https://cis.temple.edu/~pwang/Publication/OpenNARS.pdf
NARS utilises the Non-Axiomatic Logic (NAL) [9] for inference and the Nars-ese language for representing statements. The language and the logic are outside the scope of this document. The aim of this paper is to describe the current implementation of NARS in detail. The following aspects of the implementa-tion are focused on: memory management with concept centric processing, non-deterministic ...
https://cis.temple.edu/~yu/research/FitLoc-infocom16.pdf
In this paper, we propose, FitLoc, a fine-grained and low cost DfL approach that can localize multiple targets in various areas. By taking advantage of the compressive sensing (CS) theory, FitLoc decreases the deployment cost by collecting only a few of RSS measurements and performs a fine-grained localization. Further, FitLoc employs a rigorously designed transfer scheme to unify the radio ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf
Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...
https://cis.temple.edu/~wu/research/publications/Publication_files/1571039973-LCN2024.pdf
Abstract—Local Area Networks (LANs), as interconnected networks, are susceptible to numerous security threats. Existing intrusion detection systems (IDS) heavily rely on large, fully-labeled datasets to have accurate detection, facing challenges when only a few malicious samples are available. In addition, previous studies have identified the deterioration of IDS’s per-formance when the ...
https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf
Summary In the performance evaluation of a protocol for an ad hoc network, the protocol should be tested under realistic conditions including, but not limited to, a sensible transmission range, limited buffer space for the storage of messages, representative data traffic models and realistic movements of the mobile users (i.e. a mobility model). This paper is a survey of mobility models that ...
https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf
Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...
https://cis.temple.edu/~latecki//Courses/CIS166-Spring07/Lectures/ch7.4.pdf
Section 7.4 Closures of Relations Definition: The closure of a R relation with respect property P is the relation number of ordered R to obtain pairs property to
https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf
Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...
https://ronlevygroup.cst.temple.edu/courses/2023_fall/chem5302/slides-notes/chem5302_lecture7.pdf
Terminology Potential Energy – non-kinetic part of the internal energy of a system.
https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf
Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...