https://www.fox.temple.edu/sites/fox/files/Complementarity-and-Cannibalization-of-Offline-to-Online-Targeting-A-Field-Experiment-on-Omnichannel-Commerce.pdf
However, it is debatable whether such offline-to-online tar-geting is effective. On the one hand, advocates argue that inducing offline customers to buy online may complement a firm’s store channel. This is because as more channels are used to engage customers, the value of these customers increases (Gimpel et al. 2018), and multichannel shoppers are more loyal and spend more than single ...
https://cis.temple.edu/~latecki/Papers/SDM09_Final.pdf
Outlier detection techniques can be categorized into several groups: (1) statistical or distribution-based ap-proaches; (2) geometric-based approaches; (3) pro ̄ling methods; and (4) model-based approaches. In statisti-cal techniques [2, 3], the data points are typically mod-eled using a data distribution, and points are labeled as outliers depending on their relationship with the dis ...
https://sites.temple.edu/borguet/files/2024/10/zou-et-al-2024-a-simplified-approach-for-dynamic-contact-angle-measurements.pdf
ABSTRACT: Contact angle measurement is a valuable tool for analyzing surface properties, including surface structure, cleanliness, and solid−liquid interactions. Typically, this measurement is performed at the static state, capturing the interactions at the solid−liquid interface when the gas, liquid, and solid phases reach equilibrium. In this study, we developed a user-friendly setup for ...
https://cis.temple.edu/~latecki/Papers/GIFT-IEEEMM2017.pdf
Abstract—Projective analysis is an important solution in three-dimensional (3D) shape retrieval, since human visual perceptions of 3D shapes rely on various 2D observations from different viewpoints. Although multiple informative and discriminative views are utilized, most projection-based retrieval systems suffer from heavy computational cost, and thus cannot satisfy the basic requirement ...
https://cis.temple.edu/~latecki/Papers/mldm07.pdf
Abstract. Outlier detection has recently become an important prob-lem in many industrial and ̄nancial applications. In this paper, a novel unsupervised algorithm for outlier detection with a solid statistical foun-dation is proposed. First we modify a nonparametric density estimate with a variable kernel to yield a robust local density estimation. Out-liers are then detected by comparing the ...
https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf
Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...
https://cis.temple.edu/tagit/publications/PAGI-TR-11.pdf
October 19, 2020 NARS (Non-Axiomatic Reasoning System) can be analyzed in three parts [Wang, 1995, Wang, 2006, Wang, 2013]:
https://cis.temple.edu/~latecki/Papers/QiJia_Ellipse_IEEETIP_2023.pdf
Abstract—It is challenging to characterize the intrinsic geom-etry of high-degree algebraic curves with lower-degree algebraic curves. The reduction in the curve’s degree implies lower com-putation costs, which is crucial for various practical computer vision systems. In this paper, we develop a characteristic mapping (CM) to recursively degenerate 3n points on a planar curve of nth order ...
https://cis.temple.edu/~latecki/Courses/RobotFall07/PapersFall07/fox-ijrr-2003.pdf
a small part of the state space, and it chooses a large number of samples if the state un-certainty is high. Both the implementation and computation overhead of this approach are small. Extensive experiments using mobile robot localization as a test application show that our approach yields drastic improvements over particle filters with fixed sample set sizes and over a previously introduced ...
https://liberalarts.temple.edu/sites/liberalarts/files/Handbook_on_the_Economics.pdf
The largest part of the industry (75 percent) comprises guards or patrol ofi cers. With the rising employment of technology, security blends into the IT department, especially in the proprietary context. It is also important to note that in both segments of the indus-try some security employees spend part of their time in such non- security- related tasks as concierge- type activities.