https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/RILA_Moenig_JRI_final.pdf
Registered index-linked annuities (RILAs) are increasingly popular equity-based re-tirement savings products o ered by U.S. life insurance companies. They combine features of xed-index annuities and traditional variable annuities (TVAs), o ering in-vestors equity exposure with downside protection in a tax-deferred setting. This article introduces RILAs to the academic literature by describing ...
https://sites.temple.edu/centerforpublichistory/files/2017/05/sample-prospectus.pdf
Topic: Archivists have long been aware of their critical role in the creation of cultural memory. In the 1960s and 1970s, shifts in historiography prompted archivists to reconsider their dual position as both keepers and creators of the historical record. Since then, the profession has continued to discuss the necessity of maintaining historically and culturally responsible records. In recent ...
https://cis.temple.edu/~latecki/Papers/VisualCurvatureCVPR07.pdf
a relation between multi-scale visual curvature and convexity of simple closed curves. To our best knowledge, the proposed definition of visual curvature is the first ever that applies to regular curves as defined in differential geometry as well as to turn angles of polygonal curves. Moreover, it yields stable curvature estimates of curves in digital images even under sever distortions.
https://sites.temple.edu/emilyksnell/files/2017/08/Wasik-Hindman-Snell-2016.pdf
a b s t r a c t This paper reviews high-quality empirical studies on book reading practices in early childhood that have resulted in increases in child vocabulary.
https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf
How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010
https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf
Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...
https://sites.temple.edu/ticlj/files/2017/02/24.2.Abrams-TICLJ.pdf
A. January 12, 2010 When I began this comment, Haiti, a country only slightly larger than the state of Maryland and the poorest country in the western hemisphere,1 was hardly more than a blip on the world’s radar. But on January 12, 2010, the world was forced to take notice of Haiti as it suffered the worst natural disaster it had ever faced in its 200-year history: a catastrophic 7.0 ...
https://news.temple.edu/nutshell/2023-03-20/what-do-you-meme-you-can-get-sued-social-post
If your meme is fixed and original, then you don’t have to do anything else for it to receive copyright protection. However, Harris says that you will want to register your meme with the copyright office if you’re really worried that someone will infringe on your intellectual property rights.
https://cis.temple.edu/~jiewu/research/publications/Publication_files/jiang_www_2020.pdf
The goal is to generate a list of potential items,Ttar ⊂ T, each one of which is represented as a reCap, and provide expla-nations for , so as to enhance recommendation serendipity (a utar balance between diference and accuracy) and explainability.
https://cis.temple.edu/~latecki//Courses/CIS166-Spring07/Lectures/ch7.4.pdf
Section 7.4 Closures of Relations Definition: The closure of a R relation with respect property P is the relation number of ordered R to obtain pairs property to