Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 6,830

The OpenNARS implementation of the Non-Axiomatic Reasoning System

https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf

NARS utilises the Non-Axiomatic Logic (NAL) [9] for inference and the Nars-ese language for representing statements. The language and the logic are outside the scope of this document. The aim of this paper is to describe the current implementation of NARS in detail. The following aspects of the implementa-tion are focused on: memory management with concept centric processing, non-deterministic ...

FitLoc: Fine-grained and Low-cost Device-free Localization for Multiple ...

https://cis.temple.edu/~yu/research/FitLoc-infocom16.pdf

In this paper, we propose, FitLoc, a fine-grained and low cost DfL approach that can localize multiple targets in various areas. By taking advantage of the compressive sensing (CS) theory, FitLoc decreases the deployment cost by collecting only a few of RSS measurements and performs a fine-grained localization. Further, FitLoc employs a rigorously designed transfer scheme to unify the radio ...

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

PTN-IDS: Prototypical Network Solution for the Few-shot Detection in ...

https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf

Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput ...

https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf

Summary In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models and realistic movements of the mobile users (i.e. a mobility model). This paper is a survey of mobility models that ...

Outlier Detection with Globally Optimal Exemplar-Based GMM

https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf

Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...

Section 7 Closures of Relations R - Temple University

https://cis.temple.edu/~latecki//Courses/CIS166-Spring07/Lectures/ch7.4.pdf

Section 7.4 Closures of Relations Definition: The closure of a R relation with respect property P is the relation number of ordered R to obtain pairs property to

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...

Lecture 7: Potential Energy Functions - Temple University

https://ronlevygroup.cst.temple.edu/courses/2023_fall/chem5302/slides-notes/chem5302_lecture7.pdf

Terminology Potential Energy – non-kinetic part of the internal energy of a system.

MRRC: an effective cache for fast memory registration in RDMA

https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf

Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...