Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 49

The Cost of Convenience: © 2010 University of Uta

https://sites.temple.edu/nickerson/files/2017/07/Bennion_Nickerson.2011.pdf

Abstract Lower transaction costs have shifted voter registration activities online and away from traditional modes of outreach. Downloading forms may impose higher transaction costs than traditional outreach for some people and thereby decrease electoral participation. A randomized, controlled experiment tested this hypothesis by encouraging treat-ment participants via e-mail to use online ...

GIFT: Towards Scalable 3D Shape Retrieval - Temple University

https://cis.temple.edu/~latecki/Papers/GIFT-IEEEMM2017.pdf

Abstract—Projective analysis is an important solution in three-dimensional (3D) shape retrieval, since human visual perceptions of 3D shapes rely on various 2D observations from different viewpoints. Although multiple informative and discriminative views are utilized, most projection-based retrieval systems suffer from heavy computational cost, and thus cannot satisfy the basic requirement ...

Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence ...

https://www.fox.temple.edu/sites/fox/files/Frontiers-Machines-versus-Humans-The-Impact-of-Artificial-Intelligence-Chatbot-Disclosure-on-Customer-Purchases.pdf

Frontiers: Machines vs. Humans: The Impact of Artificial Intelligence Chatbot Disclosure on Customer Purchases Xueming Luo,aSiliang Tong,aZheng Fang,bZhe Quc

Fog/Edge Computing For Security, Privacy, and Applications

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Fog_Edge_Computing_BC2020.pdf

This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The ...

TileSR: Accelerate On-Device Super-Resolution with Parallel Offloading ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/m37113-chen%20final.pdf

Abstract—Recent years have witnessed the unprecedented performance of convolutional networks in image super-resolution (SR). SR involves upscaling a single low-resolution image to meet application-specific image quality demands, making it vital for mobile devices. However, the excessive computational and memory requirements of SR tasks pose a challenge in mapping SR networks on a single ...

location_mobicom.dvi - Temple University

https://cis.temple.edu/~jiewu/teaching/Spring%202013/01-savvides-localization-wireless-sensor-networks-fine-grained.pdf

Abstract— Wireless communication systems have become increasingly common because of advances in radio and embedded system technologies. In recent years, a new class of applications that networks these wireless de-vices together is evolving. A representative of this class that has received considerable attention from the research community is the wireless sensor network. Such a sensor ...

The Socialist Legal System with Chinese Characteristics:

https://sites.temple.edu/ticlj/files/2017/02/24.1.Zhang-TICLJ.pdf

The specifics of what is a socialist legal system and what constitutes Chinese characteristics in terms of the rule of law are subject to further debate. The Confucian heritage rooted legal tradition and the single party ruling system have significantly shaped the legal landscape of the country, making the route to the rule of law in China a long and thorny one. Despite China’s socialist ...

Time-Based Proxy Re-encryption Scheme for Secure Data Sharing in a ...

https://www.cis.temple.edu/~jiewu/research/publications/Publication_files/INS-Time-Based%20Proxy%20Re-encryption%20Scheme%20for%20Secure%20Data%20Sharing%20in%20a%20Cloud%20Environment.pdf

Abstract A fundamental approach for secure data sharing in a cloud environment is to let the data owner encrypt data before outsouring. To simultaneously achieve fine-grained access control on encrypted data and scalable user revo-cation, existing work combines attribute-based encryption (ABE) and proxy re-encryption (PRE) to delegate the cloud service provider (CSP) to execute re-encryption ...

Distributed Deep Multi-Agent Reinforcement Learning for Cooperative ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/Distributed_Deep_Multi-Agent_Reinforcement_Learning_for_Cooperative_Edge_Caching_in_Internet-of-Vehicles.pdf

Abstract—Edge caching is a promising approach to reduce duplicate content transmission in Internet-of-Vehicles (IoVs). Sev-eral Reinforcement Learning (RL) based edge caching methods have been proposed to improve the resource utilization and reduce the backhaul trafic load. However, they only obtain the local sub-optimal solution, as they neglect the influence from environments by other ...