https://cis.temple.edu/~ingargio/cis587/readings/id3-c45.html
Introduction ID3 and C4.5 are algorithms introduced by Quinlan for inducing Classification Models, also called Decision Trees, from data.
https://cis.temple.edu/~wu/hoc4667-liu.pdf
ABSTRACT The non-existence of an end-to-end path poses a challenge in adapting the traditional routing algorithms to delay tolerant networks (DTNs). Previous works include centralized rout-ing approaches based on deterministic mobility, ferry-based routing with deterministic or semi-deterministic mobility, °ooding-based approaches for networks with general mo-bility, and probability-based ...
https://ronlevygroup.cst.temple.edu/courses/2016_fall/biost5312/lectures/biostat_lecture_09.pdf
2 1 if C < n=2 if C = n=2 This is a special case of the small-sample, one-sample binomial test.
https://cis.temple.edu/~latecki/Papers/mldm07.pdf
Abstract. Outlier detection has recently become an important prob-lem in many industrial and ̄nancial applications. In this paper, a novel unsupervised algorithm for outlier detection with a solid statistical foun-dation is proposed. First we modify a nonparametric density estimate with a variable kernel to yield a robust local density estimation. Out-liers are then detected by comparing the ...
https://cis.temple.edu/~apal/ccgrid_iot.pdf
Abstract—In this paper we examine the problem of conflict detection and mitigation across multiple independently designed IoT subsystems deployed in a shared environment. The desired behavior of the system is codified in terms of predefined “safety properties”. We allow both the operational rules and safety properties to include time and temporal logic operations and detect their ...
https://community.mis.temple.edu/mis5203sec951summer2020/files/2019/01/application-audit-process-guide-information-security-professionals-1534.pdf
The Application Audit Process - A Guide for Information Security Professionals This paper is meant to be a guide for IT professionals, whose applications are audited, either by an internal or external IS audit. It provides a basic understanding of the IS Audit process. It is also meant as an aid for auditors to facilitate the audit process by communicating audit terms and objectives. The ...
https://cis.temple.edu/~wu/teaching/Spring2022/Chapter4.pdf
Greedy approaches Seek to maximize the overall utility of some process by making the
https://cis.temple.edu/~jiewu/research/publications/Publication_files/Paper%206750%20Camera%20Ready%20Version.pdf
FedHAN: A Cache-Based Semi-Asynchronous Federated Learning Framework Defending Against Poisoning Attacks in Heterogeneous Clients Xiaoding Wang1 , Bin Ye1 , Li Xu1 , Sun-Yuan Hsieh2 , Jie Wu3;4 and Limei Lin1 1College of Computer and Cyber Security, Fujian Provincial Key Laboratory of Network Security and Cryptology, Fujian Normal University, Fuzhou 350117, China 2Department of Computer ...
https://community.mis.temple.edu/mis5206sec001fall2021/files/2017/08/ISACA_Risk-IT-Framework_fmk_Eng_0610.pdf
Disclaimer ISACA has designed and created The Risk IT Framework (the ‘Work’) primarily as an educational resource for chief information officers (CIOs), senior management and IT management. ISACA makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of all proper information, procedures and tests or exclusive of other ...
https://www.fox.temple.edu/sites/fox/files/documents/Cummins%20Conference%202022/XiangHuBao-main-2022-03-23.pdf
The significant progress in information technologies promotes new venues in risk sharing and risk management practices (OECD, 2017). Just as peer-to-peer (P2P) lending platforms connected un-or under-financed borrowers to lenders, emerging fintech platforms can also be leveraged to reach traditionally un-insured or under-insured customers.2 This is exemplified by Xiang Hu Bao (XHB, meaning ...