https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://cis.temple.edu/~pwang/9991-PJ/Reports/OzkanKilic.pdf
AGI SYSTEMS For more than 60 years, AI researchers have been working on creating intelligent machines or programs that can perform intellectual tasks that a human being can. These tasks can vary a lot from playing chess, counting animals in a picture, performing commands given in a natural language to making jokes, having a conversation with a human, producing novel inventions and art. Weak-AI ...
https://sites.temple.edu/sserrano/files/2020/08/1-Propagation-of-Nonlinear-Flood-Waves-in-Rivers.pdf
Sergio E. Serrano1 Abstract: The propagation of flood waves in rivers is governed by the Saint Venant equations. Under certain simplifying assumptions, these nonlinear equations have been solved numerically via computationally intensive, specialized software. There is a cogent need for simple analytical solutions for preliminary analyses. In this paper, new approximate analytical solutions to ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf
Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...
https://sites.temple.edu/borguet/files/2025/01/Borguet_Klein_Ruiyu_pKa_acs.jpclett.9b02913_2020.pdf
ABSTRACT: Acid/base chemistry is an intriguing topic that still constitutes a challenge for computational chemistry. While estimating the acid dissociation constant (or pKa) could shed light on many chemistry processes, especially in the fields of biochemistry and geochemistry, evaluating the relative stability between protonated and nonprotonated species is often very di ffi cult. Indeed, a ...
https://www.fox.temple.edu/sites/fox/files/Nonlinear-Role-of-Social-Interactions-for-Individual-Goal-Pursuit-and-Spendin.pdf
Nonlinear Effects of Social Connections and Interactions on Individual Goal Attainment and Spending: Evidences from Online Gaming Markets Although it seems intuitive for firms to leverage social connections and interactions to inuence consumers’ fl goal attainment and spending, the authors present a caveat of such strategies. Using two large-scale data sets with more than 5 million people ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/WENJUNJIANG2021TWeb.pdf
In online systems, including e-commerce platforms, many users resort to the reviews or comments generated by previous consumers for decision making, while their time is limited to deal with many reviews. Therefore, a review summary, which contains all important features in user-generated reviews, is expected. In this paper, we study “how to generate a comprehensive review summary from a ...
https://cis.temple.edu/~pwang/Publication/AI_Definitions.pdf
Though people have different opinions on how to accurately define AI, on a more general level they do agree on what this field is about. Human beings differ from animals and machines significantly in their mental ability, which is commonly called “intelligence”, and AI is the attempt to reproduce this ability in computer systems. This vague consensus sets important constraints on how AI ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Crootof-TICLJ.pdf
―[p]redictable, reliable and transparent technology‖; ―[a]ccurate information for the user on the outcome sought, the technology, and the context of use‖; ―[t]imely human judgement and action, and a potential for timely intervention‖; and ―[a]ccountability to a certain standard.‖
https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...