Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 4,270

Deobfuscation of Virtualization-obfuscated Code through Symbolic ...

https://cis.temple.edu/~qzeng/papers/deobfuscation-icics2017.pdf

Abstract. Virtualization-obfuscation replaces native code in a binary with semantically equivalent and self-de ned bytecode, which, upon ex-ecution, is interpreted by a custom virtual machine. It makes the code very di cult to analyze and is thus widely used in malware. How to deobfuscate such virtualization obfuscated code has been an important and challenging problem. We approach the problem ...

An introduction to Support Vector Machines

https://cis-linux1.temple.edu/~latecki/Courses/AI-Fall11/Lectures/ch5SVM.ppt

Outline What do we mean with classification, why is it useful Machine learning- basic concept Support Vector Machines (SVM) Linear SVM – basic terminology and some formulas Non-linear SVM – the Kernel trick An example: Predicting protein subcellular location with SVM Performance measurments Classification Everyday, all the time we classify things. Eg crossing the street: Is there a car ...

CoursePack.book - Temple University

https://cis.temple.edu/~latecki/Courses/CIS750-03/Papers/KalmanFilterSIGGRAPH2001.pdf

The good news is you don’t have to be a mathematical genius to understand and effectively use Kalman filters. This tutorial is designed to provide developers of graphical systems with a basic understanding of this important mathematical tool.

A Simplified Approach for Dynamic Contact Angle Measurements

https://sites.temple.edu/borguet/files/2024/10/zou-et-al-2024-a-simplified-approach-for-dynamic-contact-angle-measurements.pdf

ABSTRACT: Contact angle measurement is a valuable tool for analyzing surface properties, including surface structure, cleanliness, and solid−liquid interactions. Typically, this measurement is performed at the static state, capturing the interactions at the solid−liquid interface when the gas, liquid, and solid phases reach equilibrium. In this study, we developed a user-friendly setup for ...

MRRC: an effective cache for fast memory registration in RDMA

https://cis.temple.edu/~he/publications/Conferences/RDMA_MSST06.pdf

Abstract RDMA reduces network latency by eliminating unnec-essary copies from network interface card to application buffers, but how to reduce memory registration cost is a challenge. Previous studies use pin-down cache and batched deregistration to address this issue, but only sim-ple LRU is used as a replacement algorithm to manage the cache space. In this paper, we propose an effective ...

How to Benchmark Code Execution Times on Intel IA-32 and IA-64 ...

https://cis.temple.edu/~qzeng/cis3207-spring18/files/ia-32-ia-64-benchmark-code-execution-paper.pdf

How to Benchmark Code Execution Times on Intel® IA-32 and IA-64 Instruction Set Architectures September 2010

A Model of Unified Perception and Cognition - Temple University

https://cis.temple.edu/tagit/publications/A_Model_of_Unified_Perception_and_Cognition.pdf

NARS (Non-Axiomatic Reasoning System) is an AGI system designed in the framework of a reasoning (or inference) system, where the notion of “reasoning” is used in its broad sense to include many cognitive functions, including learning and perception (Wang, 1995, 2006, 2013). Perception, usually taken to mean sensory understanding, is highly relevant to AI. Perception and cognition are ...

Legendre-Hadamard conditions for two-phase configuration

https://faculty.cst.temple.edu/~yury/LH4lam.pdf

We generalize the classical Legendre-Hadamard conditions by using quadratic extensions of the energy around a set of two configurations and obtain new algebraic necessary conditions for nonsmooth strong local minimizers. The implied bounds of stability are easily accessible as we illustrate on a nontrivial example where quasiconvexification is unknown.

WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput ...

https://cis.temple.edu/~wu/teaching/spring2017_files/mobility.pdf

In all five group mobility models, random motion of each individual MN within a given group occurs. In Section 4, we illustrate that a mobility model has a large effect on the performance evaluation of an ad hoc network protocol. In other words, we show how the performance results of an ad hoc network pro-tocol significantly change when the mobility model in the simulation is changed. The ...

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...