https://cis.temple.edu/~pwang/Publication/AI_Misconceptions.pdf
In the discussions on the limitation of Artificial Intelligence (AI), there are three major misconceptions, which identify an AI system with an ax-iomatic system, a Turing machine, and a system with a model-theoretic se-mantics, respectively. Though these three notions can be used to describe a computer system for certain purposes, they are not always the proper theoretical notions when an AI ...
https://liberalarts.temple.edu/sites/liberalarts/files/Handbook_on_the_Economics.pdf
The largest part of the industry (75 percent) comprises guards or patrol ofi cers. With the rising employment of technology, security blends into the IT department, especially in the proprietary context. It is also important to note that in both segments of the indus-try some security employees spend part of their time in such non- security- related tasks as concierge- type activities.
https://sites.temple.edu/nickerson/files/2017/07/Gerber_Green_Nickerson.PA_.2001.pdf
If the publication decisions of journals are a function of the statistical significance of re-search findings, the published literature may suffer from “publication bias.” This paper describes a method for detecting publication bias. We point out that to achieve statisti-cal significance, the effect size must be larger in small samples. If publications tend to be biased against ...
https://cis.temple.edu/~jiewu/research/publications/Publication_files/AVOA_Fuzzy.pdf
Abstract—The Internet of Things (IoT) has rapidly grown in the past decade as an emerging technology. Due to the heterogeneity and energy limitations of IoT devices, adopting eficient management practices for developing IoT applications and managing IoT networks is a challenging task. One of the most critical IoT challenges that needs to be considered is routing due to its significant impact ...
https://cis.temple.edu/tagit/presentations/Dual-Process%20Theories%20of%20Higher%20Cognition%20Advancing%20the%20Debate.pdf
Criticism 4: Single-process accounts may be offered for dual-process phenomena The main argument is that a unified theory of decision making can be made on the basis of rule processing and that attempts to separate rule-based processing from other kinds. They agree that all behavior attributed to Type 1 and 2 processes by dual-process theorists can be described using rules and modeled by ...
https://cis.temple.edu/~latecki/Papers/PAMIshape08.pdf
Xiang Bai and Longin Jan Latecki, Senior Member, IEEE Abstract—This paper proposes a novel graph matching algorithm and applies it to shape recognition based on object silhouettes. The main idea is to match skeleton graphs by comparing the geodesic paths between skeleton endpoints. In contrast to typical tree or graph matching methods, we do not consider the topological graph structure. Our ...
https://cis.temple.edu/~latecki/Papers/cvpr00.pdf
Abstract The Core Experiment CE-Shape-1 for shape descriptors performed for the MPEG-7 standard gave a unique oppor-tunity to compare various shape descriptors for non-rigid shapes with a single closed contour. There are two main dif-ferences with respect to other comparison results reported in the literature: (1) For each shape descriptor, the exper-iments were carried out by an institute ...
https://sites.temple.edu/cognitionlearning/files/2013/09/Ramirez-et-al-2013.pdf
The University of Chicago Although math anxiety is associated with poor mathematical knowledge and low course grades (Ashcraft & Krause, 2007), research establishing a connection between math anxiety and math achievement has generally been conducted with young adults, ignoring the emergence of math anxiety in young children. In the current study, we explored whether math anxiety relates to ...