purely symbolic, syntactic or mathematical
https://cis.temple.edu/~yu/research/HearBP-info24.pdf
Abstract—Continuous blood pressure (BP) monitoring using wearable devices has received increasing attention due to its importance in diagnosing diseases. However, existing methods mainly measure BP intermittently, involve some form of user effort, and suffer from insuficient accuracy due to sensor properties. In order to overcome these limitations, we study the BP measurement technology ...
https://cis.temple.edu/~wu/research/publications/Publication_files/ICDE2024_Xu.pdf
Abstract—In this paper, we investigate the competitive content placement problem in Mobile Edge Caching (MEC) systems, where Edge Data Providers (EDPs) cache appropriate contents and trade them with requesters at a suitable price. Most of the existing works ignore the complicated strategic and economic interplay between content caching, pricing, and content sharing. Therefore, we propose a ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/IEEE%20TMC-2025%EF%BC%88Forward_Legal_Anonymous_Group_Pairing-Onion_Routing_for_Mobile_Opportunistic_Networks%EF%BC%89.pdf
a group can potentially act as a relay. To ensure message authenticity, we employ the efficient SM2 signing algorithm to generate signatures for the message source. Furthermore, by incorporating parameters such as the public key validity period and master key validity period into the group pairing-onion routing protocol, we achieve forward security in message delivery. We conduct a thorough ...
https://cis.temple.edu/~yu/research/mobicomPOS06-bo.pdf
ABSTRACT In this work, we present SilentSense, a framework to authenticate users silently and transparently by exploiting the user touch behav-ior biometrics and leveraging the integrated sensors to capture the micro-movement of the device caused by user’s screen-touch ac-tions. By tracking the fine-detailed touch actions of the user, we build a “touch-based biometrics” model of the ...