https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf
Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...
https://cis-linux1.temple.edu/~latecki/Courses/AI-Fall11/Lectures/ch5SVM.ppt
Outline What do we mean with classification, why is it useful Machine learning- basic concept Support Vector Machines (SVM) Linear SVM – basic terminology and some formulas Non-linear SVM – the Kernel trick An example: Predicting protein subcellular location with SVM Performance measurments Classification Everyday, all the time we classify things. Eg crossing the street: Is there a car ...
https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/KalmanFilterSIGGRAPH2001.pdf
The good news is you don’t have to be a mathematical genius to understand and effectively use Kalman filters. This tutorial is designed to provide developers of graphical systems with a basic understanding of this important mathematical tool.
https://sites.temple.edu/borguet/files/2024/10/zou-et-al-2024-a-simplified-approach-for-dynamic-contact-angle-measurements.pdf
ABSTRACT: Contact angle measurement is a valuable tool for analyzing surface properties, including surface structure, cleanliness, and solid−liquid interactions. Typically, this measurement is performed at the static state, capturing the interactions at the solid−liquid interface when the gas, liquid, and solid phases reach equilibrium. In this study, we developed a user-friendly setup for ...
https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf
Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...
https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf
How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010
https://cis.temple.edu/tagit/publications/A_Model_of_Unified_Perception_and_Cognition.pdf
NARS (Non-Axiomatic Reasoning System) is an AGI system designed in the framework of a reasoning (or inference) system, where the notion of “reasoning” is used in its broad sense to include many cognitive functions, including learning and perception (Wang, 1995, 2006, 2013). Perception, usually taken to mean sensory understanding, is highly relevant to AI. Perception and cognition are ...
https://faculty.cst.temple.edu/~yury/LH4lam.pdf
We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.
https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf
In all five group mobility models, random motion of each individual MN within a given group occurs. In Section 4, we illustrate that a mobility model has a large effect on the performance evaluation of an ad hoc network protocol. In other words, we show how the performance results of an ad hoc network pro-tocol significantly change when the mobility model in the simulation is changed. The ...
https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf
Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...